CN116738387A - Big data analysis system adopting computer verification code technology - Google Patents
Big data analysis system adopting computer verification code technology Download PDFInfo
- Publication number
- CN116738387A CN116738387A CN202310505085.8A CN202310505085A CN116738387A CN 116738387 A CN116738387 A CN 116738387A CN 202310505085 A CN202310505085 A CN 202310505085A CN 116738387 A CN116738387 A CN 116738387A
- Authority
- CN
- China
- Prior art keywords
- module
- verification code
- wireless
- central processing
- big data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 60
- 238000007405 data analysis Methods 0.000 title claims abstract description 25
- 238000005516 engineering process Methods 0.000 title claims abstract description 22
- 238000012545 processing Methods 0.000 claims abstract description 48
- 230000002457 bidirectional effect Effects 0.000 claims abstract description 25
- 238000007726 management method Methods 0.000 claims description 16
- 238000013500 data storage Methods 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000004140 cleaning Methods 0.000 claims description 8
- 238000000034 method Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000007418 data mining Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
- G06F16/215—Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a big data analysis system adopting a computer verification code technology, which comprises a central processing system, wherein the input end of the central processing system is electrically connected with the output end of a data acquisition module, the output end of the data acquisition module is electrically connected with the input end of a data processing unit, and the central processing system is in bidirectional connection with an identity verification unit through wireless. According to the big data analysis system adopting the computer verification code technology, the security level judgment is carried out on the big data analysis system through the level judgment module, when the security requirement of the system is not high, the authentication code is directly requested, the identity verification is carried out through the form of sending the short message verification code, when the security level requirement of the system is high, the user can request to send the short message verification code to carry out verification login after the face recognition is successful, the intelligent security system is more intelligent, and safer protection is provided for secret data.
Description
Technical Field
The invention relates to the technical field of big data analysis, in particular to a big data analysis system adopting a computer verification code technology.
Background
Big data or huge amount of data refers to large amount of data which cannot be retrieved, managed, processed and tidied in a reasonable time through a mainstream software tool, the big data needs special technology to effectively process a large amount of data within a tolerant time, the technology is suitable for big data, the technology comprises a large-scale parallel processing (MPP) database, a data mining, a distributed file system, a distributed database, a cloud computing platform, the Internet and an extensible storage system, the big data is taken as vocabulary of the IT industry which is the most hot at present, and accordingly, the utilization of business value of data warehouse, data security, data analysis, data mining and the like around the big data gradually becomes a profit focus for industrial personnel to strive for, and the big data analysis also occurs along with the coming of big data age.
At present, a large data platform mostly adopts a verification code form to log in the data platform in the application process, and the data is checked, and the existing verification code technology comprises the forms of pictures, characters, short messages and the like, so that a single verification mode is simple and is easy to crack, the data platform with higher security is not protected, and the data is easy to steal.
Disclosure of Invention
(one) solving the technical problems
Aiming at the defects of the prior art, the invention provides a big data analysis system adopting a computer verification code technology, which solves the problems that a single verification mode is simpler and is easy to crack, the protection of a data platform with higher security is not facilitated, and the data is easy to steal.
(II) technical scheme
In order to achieve the above purpose, the invention is realized by the following technical scheme: the big data analysis system comprises a central processing system, wherein the input end of the central processing system is electrically connected with the output end of a data acquisition module, the output end of the data acquisition module is electrically connected with the input end of a data processing unit, the central processing system is in bidirectional connection with an identity verification unit through wireless, the output end of the identity verification unit is electrically connected with the input end of an information management unit, the central processing system is in bidirectional connection with a data storage unit through wireless, the central processing system is in bidirectional connection with a grade judging module through wireless, the central processing system is in bidirectional connection with a wireless transmission module through wireless, and the wireless transmission module is in bidirectional connection with a login module through wireless.
Preferably, the information management unit is in bidirectional connection with the central processing system through wireless, and the data processing unit is in bidirectional connection with the central processing system through wireless.
Preferably, the data processing unit comprises a cleaning module, an integrating and converting module and a classifying module, and is used for cleaning, integrating, converting and classifying the acquired data.
Preferably, the data storage unit comprises a database, the database is in bidirectional connection with the backup module through wireless, and the database is in bidirectional connection with the update module through wireless.
Preferably, the database is connected in two directions through a wireless and deleting module, and the database is connected in two directions through a wireless and protecting module.
Preferably, the identity verification unit comprises a permission request module, a face recognition module, a comparison module and a storage module.
Preferably, the information management unit comprises a request receiving module, a verification code information base and a verification code generating module.
Preferably, the information management unit is used for extracting and generating the real-time verification code from the information base after receiving the verification request.
(III) beneficial effects
The invention provides a big data analysis system adopting a computer verification code technology. The device comprises the following
The beneficial effects are that:
(1) According to the big data analysis system adopting the computer verification code technology, the security level judgment is carried out on the big data analysis system through the level judgment module, when the security requirement of the system is not high, the authentication is directly carried out through requesting the verification code through sending the short message verification code, when the security level requirement of the system is high, the user can request to send the short message verification code to carry out verification login after the face recognition is successful, the intelligent security system is used, and safer protection is provided for confidential data.
(2) The big data analysis system adopting the computer verification code technology is electrically connected with the input end of the data processing unit through the output end of the data acquisition module, and after data acquisition, the data are cleaned, integrated, converted and classified through the data processing unit, so that the data are normalized, the quality and accuracy of the data are improved, and the subsequent data processing time is saved.
(3) The big data analysis system adopting the computer verification code technology stores the processed data through the database, and backs up the data through the backup module, so that the data loss is prevented, and the safety of the big data system is improved.
Drawings
FIG. 1 is a schematic block diagram of a system of the present invention;
FIG. 2 is a schematic block diagram of a data processing unit according to the present invention;
FIG. 3 is a schematic block diagram of a data storage unit according to the present invention;
FIG. 4 is a schematic block diagram of the identity verification unit of the present invention;
fig. 5 is a schematic block diagram of the structure of the information management unit of the present invention.
In the figure: the system comprises a central processing system (CPU), a data acquisition module (2), a data processing unit (3), a cleaning module (31), an integrating and converting module (32), a classification module (33), an identity verification unit (4), a permission request module (41), a face recognition module (42), a comparison module (43), a storage module (44), an information management unit (5), a request receiving module (51), a verification code information base (52), a verification code generation module (53), a data storage unit (6), a database (61), a backup module (62), an updating module (63), a deletion module (64), a protection module (65), a grade 7 judgment module (7), a wireless transmission module (8) and a login module (9).
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-5, the embodiment of the present invention provides a technical solution: the utility model provides an adopt big data analysis system of computer identifying code technique, including central processing system 1, central processing system 1's input and the output electric connection of data acquisition module 2, data acquisition module 2 is used for gathering data information from routes such as each big website, news, specialty forum, the output of data acquisition module 2 and the input electric connection of data processing unit 3, central processing system 1 realizes two-way connection through wireless with authentication unit 4, authentication unit 4's output and information management unit 5's input electric connection, central processing system 1 realizes two-way connection through wireless with data storage unit 6, central processing system 1 realizes two-way connection through wireless with grade decision module 7, grade decision module 7 is used for judging big data system's security level, the security level is divided into one-level, two-level, three-level and four-level, one-level and two-level are set to the security level that the demand is high, three-level and four-level are set to the security level that the demand is low, central processing system 1 realizes two-way connection through wireless with wireless transmission module 8, wireless transmission module 8 realizes two-way connection through wireless with login module 9.
In the embodiment of the invention, the information management unit 5 is in bidirectional connection with the central processing system 1 through wireless, and the data processing unit 3 is in bidirectional connection with the central processing system 1 through wireless.
In the embodiment of the invention, the data processing unit 3 includes a cleaning module 31, an integrating and converting module 32 and a classifying module 33, and the data processing unit 3 is used for cleaning, integrating, converting and classifying the collected data, normalizing the data and improving the quality and accuracy of the data.
In the embodiment of the invention, the data storage unit 6 comprises a database 61, the database 61 is in bidirectional connection with a backup module 62 through wireless, the backup module 62 backs up data, data loss is prevented, the database 61 is in bidirectional connection with an updating module 63 through wireless, and the updating module 63 is used for updating data in real time, so that authority and specialty of big data are improved.
In the embodiment of the present invention, the database 61 is connected in two directions by the wireless and delete module 64, and the database 61 is connected in two directions by the wireless and protection module 65.
In the embodiment of the present invention, the identity verification unit 4 includes a permission request module 41, a face recognition module 42, a comparison module 43 and a storage module 44, where the permission request module 41 is used for requesting permission information of the camera, the face recognition module 42 performs face recognition on the user, the storage module 44 is used for inputting face information of the user in advance and storing the face information, and the comparison module 43 is used for comparing the face information identified with the face information in the storage module 44.
In the embodiment of the present invention, the information management unit 5 includes a request receiving module 51, a verification code information base 52 and a verification code generating module 53, the verification code information base 52 is used for storing verification code information, and the verification code generating module 53 is used for extracting verification codes in the verification code information base 52 to generate verification code information.
In the embodiment of the present invention, the information management unit 5 is configured to extract and generate a real-time verification code from the information base after receiving the verification request.
And all that is not described in detail in this specification is well known to those skilled in the art.
When the system is used, the data acquisition module 2 is used for acquiring data information from various large websites, news, forums and other approaches, the acquired information is transmitted to the data processing unit 3, the cleaning module 31 is used for filtering and denoising the acquired data so as to obtain reasonable data, the integration and conversion module 32 is used for processing redundancy of the data and normalizing the data, and the classification module 33 is used for classifying the data according to the type of the data;
the processed data is uploaded to the data storage unit 6, the database 61 is used for storing the processed data, the backup module 62 is used for backing up and storing the data to prevent data loss, the update module 63 is used for updating the data content in the database 61 in real time, the deletion module 64 is used for deleting unnecessary data, and the protection module 65 is used for carrying out safety protection on the database 61 to prevent virus invasion;
the level judging module 7 is used for judging the security level of the big data system, when a user needs to enter the system, the authentication request is sent to the information management unit 5 directly, when the security requirement of the system is not high, the request receiving module 51 is used for receiving the authentication request, the authentication code information base 52 is used for storing authentication code information, the authentication code generating module 53 is used for extracting the authentication code in the authentication code information base 52 to generate authentication code information, the wireless transmission module 8 is used for sending the information to the user in the form of sending the authentication code through a short message, and the user performs authentication login through the login module 9;
when the security level of the system is high, the authentication request is transmitted to the authentication unit 4, the permission request module 41 is used for requesting permission information of the camera, then the face recognition module 42 is used for recognizing the face of the user, the storage module 44 is used for inputting the face information of the user in advance and storing the face information, the comparison module 43 is used for comparing the recognized face information with the face information in the storage module 44, after the comparison is successful, the information can be sent to the information management unit 5, the operation of the previous step is continued, and the request of sending the short message authentication code is performed for authentication login.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. The big data analysis system adopting the computer verification code technology comprises a central processing system (1), and is characterized in that: the intelligent data acquisition system is characterized in that the input end of the central processing system (1) is electrically connected with the output end of the data acquisition module (2), the output end of the data acquisition module (2) is electrically connected with the input end of the data processing unit (3), the central processing system (1) is in bidirectional connection with the identity verification unit (4) through wireless, the output end of the identity verification unit (4) is electrically connected with the input end of the information management unit (5), the central processing system (1) is in bidirectional connection with the data storage unit (6) through wireless, the central processing system (1) is in bidirectional connection with the grade judgment module (7) through wireless, the central processing system (1) is in bidirectional connection with the wireless transmission module (8) through wireless, and the wireless transmission module (8) is in bidirectional connection with the login module (9) through wireless.
2. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) is in bidirectional connection with the central processing system (1) through wireless, and the data processing unit (3) is in bidirectional connection with the central processing system (1) through wireless.
3. The big data analysis system using computer verification code technology according to claim 1, wherein: the data processing unit (3) comprises a cleaning module (31), an integrating and converting module (32) and a classifying module (33), and the data processing unit (3) is used for cleaning, integrating, converting and classifying acquired data.
4. The big data analysis system using computer verification code technology according to claim 1, wherein: the data storage unit (6) comprises a database (61), the database (61) is in bidirectional connection with the backup module (62) through wireless, and the database (61) is in bidirectional connection with the update module (63) through wireless.
5. The big data analysis system using computer verification code technology according to claim 4, wherein: the database (61) is connected in a bidirectional manner through a wireless and deleting module (64), and the database (61) is connected in a bidirectional manner through a wireless and protecting module (65).
6. The big data analysis system using computer verification code technology according to claim 1, wherein: the identity verification unit (4) comprises a permission request module (41), a face recognition module (42), a comparison module (43) and a storage module (44).
7. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) comprises a request receiving module (51), a verification code information base (52) and a verification code generating module (53).
8. The big data analysis system using computer verification code technology according to claim 1, wherein: the information management unit (5) is used for extracting and generating a real-time verification code from the information base after receiving the verification request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310505085.8A CN116738387A (en) | 2023-05-08 | 2023-05-08 | Big data analysis system adopting computer verification code technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310505085.8A CN116738387A (en) | 2023-05-08 | 2023-05-08 | Big data analysis system adopting computer verification code technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116738387A true CN116738387A (en) | 2023-09-12 |
Family
ID=87917692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310505085.8A Pending CN116738387A (en) | 2023-05-08 | 2023-05-08 | Big data analysis system adopting computer verification code technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116738387A (en) |
-
2023
- 2023-05-08 CN CN202310505085.8A patent/CN116738387A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10181168B2 (en) | Personal safety verification system and similarity search method for data encrypted for confidentiality | |
CN110008704B (en) | Intelligent electronic information storage system for industrial management | |
CN102045268B (en) | A kind of e-mail data restoration methods and device | |
CN113656661B (en) | Mobile government affair system based on natural language recognition | |
CN113918526B (en) | Log processing method, device, computer equipment and storage medium | |
CN116629804B (en) | Letters, interviews, supervision and tracking management system and management method | |
CN114996675A (en) | Data query method and device, computer equipment and storage medium | |
CN111405013A (en) | Cloud platform data management system | |
CN116738387A (en) | Big data analysis system adopting computer verification code technology | |
CN114584369A (en) | Big data processing system with resource sharing function | |
CN105160229A (en) | Single-soldier system with voice and fingerprint dual authentication | |
CN114282903A (en) | City multisource data overall process integrated management system | |
CN210804423U (en) | Website information acquisition and release platform system | |
CN108881159B (en) | Safety control method | |
CN103200180A (en) | Method and system of protecting network behavior through user recognition | |
CN116010465B (en) | Financial business management system and method | |
CN117197816B (en) | User material identification method and system | |
CN116800485A (en) | IT equipment information acquisition system | |
CN115578215A (en) | Power data management system and method based on trusted AI | |
Li | Redundancy evaluation method of massive heterogeneous data in Internet of things based on attributes and relations | |
CN116089429A (en) | Big data storage method, device, equipment and storage medium | |
CN117220902A (en) | Data attack processing method and server applied to intelligent cloud | |
CN117271491A (en) | User data cleaning method, device, intelligent equipment and storage medium | |
CN117196631A (en) | Data transaction processing method and terminal equipment thereof | |
CN115545752A (en) | Data processing and storing system for information service consultation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |