CN115955363A - Communication terminal based on desktop fusion - Google Patents

Communication terminal based on desktop fusion Download PDF

Info

Publication number
CN115955363A
CN115955363A CN202310233428.XA CN202310233428A CN115955363A CN 115955363 A CN115955363 A CN 115955363A CN 202310233428 A CN202310233428 A CN 202310233428A CN 115955363 A CN115955363 A CN 115955363A
Authority
CN
China
Prior art keywords
user
data
module
safety
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310233428.XA
Other languages
Chinese (zh)
Other versions
CN115955363B (en
Inventor
闫志权
闫芮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xianchi Internet Of Things Technology Co ltd
Original Assignee
Jiangsu Xianchi Internet Of Things Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Xianchi Internet Of Things Technology Co ltd filed Critical Jiangsu Xianchi Internet Of Things Technology Co ltd
Priority to CN202310233428.XA priority Critical patent/CN115955363B/en
Publication of CN115955363A publication Critical patent/CN115955363A/en
Application granted granted Critical
Publication of CN115955363B publication Critical patent/CN115955363B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a communication terminal based on desktop fusion, which relates to the technical field of data processing, and comprises a data acquisition port, a data processing port and a data feedback port, wherein the data acquisition port is used for acquiring data information operated by a user and data information verified by a password, the data processing port is used for calculating the operation safety rate and the password verification success rate of the user and calculating the safety factor of the user, the data feedback port is used for setting the safety level through the safety factor, and setting a blacklist and a white list according to the safety level of the user, so that the operation safety rate, the password verification success rate and the user safety factor of the user can be automatically calculated, the safety of the whole user can be accurately and dynamically evaluated, and the safety of the communication terminal is improved.

Description

Communication terminal based on desktop fusion
Technical Field
The invention relates to the technical field of data processing, in particular to a communication terminal based on desktop convergence.
Background
The communication terminal is a direct tool for people to enjoy different information applications, and undertakes various tasks such as providing a good user interface for users, completing required service functions, accessing a communication network and the like.
In the application field, non-counter services such as online banking, online securities, bank low-counter services and the like widely adopt the communication terminal, and the application field of the communication terminal is rapidly expanded to emerging non-financial industries such as telecommunication, electric power, tax, education, government and the like.
With the rapid development of communication technology, a terminal can generate a large amount of data in real time, if the data are concentrated in a cloud center for processing, problems such as delay and privacy disclosure can be caused during communication, the terminal in a wireless environment faces security threats such as identity embezzlement, data stealing and tampering in a data transmission process, and terminal attack by malicious users, terminal data are likely to be leaked under the condition that the user is unaware of the security threats and privacy, and therefore a communication terminal with high security is needed, and the existing terminal has the defects that the security evaluation index is single, the evaluated content is less, the security of the user cannot be accurately evaluated, even if a part of risk users are intercepted, the security of other users cannot be dynamically evaluated, a system for dynamically and safely evaluating the whole users cannot be screened, and the risk users cannot be accurately intercepted;
for example, an authorization notice number is CN111917798B (a method for controlling and secure communication of an internet of things terminal), which includes: numbering the equipment of the Internet of things, generating corresponding keys according to corresponding numbers by a rear-end encryption server according to key generation rules, and sequentially writing the keys into corresponding key fobs; when the Internet of things equipment is installed, the key fob is inserted into the card slot of the Internet of things equipment; the Internet of things equipment sends a request for establishing connection with a corresponding server according to the server address attribute recorded in the key fob, and the connection is established after the authentication of the two parties is passed; when the internet of things equipment is communicated with the server, different service servers are selected for connection access according to different service requirements; during communication, the communication key stored in the key fob is used, the corresponding temporary working key is generated according to the function point to encrypt the transmitted data, the main key is also stored in the server, the corresponding temporary working key is generated and then decrypted, so that the safety problems in the aspects of management and control of the internet of things terminal and safe communication are solved,
for example, the authorization bulletin number is CN110166410B (a method, terminal and multimode communication terminal for securely transmitting data), which includes: the method comprises the steps that a first terminal encrypts data information to be transmitted; establishing a broadband communication link with a second terminal; transmitting the encrypted data information to the second terminal through the broadband communication link; acquiring preset key information related to data information to be transmitted, wherein the preset key information can be used for decrypting encrypted data information; establishing a narrowband communication link with the second terminal; and transmitting the preset key information to the second terminal through the narrow-band communication link, thereby achieving the purposes of improving the data transmission safety performance and reducing the data transmission cost,
the invention provides a communication terminal based on desktop convergence, aiming at solving the problem.
Disclosure of Invention
The invention mainly aims to provide a communication terminal based on desktop convergence, which can effectively solve the problems in the background technology: the security evaluation index is single, the evaluated content is less, the security of the user cannot be accurately evaluated, even if a part of risk users are intercepted, the security of other users cannot be dynamically evaluated, a system for dynamically evaluating the security of all users is lacked, the security users and the risk users cannot be discriminated, and the risk users cannot be accurately intercepted.
In order to realize the purpose, the invention adopts the technical scheme that:
a communication terminal based on desktop fusion comprises a data acquisition port, a data processing port and a data feedback port,
the data acquisition port is used for acquiring data information operated by a user and data information verified by a password,
the data processing port is used for calculating the user operation safety rate and the password verification success rate and calculating the safety factor of the user,
the data feedback port is used for setting a safety level according to the range of the safety factor of the user, determining the user with the safety factor larger than 0.8 as a first-level user, and setting the customer information in a white list, determining the user with the safety factor higher than 0.4 and lower than 0.8 as a second-level user, determining the user with the safety factor lower than 0.4 as a third-level user, and setting the customer information in a black list.
The data acquisition port includes at least one secure operation information acquisitionThe system comprises a module, at least one password verification data acquisition module and a user information acquisition module, wherein the safe operation information acquisition module is used for acquiring information of safe operation of a user and comprises total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetAnd the user information acquisition module is used for recording the IP information of the user.
The invention is further improved in that the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user.
The invention is further improved in that the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user authority granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user authority granting module is used for granting authorities in corresponding ranges to users according to the user security levels.
The invention is further improved in that the user operation safety rate formula is as follows:
Figure SMS_1
in whichN 1 In order to perform the total number of operations,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>
Figure SMS_2
To use the scaling factor for non-internal network entry,T 1 for each time a non-internal network time is logged in,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for each time of data transmission between the internal network and the internet, a data time is determined>
Figure SMS_3
For using the odds factor of a risk web site, </or >>
Figure SMS_4
For a duty factor for installing unauthorized software, a device is provided>
Figure SMS_5
For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>
Figure SMS_6
The invention has the further improvement that the success rate formula of the password verification is as follows:
Figure SMS_7
in whichN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
The invention has the further improvement that the user safety coefficient calculation formula is as follows:
Figure SMS_8
compared with the prior art, the invention has the beneficial effects that:
1. the password authentication system comprises a security operation information acquisition module, a password authentication data acquisition module, a data acquisition and storage module, a user operation safety rate calculation module, a password authentication success rate calculation module, a data transmission module and a user safety factor calculation module.
2. The safety of user operation is evaluated by eight indexes, namely the number and time of logging in a non-internal network, the number and time of browsing a risk website, the number and time of using unauthorized software, and the number and time of mutually transmitting data by using an internal network and the Internet, so that the safety of a user can be accurately evaluated, and the reliability and the accuracy of the safety rate of the user operation are improved.
3. The reliability and the accuracy of the success rate of the password verification are improved through the total password verification times, the successful password verification times and the time required for verifying the password every time.
Drawings
Fig. 1 is a schematic diagram of a principle framework based on a desktop convergence communication terminal according to the present invention.
Detailed Description
The orientations and positional relationships shown in the drawings are for convenience in describing the invention and simplifying the description, and do not indicate or imply any particular orientations of the devices and elements, and therefore should not be considered limiting of the invention.
Example 1
This embodiment is used for gathering user security operation's information through safe operation information acquisition module, password authentication data acquisition module is used for gathering the user and carries out the information that the password was verified, through data acquisition and storage module, user operation safety rate calculation module, password authentication success rate calculation module, data transmission module and user safety factor calculation module automatic calculation user operation safety rate, password authentication success rate and user safety factor, can evaluate the security of all users dynamically, the security at terminal has been improved, concrete scheme is:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-intranetsNumber of network entriesM 1 Each time logging on the non-internal network timeT 1 And the number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 And mutually transmitting data times with the Internet by using the internal networkM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the user operation safety rate formula is as follows:
Figure SMS_9
whereinN 1 In order to perform the total number of operations,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>
Figure SMS_10
To use the scaling factor for non-internal network entry,T 1 for each login to the non-internal network time,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>
Figure SMS_11
For using the odds factor of a risk web site, </or >>
Figure SMS_12
For a duty factor for installing unauthorized software, a device is provided>
Figure SMS_13
Ratio coefficient for mutually transmitting data with the internet by using an internal network>
Figure SMS_14
The password verification success rate formula is as follows:
Figure SMS_15
whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tthe total operation time is; />
The user safety coefficient calculation formula is as follows:
Figure SMS_16
example 2
The embodiment evaluates the safety of user operation by eight indexes, namely the number and time of logging in a non-internal network, the number and time of browsing a risk website, the number and time of using unauthorized software, and the number and time of using internal network and internet to transmit data mutually, can accurately evaluate the safety of a user, improves the reliability and accuracy of the safety rate of user operation, and has the specific scheme that:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 Using an intranet and interconnectionNumber of times of data transmission between networksM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information of password verification carried out by a user, and the information comprises the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the user operation safety rate formula is as follows:
Figure SMS_17
whereinN 1 In order to operate the total number of times,Tin order to have a total length of time for the operation,M 1 for using non-interior partsThe number of times of network login is counted,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, the data is judged>
Figure SMS_18
To use the scaling factor for non-internal network entry,T 1 for each login to the non-internal network time,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>
Figure SMS_19
For using the odds factor of a risk web site, </or >>
Figure SMS_20
For the purpose of setting a duty factor for unauthorized software, a decision is made as to whether the software is present in the system>
Figure SMS_21
For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>
Figure SMS_22
Example 3
This embodiment passes through the password and verifies total number of times, and the number of times and the required time of each time verification password that the password verified the success rate have improved reliability and accuracy of password verification success rate, and the concrete scheme is:
as shown in fig. 1, a communication terminal based on desktop fusion includes a data acquisition port, a data processing port, and a data feedback port, where the data acquisition port is used to acquire data information operated by a user and data information for password verification, the data feedback port is used to set a security level according to a security coefficient range of the user, a user with a security coefficient greater than 0.8 is defined as a first-level user, and client information is set in a white list, a user with a security coefficient above 0.4 and below 0.8 is defined as a second-level user, a user with a security coefficient below 0.4 is defined as a third-level user, and client information is set in a black list;
the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time logging on the non-internal network timeT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information for password verification carried out by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetThe user information acquisition module is used for recording the IP information of the user;
the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user;
the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels;
the password verification success rate formula is as follows:
Figure SMS_23
whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
The foregoing shows and describes the general principles and broad features of the present invention and advantages thereof. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are merely illustrative of the principles of the invention, but that various changes and modifications may be made without departing from the spirit and scope of the invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (7)

1. The utility model provides a communication terminal based on desktop integration which characterized in that: comprises a data acquisition port, a data processing port and a data feedback port,
the data acquisition port is used for acquiring data information operated by a user and data information verified by a password,
the data processing port is used for calculating the user operation safety rate and the password verification success rate and calculating the safety factor of the user,
the data feedback port is used for setting a safety level according to the range of the safety factor of the user, determining the user with the safety factor larger than 0.8 as a first-level user, setting the customer information in a white list, determining the user with the safety factor more than 0.4 and less than 0.8 as a second-level user, determining the user with the safety factor less than 0.4 as a third-level user, and setting the customer information in a black list.
2. The communication terminal based on desktop fusion according to claim 1, wherein: the data acquisition port comprises at least one safety operation information acquisition module, at least one password verification data acquisition module and a user information acquisition module, wherein the safety operation information acquisition module is used for acquiring information of user safety operation, including total operation timesN 1 Total length of operationT、Using non-internal network login timesM 1 Each time of logging on the non-internal networkT 1 Number of times of browsing risky websitesM 2 Time to browse risky websites each timeT 2 Number of times of installing unauthorized softwareM 3 Time of each use of unauthorized softwareT 3 The number of times of mutual data transmission between the internal network and the InternetM 4 And time of each data transmissionT 4 The password verification data acquisition module is used for acquiring information of password verification performed by a user, including the total password verification timesN 2 Number of times of successful password verificationM 5 And the time required to verify the password each timetAnd the user information acquisition module is used for recording the IP information of the user.
3. The communication terminal based on desktop convergence according to claim 2, wherein: the data processing port comprises a data acquisition and storage module, a user operation safety rate calculation module, a password verification success rate calculation module, a data transmission module and a user safety factor calculation module, wherein the data acquisition and storage module is used for acquiring and storing data and information of the data acquisition port, the user operation safety rate calculation module is used for substituting acquired data into a user operation safety rate formula and calculating a user operation safety rate, the password verification success rate calculation module is used for substituting acquired data into a password verification success rate formula and calculating the password verification success rate of a user, the data transmission module is used for transmitting data among the modules, and the user safety factor calculation module is used for substituting the user operation safety rate and the password verification success rate into a safety factor calculation formula and calculating the safety factor of the user.
4. The desktop convergence-based communication terminal according to claim 3, wherein: the data feedback port comprises a data acquisition and storage module, a security level evaluation module, a data transmission module and a user permission granting module, the data acquisition and storage module is used for acquiring and storing data and information of the data processing port, the security level evaluation module is used for dividing user security levels according to user security coefficients, the data transmission module is used for transmitting data among the modules, and the user permission granting module is used for granting permissions in corresponding ranges of users according to the user security levels.
5. The desktop convergence-based communication terminal of claim 4, wherein: the user operation safety rate formula is as follows:
Figure QLYQS_1
whereinN 1 In order to operate the total number of times,Tin order to have a total length of time for the operation,M 1 in order to use the non-internal network login times,M 2 in order to view the number of times of the risky website,M 3 in order to install the unauthorized software the number of times,M 4 for mutually transmitting data times by using an internal network and the Internet, based on the data times>
Figure QLYQS_2
To use the scaling factor for non-intranet logging,T 1 for each login NOTThe time of the internal network is set,T 2 for each time a risky web site is browsed,T 3 for each time that the unauthorized software is used,T 4 for transmitting data time with each other using the intranet and the internet each time, the device>
Figure QLYQS_3
For using the odds factor of a risk web site, </or >>
Figure QLYQS_4
For the purpose of setting a duty factor for unauthorized software, a decision is made as to whether the software is present in the system>
Figure QLYQS_5
For the purpose of using the ratio coefficient of the data mutually transmitted between the internal network and the internet, the ratio coefficient is evaluated>
Figure QLYQS_6
6. The desktop convergence-based communication terminal of claim 5, wherein: the password verification success rate formula is as follows:
Figure QLYQS_7
whereinN 2 For the total number of times the password is verified,M 5 for the number of times the password authentication is successful,tfor each time the time required to verify the password,Tis the total length of operation.
7. The communication terminal based on desktop fusion according to claim 6, wherein: the user safety coefficient calculation formula is as follows:
Figure QLYQS_8
。/>
CN202310233428.XA 2023-03-13 2023-03-13 Communication terminal based on desktop fusion Active CN115955363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310233428.XA CN115955363B (en) 2023-03-13 2023-03-13 Communication terminal based on desktop fusion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310233428.XA CN115955363B (en) 2023-03-13 2023-03-13 Communication terminal based on desktop fusion

Publications (2)

Publication Number Publication Date
CN115955363A true CN115955363A (en) 2023-04-11
CN115955363B CN115955363B (en) 2023-06-20

Family

ID=85892328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310233428.XA Active CN115955363B (en) 2023-03-13 2023-03-13 Communication terminal based on desktop fusion

Country Status (1)

Country Link
CN (1) CN115955363B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150229609A1 (en) * 2005-09-06 2015-08-13 Daniel Chien Evaluating a questionable network communication
CN109800589A (en) * 2019-01-25 2019-05-24 深信服科技股份有限公司 A kind of information security management and control method, system, device and readable storage medium storing program for executing
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment
CN112187792A (en) * 2020-09-27 2021-01-05 安徽斯跑特科技有限公司 Network information safety protection system based on internet
CN114785720A (en) * 2022-04-08 2022-07-22 北京国信网联科技有限公司 Internet surfing behavior supervision platform for enterprise local area network
CN115694980A (en) * 2022-10-28 2023-02-03 河南中裕广恒科技股份有限公司 Method for carrying out network security protection on Internet of things system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150229609A1 (en) * 2005-09-06 2015-08-13 Daniel Chien Evaluating a questionable network communication
CN109800589A (en) * 2019-01-25 2019-05-24 深信服科技股份有限公司 A kind of information security management and control method, system, device and readable storage medium storing program for executing
CN111683157A (en) * 2020-08-11 2020-09-18 杭州优云科技有限公司 Network security protection method for Internet of things equipment
CN112187792A (en) * 2020-09-27 2021-01-05 安徽斯跑特科技有限公司 Network information safety protection system based on internet
CN114785720A (en) * 2022-04-08 2022-07-22 北京国信网联科技有限公司 Internet surfing behavior supervision platform for enterprise local area network
CN115694980A (en) * 2022-10-28 2023-02-03 河南中裕广恒科技股份有限公司 Method for carrying out network security protection on Internet of things system

Also Published As

Publication number Publication date
CN115955363B (en) 2023-06-20

Similar Documents

Publication Publication Date Title
KR102055116B1 (en) Data security service
US7197568B2 (en) Secure cache of web session information using web browser cookies
US8359465B2 (en) Enterprise security system
CN106559408B (en) SDN authentication method based on trust management
CN107122674B (en) Access method of oracle database applied to operation and maintenance auditing system
CN109787988A (en) A kind of identity reinforces certification and method for authenticating and device
CN101741860A (en) Computer remote security control method
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CN106302550A (en) A kind of information security method for intelligent substation automatization and system
KR20060032888A (en) Apparatus for managing identification information via internet and method of providing service using the same
CN115333755A (en) Multi-attribute identity authentication method based on continuous trust evaluation
CN114884680A (en) Multi-server sustainable trust evaluation method based on context authentication
EP2070248B1 (en) System and method for facilitating secure online transactions
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN109495500A (en) A kind of double factor authentication method based on smart phone
CN105071993B (en) Encrypted state detection method and system
CN115955363B (en) Communication terminal based on desktop fusion
Yingkai et al. A kind of identity authentication under cloud computing environment
CN117596595B (en) Working method for carrying out safe login based on photovoltaic power system
CN111464317B (en) Digital certificate-based cryptography operation method
Meng et al. Verification of Resistance of Denial of Service Attacks in Extended Applied Pi Calculus with ProVerif.
KR100406292B1 (en) Password Transmission system and method in Terminal Communications
Sun et al. Formalization and verification of TESAC using CSP
Algamdi Security Risk Management in the Electronic Banking Environment: Some Evidence for Banking Systems
CN117951729A (en) Anti-leakage safety prevention and control system for data management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant