CN201937606U - Network data safety supervision system - Google Patents
Network data safety supervision system Download PDFInfo
- Publication number
- CN201937606U CN201937606U CN2011200496278U CN201120049627U CN201937606U CN 201937606 U CN201937606 U CN 201937606U CN 2011200496278 U CN2011200496278 U CN 2011200496278U CN 201120049627 U CN201120049627 U CN 201120049627U CN 201937606 U CN201937606 U CN 201937606U
- Authority
- CN
- China
- Prior art keywords
- network data
- server
- supervisory systems
- authentication
- data security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
The utility model discloses a network data safety supervision system, which comprises user end equipment and data end equipment, wherein the user end equipment comprises a user terminal machine and an authentication generator which are connected through Internet, the data end equipment comprises a data server, a timer and an authentication server, the timer is connected with the authentication server, and the authentication server is connected with the data server through networks. The network data safety supervision system can avoid the direct visiting of the data server under the condition that a user steals login passwords, visitors of the data server are controlled in a timing mode, and the safety of the data server is enhanced.
Description
Technical field
The utility model relates to a kind of safety system, especially relates to a kind of network data security supervisory systems.
Background technology
The security control of network data becomes the topic of a hot topic day by day.In fields such as bank, communication, scientific researches, the security control of network data is an important topic.
Usually, security control is the mode that adopts identification, and by direct identification, for example modes such as password identification, fingerprint recognition, iris recognition are carried out, and the user that identification is passed through is direct accesses network data just.But RM may be stolen by illegal invasion person, and particularly under the password identification mode, the invador may crack by calculation mode, and illegal accesses network data.
The utility model content
The utility model provides a kind of network data security supervisory systems at the problems referred to above, and this system can utilize timer to limit the time difference that the user obtains authentication and uses authentication, further guarantees the legitimacy of user identity.
A purpose of the present utility model provides a kind of safer network data protection system.
For this reason, the utility model provides a kind of network data security supervisory systems, comprising:
Ustomer premises access equipment and data terminal equipment,
Described ustomer premises access equipment comprises by the user terminal of Internet connection and authentication generating means;
Described data terminal equipment comprises data server, timer and certificate server, described timer with
Described certificate server connects, and described certificate server is connected with described data server network.
Preferably, in the described network data security supervisory systems, described user terminal is a computer.
Preferably, in the described network data security supervisory systems, comprise bar code printer in the described authentication generating means.
Preferably, in the described network data security supervisory systems, comprise writer in the described authentication generating means.
Preferably, in the described network data security supervisory systems, comprise card reader in the described certificate server.
Preferably, in the described network data security supervisory systems, comprise bar-code reader in the described certificate server.
In the disclosed network data security supervisory systems of the utility model,, further guarantee the legitimacy of user identity by limiting the time that authentication obtains and uses.
Description of drawings
Fig. 1 is the structural representation of network data security supervisory systems described in the utility model.
Embodiment
Below in conjunction with accompanying drawing the utility model is described in further detail, can implements according to this with reference to the specification literal to make those skilled in the art.
As shown in Figure 1, the utility model discloses a kind of network data security supervisory systems, comprising: ustomer premises access equipment and data terminal equipment, described ustomer premises access equipment comprise by the user terminal of Internet connection and authentication generating means; Described data terminal equipment comprises data server, timer and certificate server, and described timer is connected with described certificate server, and described certificate server is connected with described data server network.
In the use, the user at first logins by password on user terminal, and after logining, the authentication generating means produces authentication information, simultaneously the authentication information generation time is sent on the certificate server in the data terminal equipment.The authentication information that is produced can be the bar code paper that prints, and also can be the magnetic card of writing information data.The user delivers to the certificate server place with the authentication information that obtains and authenticates, and certificate server not only carries out the authentication of authentication information, also carries out the authentication of the time difference of authentication information generation time and authenticated time.That is to say, the time of setting in time difference of authentication information generation time and authenticated time and the timer is compared, if drop in the setting-up time, then by authentication, if surpass setting-up time, then refusal authentication.
In the described network data security supervisory systems, described user terminal is a computer.
In the described network data security supervisory systems, comprise bar code printer in the described authentication generating means, the form of authentication information with bar code can be printed on the paper.
In the described network data security supervisory systems, comprise writer in the described authentication generating means, authentication information can be write magnetic card with the form of card information.
Accordingly, in the described network data security supervisory systems, comprise card reader in the described certificate server or comprise bar-code reader.
Although embodiment of the present utility model is open as above, but it is not restricted to listed utilization in specification and the execution mode, it can be applied to the various fields of the present utility model that are fit to fully, for those skilled in the art, can easily realize other modification, therefore under the universal that does not deviate from claim and equivalency range and limited, the legend that the utility model is not limited to specific details and illustrates here and describe.
Claims (6)
1. a network data security supervisory systems is characterized in that, comprising:
Ustomer premises access equipment and data terminal equipment,
Described ustomer premises access equipment comprises by the user terminal of Internet connection and authentication generating means;
Described data terminal equipment comprises data server, timer and certificate server, described timer with
Described certificate server connects, and described certificate server is connected with described data server network.
2. network data security supervisory systems as claimed in claim 1 is characterized in that, described user terminal is a computer.
3. network data security supervisory systems as claimed in claim 1 is characterized in that, comprises bar code printer in the described authentication generating means.
4. network data security supervisory systems as claimed in claim 1 is characterized in that, comprises writer in the described authentication generating means.
5. network data security supervisory systems as claimed in claim 4 is characterized in that, comprises card reader in the described certificate server.
6. network data security supervisory systems as claimed in claim 3 is characterized in that, comprises bar-code reader in the described certificate server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200496278U CN201937606U (en) | 2011-02-28 | 2011-02-28 | Network data safety supervision system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200496278U CN201937606U (en) | 2011-02-28 | 2011-02-28 | Network data safety supervision system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201937606U true CN201937606U (en) | 2011-08-17 |
Family
ID=44449110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011200496278U Expired - Fee Related CN201937606U (en) | 2011-02-28 | 2011-02-28 | Network data safety supervision system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201937606U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523199A (en) * | 2011-11-29 | 2012-06-27 | 深圳市中联创新自控系统有限公司 | Safety protection system with anti-counterfeiting certification and anti-counterfeiting certification method thereof |
WO2014029343A1 (en) * | 2012-08-24 | 2014-02-27 | 湖州龙宇信息技术有限公司 | System and method for data safety monitoring, warning and backup strategy |
-
2011
- 2011-02-28 CN CN2011200496278U patent/CN201937606U/en not_active Expired - Fee Related
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523199A (en) * | 2011-11-29 | 2012-06-27 | 深圳市中联创新自控系统有限公司 | Safety protection system with anti-counterfeiting certification and anti-counterfeiting certification method thereof |
WO2014029343A1 (en) * | 2012-08-24 | 2014-02-27 | 湖州龙宇信息技术有限公司 | System and method for data safety monitoring, warning and backup strategy |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101997824B (en) | Identity identifying method based on mobile terminal and device thereof and system | |
EP2939387B1 (en) | Apparatus for and method of multi-factor authentication among collaborating communication devices | |
KR101829266B1 (en) | Authentication in ubiquitous environment | |
CN103942478B (en) | A kind of authentication and right management method and equipment | |
EP2912595B1 (en) | Method for producing a soft token, computer program product and service computer system | |
EP3023899B1 (en) | Proximity authentication system | |
US20140329497A1 (en) | Smartdevices Enabled Secure Access to Multiple Entities (SESAME) | |
WO2013030060A1 (en) | Method for generating a soft token, computer program product and service computer system | |
CN103368954B (en) | A kind of smart card registration entry based on password and biological characteristic | |
CN106100850A (en) | Intelligent and safe chip signing messages transmission method based on Quick Response Code and system | |
CN103366111A (en) | Two-dimensional code based method for realizing extended authentication control of smart card on mobile equipment | |
CN102349061A (en) | Dynamic remote peripheral binding | |
US20130194075A1 (en) | Method for reading an rfid token, rfid card and electronic device | |
CN103136485B (en) | A kind of method realizing computer security and computer | |
CN103971426A (en) | PSAM safety control-based access control system and safe access control method using the same | |
CN105100009A (en) | Login control system, method and device | |
CN104601594B (en) | The identification authentication system and method for OTP token equipment based on two dimensional code | |
CN104085203A (en) | Portable intelligent digital seal | |
JP2010204809A (en) | Usb type token | |
CN108400989B (en) | Security authentication equipment, method and system for shared resource identity authentication | |
CN201937606U (en) | Network data safety supervision system | |
CN104135480A (en) | Entrance guard authorization system and entrance guard authorization method | |
CN102170437A (en) | System and method for realizing Phishing identification based on challenge password token | |
CN104579673B (en) | Interactive authentication method between RFID card and card reader | |
CN101127592A (en) | A biological template registration method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110817 Termination date: 20140228 |