CN116633586A - Identification authentication analysis system based on Internet of things - Google Patents

Identification authentication analysis system based on Internet of things Download PDF

Info

Publication number
CN116633586A
CN116633586A CN202310364296.4A CN202310364296A CN116633586A CN 116633586 A CN116633586 A CN 116633586A CN 202310364296 A CN202310364296 A CN 202310364296A CN 116633586 A CN116633586 A CN 116633586A
Authority
CN
China
Prior art keywords
data
internet
things
analysis
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310364296.4A
Other languages
Chinese (zh)
Inventor
王金凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shengbo Yayi Network Technology Co ltd
Original Assignee
Beijing Shengbo Yayi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shengbo Yayi Network Technology Co ltd filed Critical Beijing Shengbo Yayi Network Technology Co ltd
Priority to CN202310364296.4A priority Critical patent/CN116633586A/en
Publication of CN116633586A publication Critical patent/CN116633586A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention discloses an identification authentication analysis system based on the Internet of things, which comprises the following operation methods: performing initialization function setting processing of a computer system; data acquisition and transmission control management are carried out; carrying out trust analysis control processing on the data which is transmitted; and performing security control management on the computer equipment. The performing the computer system initialization function setting process includes: after registering and logging in the computer system, the user carries out basic setting processing of the system. The data acquisition and transmission control management comprises the following steps: according to the set key knocking data and the set mouse use data acquisition period, carrying out acquisition control processing on the key knocking data and the mouse use data acquisition period; after the key knocking data and the mouse using data are acquired, the key knocking data and the mouse using data are transmitted to a cloud server for subsequent identification, authentication and analysis processing. The trust analysis control processing of the data which is transmitted comprises the following steps: and receiving the key-knocking data and the mouse use data which are transmitted completely. The invention has the characteristics of high safety and intelligent management.

Description

Identification authentication analysis system based on Internet of things
Technical Field
The invention relates to the technical field of identification authentication, in particular to an identification authentication analysis system based on the Internet of things.
Background
Along with the high-speed development of domestic computer technology and traction guidance of the strategy of Internet plus, the traditional industry is deeply fused with the Internet, and a new round of industry upgrading transformation is realized. When the advantages of the Internet are applied to the production and sales of the traditional industry, the number and types of network applications are rapidly increased in all aspects of the business organization, the problem of data security and information privacy of the traditional Internet also enters the traditional industry, and all fields of the whole society face the greater data privacy problem and the more serious information security challenge brought by the Internet. The identity authentication technology becomes critical as the first defense line of the traditional information security guarantee. However, at present, physiological feature recognition (fingerprint, iris, face recognition and the like) generally needs to rely on specific feature recognizers such as face recognition devices and fingerprint collectors, equipment manufacturing cost is high, the device is widely used for disclosing manageable occasions, the risk of pre-forging exists, and the device is difficult to popularize in a full range in various industries at present. And after verifying the user identity when the equipment is unlocked for the first time, the system resource can be continuously used without receiving the recheck, so that the safety risk is greatly increased. Therefore, it is necessary to design an identification authentication analysis system based on the internet of things, which has high security and intelligent management.
Disclosure of Invention
The invention aims to provide an identification authentication analysis system based on the Internet of things, so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: the identification authentication analysis method based on the Internet of things comprises the following steps:
performing initialization function setting processing of a computer system;
data acquisition and transmission control management are carried out;
carrying out trust analysis control processing on the data which is transmitted;
and performing security control management on the computer equipment.
According to the above technical solution, the performing the initialization function setting process of the computer system includes:
after registering and logging in the computer system, the user carries out basic setting processing of the system.
According to the above technical scheme, the data acquisition and transmission control management comprises:
according to the set key knocking data and the set mouse use data acquisition period, carrying out acquisition control processing on the key knocking data and the mouse use data acquisition period;
after the key knocking data and the mouse using data are acquired, the key knocking data and the mouse using data are transmitted to a cloud server for subsequent identification, authentication and analysis processing.
According to the above technical solution, the performing trust analysis control processing on the data after completing transmission includes:
after receiving the key knocking data and the mouse using data which are transmitted, carrying out data preprocessing on the key knocking data and the mouse using data;
analyzing the trust degree of the current operation user according to the preprocessed key knocking data and mouse use data;
and after the operation behavior of the current user triggers the system alert monitoring process, adjusting the alert value according to the operation behavior of the user.
According to the above technical solution, the performing security control management of the computer device includes:
immediately locking the current computer equipment after receiving the early warning notification signal, and waiting for the registered user to unlock;
after the locking of the computer equipment is completed, the computer equipment is notified by alarming according to the contact way set by the registered user.
According to the technical scheme, the identification authentication analysis system based on the internet of things comprises:
the acquisition management module is used for carrying out data acquisition and transmission control management;
the analysis adjustment module is used for carrying out trust analysis control management on the data which is transmitted;
and the safety control module is used for carrying out safety control management on the computer equipment.
According to the above technical scheme, the acquisition management module includes:
the initialization module is used for performing initialization setting of the computer system;
the data acquisition module is used for carrying out data acquisition control;
and the data transmission module is used for carrying out data cloud server transmission processing.
According to the above technical solution, the analysis adjustment module includes:
the preprocessing module is used for preprocessing the received data;
the trust analysis module is used for carrying out trust analysis management;
and the warning adjustment module is used for detecting and adjusting the warning value.
According to the above technical scheme, the safety control module includes:
the locking control module is used for performing locking control on the computer equipment;
and the alarm notification module is used for notifying the alarm of the user.
Compared with the prior art, the invention has the following beneficial effects: the invention, through setting up and gathering management module, analysis adjustment module and safe control module, can make the credibility analyze more high-efficient, accurate, reduce the situation emergence of the too long or appearance analysis processing error of analysis processing time because of the data content is complicated, and make the identity identification authentication process more intelligent, make the analysis judge more accurate, avoid the situation emergence of recognition authentication analysis error, and frequent warning notice because of influence of factors such as the external environment, etc., effectively promote user's satisfaction while guaranteeing the apparatus security.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
fig. 1 is a flowchart of an identification authentication analysis method based on internet of things according to an embodiment of the present invention;
fig. 2 is a block diagram of an identification authentication analysis system based on internet of things according to a second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Embodiment one: fig. 1 is a flowchart of an identification authentication analysis method based on the internet of things, which is provided in an embodiment of the present invention, and the method may be implemented by the identification authentication analysis system based on the internet of things, which is provided in the embodiment of the present invention, and the system is composed of a plurality of software and hardware modules, as shown in fig. 1, and the method specifically includes the following steps:
s101, performing initialization function setting processing of a computer system;
illustratively, in the embodiment of the present invention, after a user registers and logs in a computer system, a basic setting process of the system is performed; in the step, after user registration and login, a system defaults that a user is a real user identity when the user is initially registered, and defines that the same device has and only allows to have an account ID, so that the uniqueness of the real user is fundamentally ensured, when the user registration is completed, a cloud server stores a user account password, a new directory is used for storing user data, a mapping between the user ID and a storage path is constructed, the new directory is written into a database, when the user logs in, the server verifies the account password, the system defaults to automatically login and allows to memorize the password, after the registration login is completed, a user tapping key data and a mouse use data acquisition period are set, wherein the user can select an acquisition direction by himself, such as text workers are more prone to document operation, and a designer is more prone to mouse interaction, and the like, so that the data acquisition is more consistent with user use habit, the acquisition result is more efficient, and subsequent identity identification, authentication, analysis and processing are facilitated.
S102, data acquisition and transmission control management are carried out;
in the embodiment of the invention, the acquisition control processing is carried out according to the set key-knocking data and the set mouse usage data acquisition period; since a large amount of interactive data is generated when a user works with a computer in daily use, the main keyboard area (letters+numbers), the function key areas (F1-F12), the control key areas (Shift, enter, delete keys, etc.), the key values of the key areas (numbers, add-subtract codes, etc.), the duration of a single key, the interval time between keys, the frequency of the key, etc. are collected and recorded according to the set period for the key data, and the coordinate position of the mouse, the maximum movement speed of the mouse, the single/double click frequency, the rest, click (single click and double click), movement, dragging data, etc. of the mouse are collected and recorded for the mouse use data in a classified manner after collection.
After the key knocking data and the mouse using data are acquired, the key knocking data and the mouse using data are transmitted to a cloud server for subsequent identification, authentication and analysis; because the system continuously runs, the collected user data are numerous and heterogeneous, the configuration of different single-machine equipment is good and bad, and various identification technologies and classification algorithms are involved, and the local server is difficult to realize authentication analysis processing, so that the step is adopted to transmit the local server to the cloud server, and the cloud server is adopted to carry out subsequent identification authentication processing, so that the high efficiency and accuracy of the identification processing are effectively ensured.
S103, carrying out trust analysis control processing on the data which are transmitted;
exemplary, in the embodiment of the invention, after receiving the key-knocking data and the mouse use data which are transmitted completely, data preprocessing is carried out on the key-knocking data and the mouse use data; in the step, firstly, errors, redundancies, noise and the like in an original data set are removed through data cleaning, wherein blank value processing, repeated data processing and the like are included, then normalization processing is carried out on knocking key values with different attributes, the occurrence probability of each key value is mainly mapped to a (0, 1) interval, decimal numbers are limited, the complexity of processing time is reduced, meanwhile, extreme data, unstable data and the like are removed through setting the maximum movable pixel point of a mouse, and the data source of the mouse is single, so that data integration is not needed, centralization and normalization processing are carried out on the mouse data, the multi-dimensional mouse data reach the same scale, and through the processing, the subsequent trust degree analysis can be more efficient and accurate, and the situation that the analysis processing time is overlong or analysis processing errors occur due to the complexity of data content is reduced.
Analyzing the trust degree of the current operation user according to the preprocessed key knocking data and mouse use data; in the step, after the operation characteristics (average key-pressing frequency, average pressing time, pressing association sequence, maximum moving speed of the mouse, single/double pressing frequency and the like) of the user behaviors are determined according to the preprocessed pressing key data and the mouse using data extraction analysis, a trust score and a trust threshold are preset by the system, when the periodical user behavior characteristics accord with the determined operation characteristics of the user behaviors, the trust score rises, the highest trust score is the full score which is not set, otherwise, the trust score falls, and when the trust score is lower than the set trust threshold, alarm monitoring processing is triggered.
After the operation behavior of the current user triggers the system alert monitoring process, the alert value is further adjusted according to the operation behavior of the user; in the step, after the current user behavior is inconsistent with the operation characteristics of the user behavior determined by analysis, the current operation behavior is further monitored in real time after the alarm monitoring processing of the system is triggered, when the behavior of the user does not exceed a set threshold value in a subsequent set time period, the fact that the current user is possibly influenced by factors such as emotion or external environment and the like, the operation characteristics obtained by the operation of the current behavior and the analysis determination are inconsistent is indicated, so that the trust degree analysis processing is restored, otherwise, the fact that the current user is not registered is clarified, early warning notification is carried out, through the step, the identity recognition authentication processing is more intelligent, the analysis judgment is more accurate, the situation that the early warning notification is frequently carried out due to the fact that the recognition authentication analysis is wrong due to the influence of the factors such as the external environment is avoided, and the satisfaction degree of the user is effectively improved while the safety of equipment is ensured.
S104, performing security control management on the computer equipment;
in the embodiment of the invention, the current computer equipment is locked immediately after receiving the early warning notification signal, and a registered user is waited to unlock;
after the locking of the computer equipment is completed, the computer equipment is notified by alarming according to the contact way set by the registered user.
Embodiment two: the second embodiment of the present invention provides an identification authentication analysis system based on the internet of things, and fig. 2 is a schematic diagram of module configuration of the identification authentication analysis system based on the internet of things provided in the second embodiment, as shown in fig. 2, where the system includes:
the acquisition management module is used for carrying out data acquisition and transmission control management;
the analysis adjustment module is used for carrying out trust analysis control management on the data which is transmitted;
and the safety control module is used for carrying out safety control management on the computer equipment.
In some embodiments of the invention, the acquisition management module comprises:
the initialization module is used for performing initialization setting of the computer system;
the data acquisition module is used for carrying out data acquisition control;
and the data transmission module is used for carrying out data cloud server transmission processing.
In some embodiments of the invention, the analysis adjustment module comprises:
the preprocessing module is used for preprocessing the received data;
the trust analysis module is used for carrying out trust analysis management;
and the warning adjustment module is used for detecting and adjusting the warning value.
In some embodiments of the invention, the security control module comprises:
the locking control module is used for performing locking control on the computer equipment;
and the alarm notification module is used for notifying the alarm of the user.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. An identification authentication analysis method based on the Internet of things is characterized by comprising the following steps of: comprising the following steps:
performing initialization function setting processing of a computer system;
data acquisition and transmission control management are carried out;
carrying out trust analysis control processing on the data which is transmitted;
and performing security control management on the computer equipment.
2. The recognition authentication analysis method based on the internet of things according to claim 1, wherein the recognition authentication analysis method based on the internet of things is characterized in that: the performing the computer system initialization function setting process includes:
after registering and logging in the computer system, the user carries out basic setting processing of the system.
3. The recognition authentication analysis method based on the internet of things according to claim 1, wherein the recognition authentication analysis method based on the internet of things is characterized in that: the data acquisition and transmission control management comprises the following steps:
according to the set key knocking data and the set mouse use data acquisition period, carrying out acquisition control processing on the key knocking data and the mouse use data acquisition period;
after the key knocking data and the mouse using data are acquired, the key knocking data and the mouse using data are transmitted to a cloud server for subsequent identification, authentication and analysis processing.
4. The recognition authentication analysis method based on the internet of things according to claim 1, wherein the recognition authentication analysis method based on the internet of things is characterized in that: the trust analysis control processing of the data which is transmitted comprises the following steps:
after receiving the key knocking data and the mouse using data which are transmitted, carrying out data preprocessing on the key knocking data and the mouse using data;
analyzing the trust degree of the current operation user according to the preprocessed key knocking data and mouse use data;
and after the operation behavior of the current user triggers the system alert monitoring process, adjusting the alert value according to the operation behavior of the user.
5. The recognition authentication analysis method based on the internet of things according to claim 1, wherein the recognition authentication analysis method based on the internet of things is characterized in that: the computer equipment safety control management comprises the following steps:
immediately locking the current computer equipment after receiving the early warning notification signal, and waiting for the registered user to unlock;
after the locking of the computer equipment is completed, the computer equipment is notified by alarming according to the contact way set by the registered user.
6. An identification authentication analysis system based on the internet of things is characterized in that: comprising the following steps:
the acquisition management module is used for carrying out data acquisition and transmission control management;
the analysis adjustment module is used for carrying out trust analysis control management on the data which is transmitted;
and the safety control module is used for carrying out safety control management on the computer equipment.
7. The internet of things-based identification authentication analysis system of claim 6, wherein: the acquisition management module comprises:
the initialization module is used for performing initialization setting of the computer system;
the data acquisition module is used for carrying out data acquisition control;
and the data transmission module is used for carrying out data cloud server transmission processing.
8. The internet of things-based identification authentication analysis system of claim 6, wherein: the analysis adjustment module comprises:
the preprocessing module is used for preprocessing the received data;
the trust analysis module is used for carrying out trust analysis management;
and the warning adjustment module is used for detecting and adjusting the warning value.
9. The internet of things-based identification authentication analysis system of claim 6, wherein: the safety control module includes:
the locking control module is used for performing locking control on the computer equipment;
and the alarm notification module is used for notifying the alarm of the user.
CN202310364296.4A 2023-04-07 2023-04-07 Identification authentication analysis system based on Internet of things Pending CN116633586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310364296.4A CN116633586A (en) 2023-04-07 2023-04-07 Identification authentication analysis system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310364296.4A CN116633586A (en) 2023-04-07 2023-04-07 Identification authentication analysis system based on Internet of things

Publications (1)

Publication Number Publication Date
CN116633586A true CN116633586A (en) 2023-08-22

Family

ID=87637185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310364296.4A Pending CN116633586A (en) 2023-04-07 2023-04-07 Identification authentication analysis system based on Internet of things

Country Status (1)

Country Link
CN (1) CN116633586A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317682A (en) * 2017-05-10 2017-11-03 史展 A kind of identity identifying method and system
CN111124860A (en) * 2019-12-16 2020-05-08 电子科技大学 Method for identifying user by using keyboard and mouse data in uncontrollable environment
CN112100598A (en) * 2020-09-08 2020-12-18 紫光云(南京)数字技术有限公司 Method and device for identifying login authentication through mouse and keyboard knocking rhythm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107317682A (en) * 2017-05-10 2017-11-03 史展 A kind of identity identifying method and system
CN111124860A (en) * 2019-12-16 2020-05-08 电子科技大学 Method for identifying user by using keyboard and mouse data in uncontrollable environment
CN112100598A (en) * 2020-09-08 2020-12-18 紫光云(南京)数字技术有限公司 Method and device for identifying login authentication through mouse and keyboard knocking rhythm

Similar Documents

Publication Publication Date Title
CN111163087B (en) Database safety protection system based on data acquisition
CN106911668B (en) Identity authentication method and system based on user behavior model
US9626574B2 (en) Biometric notification system
Pusara et al. User re-authentication via mouse movements
CN101339593B (en) Software security evaluation system, user capability and confidence level evaluation system and method
US20220201008A1 (en) Multimodal modelling for systems using distance metric learning
CN111625789A (en) Multi-core learning fusion mouse and keyboard behavior feature-based user identification method
Kleber et al. Message type identification of binary network protocols using continuous segment similarity
CN113901441A (en) User abnormal request detection method, device, equipment and storage medium
US11539730B2 (en) Method, device, and computer program product for abnormality detection
US20230385411A1 (en) Systems and methods for side-channel monitoring of a processor on a communication network
WO2021248707A1 (en) Operation verification method and apparatus
CN116644825B (en) Big data-based outpatient information inquiry reservation management system
CN116383786B (en) Big data information supervision system and method based on Internet of things
CN116633586A (en) Identification authentication analysis system based on Internet of things
CN112288317A (en) Industrial big data analysis platform and method based on multi-source heterogeneous data governance
CN108696865B (en) Wireless sensor network node security authentication method
CN113360899B (en) Machine behavior recognition method and system
Li et al. The insider threat detection method of university website clusters based on machine learning
CN101639876A (en) Identity authentication method
CN114285596A (en) Transformer substation terminal account abnormity detection method based on machine learning
CN111339829B (en) User identity authentication method, device, computer equipment and storage medium
CN109508541B (en) Credible behavior library generation method based on semantic analysis
CN111416817A (en) Mode identification method based on network verification code
Ju et al. Detection of malicious code using the direct hashing and pruning and support vector machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination