CN116738387A - Big data analysis system adopting computer verification code technology - Google Patents

Big data analysis system adopting computer verification code technology Download PDF

Info

Publication number
CN116738387A
CN116738387A CN202310505085.8A CN202310505085A CN116738387A CN 116738387 A CN116738387 A CN 116738387A CN 202310505085 A CN202310505085 A CN 202310505085A CN 116738387 A CN116738387 A CN 116738387A
Authority
CN
China
Prior art keywords
module
verification code
wireless
central processing
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310505085.8A
Other languages
Chinese (zh)
Inventor
谢强
陈晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Jiyi Network Technology Co ltd
Original Assignee
Wuhan Jiyi Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Jiyi Network Technology Co ltd filed Critical Wuhan Jiyi Network Technology Co ltd
Priority to CN202310505085.8A priority Critical patent/CN116738387A/en
Publication of CN116738387A publication Critical patent/CN116738387A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a big data analysis system adopting a computer verification code technology, which comprises a central processing system, wherein the input end of the central processing system is electrically connected with the output end of a data acquisition module, the output end of the data acquisition module is electrically connected with the input end of a data processing unit, and the central processing system is in bidirectional connection with an identity verification unit through wireless. According to the big data analysis system adopting the computer verification code technology, the security level judgment is carried out on the big data analysis system through the level judgment module, when the security requirement of the system is not high, the authentication code is directly requested, the identity verification is carried out through the form of sending the short message verification code, when the security level requirement of the system is high, the user can request to send the short message verification code to carry out verification login after the face recognition is successful, the intelligent security system is more intelligent, and safer protection is provided for secret data.

Description

Big data analysis system adopting computer verification code technology
Technical Field
The invention relates to the technical field of big data analysis, in particular to a big data analysis system adopting a computer verification code technology.
Background
Big data or huge amount of data refers to large amount of data which cannot be retrieved, managed, processed and tidied in a reasonable time through a mainstream software tool, the big data needs special technology to effectively process a large amount of data within a tolerant time, the technology is suitable for big data, the technology comprises a large-scale parallel processing (MPP) database, a data mining, a distributed file system, a distributed database, a cloud computing platform, the Internet and an extensible storage system, the big data is taken as vocabulary of the IT industry which is the most hot at present, and accordingly, the utilization of business value of data warehouse, data security, data analysis, data mining and the like around the big data gradually becomes a profit focus for industrial personnel to strive for, and the big data analysis also occurs along with the coming of big data age.
At present, a large data platform mostly adopts a verification code form to log in the data platform in the application process, and the data is checked, and the existing verification code technology comprises the forms of pictures, characters, short messages and the like, so that a single verification mode is simple and is easy to crack, the data platform with higher security is not protected, and the data is easy to steal.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a big data analysis system adopting a computer verification code technology, which solves the problems that a single verification mode is simpler and is easy to crack, the protection of a data platform with higher security is not facilitated, and the data is easy to steal.
(II) technical scheme
In order to achieve the above purpose, the invention is realized by the following technical scheme: the big data analysis system comprises a central processing system, wherein the input end of the central processing system is electrically connected with the output end of a data acquisition module, the output end of the data acquisition module is electrically connected with the input end of a data processing unit, the central processing system is in bidirectional connection with an identity verification unit through wireless, the output end of the identity verification unit is electrically connected with the input end of an information management unit, the central processing system is in bidirectional connection with a data storage unit through wireless, the central processing system is in bidirectional connection with a grade judging module through wireless, the central processing system is in bidirectional connection with a wireless transmission module through wireless, and the wireless transmission module is in bidirectional connection with a login module through wireless.
Preferably, the information management unit is in bidirectional connection with the central processing system through wireless, and the data processing unit is in bidirectional connection with the central processing system through wireless.
Preferably, the data processing unit comprises a cleaning module, an integrating and converting module and a classifying module, and is used for cleaning, integrating, converting and classifying the acquired data.
Preferably, the data storage unit comprises a database, the database is in bidirectional connection with the backup module through wireless, and the database is in bidirectional connection with the update module through wireless.
Preferably, the database is connected in two directions through a wireless and deleting module, and the database is connected in two directions through a wireless and protecting module.
Preferably, the identity verification unit comprises a permission request module, a face recognition module, a comparison module and a storage module.
Preferably, the information management unit comprises a request receiving module, a verification code information base and a verification code generating module.
Preferably, the information management unit is used for extracting and generating the real-time verification code from the information base after receiving the verification request.
(III) beneficial effects
The invention provides a big data analysis system adopting a computer verification code technology. The device comprises the following
The beneficial effects are that:
(1) According to the big data analysis system adopting the computer verification code technology, the security level judgment is carried out on the big data analysis system through the level judgment module, when the security requirement of the system is not high, the authentication is directly carried out through requesting the verification code through sending the short message verification code, when the security level requirement of the system is high, the user can request to send the short message verification code to carry out verification login after the face recognition is successful, the intelligent security system is used, and safer protection is provided for confidential data.
(2) The big data analysis system adopting the computer verification code technology is electrically connected with the input end of the data processing unit through the output end of the data acquisition module, and after data acquisition, the data are cleaned, integrated, converted and classified through the data processing unit, so that the data are normalized, the quality and accuracy of the data are improved, and the subsequent data processing time is saved.
(3) The big data analysis system adopting the computer verification code technology stores the processed data through the database, and backs up the data through the backup module, so that the data loss is prevented, and the safety of the big data system is improved.
Drawings
FIG. 1 is a schematic block diagram of a system of the present invention;
FIG. 2 is a schematic block diagram of a data processing unit according to the present invention;
FIG. 3 is a schematic block diagram of a data storage unit according to the present invention;
FIG. 4 is a schematic block diagram of the identity verification unit of the present invention;
fig. 5 is a schematic block diagram of the structure of the information management unit of the present invention.
In the figure: the system comprises a central processing system (CPU), a data acquisition module (2), a data processing unit (3), a cleaning module (31), an integrating and converting module (32), a classification module (33), an identity verification unit (4), a permission request module (41), a face recognition module (42), a comparison module (43), a storage module (44), an information management unit (5), a request receiving module (51), a verification code information base (52), a verification code generation module (53), a data storage unit (6), a database (61), a backup module (62), an updating module (63), a deletion module (64), a protection module (65), a grade 7 judgment module (7), a wireless transmission module (8) and a login module (9).
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-5, the embodiment of the present invention provides a technical solution: the utility model provides an adopt big data analysis system of computer identifying code technique, including central processing system 1, central processing system 1's input and the output electric connection of data acquisition module 2, data acquisition module 2 is used for gathering data information from routes such as each big website, news, specialty forum, the output of data acquisition module 2 and the input electric connection of data processing unit 3, central processing system 1 realizes two-way connection through wireless with authentication unit 4, authentication unit 4's output and information management unit 5's input electric connection, central processing system 1 realizes two-way connection through wireless with data storage unit 6, central processing system 1 realizes two-way connection through wireless with grade decision module 7, grade decision module 7 is used for judging big data system's security level, the security level is divided into one-level, two-level, three-level and four-level, one-level and two-level are set to the security level that the demand is high, three-level and four-level are set to the security level that the demand is low, central processing system 1 realizes two-way connection through wireless with wireless transmission module 8, wireless transmission module 8 realizes two-way connection through wireless with login module 9.
In the embodiment of the invention, the information management unit 5 is in bidirectional connection with the central processing system 1 through wireless, and the data processing unit 3 is in bidirectional connection with the central processing system 1 through wireless.
In the embodiment of the invention, the data processing unit 3 includes a cleaning module 31, an integrating and converting module 32 and a classifying module 33, and the data processing unit 3 is used for cleaning, integrating, converting and classifying the collected data, normalizing the data and improving the quality and accuracy of the data.
In the embodiment of the invention, the data storage unit 6 comprises a database 61, the database 61 is in bidirectional connection with a backup module 62 through wireless, the backup module 62 backs up data, data loss is prevented, the database 61 is in bidirectional connection with an updating module 63 through wireless, and the updating module 63 is used for updating data in real time, so that authority and specialty of big data are improved.
In the embodiment of the present invention, the database 61 is connected in two directions by the wireless and delete module 64, and the database 61 is connected in two directions by the wireless and protection module 65.
In the embodiment of the present invention, the identity verification unit 4 includes a permission request module 41, a face recognition module 42, a comparison module 43 and a storage module 44, where the permission request module 41 is used for requesting permission information of the camera, the face recognition module 42 performs face recognition on the user, the storage module 44 is used for inputting face information of the user in advance and storing the face information, and the comparison module 43 is used for comparing the face information identified with the face information in the storage module 44.
In the embodiment of the present invention, the information management unit 5 includes a request receiving module 51, a verification code information base 52 and a verification code generating module 53, the verification code information base 52 is used for storing verification code information, and the verification code generating module 53 is used for extracting verification codes in the verification code information base 52 to generate verification code information.
In the embodiment of the present invention, the information management unit 5 is configured to extract and generate a real-time verification code from the information base after receiving the verification request.
And all that is not described in detail in this specification is well known to those skilled in the art.
When the system is used, the data acquisition module 2 is used for acquiring data information from various large websites, news, forums and other approaches, the acquired information is transmitted to the data processing unit 3, the cleaning module 31 is used for filtering and denoising the acquired data so as to obtain reasonable data, the integration and conversion module 32 is used for processing redundancy of the data and normalizing the data, and the classification module 33 is used for classifying the data according to the type of the data;
the processed data is uploaded to the data storage unit 6, the database 61 is used for storing the processed data, the backup module 62 is used for backing up and storing the data to prevent data loss, the update module 63 is used for updating the data content in the database 61 in real time, the deletion module 64 is used for deleting unnecessary data, and the protection module 65 is used for carrying out safety protection on the database 61 to prevent virus invasion;
the level judging module 7 is used for judging the security level of the big data system, when a user needs to enter the system, the authentication request is sent to the information management unit 5 directly, when the security requirement of the system is not high, the request receiving module 51 is used for receiving the authentication request, the authentication code information base 52 is used for storing authentication code information, the authentication code generating module 53 is used for extracting the authentication code in the authentication code information base 52 to generate authentication code information, the wireless transmission module 8 is used for sending the information to the user in the form of sending the authentication code through a short message, and the user performs authentication login through the login module 9;
when the security level of the system is high, the authentication request is transmitted to the authentication unit 4, the permission request module 41 is used for requesting permission information of the camera, then the face recognition module 42 is used for recognizing the face of the user, the storage module 44 is used for inputting the face information of the user in advance and storing the face information, the comparison module 43 is used for comparing the recognized face information with the face information in the storage module 44, after the comparison is successful, the information can be sent to the information management unit 5, the operation of the previous step is continued, and the request of sending the short message authentication code is performed for authentication login.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. The big data analysis system adopting the computer verification code technology comprises a central processing system (1), and is characterized in that: the intelligent data acquisition system is characterized in that the input end of the central processing system (1) is electrically connected with the output end of the data acquisition module (2), the output end of the data acquisition module (2) is electrically connected with the input end of the data processing unit (3), the central processing system (1) is in bidirectional connection with the identity verification unit (4) through wireless, the output end of the identity verification unit (4) is electrically connected with the input end of the information management unit (5), the central processing system (1) is in bidirectional connection with the data storage unit (6) through wireless, the central processing system (1) is in bidirectional connection with the grade judgment module (7) through wireless, the central processing system (1) is in bidirectional connection with the wireless transmission module (8) through wireless, and the wireless transmission module (8) is in bidirectional connection with the login module (9) through wireless.
2. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) is in bidirectional connection with the central processing system (1) through wireless, and the data processing unit (3) is in bidirectional connection with the central processing system (1) through wireless.
3. The big data analysis system using computer verification code technology according to claim 1, wherein: the data processing unit (3) comprises a cleaning module (31), an integrating and converting module (32) and a classifying module (33), and the data processing unit (3) is used for cleaning, integrating, converting and classifying acquired data.
4. The big data analysis system using computer verification code technology according to claim 1, wherein: the data storage unit (6) comprises a database (61), the database (61) is in bidirectional connection with the backup module (62) through wireless, and the database (61) is in bidirectional connection with the update module (63) through wireless.
5. The big data analysis system using computer verification code technology according to claim 4, wherein: the database (61) is connected in a bidirectional manner through a wireless and deleting module (64), and the database (61) is connected in a bidirectional manner through a wireless and protecting module (65).
6. The big data analysis system using computer verification code technology according to claim 1, wherein: the identity verification unit (4) comprises a permission request module (41), a face recognition module (42), a comparison module (43) and a storage module (44).
7. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) comprises a request receiving module (51), a verification code information base (52) and a verification code generating module (53).
8. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) is used for extracting and generating a real-time verification code from the information base after receiving the verification request.
CN202310505085.8A 2023-05-08 2023-05-08 Big data analysis system adopting computer verification code technology Pending CN116738387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310505085.8A CN116738387A (en) 2023-05-08 2023-05-08 Big data analysis system adopting computer verification code technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310505085.8A CN116738387A (en) 2023-05-08 2023-05-08 Big data analysis system adopting computer verification code technology

Publications (1)

Publication Number Publication Date
CN116738387A true CN116738387A (en) 2023-09-12

Family

ID=87917692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310505085.8A Pending CN116738387A (en) 2023-05-08 2023-05-08 Big data analysis system adopting computer verification code technology

Country Status (1)

Country Link
CN (1) CN116738387A (en)

Similar Documents

Publication Publication Date Title
US10181168B2 (en) Personal safety verification system and similarity search method for data encrypted for confidentiality
CN110008704B (en) Intelligent electronic information storage system for industrial management
CN102045268B (en) A kind of e-mail data restoration methods and device
CN113656661B (en) Mobile government affair system based on natural language recognition
CN113918526B (en) Log processing method, device, computer equipment and storage medium
CN116629804B (en) Letters, interviews, supervision and tracking management system and management method
CN114996675A (en) Data query method and device, computer equipment and storage medium
CN111405013A (en) Cloud platform data management system
CN116738387A (en) Big data analysis system adopting computer verification code technology
CN114584369A (en) Big data processing system with resource sharing function
CN105160229A (en) Single-soldier system with voice and fingerprint dual authentication
CN114282903A (en) City multisource data overall process integrated management system
CN210804423U (en) Website information acquisition and release platform system
CN108881159B (en) Safety control method
CN103200180A (en) Method and system of protecting network behavior through user recognition
CN116010465B (en) Financial business management system and method
CN117197816B (en) User material identification method and system
CN116800485A (en) IT equipment information acquisition system
CN115578215A (en) Power data management system and method based on trusted AI
Li Redundancy evaluation method of massive heterogeneous data in Internet of things based on attributes and relations
CN116089429A (en) Big data storage method, device, equipment and storage medium
CN117220902A (en) Data attack processing method and server applied to intelligent cloud
CN117271491A (en) User data cleaning method, device, intelligent equipment and storage medium
CN117196631A (en) Data transaction processing method and terminal equipment thereof
CN115545752A (en) Data processing and storing system for information service consultation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination