CN116032652B - Gateway authentication method and system based on intelligent interactive touch panel - Google Patents

Gateway authentication method and system based on intelligent interactive touch panel Download PDF

Info

Publication number
CN116032652B
CN116032652B CN202310098501.7A CN202310098501A CN116032652B CN 116032652 B CN116032652 B CN 116032652B CN 202310098501 A CN202310098501 A CN 202310098501A CN 116032652 B CN116032652 B CN 116032652B
Authority
CN
China
Prior art keywords
user
data
security level
gateway authentication
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310098501.7A
Other languages
Chinese (zh)
Other versions
CN116032652A (en
Inventor
廖传贵
谢齐
李小明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Chuangyida Industrial Development Co ltd
Original Assignee
Hunan Chuangyida Industrial Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Chuangyida Industrial Development Co ltd filed Critical Hunan Chuangyida Industrial Development Co ltd
Priority to CN202310098501.7A priority Critical patent/CN116032652B/en
Publication of CN116032652A publication Critical patent/CN116032652A/en
Application granted granted Critical
Publication of CN116032652B publication Critical patent/CN116032652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The invention relates to the technical field of gateway authentication, and particularly discloses a gateway authentication method and a gateway authentication system based on an intelligent interactive touch panel, wherein the method comprises the steps of receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data, and judging the security level of the user; determining a data sampling frequency according to the security level, and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency; counting and identifying the acquired user behaviors and data transmission characteristics, and adjusting the security level of the user according to the identification result; and when the regulated security level is smaller than a preset level threshold, sending an identification request to the user. The invention adds the detection process of user behavior and data transmission process on the original basis, detects the behavior habit of the user on the basis of completing verification, and improves the safety and flexibility.

Description

Gateway authentication method and system based on intelligent interactive touch panel
Technical Field
The invention relates to the technical field of gateway authentication, in particular to a gateway authentication method and system based on an intelligent interactive touch panel.
Background
"Smart City" is a concept in IBM laboratories that is intended to enhance new modes of urban planning, construction and management by comprehensively utilizing modern science and technology, integrating information resources, and orchestrating business applications. The mode needs to fully use the Internet of things and the sensor network, and relates to the fields of intelligent building, intelligent home, road network monitoring, intelligent hospitals, urban life line management, food and medicine management, ticket management, home care, personal health, digital life and the like. At present, the construction of domestic smart cities mainly focuses on the development of RFID related technologies, the construction of telecom services and informationized infrastructures, the construction of ICT infrastructures, authentication, security and other platforms, demonstration projects and the like.
In the construction process of the smart city, the network transmission process is not separated, the network is a double-edged sword, and a plurality of network crimes are drowned while the network is convenient, so that identity verification is required when a user sends a networking request, but the conventional authentication mode is a static authentication mode based on account passwords, and the flexibility and the security are very low.
Disclosure of Invention
The invention aims to provide a gateway authentication method and system based on an intelligent interactive touch panel, which are used for solving the problems in the background technology.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a gateway authentication method based on an intelligent interactive touch panel, the method comprising:
receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data, and judging the security level of the user; the user data includes device information;
determining a data sampling frequency according to the security level, and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
counting and identifying the acquired user behaviors and data transmission characteristics, and adjusting the security level of the user according to the identification result;
and when the regulated security level is smaller than a preset level threshold, sending an identification request to the user.
As a further scheme of the invention: the step of receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data, and judging the security level of the user comprises the following steps:
receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring user data based on the acquired query authority;
establishing an access report based on the acquired user data; the access report comprises a data characteristic item and an access times item which are determined by user data;
converting the acquired user data into data features, traversing the access report based on the data features obtained by conversion, and judging whether a matched data item exists or not;
when the matching data item exists, self-increasing and reading the corresponding access times; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
and determining the security level of the user according to the access times.
As a further scheme of the invention: the step of receiving the gateway authentication request input by the user, obtaining the user data, verifying the user data according to the pre-stored historical data, and judging the security level of the user further comprises the following steps:
monitoring the behavior of the software accessing the network in real time;
when monitoring that the software is networked, intercepting a webpage address of a networking request;
detecting an identification website from the webpage address; wherein the identification website is a prestored website;
inquiring the identification website in the running background App, marking the background App containing the identification website, and correcting the security level of the user according to the marked background App.
As a further scheme of the invention: the step of determining the data sampling frequency according to the security level and acquiring the user behavior and the data transmission characteristics in the preset time period step based on the data sampling frequency at regular time comprises the following steps:
inquiring data sampling frequency in a preset frequency table according to the security level;
determining a sampling period based on the data sampling frequency and a preset period step length;
acquiring a current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
and carrying out numerical processing on the user behaviors, and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis.
As a further scheme of the invention: the step of counting and identifying the acquired user behavior and data transmission characteristics and adjusting the security level of the user according to the identification result comprises the following steps:
reading user behaviors and data transmission speed which are counted based on the same time axis and subjected to numerical processing, and fitting according to a preset fitting model to obtain a change function;
performing Fourier transformation on the change function to obtain a trigonometric function sum;
generating a feature matrix according to the function features of the trigonometric function sum;
and comparing the feature matrix with a pre-stored historical feature matrix, and adjusting the security level of the user according to a comparison operation result.
As a further scheme of the invention: the step of sending an identification request to the user when the adjusted security level is less than a preset level threshold value comprises the following steps:
when the regulated security level is smaller than a preset level threshold, an identity recognition request is sent to a user;
receiving an agreement signal sent by a user, and establishing a connection channel containing a data encryption algorithm;
acquiring identity information of a user based on a connection channel, and identifying the identity information;
in the process of acquiring identity information of a user based on a connection channel and identifying the identity information, transmission data is encrypted at fixed time based on a data encryption algorithm.
The technical scheme of the invention also provides a gateway authentication system based on the intelligent interactive touch panel, which comprises the following steps:
the security level judging module is used for receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data and judging the security level of the user; the user data includes device information;
the behavior monitoring module is used for determining a data sampling frequency according to the security level and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
the security level adjusting module is used for counting and identifying the acquired user behaviors and data transmission characteristics and adjusting the security level of the user according to the identification result;
and the identity recognition module is used for sending an identity recognition request to the user when the regulated security level is smaller than a preset level threshold value.
As a further scheme of the invention: the security level determination module includes:
the data query unit is used for receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring user data based on the acquired query authority;
the access report establishing unit is used for establishing an access report based on the acquired user data; the access report comprises a data characteristic item and an access times item which are determined by user data;
the matching unit is used for converting the acquired user data into data characteristics, traversing the access report based on the data characteristics obtained by conversion, and judging whether a matching data item exists or not;
the data reading storage unit is used for automatically increasing and reading the corresponding access times when the matched data items exist; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
and the level determining unit is used for determining the security level of the user according to the access times.
As a further scheme of the invention: the behavior monitoring module comprises:
the frequency reading unit is used for inquiring the data sampling frequency according to the security level in a preset frequency table;
a period determining unit, configured to determine a sampling period based on the data sampling frequency and a preset period step;
the port application unit is used for acquiring the current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
and the time domain statistics unit is used for carrying out numerical processing on the user behaviors and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis.
The technical scheme of the invention also provides a gateway authentication cloud platform based on the intelligent interactive touch panel, which is characterized by comprising one or more processors and one or more memories, wherein at least one program code is stored in the one or more memories, and the gateway authentication method based on the intelligent interactive touch panel is realized when the program code is loaded and executed by the one or more processors.
Compared with the prior art, the invention has the beneficial effects that: the invention adds the detection process of user behavior and data transmission process based on account verification, detects the behavior habit of the user based on the verification, and further detects the gateway authentication process in the whole process, thereby greatly improving the safety and flexibility.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly introduce the drawings that are needed in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a flow chart diagram of a gateway authentication method based on an intelligent interactive touch pad.
Fig. 2 is a first sub-flowchart block diagram of a gateway authentication method based on an intelligent interactive touch pad.
Fig. 3 is a second sub-flowchart block diagram of a gateway authentication method based on an intelligent interactive touch pad.
Fig. 4 is a third sub-flowchart block diagram of a gateway authentication method based on an intelligent interactive touch pad.
Fig. 5 is a fourth sub-flowchart block diagram of a gateway authentication method based on an intelligent interactive touch pad.
Fig. 6 is a block diagram of the composition and structure of a gateway authentication system based on an intelligent interactive touch pad.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects to be solved more clear, the invention is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Example 1
Fig. 1 is a flow chart of a gateway authentication method based on an intelligent interactive touch panel, and in an embodiment of the invention, the method includes:
step S100: receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data, and judging the security level of the user; the user data includes device information;
receiving a gateway authentication request input by a user, acquiring permission based on the request, acquiring and storing user data based on the permission, and obtaining historical data; and verifying the user data according to the historical data, and judging the reference level of the user.
Step S200: determining a data sampling frequency according to the security level, and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
different security levels correspond to different data sampling frequencies, and the operation behaviors of the user and data transmission data generated in the operation process are obtained at regular time according to the data sampling frequencies, and the data can reflect the operation habits of the user.
Step S300: counting and identifying the acquired user behaviors and data transmission characteristics, and adjusting the security level of the user according to the identification result;
the statistical user behavior and the data transmission characteristics are analyzed, so that the operation habit of the user can be judged, whether the user main body changes or not can be judged by analyzing the operation habit, and the security level can be adjusted according to the judgment result.
Step S400: when the regulated security level is smaller than a preset level threshold, an identity recognition request is sent to a user;
when the security level is sufficiently low, an identification process is triggered, which is a more stringent identification process, such as face recognition.
Fig. 2 is a first sub-flowchart of a gateway authentication method based on an intelligent interactive touch panel, wherein the steps of receiving a gateway authentication request input by a user, obtaining user data, verifying the user data according to pre-stored historical data, and determining a security level of the user include:
step S101: receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring user data based on the acquired query authority;
after receiving a gateway authentication request input by a user, the user data needs to be acquired immediately, the user data needs to be acquired with query permission, and the user data can be acquired based on the query permission.
Step S102: establishing an access report based on the acquired user data; the access report comprises a data characteristic item and an access times item which are determined by user data;
based on the acquired user data, an access report may be established, the access report representing the historical data.
Step S103: converting the acquired user data into data features, traversing the access report based on the data features obtained by conversion, and judging whether a matched data item exists or not;
user data is in various formats, and the user data needs to be converted into numerical values for analysis, so that a traversal matching process can be executed.
Step S104: when the matching data item exists, self-increasing and reading the corresponding access times; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
step S105: determining the security level of the user according to the access times;
the purpose of performing the traversal matching process is to determine what number of accesses the user is, and an initial level may be determined based on the number of accesses.
As a preferred embodiment of the present invention, the step of receiving a gateway authentication request input by a user, obtaining user data, verifying the user data according to pre-stored historical data, and determining the security level of the user further includes:
monitoring the behavior of the software accessing the network in real time;
when monitoring that the software is networked, intercepting a webpage address of a networking request;
detecting an identification website from the webpage address; wherein the identification website is a prestored website;
inquiring the identification website in the running background App, marking the background App containing the identification website, and correcting the security level of the user according to the marked background App.
In an example of the technical scheme of the invention, network access behaviors are monitored in real time, an identification website is detected according to monitoring results, which is used in a running background App is queried based on the identification website, and generally, only one background App is used, and the security level of a user can be corrected according to the background App which is used.
Fig. 3 is a second sub-flowchart of a gateway authentication method based on an intelligent interactive touch panel, wherein the steps of determining a data sampling frequency according to the security level and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency include:
step S201: inquiring data sampling frequency in a preset frequency table according to the security level;
the sampling frequency inquiry process is a data table reading operation, and the data sampling frequency is read in a preset frequency table.
Step S202: determining a sampling period based on the data sampling frequency and a preset period step length;
each time data is acquired, the data is acquired for a period of time, and therefore, the sampling period can be determined by the data sampling frequency and a preset period step.
Step S203: acquiring a current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
and when the current moment is in a sampling period, executing a data sampling action.
Step S204: performing numerical processing on the user behaviors, and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis;
the process of converting the user behavior into the numerical value is a numerical processing process, and statistics is carried out on the user behavior and the data transmission speed after the numerical processing based on the same time axis, so that a plurality of fluctuation curves can be obtained.
Fig. 4 is a third sub-flowchart of a gateway authentication method based on an intelligent interactive touch panel, wherein the steps of counting and identifying the acquired user behavior and data transmission characteristics and adjusting the security level of the user according to the identification result include:
step S301: reading user behaviors and data transmission speed which are counted based on the same time axis and subjected to numerical processing, and fitting according to a preset fitting model to obtain a change function;
fitting the fluctuation curve can obtain a fitting function (change function).
Step S302: performing Fourier transformation on the change function to obtain a trigonometric function sum;
fourier transforming the varying function may transform the fitting function into a sum of a plurality of trigonometric functions.
Step S303: generating a feature matrix according to the function features of the trigonometric function sum;
the parameters of the trigonometric function comprise amplitude, frequency and phase, and the feature matrix can be spliced by inquiring the function features of the trigonometric function.
Step S304: comparing the feature matrix with a pre-stored historical feature matrix, and adjusting the security level of the user according to a comparison operation result;
the feature matrix is compared with a pre-stored historical feature matrix to judge whether the behavior habit of the user changes or not, and the security level of the user can be adjusted according to the change of the behavior habit of the user.
FIG. 5 is a fourth sub-flowchart of a gateway authentication method based on an intelligent interactive touch pad, wherein when the adjusted security level is less than a preset level threshold, the step of sending an identification request to a user includes:
step S401: when the regulated security level is smaller than a preset level threshold, an identity recognition request is sent to a user;
when the security level is sufficiently low, an identification request is sent to the user.
Step S402: receiving an agreement signal sent by a user, and establishing a connection channel containing a data encryption algorithm;
when the user agrees to carry out the identification, a connection channel containing a data encryption algorithm is established.
Step S403: acquiring identity information of a user based on a connection channel, and identifying the identity information;
and acquiring identity information (such as face information) of the user based on the connection channel, and identifying the identity information to complete the identification task.
In the process of acquiring identity information of a user based on a connection channel and identifying the identity information, transmission data is encrypted at fixed time based on a data encryption algorithm. The identity information is sensitive data, and the generated data is encrypted in the process of identifying the identity information, so that the privacy of a user can be greatly protected.
Example 2
Fig. 6 is a block diagram of a gateway authentication system based on an intelligent interactive touch panel, in which the system 10 includes:
the security level judging module 11 is configured to receive a gateway authentication request input by a user, obtain user data, verify the user data according to pre-stored historical data, and judge a security level of the user; the user data includes device information;
the behavior monitoring module 12 is configured to determine a data sampling frequency according to the security level, and acquire user behavior and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
the security level adjusting module 13 is used for counting and identifying the acquired user behaviors and data transmission characteristics, and adjusting the security level of the user according to the identification result;
the identity module 14 is configured to send an identity request to the user when the adjusted security level is less than a preset level threshold.
The security level determination module 11 includes:
the data query unit is used for receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring user data based on the acquired query authority;
the access report establishing unit is used for establishing an access report based on the acquired user data; the access report comprises a data characteristic item and an access times item which are determined by user data;
the matching unit is used for converting the acquired user data into data characteristics, traversing the access report based on the data characteristics obtained by conversion, and judging whether a matching data item exists or not;
the data reading storage unit is used for automatically increasing and reading the corresponding access times when the matched data items exist; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
and the level determining unit is used for determining the security level of the user according to the access times.
The behavior monitoring module 12 includes:
the frequency reading unit is used for inquiring the data sampling frequency according to the security level in a preset frequency table;
a period determining unit, configured to determine a sampling period based on the data sampling frequency and a preset period step;
the port application unit is used for acquiring the current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
and the time domain statistics unit is used for carrying out numerical processing on the user behaviors and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (7)

1. The gateway authentication method based on the intelligent interactive touch panel is characterized by comprising the following steps of:
receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data, and judging the security level of the user; the user data includes device information;
determining a data sampling frequency according to the security level, and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
counting and identifying the acquired user behaviors and data transmission characteristics, and adjusting the security level of the user according to the identification result;
when the regulated security level is smaller than a preset level threshold, an identity recognition request is sent to a user;
the step of determining the data sampling frequency according to the security level and acquiring the user behavior and the data transmission characteristics in the preset time period step based on the data sampling frequency at regular time comprises the following steps:
inquiring data sampling frequency in a preset frequency table according to the security level;
determining a sampling period based on the data sampling frequency and a preset period step length;
acquiring a current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
performing numerical processing on the user behaviors, and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis;
the step of counting and identifying the acquired user behavior and data transmission characteristics and adjusting the security level of the user according to the identification result comprises the following steps:
reading user behaviors and data transmission speed which are counted based on the same time axis and subjected to numerical processing, and fitting according to a preset fitting model to obtain a change function;
performing Fourier transformation on the change function to obtain a trigonometric function sum;
generating a feature matrix according to the function features of the trigonometric function sum;
and comparing the feature matrix with a pre-stored historical feature matrix, and adjusting the security level of the user according to a comparison operation result.
2. The gateway authentication method based on the intelligent interactive touch panel according to claim 1, wherein the step of receiving the gateway authentication request input by the user, obtaining the user data, verifying the user data according to the pre-stored history data, and determining the security level of the user comprises:
receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring historical user data based on the acquired query authority;
establishing an access report based on the acquired historical user data; the access report comprises data characteristic items and access times items which are determined by historical user data;
converting the acquired real-time user data into data features, traversing the access report based on the data features obtained by conversion, and judging whether a matched data item exists or not;
when the matching data item exists, self-increasing and reading the corresponding access times; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
and determining the security level of the user according to the access times.
3. The gateway authentication method based on the intelligent interactive touch panel according to claim 2, wherein the step of receiving the gateway authentication request input by the user, obtaining the user data, verifying the user data according to the pre-stored history data, and determining the security level of the user further comprises:
monitoring the behavior of the software accessing the network in real time;
when monitoring that the software is networked, intercepting a webpage address of a networking request;
detecting an identification website from the webpage address; wherein the identification website is a prestored website;
inquiring the identification website in the running background App, marking the background App containing the identification website, and correcting the security level of the user according to the marked background App.
4. The gateway authentication method based on an intelligent interactive touch panel according to claim 1, wherein the step of sending an identification request to a user when the adjusted security level is less than a preset level threshold value comprises:
when the regulated security level is smaller than a preset level threshold, an identity recognition request is sent to a user;
receiving an agreement signal sent by a user, and establishing a connection channel containing a data encryption algorithm;
acquiring identity information of a user based on a connection channel, and identifying the identity information;
in the process of acquiring identity information of a user based on a connection channel and identifying the identity information, transmission data is encrypted at fixed time based on a data encryption algorithm.
5. A gateway authentication system based on an intelligent interactive touch panel, the system comprising:
the security level judging module is used for receiving a gateway authentication request input by a user, acquiring user data, verifying the user data according to pre-stored historical data and judging the security level of the user; the user data includes device information;
the behavior monitoring module is used for determining a data sampling frequency according to the security level and acquiring user behaviors and data transmission characteristics in a preset time period step at regular time based on the data sampling frequency;
the security level adjusting module is used for counting and identifying the acquired user behaviors and data transmission characteristics and adjusting the security level of the user according to the identification result;
the identity recognition module is used for sending an identity recognition request to a user when the regulated security level is smaller than a preset level threshold value;
the behavior monitoring module comprises:
the frequency reading unit is used for inquiring the data sampling frequency according to the security level in a preset frequency table;
a period determining unit, configured to determine a sampling period based on the data sampling frequency and a preset period step;
the port application unit is used for acquiring the current moment in real time, opening a data acquisition port when the current moment is in a sampling period, and acquiring user behaviors and data transmission speed based on the data acquisition port;
the time domain statistics unit is used for carrying out numerical processing on the user behaviors and counting the user behaviors and the data transmission speed which are subjected to the numerical processing based on the same time axis;
the statistics and the identification of the acquired user behavior and data transmission characteristics, and the content for adjusting the security level of the user according to the identification result comprise:
reading user behaviors and data transmission speed which are counted based on the same time axis and subjected to numerical processing, and fitting according to a preset fitting model to obtain a change function;
performing Fourier transformation on the change function to obtain a trigonometric function sum;
generating a feature matrix according to the function features of the trigonometric function sum;
and comparing the feature matrix with a pre-stored historical feature matrix, and adjusting the security level of the user according to a comparison operation result.
6. The intelligent interactive touch pad based gateway authentication system of claim 5, wherein the security level determination module comprises:
the data query unit is used for receiving a gateway authentication request input by a user, sending a query authority acquisition request to the user, and acquiring historical user data based on the acquired query authority;
the access report establishing unit is used for establishing an access report based on the acquired historical user data; the access report comprises data characteristic items and access times items which are determined by historical user data;
the matching unit is used for converting the acquired real-time user data into data characteristics, traversing the access report based on the data characteristics obtained by conversion, and judging whether a matching data item exists or not;
the data reading storage unit is used for automatically increasing and reading the corresponding access times when the matched data items exist; when no matching data item exists, creating a data item according to the data characteristics, and assigning the corresponding access times to be one;
and the level determining unit is used for determining the security level of the user according to the access times.
7. A gateway authentication cloud platform based on an intelligent interactive touch panel, wherein the cloud platform comprises one or more processors and one or more memories, at least one program code is stored in the one or more memories, and when loaded and executed by the one or more processors, the gateway authentication method based on the intelligent interactive touch panel according to any of claims 1-4 is realized.
CN202310098501.7A 2023-01-31 2023-01-31 Gateway authentication method and system based on intelligent interactive touch panel Active CN116032652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310098501.7A CN116032652B (en) 2023-01-31 2023-01-31 Gateway authentication method and system based on intelligent interactive touch panel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310098501.7A CN116032652B (en) 2023-01-31 2023-01-31 Gateway authentication method and system based on intelligent interactive touch panel

Publications (2)

Publication Number Publication Date
CN116032652A CN116032652A (en) 2023-04-28
CN116032652B true CN116032652B (en) 2023-08-25

Family

ID=86070628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310098501.7A Active CN116032652B (en) 2023-01-31 2023-01-31 Gateway authentication method and system based on intelligent interactive touch panel

Country Status (1)

Country Link
CN (1) CN116032652B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117395033A (en) * 2023-09-22 2024-01-12 广州尚全信息技术有限公司 Data security supervision method and system

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006285329A (en) * 2005-03-31 2006-10-19 Nec Corp Mobile security determination support system, method and program, mobile communication terminal device and information management operation server
CN102761555A (en) * 2012-07-26 2012-10-31 郑州信大捷安信息技术股份有限公司 Mandatory access control system and control method based on access history
CN103974244A (en) * 2014-05-23 2014-08-06 南京大学 Intelligent terminal authentication method based on multi-mode sensing and intelligent terminals
DE112016004922T5 (en) * 2015-10-28 2018-07-19 Tongji University Construction and analysis system of the touch screen user button behavior mode and its identity recognition method
CN110324350A (en) * 2019-07-09 2019-10-11 中国工商银行股份有限公司 Identity identifying method and server based on the non-sensitive sensing data in mobile terminal
WO2020015877A1 (en) * 2018-07-19 2020-01-23 British Telecommunications Public Limited Company Dynamic data encryption
WO2020162943A1 (en) * 2019-02-07 2020-08-13 Thogamalai Krishnakumar Arumugham Holistic intelligence and autonomous information system and method thereof
CN112600863A (en) * 2021-03-04 2021-04-02 南京敏宇数行信息技术有限公司 Safe remote access system and method
WO2021072881A1 (en) * 2019-10-16 2021-04-22 平安科技(深圳)有限公司 Object storage-based request processing method, apparatus and device, and storage medium
CN113507462A (en) * 2021-07-05 2021-10-15 中国联合网络通信集团有限公司 Zero-trust data monitoring and early warning method, device, system and storage medium
CN113904799A (en) * 2021-09-01 2022-01-07 安徽精蓝测绘服务有限责任公司 Big data information processing system, method, computer equipment and storage medium
CN114039729A (en) * 2022-01-08 2022-02-11 广州市成格信息技术有限公司 Intelligent network management method and system based on optical network technology
CN114036480A (en) * 2022-01-07 2022-02-11 北京悦游信息技术有限公司 Security access control method and system for private application and readable storage medium
CN114629719A (en) * 2022-04-08 2022-06-14 中国移动通信集团陕西有限公司 Resource access control method and resource access control system
CN114896634A (en) * 2022-07-15 2022-08-12 山东恒迈信息科技有限公司 Data authority control method and system of enterprise report platform
WO2023280407A1 (en) * 2021-07-08 2023-01-12 Telefonaktiebolaget Lm Ericsson (Publ) Method, authentication system, and computer program for authenticating a user for a service

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7345585B2 (en) * 2005-08-01 2008-03-18 Cisco Technology, Inc. Network based device for providing RFID middleware functionality
RU2589861C2 (en) * 2014-06-20 2016-07-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of user data encryption
CN106789851A (en) * 2015-11-24 2017-05-31 阿里巴巴集团控股有限公司 Auth method, system, service server and authentication server
WO2018000396A1 (en) * 2016-06-30 2018-01-04 华为技术有限公司 Authentication method and communication terminal
US20220052805A1 (en) * 2020-08-11 2022-02-17 Qualcomm Incorporated Dynamic operating channel bandwidths with adjusted thresholds
US20220198015A1 (en) * 2020-12-22 2022-06-23 International Business Machines Corporation Adjusting role-based access control of a user based on behavior data of the user
US11509604B1 (en) * 2021-05-12 2022-11-22 InContact Inc. Enforcement of time-based user access levels for computing environments

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006285329A (en) * 2005-03-31 2006-10-19 Nec Corp Mobile security determination support system, method and program, mobile communication terminal device and information management operation server
CN102761555A (en) * 2012-07-26 2012-10-31 郑州信大捷安信息技术股份有限公司 Mandatory access control system and control method based on access history
CN103974244A (en) * 2014-05-23 2014-08-06 南京大学 Intelligent terminal authentication method based on multi-mode sensing and intelligent terminals
DE112016004922T5 (en) * 2015-10-28 2018-07-19 Tongji University Construction and analysis system of the touch screen user button behavior mode and its identity recognition method
WO2020015877A1 (en) * 2018-07-19 2020-01-23 British Telecommunications Public Limited Company Dynamic data encryption
WO2020162943A1 (en) * 2019-02-07 2020-08-13 Thogamalai Krishnakumar Arumugham Holistic intelligence and autonomous information system and method thereof
CN110324350A (en) * 2019-07-09 2019-10-11 中国工商银行股份有限公司 Identity identifying method and server based on the non-sensitive sensing data in mobile terminal
WO2021072881A1 (en) * 2019-10-16 2021-04-22 平安科技(深圳)有限公司 Object storage-based request processing method, apparatus and device, and storage medium
CN112600863A (en) * 2021-03-04 2021-04-02 南京敏宇数行信息技术有限公司 Safe remote access system and method
CN113507462A (en) * 2021-07-05 2021-10-15 中国联合网络通信集团有限公司 Zero-trust data monitoring and early warning method, device, system and storage medium
WO2023280407A1 (en) * 2021-07-08 2023-01-12 Telefonaktiebolaget Lm Ericsson (Publ) Method, authentication system, and computer program for authenticating a user for a service
CN113904799A (en) * 2021-09-01 2022-01-07 安徽精蓝测绘服务有限责任公司 Big data information processing system, method, computer equipment and storage medium
CN114036480A (en) * 2022-01-07 2022-02-11 北京悦游信息技术有限公司 Security access control method and system for private application and readable storage medium
CN114039729A (en) * 2022-01-08 2022-02-11 广州市成格信息技术有限公司 Intelligent network management method and system based on optical network technology
CN114629719A (en) * 2022-04-08 2022-06-14 中国移动通信集团陕西有限公司 Resource access control method and resource access control system
CN114896634A (en) * 2022-07-15 2022-08-12 山东恒迈信息科技有限公司 Data authority control method and system of enterprise report platform

Also Published As

Publication number Publication date
CN116032652A (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US10952074B2 (en) Method and apparatus for authenticating users in internet of things environment
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
KR20200085899A (en) Identity verification method and apparatus
CN113347205B (en) Method and device for detecting service access request
US20110314558A1 (en) Method and apparatus for context-aware authentication
CN110830445B (en) Method and device for identifying abnormal access object
CN108521405B (en) Risk control method and device and storage medium
WO2021098274A1 (en) Method and apparatus for evaluating risk of leakage of private data
CN116032652B (en) Gateway authentication method and system based on intelligent interactive touch panel
CN112685774B (en) Payment data processing method based on big data and block chain finance and cloud server
CN113111359A (en) Big data resource sharing method and resource sharing system based on information security
CN105022939A (en) Information verification method and device
CN112115507B (en) Cloud service interaction method and big data platform based on cloud computing and information digitization
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN113222729A (en) Intelligent financial management system of family
CN111314326B (en) Method, device, equipment and medium for confirming HTTP vulnerability scanning host
CN108881275B (en) Method and system for analyzing access compliance of user
CN111489175A (en) Online identity authentication method, device, system and storage medium
CN107679865B (en) Identity verification method and device based on touch area
CN109636578A (en) Risk checking method, device, equipment and the readable storage medium storing program for executing of credit information
CN115080827A (en) Sensitive data processing method and device
CN111241376B (en) Multistage information matching method and device and cloud service platform
CN105678157A (en) System and method for data property right protection based on application environment identification
CN112491882A (en) Webshell detection method, webshell detection device, webshell detection medium and electronic equipment
CN109636575A (en) Terminal risk checking method, device, equipment and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 422000 No. 88 Jucai Road, Longshi Community, Dahetang Street, Shaodong City, Shaoyang City, Hunan Province

Patentee after: HUNAN CHUANGYIDA INDUSTRIAL DEVELOPMENT Co.,Ltd.

Address before: 2 / F, building 3, Longyuan Industrial Park, liangshitang sub district office, Shaodong City, Shaoyang City, Hunan Province, 422000

Patentee before: HUNAN CHUANGYIDA INDUSTRIAL DEVELOPMENT Co.,Ltd.

CP02 Change in the address of a patent holder