CN114885329B - Information security system based on wireless communication network - Google Patents

Information security system based on wireless communication network Download PDF

Info

Publication number
CN114885329B
CN114885329B CN202210277118.3A CN202210277118A CN114885329B CN 114885329 B CN114885329 B CN 114885329B CN 202210277118 A CN202210277118 A CN 202210277118A CN 114885329 B CN114885329 B CN 114885329B
Authority
CN
China
Prior art keywords
module
information
mobile phone
software
information security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210277118.3A
Other languages
Chinese (zh)
Other versions
CN114885329A (en
Inventor
廖雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Aojun Technology Group Co ltd
Original Assignee
Hunan Aojun Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Aojun Technology Group Co ltd filed Critical Hunan Aojun Technology Group Co ltd
Priority to CN202210277118.3A priority Critical patent/CN114885329B/en
Priority to CN202310710295.0A priority patent/CN117041963A/en
Priority to CN202310710350.6A priority patent/CN116866913A/en
Publication of CN114885329A publication Critical patent/CN114885329A/en
Application granted granted Critical
Publication of CN114885329B publication Critical patent/CN114885329B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/65Environment-dependent, e.g. using captured environmental data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an information security system based on a wireless communication network, which comprises a permission registration module, an information matching verification module and an information security control module, wherein the permission registration module is used for registering and storing personal operation files of adults and information of people to be protected, the information matching verification module is used for matching and verifying users when a mobile phone end is used, the information security control module is used for carrying out deep information security control when the people to be protected are judged to use the mobile phone, and the permission registration module, the information matching verification module and the information security control module are connected through signals; the authority registration module comprises an information storage module, a security setting module, a software authorization module and a file establishment module, wherein the information storage module is used for recording and storing personal information of a protected person.

Description

Information security system based on wireless communication network
Technical Field
The invention relates to the technical field of information data, in particular to an information security system based on a wireless communication network.
Background
Because of the rapid promotion of the current technology and the popularization of big data, the content pushed by the platform is more and more accurate through the algorithm recommendation technology, and is highly targeted; for minors with poor homemade strength, long-term immersion in them can make their information field of view narrower and narrower. Although some online games, short video and live platforms have introduced teenager anti-addiction systems, some have limited use. For example, one piece of application software is limited to 40 minutes, but a plurality of pieces of application software can be downloaded to be used in turn, and the total online time is still uncontrollable; many children use a cell phone for grandpa milk, and some program software is set in adult mode by default; after some application software is unloaded and reloaded, the previous state can be restored, and the mode of teenager is similar to the dummy mode. Therefore, it is necessary to design an information security system based on a wireless communication network with high practicality and high security.
Disclosure of Invention
The present invention is directed to an information security system based on a wireless communication network, so as to solve the problems set forth in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: the information security system based on the wireless communication network comprises a permission registration module, an information matching verification module and an information security control module, wherein the permission registration module is used for registering and storing personal operation files of adults and information of people to be protected, the information matching verification module is used for matching and verifying users when a mobile phone end is used, the information security control module is used for carrying out deep information security control when the people to be protected are judged to use the mobile phone, and the permission registration module, the information matching verification module and the information security control module are connected through signals;
the authority registration module comprises an information storage module, a security setting module, a software authorization module and a file establishment module, wherein the information storage module is used for recording and storing personal information of a protected person, the security setting module is used for setting security use time limit for preventing addiction, the software authorization module is used for selecting and authorizing a software mode to follow an information security system, the file establishment module is used for establishing personal operation files of an adult owner, the file establishment module comprises an operation mode recording module I, and the operation mode recording module I is used for recording operation habit flow under multiple dimensions.
According to the technical scheme, the information matching verification module comprises a right login module, an operation mode recording module II and an information research and judgment module, wherein the right login module is used for identifying and logging in user information when the mobile phone terminal is used, the operation mode recording module II is used for recording operation habit processes under multiple dimensions after the right login, the right login module and the operation mode recording module II are both in signal connection with the information research and judgment module, and the information research and judgment module is used for analyzing and judging whether the operation habit processes are consistent with information of right login personnel.
According to the technical scheme, the information security control module comprises a system following module, a communication control assembly and a locking module, wherein the system following module is used for controlling the control mode of authorized software to follow information security system setting, the communication control assembly is used for controlling the communication network to intelligently intercept push information, the locking module is in signal connection with the security setting module, and the locking module is used for controlling the corresponding mobile phone terminal to carry out limiting locking.
According to the technical scheme, the communication control assembly comprises a communication signal receiving module, a detecting module and an intercepting module, wherein the communication signal receiving module is used for receiving pushing information sent by a sending end through a wireless communication network, the detecting module is used for detecting and identifying pushing information content, and the intercepting module is used for intercepting network services by detecting the pushing information containing bad guidance.
According to the technical scheme, the operation method of the permission registration module mainly comprises the following steps:
step S1: the method comprises the steps that an information security system starts to be registered at a mobile phone end, and firstly, an authority registration module is entered;
step S2: binding personal information after entering an authority registration module, and carrying out face recognition authentication by a big data network, wherein after the authenticated registrant reaches the national legal adult age, entering an information storage partition and entering the next step, otherwise, the registration of an information security system cannot be completed;
step S3: filling personal related information of a protected person in the information storage partition, wherein the personal related information comprises age and gender information;
step S4: entering a security setting partition, and setting time for safely using the mobile phone according to the condition of the protected personal protection addiction;
step S5: then, carrying out all or specific selection on the software in the mobile phone, authorizing the selected software, and connecting and synchronizing with an information security system;
step S6: finally, starting a file establishment module to start file establishment of a personal operation mode;
step S7: after the initial establishment of the file is completed, the authority registration of the information security system is completed;
step S8: in step S2-S7, the permission registration module requests the mobile phone end to start the face recognition module in the background in the whole process, and keeps the registered face in the whole process in the face view-finding frame for operation or recording, otherwise, the operation or recording is stopped.
According to the above technical solution, in step S6, the method for establishing the profile of the personal operation mode includes the following steps:
step S61: the file establishment module is started and runs in the background of the mobile phone terminal;
step S62: during background operation, a user normally operates the mobile phone, and records the operation habit flow of the registered user when the face is ensured to be in the face view frame in the whole course, wherein the recording method of the operation habit flow mainly comprises the recording of the software using frequency and average duration ratio, the recording of the high-frequency using time period of the mobile phone and the recording of the operation time during the switching between the software;
step S63: recording the data and storing the data in a file of the established personal operation mode;
step S64: after the data volume of the record of the software using frequency and average duration ratio, the record of the mobile phone high-frequency using time period and the record of the operation time during the switching among the software reach the standard value of the file preliminary establishment, the file preliminary establishment is completed;
step S65: after completing the preliminary establishment of the profile, the user may further repeat steps S61-S63, perfecting the personal operation mode profile.
According to the technical scheme, the operation method of the information matching verification module mainly comprises the following steps:
step A1: when a user uses a mobile phone end during non-registration, the permission login module is started to control face recognition verification;
step A2: when the face recognition verification is that the protected person, the information security system logs in successfully, the information matching verification module transmits signals to the information security control module, and the mobile phone uses security information to control; when the face recognition is not passed, the mobile phone terminal is directly locked; when the face recognition verification is an adult owner, the mobile phone terminal is directly unlocked for use, the second operation mode recording module starts background recording, and the operation habit flow data is transmitted to the information judging module and then is transferred to the next step;
step A3: and analyzing and judging whether the operation habit flow used by the mobile phone in the unlocking period is fit with the personal operation mode file in real time, if so, continuing to use, otherwise, starting to control the use safety information of the mobile phone by logging in the information safety system.
According to the above technical solution, the method for analyzing and judging whether to attach to the personal operation mode file in the step A3 further includes the following steps:
step A31: acquiring operation habit flow data in real time, firstly comparing a mobile phone use time period with a mobile phone high-frequency use time period in a personal operation mode file, judging and outputting a signal value when the current mobile phone use time period is within plus or minus 2 hours of the mobile phone high-frequency use time period, otherwise, not outputting the signal value;
step A32: then matching the software running in the personal operation mode file with the software using frequency and average duration ratio, judging to output a signal value when the software running in the current mobile phone simultaneously meets 10% of the software using frequency and 5% of the average duration in the personal operation mode file, otherwise, not outputting the signal value;
step A33: finally, comparing the operation time when the software is switched with the operation time when the software is switched in the personal operation mode file, judging to output a signal value when the average operation time when the current software is switched is more than 50% of the operation time when the software is switched in the personal operation mode file, otherwise, judging not to output the signal value;
step A34: capturing a signal value, and when the captured signal value is larger than 1, analyzing and judging that the personal operation mode file is attached, and continuing to use the mobile phone; otherwise, the information security system intervenes, and the mobile phone is controlled by using the security information.
According to the technical scheme, the operation method of the information security control module mainly comprises the following steps:
step B1: after the software is started, the system following module controls the authorized software to open a teenager mode;
step B2: when pushing information at a software terminal during the use of a mobile phone, a mobile phone port communication control component pre-detains information, inquires the pushing content, semantically identifies whether the pushing content contains a guide link and unsuitable words, and intercepts the pushing information with the conditions;
step B3: after the mobile phone service time reaches the set safe mobile phone service time, the information security system controls the mobile phone to lock.
According to the above technical solution, the method for recording the operation time during the switching between the software in step S62 is as follows: and detecting that one piece of software is exited and the other piece of software is started in 30 seconds, recording the touch screen clicking times m in the time t from the exiting of the one piece of software to the clicking of the other piece of software, and outputting the time as the operation time when the software is switched between by using the value of t/m.
Compared with the prior art, the invention has the following beneficial effects: the invention can control the information security even after the face authentication of the information security system is passed, and can realize double verification and strengthen the security protection of underadults if the operation habit flow is judged to be not in accordance with the use habit of the adult owner during the subsequent operation.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a schematic diagram of the system module composition of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present invention provides the following technical solutions: the information security system based on the wireless communication network comprises a permission registration module, an information matching verification module and an information security control module, wherein the permission registration module is used for registering and storing personal operation files of an adult owner and information of a person to be protected, the information matching verification module is used for matching and verifying a user when a mobile phone end is used, the information security control module is used for carrying out deep information security control when the person to be protected is judged to use the mobile phone, and the permission registration module, the information matching verification module and the information security control module are connected through signals;
the authority registration module comprises an information storage module, a security setting module, a software authorization module and a file establishment module, wherein the information storage module is used for recording and storing personal information of a protected person, the security setting module is used for setting security use time limit for preventing addiction, the software authorization module is used for selecting and authorizing a software mode to follow an information security system, the file establishment module is used for establishing personal operation files of adult owners, the file establishment module comprises an operation mode recording module I, and the operation mode recording module I is used for recording operation habit flow under multiple dimensions.
The information matching verification module comprises a right login module, an operation mode recording module II and an information research and judgment module, wherein the right login module is used for identifying and logging in user information when the mobile phone terminal is used, the operation mode recording module II is used for recording operation habit processes under multiple dimensions after the right login, the right login module and the operation mode recording module II are both in signal connection with the information research and judgment module, and the information research and judgment module is used for analyzing and judging whether the operation habit processes are consistent with the information of right login personnel.
The information security control module comprises a system following module, a communication control module and a locking module, wherein the system following module is used for controlling the control mode of authorized software to follow the information security system setting, the communication control module is used for controlling the communication network to intelligently intercept push information, the locking module is in signal connection with the security setting module, and the locking module is used for controlling the corresponding mobile phone terminal to carry out limiting locking.
The communication control assembly comprises a communication signal receiving module, a detection module and an interception module, wherein the communication signal receiving module is used for receiving push information sent by a sending end through a wireless communication network, the detection module is used for detecting and identifying push information content, and the interception module is used for intercepting network services by detecting the push information containing bad guidance.
The operation method of the permission registration module mainly comprises the following steps:
step S1: the method comprises the steps that an information security system starts to be registered at a mobile phone end, and firstly, an authority registration module is entered;
step S2: binding personal information after entering an authority registration module, and carrying out face recognition authentication by a big data network, wherein after the authenticated registrant reaches the national legal adult age, entering an information storage partition and entering the next step, otherwise, the registration of an information security system cannot be completed; thereby avoiding the unauthorized registration of the information security system by the minors, and leading the information security system to not achieve the effect of substantially protecting the minors;
step S3: filling personal related information of the protected person in the information storage partition, wherein the personal related information comprises age and gender information; the information security system can take security control measures which are most suitable for the protected person according to the personal related information of the protected person, so as to achieve the expediency between deep protection and avoiding excessive limitation;
step S4: entering a security setting partition, and setting time for safely using the mobile phone according to the condition of the protected personal protection addiction;
step S5: then, carrying out all or specific selection on the software in the mobile phone, authorizing the selected software, and connecting and synchronizing with an information security system; the software can further identify the control authority of the current information security system, and synchronize whether the software needs to start a self teenager mode or not when the software is used, so that the information security system is not required to be further controlled, and the effect of convenience and rapidness is realized;
step S6: finally, starting a file establishment module to start file establishment of a personal operation mode;
step S7: after the initial establishment of the file is completed, the authority registration of the information security system is completed;
step S8: in the steps S2-S7, the permission registration module requires the mobile phone end to start the face recognition module in the background in the whole course, and keeps the registered face in the whole course in the face view-finding frame for operation or recording, otherwise, the operation or recording is stopped; and furthermore, the malicious registration after the face authentication is bypassed by the non-compliance ways such as temporary face brushing and parent information acquisition of minors in the registration process is effectively prevented, and the safety and the perfection of the information security system are further improved.
In step S6, the file creation method of the personal operation mode includes the following steps:
step S61: the file establishment module is started and runs in the background of the mobile phone terminal;
step S62: during background operation, a user normally operates the mobile phone, and when the whole face is ensured to be in the face view frame, the operation habit flow of the registered user is recorded, and the recording method of the operation habit flow mainly comprises the recording of the software using frequency and the average duration ratio, the recording of the high-frequency using time period of the mobile phone and the recording of the operation time during the switching between the software; because the operation fluency of each person to the mobile phone is different, especially between the old and the minor, the operation fluency of the old is generally sparse and greatly different from that of the minor, and meanwhile, the time period of each person for using the mobile phone at high frequency and the frequency of common software are different, a set of operation habit flow conforming to the adult owner is established through the records, and the protected minor is prevented from continuing to enthrallly to use the mobile phone through temporary face brushing and other ways;
step S63: recording the data and storing the data in a file of the established personal operation mode;
step S64: after the data volume of the record of the software using frequency and average duration ratio, the record of the mobile phone high-frequency using time period and the record of the operation time during the switching among the software reach the standard value of the file preliminary establishment, the file preliminary establishment is completed;
step S65: after completing the preliminary establishment of the profile, the user may further repeat steps S61-S63, perfecting the personal operation mode profile; furthermore, the accuracy of the personal operation mode file can be further improved by recording more personal operation habit processes, and the judgment error rate is high when information matching verification is avoided.
The operation method of the information matching verification module mainly comprises the following steps:
step A1: when a user uses a mobile phone end during non-registration, the permission login module is started to control face recognition verification;
step A2: when the face recognition verification is that the protected person, the information security system logs in successfully, the information matching verification module transmits signals to the information security control module, and the mobile phone uses security information to control; when the face recognition is not passed, the mobile phone terminal is directly locked; when the face recognition verification is an adult owner, the mobile phone terminal is directly unlocked for use, the second operation mode recording module starts background recording, and the operation habit flow data is transmitted to the information judging module and then is transferred to the next step;
step A3: analyzing and judging whether the operation habit flow used by the mobile phone is attached to the personal operation mode file in real time, if so, continuing to use, otherwise, starting to control the use safety information of the mobile phone by logging in the information safety system; compared with the traditional mode of directly utilizing adult family members to brush faces to remove underage management and control limitation, the invention can carry out information security control on the adult family members when judging that the operation habit flow does not accord with the use habit of the adult family members in the follow-up operation period after the face authentication of the information security system, realize double authentication, strengthen the safety protection of underage, and if the information security system judges that the information security system operates the mobile phone not in a machine owner, the control is still to be removed after the information security control is carried out, the face is required to be in a background face view frame in the whole course when the adult family members subsequently use the mobile phone until the personal operation habit flow file is further perfected to accord with the information research and judgment requirement.
The method for analyzing and judging whether to attach the personal operation mode file in the step A3 further comprises the following steps:
step A31: acquiring operation habit flow data in real time, firstly comparing a mobile phone use time period with a mobile phone high-frequency use time period in a personal operation mode file, judging and outputting a signal value when the current mobile phone use time period is within plus or minus 2 hours of the mobile phone high-frequency use time period, otherwise, not outputting the signal value;
step A32: then matching the software running in the personal operation mode file with the software using frequency and average duration ratio, judging to output a signal value when the software running in the current mobile phone simultaneously meets 10% of the software using frequency and 5% of the average duration in the personal operation mode file, otherwise, not outputting the signal value;
step A33: finally, comparing the operation time when the software is switched with the operation time when the software is switched in the personal operation mode file, judging to output a signal value when the average operation time when the current software is switched is more than 50% of the operation time when the software is switched in the personal operation mode file, otherwise, judging not to output the signal value;
step A34: capturing a signal value, and when the captured signal value is larger than 1, analyzing and judging that the personal operation mode file is attached, and continuing to use the mobile phone; otherwise, the information security system intervenes, and the mobile phone is controlled by using the security information.
The operation method of the information security control module mainly comprises the following steps:
step B1: after the software is started, the system following module controls the authorized software to open a teenager mode; furthermore, deep intervention control of an information safety system is not needed, and unsuitable information is automatically filtered by utilizing a software internal teenager mode;
step B2: when pushing information at a software terminal during the use of a mobile phone, a mobile phone port communication control component pre-detains information, inquires the pushing content, semantically identifies whether the pushing content contains a guide link and unsuitable words, and intercepts the pushing information with the conditions; the possibility of physical and psychological influence and property loss caused by curiosity of minors due to the fact that part of software directly pushes out information with poor guidance during information safety control is avoided;
step B3: after the mobile phone use time reaches the set safe mobile phone use time, the information security system controls the mobile phone to lock; the negative influence on physical and mental health, study life and family relation of the underage and long-time addiction mobile phone is avoided.
The recording method of the operation time during the switching between the software in step S62 is as follows: detecting that one piece of software is withdrawn and the other piece of software is started in 30 seconds, recording the touch screen clicking times m in the time t from the withdrawal of the one piece of software to the clicking of the other piece of software, and outputting the time as the operation time when the software is switched by using the value of t/m; the operation of switching between the software is judged by detecting that one software exits and the other software is started within 30 seconds, if the operation takes a short time and the number of touch screen times is more, the operation of the mobile phone is indirectly reflected to be smoother, the operation fluency of different users is different, especially the operation of the old is generally sparse, and the operation fluency of the old and the minors are greatly different, so that the operation fluency of the old is used as a judgment criterion of a personal operation habit flow.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. The utility model provides an information security system based on wireless communication network, includes permission registration module, information match verification module and information security control module, its characterized in that: the right registration module is used for registering and storing personal operation files of adult owners and information of protected personnel, the information matching verification module is used for matching and verifying the user when the mobile phone end is used, the information security control module is used for carrying out deep information security control when the protected personnel are judged to use the mobile phone, and the right registration module, the information matching verification module and the information security control module are connected through signals;
the authority registration module comprises an information storage module, a security setting module, a software authorization module and a file establishment module, wherein the information storage module is used for recording and storing personal information of a protected person, the security setting module is used for setting security use time limit for preventing addiction, the software authorization module is used for selecting and authorizing a software mode to follow an information security system, the file establishment module is used for establishing a personal operation file of an adult owner, the file establishment module comprises an operation mode recording module I, and the operation mode recording module I is used for recording operation habit flow under multiple dimensions;
the operation method of the information matching verification module mainly comprises the following steps:
step A1: when a user uses a mobile phone end during non-registration, the permission login module is started to control face recognition verification;
step A2: when the face recognition verification is that the protected person, the information security system logs in successfully, the information matching verification module transmits signals to the information security control module, and the mobile phone uses information security control; when the face recognition is not passed, the mobile phone terminal is directly locked; when the face recognition verification is an adult owner, the mobile phone terminal is directly unlocked for use, the second operation mode recording module starts background recording, and the operation habit flow data is transmitted to the information judging module and then is transferred to the next step;
step A3: analyzing and judging whether the operation habit flow used by the mobile phone is attached to the personal operation mode file in real time, if so, continuing to use, otherwise, starting to control the information security of the mobile phone by the information security system login;
the operation method of the information security control module mainly comprises the following steps:
step B1: after the software is started, the system following module controls the authorized software to open a teenager mode;
step B2: when pushing information at a software terminal during the use of a mobile phone, a mobile phone port communication control component pre-detains information, inquires the pushing content, semantically identifies whether the pushing content contains a guide link and unsuitable words, and intercepts the pushing information with the conditions;
step B3: after the mobile phone service time reaches the set safe mobile phone service time, the information security system controls the mobile phone to lock.
2. An information security system based on a wireless communication network as claimed in claim 1, wherein: the information matching verification module comprises a right login module, an operation mode recording module II and an information research and judgment module, wherein the right login module is used for identifying and logging in user information when the mobile phone terminal is used, the operation mode recording module II is used for recording operation habit processes under multiple dimensions after the right login, the right login module and the operation mode recording module II are both in signal connection with the information research and judgment module, and the information research and judgment module is used for analyzing and judging whether the operation habit processes are consistent with information of right login personnel.
3. An information security system based on a wireless communication network as claimed in claim 2, wherein: the information security control module comprises a system following module, a communication control assembly and a locking module, wherein the system following module is used for controlling the control mode of authorized software to follow information security system setting, the communication control assembly is used for controlling a communication network to intelligently intercept push information, the locking module is in signal connection with the security setting module, and the locking module is used for controlling a corresponding mobile phone terminal to carry out limiting locking.
4. A wireless communication network-based information security system according to claim 3, wherein: the communication control assembly comprises a communication signal receiving module, a detection module and an interception module, wherein the communication signal receiving module is used for receiving pushing information sent by a sending end through a wireless communication network, the detection module is used for detecting and identifying pushing information content, and the interception module is used for intercepting network services by detecting the pushing information containing bad guidance.
5. An information security system based on a wireless communication network as claimed in claim 4, wherein: the operation method of the permission registration module mainly comprises the following steps:
step S1: the method comprises the steps that an information security system starts to be registered at a mobile phone end, and firstly, an authority registration module is entered;
step S2: binding personal information after entering an authority registration module, and carrying out face recognition authentication by a big data network, wherein after the authenticated registrant reaches the national legal adult age, entering an information storage partition and entering the next step, otherwise, the registration of an information security system cannot be completed;
step S3: filling personal related information of a protected person in the information storage partition, wherein the personal related information comprises age and gender information;
step S4: entering a security setting partition, and setting time for safely using the mobile phone according to the condition of the protected personal protection addiction;
step S5: then, carrying out all or specific selection on the software in the mobile phone, authorizing the selected software, and connecting and synchronizing with an information security system;
step S6: finally, starting a file establishment module to start file establishment of a personal operation mode;
step S7: after the initial establishment of the file is completed, the authority registration of the information security system is completed;
step S8: in step S2-S7, the permission registration module requests the mobile phone end to start the face recognition module in the background in the whole process, and keeps the registered face in the whole process in the face view-finding frame for operation or recording, otherwise, the operation or recording is stopped.
6. An information security system based on a wireless communication network as claimed in claim 5, wherein: in the step S6, the file creation method of the personal operation mode includes the following steps:
step S61: the file establishment module is started and runs in the background of the mobile phone terminal;
step S62: during background operation, a user normally operates the mobile phone, and records the operation habit flow of the registered user when the face is ensured to be in the face view frame in the whole course, wherein the recording method of the operation habit flow mainly comprises the recording of the software using frequency and average duration ratio, the recording of the high-frequency using time period of the mobile phone and the recording of the operation time during the switching between the software;
step S63: recording the data and storing the data in a file of the established personal operation mode;
step S64: after the data volume of the record of the software using frequency and average duration ratio, the record of the mobile phone high-frequency using time period and the record of the operation time during the switching among the software reach the standard value of the file preliminary establishment, the file preliminary establishment is completed;
step S65: after completing the preliminary establishment of the profile, the user may further repeat steps S61-S63, perfecting the personal operation mode profile.
7. An information security system based on a wireless communication network as claimed in claim 1, wherein: the method for analyzing and judging whether to attach the personal operation mode file in the step A3 further comprises the following steps:
step A31: acquiring operation habit flow data in real time, firstly comparing a mobile phone use time period with a mobile phone high-frequency use time period in a personal operation mode file, judging and outputting a signal value when the current mobile phone use time period is within plus or minus 2 hours of the mobile phone high-frequency use time period, otherwise, not outputting the signal value;
step A32: then matching the software running in the personal operation mode file with the software using frequency and average duration ratio, judging to output a signal value when the software running in the current mobile phone simultaneously meets 10% of the software using frequency and 5% of the average duration in the personal operation mode file, otherwise, not outputting the signal value;
step A33: finally, comparing the operation time when the software is switched with the operation time when the software is switched in the personal operation mode file, judging to output a signal value when the average operation time when the current software is switched is more than 50% of the operation time when the software is switched in the personal operation mode file, otherwise, judging not to output the signal value;
step A34: capturing a signal value, and when the captured signal value is larger than 1, analyzing and judging that the personal operation mode file is attached, and continuing to use the mobile phone; otherwise, the information security system intervenes, and the mobile phone uses information security control.
8. An information security system based on a wireless communication network as claimed in claim 6, wherein: the method for recording the operation time during the switching between the software in the step S62 is as follows: and detecting that one piece of software is exited and the other piece of software is started in 30 seconds, recording the touch screen clicking times m in the time t from the exiting of the one piece of software to the clicking of the other piece of software, and outputting the time as the operation time when the software is switched between by using the value of t/m.
CN202210277118.3A 2022-03-21 2022-03-21 Information security system based on wireless communication network Active CN114885329B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202210277118.3A CN114885329B (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network
CN202310710295.0A CN117041963A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network
CN202310710350.6A CN116866913A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210277118.3A CN114885329B (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202310710295.0A Division CN117041963A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network
CN202310710350.6A Division CN116866913A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Publications (2)

Publication Number Publication Date
CN114885329A CN114885329A (en) 2022-08-09
CN114885329B true CN114885329B (en) 2023-08-08

Family

ID=82666790

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202310710350.6A Pending CN116866913A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network
CN202210277118.3A Active CN114885329B (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network
CN202310710295.0A Pending CN117041963A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202310710350.6A Pending CN116866913A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202310710295.0A Pending CN117041963A (en) 2022-03-21 2022-03-21 Information security system based on wireless communication network

Country Status (1)

Country Link
CN (3) CN116866913A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115866585B (en) * 2023-02-16 2023-06-02 天津租赁资产交易中心股份有限公司 Mobile phone APP information protection method
CN116244757A (en) * 2023-03-15 2023-06-09 武汉天楚云计算有限公司 Computer equipment monitoring alarm method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281324A (en) * 2011-06-17 2011-12-14 袁程 Method for remote authorized management on menu items of mobile communication terminal system
CN105938543A (en) * 2016-03-30 2016-09-14 乐视控股(北京)有限公司 Addiction-prevention-based terminal operation control method, device, and system
CN108900719A (en) * 2018-09-27 2018-11-27 惠州Tcl移动通信有限公司 Mobile terminal children use control processing method, mobile terminal and storage medium
CN110263518A (en) * 2019-05-31 2019-09-20 新疆爱华盈通信息技术有限公司 Electronic equipment and its application method
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system
CN113709311A (en) * 2021-07-09 2021-11-26 深圳市赛云数据有限公司 User legalization operation service platform of virtual operator value-added service

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208337B2 (en) * 2009-09-22 2015-12-08 Denise G. Tayloe Systems, methods, and software applications for providing and identity and age-appropriate verification registry

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281324A (en) * 2011-06-17 2011-12-14 袁程 Method for remote authorized management on menu items of mobile communication terminal system
CN105938543A (en) * 2016-03-30 2016-09-14 乐视控股(北京)有限公司 Addiction-prevention-based terminal operation control method, device, and system
CN108900719A (en) * 2018-09-27 2018-11-27 惠州Tcl移动通信有限公司 Mobile terminal children use control processing method, mobile terminal and storage medium
CN110263518A (en) * 2019-05-31 2019-09-20 新疆爱华盈通信息技术有限公司 Electronic equipment and its application method
CN111756766A (en) * 2020-07-01 2020-10-09 天津理工大学 Network information safety protection system
CN113709311A (en) * 2021-07-09 2021-11-26 深圳市赛云数据有限公司 User legalization operation service platform of virtual operator value-added service

Also Published As

Publication number Publication date
CN114885329A (en) 2022-08-09
CN116866913A (en) 2023-10-10
CN117041963A (en) 2023-11-10

Similar Documents

Publication Publication Date Title
CN114885329B (en) Information security system based on wireless communication network
CN104518876B (en) Service login method and device
CN106603422A (en) Network steal prevention method of wireless router, and wireless router
CN107464325A (en) A kind of multi-layer gate control system and its implementation
US20080040780A1 (en) Systems and methods for identity verification using continuous biometric monitoring
CN106780901A (en) A kind of intelligent door lock system and its application based on mobile phone MAC Address
CN104640174B (en) Wireless network access point reminding method and device
FR2864289A1 (en) Resource access controlling method, involves notifying comparison of biometric data and biometric references of user, to access terminal, by server that communicates simultaneously with terminal and access terminal
CN109344588A (en) Safety certifying method and terminal device
CN107241348A (en) Alarming method and system that a kind of router is logged in
CN110211278A (en) The access control system and passing method for remotely confirming visitor's identity based on face snap
CN110324346A (en) A kind of Internet of Things Information Security Management System and method
CN111918287A (en) Information processing method and device
CN107483394A (en) A kind of router identification verification method and system
JP2002229951A (en) Person identification system
CN101707642A (en) Intelligent antitheft method, terminal and system
CN110602111A (en) Interface anti-brushing method and system based on long connection
US11935348B2 (en) System and method for biometric access control
CN112511484B (en) U shield safety control management system
CN101854357B (en) Method and system for monitoring network authentication
CN112615828A (en) Intellectual property operating system based on cloud computing network and intelligent authorization method
CN109064675A (en) Luggage Deposit verification method, device and intelligent inbox
CN103179101A (en) Implementation method of login management system of electronic device
CN103177203A (en) Computer login management system
CN107370602A (en) The decryption method and system of a kind of user terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230712

Address after: No. 102, Building 7, A Yuan, Zhaoji Juncheng, Xinkang Road, He'an Community, Yutan Street, Ningxiang County, Changsha City, Hunan Province, 410000

Applicant after: Hunan Aojun Technology Group Co.,Ltd.

Address before: No. 693, Wuyishan Road, Rudong County, Nantong City, Jiangsu Province, 226000

Applicant before: Liao Lei

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant