CN111935154A - Cache system of cloud computing network and account security and confidentiality method thereof - Google Patents
Cache system of cloud computing network and account security and confidentiality method thereof Download PDFInfo
- Publication number
- CN111935154A CN111935154A CN202010805076.7A CN202010805076A CN111935154A CN 111935154 A CN111935154 A CN 111935154A CN 202010805076 A CN202010805076 A CN 202010805076A CN 111935154 A CN111935154 A CN 111935154A
- Authority
- CN
- China
- Prior art keywords
- module
- cloud computing
- firewall
- cache
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Virology (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a cache system of a cloud computing network and an account security and confidentiality method thereof, wherein the system is provided with a camera module and a face comparison module which can carry out face comparison on a person who uses a cloud cache module and a cloud computing resource module, so that the situation that a person who steals a password steals the internal data of the cloud cache module and the cloud computing resource module is avoided, the security of the system is improved, and meanwhile, the stealed person can be subjected to photographing alarm, so that lawless persons can be tracked in time; the timing module is matched with the starting module to regularly kill viruses for the cloud cache module and the cloud computing resource module, so that the workers are prevented from forgetting to check and kill the viruses due to negligence, the virus killing efficiency is improved, and the labor burden of the workers is also reduced.
Description
Technical Field
The invention relates to the technical field of cache systems, in particular to a cache system of a cloud computing network and an account security and confidentiality method thereof.
Background
The cloud computing network is a connection mode for changing a resource pool into a virtual resource and then connecting users at all positions to the resource. Cloud computing networks, whether they are public, private, or a hybrid cloud, must be able to: bandwidth is increased and decreased as needed. Very low latency throughput capability is achieved between storage networks, data centers, and LANs. Enabling a blocking-free connection between servers to support automatic migration of Virtual Machines (VMs). The functionality on the management panel can be extended into enterprise and service provider networks. Visibility can be provided throughout a changing environment. The cloud computing network can be seen as three interdependent structures: the front end is responsible for connecting the user to the application; the middle layer is used for realizing physical server interconnection and virtual machine migration of the physical servers; and a storage network. Larger cloud networks may be created as a layer 2 or layer 3 network. The cloud computing network has two tasks: changing the resource pool into a virtual resource and then connecting all the users in the position to the resource, the network needs to keep the account secret when in use.
However, in a common secret method, the password input module is arranged, so that when the password is stolen, a lawless person can steal the password, the safety of the system is reduced, and meanwhile, the antivirus software needs to be operated by a worker, so that the labor burden of the worker is increased.
The patent specification with application number 201410312993.6 discloses a metadata cache replacement method for a cloud storage system, which divides metadata into private metadata and shared metadata, and divides a metadata cache area into a private cache area and a shared cache area; and respectively setting replacement strategies aiming at the private cache region and the shared cache region, and respectively replacing the shared metadata in the shared cache region and the private metadata in the private cache region by the cloud storage system according to the corresponding replacement strategies. The method meets different replacement management requirements of private metadata and shared metadata respectively, avoids mutual interference of the two metadata during cache replacement, improves the replacement management capacity of the system for the metadata, improves the hit rate of metadata cache, accelerates system response and improves system performance. The method can be suitable for the access characteristics of large number of users, large data volume and variable load in the cloud storage environment. However, the patent cannot prevent a person stealing the password from stealing the internal data of the cloud cache module and the cloud computing resource module, and the security of the system is improved.
Disclosure of Invention
The invention provides a cache system of a cloud computing network, which avoids a person stealing passwords from stealing internal data of a cloud cache module and a cloud computing resource module, and improves the safety of the system.
The invention further aims to provide an account security method of the cache system of the cloud computing network.
In order to achieve the technical effects, the technical scheme of the invention is as follows:
a cache system of a cloud computing network comprises a physical server module, a cloud cache module, a cloud computing resource module, a power supply module, a firewall module, a antivirus module, a user connection module, a signal sending module, a face comparison module, a camera module, an alarm module, a signal transmitting end, an input module, a timing module and a starting module, wherein the input end of the physical server module is connected with the output end of the user connection module, the input end of the user connection module is connected with the output end of the signal sending module, the input end of the signal sending module is connected with the output end of the face comparison module, the input end of the face comparison module is connected with the output end of the camera module, the input end of the alarm module is connected with the output end of the camera module, and the input end of the camera is connected with the output end of the face comparison module, the input end of the cloud cache module is connected with the output end of the physical server module, the input end of the cloud computing resource module is connected with the output end of the cloud cache module, and the power output end of the power supply module is connected with the power access ends of the physical server module and the cloud cache module;
the input end of the cloud cache module is connected with the output ends of the firewall module and the antivirus module, the input end of the antivirus module is connected with the output end of the starting module, the input end of the starting module is connected with the output end of the timing module, and the input end of the timing module is connected with the output end of the input module.
Further, the face comparison module performs light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering and sharpening pretreatment processes of the face image on the acquired face image.
Furthermore, a firewall NAT address translation technology adopting an NAT mode is arranged in the firewall module, the firewall carries out address translation on the IP address of the internal network, and the IP address of the firewall is used for replacing the source address of the internal network to send data to the external network; when the response data flow of the external network returns to the firewall, the firewall replaces the destination address with the source address of the internal network.
Furthermore, an external input keyboard of the input module can manually set the timing time of the timing module, and the starting module controls the operation of the antivirus module.
Furthermore, antivirus software adopting a desktop virtualization technology is arranged in the antivirus module, a brand new virtual mirror image of the existing host operating system can be generated after the antivirus software is installed, the mirror image has the function of completely consistent real operating system, the desktop virtualization technology has independent grading operating system pressure, the target that garbage files are zero in the running process is achieved through the desktop virtualization technology, meanwhile, the generated virtual environment is completely isolated from the host operating system, the host is protected from being infected by viruses, and the probability that the system is damaged is reduced.
Furthermore, the firewall module realizes that an external network cannot directly see the IP address of the internal network, thereby enhancing the safety protection of the internal network; meanwhile, the internal network can use private network addresses, and the problem of limited IP address number is solved.
Further, the firewall module uses an address/port mapping technology to perform address/port mapping configuration on the firewall, and when an external network user needs to access the internal service, the firewall maps the request to the internal server; when the internal server returns the corresponding data, the firewall forwards the data to the external network.
Furthermore, the firewall module uses an address/port mapping technology to realize that an external user can access the internal service, but the external user cannot see the real address of the internal server and can only see the address of the firewall, so that the safety of the internal server is enhanced.
Further, the face comparison module performs gray level correction and noise filtering before preprocessing the acquired face image.
An account security and confidentiality method of a cache system of a cloud computing network comprises the following steps:
s1: after the power supply is switched on, the system starts to work, at the moment, when the data in the cloud cache module and the data in the cloud computing resource module need to be read, the camera module can be started firstly, and at the moment, the camera module starts to work to shoot the face of a worker;
s2: the camera module transmits the arranged face data to the interior of the face comparison module, and the face comparison module starts to perform matching comparison on the face data;
s3: after the matching and comparison judgment of the face comparison module fails, a command is sent to the camera module, the camera module sends a shot picture to a receiving end of the alarm module, and the alarm module sends face data to an alarm position through a signal transmitting end;
s4: after the face comparison module is successfully matched and compared, a connection signal is sent to the user connection module through the signal sending module, and after the user connection module receives the connection signal, the physical server module is connected to read data from the interior of the cloud cache module and the cloud computing resource module;
s5: in daily use, a fixed time is set for the timing module through the input module, then the timing module can control the starting module to start the antivirus module to search and kill viruses for data in the cloud cache module within a regular time, and meanwhile, the firewall module can also prevent the viruses from invading the cloud cache module and the cloud computing resource module.
Compared with the prior art, the technical scheme of the invention has the beneficial effects that:
according to the invention, the camera module and the face comparison module are arranged to compare faces of people who use the cloud cache module and the cloud computing resource module, so that a person who steals a password is prevented from stealing internal data of the cloud cache module and the cloud computing resource module, the safety of the system is improved, and meanwhile, the stolen person can be photographed and alarmed, so that lawless persons can be timely tracked; the timing module is matched with the starting module to regularly kill viruses for the cloud cache module and the cloud computing resource module, so that the workers are prevented from forgetting to check and kill the viruses due to negligence, the virus killing efficiency is improved, and the labor burden of the workers is also reduced.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
FIG. 2 is a block diagram of the system of the disinfection module of the present invention;
in the figure: the system comprises a physical server module, a 2-cloud cache module, a 3-cloud computing resource module, a 4-power supply module, a 5-firewall module, a 6-antivirus module, a 7-user connection module, an 8-signal sending module, a 9-human face comparison module, a 10-camera module, an 11-alarm module, a 12-signal transmitting end, a 13-input module, a 14-timing module and a 15-starting module.
Detailed Description
The drawings are for illustrative purposes only and are not to be construed as limiting the patent;
for the purpose of better illustrating the embodiments, certain features of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product;
it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The technical solution of the present invention is further described below with reference to the accompanying drawings and examples.
As shown in fig. 1-2, a cache system of cloud computing network, including physical server module 1, cloud cache module 2, cloud computing resource module 3, power module 4, prevent hot wall module 5, antivirus module 6, user connection module 7, signaling module 8, people's face comparison module 9, camera module 10, alarm module 11, signal transmitting terminal 12, input module 13, timing module 14, start module 15, the input of physical server module 1 is connected with user connection module 7's output, user connection module 7's input is connected with signaling module 8's output, signaling module 8's input is connected with people's face comparison module 9's output, people's face comparison module 9's inside is provided with the face recognition module, people's face recognition module advances the collection of face image: different face images can be collected through the camera lens, such as static images, dynamic images, different positions, different expressions and the like can be well collected; combining weak classification methods together through an Adaboost algorithm to form a new strong classification method; in the process of face detection, an Adaboost algorithm is used for picking out some rectangular features (weak classifiers) which can represent the face most, the weak classifiers are constructed into a strong classifier according to a weighted voting mode, and then a plurality of strong classifiers obtained by training are connected in series to form a cascade-structured stacked classifier, so that the detection speed of the classifier is effectively improved; then, carrying out face image preprocessing: face image preprocessing: the image preprocessing of the human face is based on the human face detection result, processes the image and finally serves the process of feature extraction; the original image obtained by the system is limited by various conditions and random interference, so that the original image can not be directly used, and the original image needs to be subjected to image preprocessing such as gray correction, noise filtration and the like in the early stage of image processing; for the face image, the preprocessing process mainly comprises the steps of light compensation, gray level transformation, histogram equalization, normalization, geometric correction, filtering, sharpening and the like of the face image; finally, the extracted feature data of the face image and a feature template stored in a database are searched and matched, and a threshold value is set, and when the similarity exceeds the threshold value, a result obtained by matching is output; the face recognition is to compare the face features to be recognized with the obtained face feature template and judge the identity information of the face according to the similarity degree; this process is divided into two categories: one is confirmation, which is a process of performing one-to-one image comparison, and the other is recognition, which is a process of performing one-to-many image matching comparison; the input end of the face comparison module 9 is connected with the output end of the camera module 10, the input end of the alarm module 11 is connected with the output end of the camera module 10, the input end of the camera module 10 is connected with the output end of the face comparison module 9, the input end of the cloud cache module 2 is connected with the output end of the physical server module 1, the input end of the cloud computing resource module 3 is connected with the output end of the cloud cache module 2, and the power output end of the power supply module 4 is connected with the power access ends of the physical server module 1 and the cloud cache module 2;
the input end of the cloud cache module 2 is connected with the output ends of a firewall module 5 and a antivirus module 6, the firewall module 5 is internally provided with a firewall NATNetwork Address Translation technology adopting an NAT mode to perform Address Translation on an IP Address of an internal network by the firewall, and the IP Address of the firewall is used for replacing a source Address of the internal network to send data to the external network; when the response data flow of the external network returns to the firewall, the firewall replaces the destination address with the source address of the internal network. The NAT mode can realize that an external network cannot directly see the IP address of the internal network, thereby further enhancing the safety protection of the internal network. Meanwhile, in the network in the NAT mode, the internal network can use the private network address, and the problem of limited IP address number can be solved. If the requirement of external network for accessing internal network service is needed to be realized on the basis of NAT mode, address/port mapping MAP technology can be used to perform address/port mapping configuration on the firewall, and when the external network user needs to access the internal service, the firewall MAPs the request to the internal server; when the internal server returns the corresponding data, the firewall forwards the data to the external network. The address/port mapping technology is used for realizing that an external user can access the internal service, but the external user cannot see the real address of the internal server and can only see the address of the firewall, so that the safety of the internal server is enhanced; the input end of the antivirus module 6 is connected with the output end of the starting module 15, the input end of the starting module 15 is connected with the output end of the timing module 14, the input end of the timing module 14 is connected with the output end of the input module 13, the external input keyboard of the input module 13 can manually set the timing time of the timing module 14, the starting module 15 controls the work of the antivirus module 6, the antivirus software adopting the desktop virtualization technology is arranged inside the antivirus module 6, a brand new virtual mirror image of the existing host operating system can be generated after the product is installed, and the mirror image has the function of completely consistent real operating systems. The desktop virtualization technology has the pressure of an independent grading operating system, the aim that garbage files are zero in the running process can be achieved through the technology, meanwhile, the generated virtual environment is completely isolated from the host operating system, the isolation effect is well achieved, the host is protected from being infected by viruses, and the probability of damage to the system is reduced.
The cache system of the cloud computing network and the account security and confidentiality method comprise the following steps:
s1: after the power is switched on, the system starts to work, at this time, when people need to read the data in the cloud cache module 2 and the cloud computing resource module 3, the camera module 10 can be started first, and at this time, the camera module 10 starts to work to photograph the faces of people;
s2: the camera module 10 transmits the arranged face data to the interior of the face comparison module 9, and the face comparison module 9 starts to perform matching comparison on the face data;
s3: after the matching and comparison judgment of the face comparison module 9 fails, a command is sent to the camera module 10, the camera module 10 sends a shot picture to a receiving end of the alarm module 11, and the alarm module 11 sends face data to an alarm position through the signal transmitting end 12;
s4: after the face comparison module 9 succeeds in matching comparison judgment, a connection signal is sent to the user connection module 7 through the signal sending module 8, and after the user connection module 7 receives the connection signal, the physical server module 1 is connected to read data from the interior of the cloud cache module 2 and the cloud computing resource module 3;
s5: in daily use, a fixed time can be set for the timing module 14 through the input module 13, then the timing module 14 can control the starting module 15 to start the antivirus module 6 to search and kill viruses for data inside the cloud cache module 2 within a regular time, and meanwhile, the firewall module 5 can also prevent viruses from invading the cloud cache module 2 and the cloud computing resource module 3.
The same or similar reference numerals correspond to the same or similar parts;
the positional relationships depicted in the drawings are for illustrative purposes only and are not to be construed as limiting the present patent;
it should be understood that the above-described embodiments of the present invention are merely examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the claims of the present invention.
Claims (10)
1. A cache system of a cloud computing network is characterized by comprising a physical server module (1), a cloud cache module (2), a cloud computing resource module (3), a power supply module (4), a firewall module (5), a antivirus module (6), a user connection module (7), a signal transmission module (8), a human face comparison module (9), a camera module (10), an alarm module (11), a signal transmitting end (12), an input module (13), a timing module (14) and a starting module (15), wherein the input end of the physical server module (1) is connected with the output end of the user connection module (7), the input end of the user connection module (7) is connected with the output end of the signal transmission module (8), the input end of the signal transmission module (8) is connected with the output end of the human face comparison module (9), the input end of the face comparison module (9) is connected with the output end of the camera module (10), the input end of the alarm module (11) is connected with the output end of the camera module (10), the input end of the camera module (10) is connected with the output end of the face comparison module (9), the input end of the cloud cache module (2) is connected with the output end of the physical server module (1), the input end of the cloud computing resource module (3) is connected with the output end of the cloud cache module (2), and the power output end of the power supply module (4) is connected with the power access ends of the physical server module (1) and the cloud cache module (2);
the input of cloud buffer module (2) is connected with prevent hot wall module (5) with the output of virus killing module (6), the input of virus killing module (6) is connected with the output of starting module (15), the input of starting module (15) is connected with the output of timing module (14), the input of timing module (14) is connected with the output of input module (13).
2. The cache system of the cloud computing network according to claim 1, wherein the face comparison module (9) performs preprocessing processes of light compensation, gray scale transformation, histogram equalization, normalization, geometric correction, filtering and sharpening of the face image on the acquired face image.
3. The cache system of the cloud computing network according to claim 2, wherein the firewall module (5) is internally provided with a firewall NAT address translation technology adopting an NAT mode to perform address translation on the IP address of the internal network by the firewall, and the IP address of the firewall is used for replacing the source address of the internal network to send data to the external network; when the response data flow of the external network returns to the firewall, the firewall replaces the destination address with the source address of the internal network.
4. The cache system of the cloud computing network according to claim 3, wherein an external input keyboard of the input module (13) can manually set the timing time of the timing module (14), and the starting module (15) controls the operation of the disinfection module (6).
5. The cache system of the cloud computing network according to claim 4, wherein antivirus software adopting a desktop virtualization technology is arranged inside the antivirus module (6), a brand new virtual image of an existing host operating system is generated after the antivirus software is installed, the image has a function of completely consistent real operating systems, the desktop virtualization technology has independent blocking operating system pressure, the target that garbage files are zero in the running process is achieved through the desktop virtualization technology, meanwhile, the generated virtual environment is completely isolated from the host operating system, the host is protected from being infected by viruses, and the probability of system damage is reduced.
6. The cache system of the cloud computing network according to claim 5, wherein the firewall module (5) realizes that an external network cannot directly see the IP address of an internal network, thereby enhancing the security protection of the internal network; meanwhile, the internal network can use private network addresses, and the problem of limited IP address number is solved.
7. The caching system of the cloud computing network according to claim 6, wherein the firewall module (5) performs address/port mapping configuration on the firewall using an address/port mapping technique, and when an external network user needs to access an internal service, the firewall maps a request onto the internal server; when the internal server returns the corresponding data, the firewall forwards the data to the external network.
8. The caching system of the cloud computing network according to claim 7, wherein the firewall module (5) uses an address/port mapping technology to enable an external user to access the internal service, but the external user cannot see a real address of the internal server and can only see an address of the firewall, so that the security of the internal server is enhanced.
9. The cache system of the cloud computing network according to claim 8, wherein the face comparison module (9) performs gray scale correction and noise filtering before preprocessing the acquired face image.
10. An account security privacy method of a cache system of a cloud computing network according to claim 9, comprising the steps of:
s1: after the power supply is switched on, the system starts to work, at the moment, when data in the cloud cache module (2) and the cloud computing resource module (3) need to be read, the camera module (10) can be started firstly, at the moment, the camera module (10) starts to work, and the face of a worker is photographed;
s2: the camera module (10) transmits the arranged face data to the interior of the face comparison module (9), and the face comparison module (9) starts to perform matching comparison on the face data;
s3: after the matching comparison judgment of the face comparison module (9) fails, a command is sent to the camera module (10), the camera module (10) sends a shot picture to a receiving end of the alarm module (11), and the alarm module (11) sends face data to an alarm position through the signal transmitting end (12);
s4: after the face comparison module (9) is successfully matched and compared, a connection signal is sent to the user connection module (7) through the signal sending module (8), and after the user connection module (7) receives the connection signal, the physical server module (1) is connected to read data from the cloud cache module (2) and the cloud computing resource module (3);
s5: in daily use, a fixed time is set for the timing module (14) through the input module (13), then the timing module (14) can control the starting module (15) to start the antivirus module (6) to search and kill viruses for data in the cloud cache module (2) within a regular time, and meanwhile, the firewall module (5) can also prevent the viruses from invading the cloud cache module (2) and the cloud computing resource module (3).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010805076.7A CN111935154A (en) | 2020-08-12 | 2020-08-12 | Cache system of cloud computing network and account security and confidentiality method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010805076.7A CN111935154A (en) | 2020-08-12 | 2020-08-12 | Cache system of cloud computing network and account security and confidentiality method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111935154A true CN111935154A (en) | 2020-11-13 |
Family
ID=73311273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010805076.7A Pending CN111935154A (en) | 2020-08-12 | 2020-08-12 | Cache system of cloud computing network and account security and confidentiality method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111935154A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112699380A (en) * | 2021-01-14 | 2021-04-23 | 杭州猿宝互联网科技有限公司 | Method for screening high-quality clients to improve wind control efficiency |
CN114339254A (en) * | 2022-01-08 | 2022-04-12 | 南京锦兰瑞科技信息有限公司 | Internet cloud video coding and decoding transmission method and storage mode |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790706A (en) * | 2012-07-27 | 2012-11-21 | 福建富士通信息软件有限公司 | Safety analyzing method and device of mass events |
CN103037019A (en) * | 2013-01-07 | 2013-04-10 | 北京华胜天成科技股份有限公司 | Distributed data acquisition system and method based on cloud computing |
US20140366119A1 (en) * | 2013-06-07 | 2014-12-11 | International Business Machines Corporation | Regional firewall clustering in a networked computing environment |
CN104954400A (en) * | 2014-03-27 | 2015-09-30 | 中国电信股份有限公司 | Cloud computing system and realizing method thereof |
CN106790270A (en) * | 2017-02-16 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of safety system of cloud operating system |
CN108011953A (en) * | 2017-12-03 | 2018-05-08 | 长沙瑞晓知识产权服务有限公司 | Cloud service system based on recognition of face |
CN109637123A (en) * | 2018-11-22 | 2019-04-16 | 深圳市博远交通设施有限公司 | A kind of complexity traffic environment downlink people living things feature recognition and traffic control system |
-
2020
- 2020-08-12 CN CN202010805076.7A patent/CN111935154A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790706A (en) * | 2012-07-27 | 2012-11-21 | 福建富士通信息软件有限公司 | Safety analyzing method and device of mass events |
CN103037019A (en) * | 2013-01-07 | 2013-04-10 | 北京华胜天成科技股份有限公司 | Distributed data acquisition system and method based on cloud computing |
US20140366119A1 (en) * | 2013-06-07 | 2014-12-11 | International Business Machines Corporation | Regional firewall clustering in a networked computing environment |
CN104954400A (en) * | 2014-03-27 | 2015-09-30 | 中国电信股份有限公司 | Cloud computing system and realizing method thereof |
CN106790270A (en) * | 2017-02-16 | 2017-05-31 | 郑州云海信息技术有限公司 | A kind of safety system of cloud operating system |
CN108011953A (en) * | 2017-12-03 | 2018-05-08 | 长沙瑞晓知识产权服务有限公司 | Cloud service system based on recognition of face |
CN109637123A (en) * | 2018-11-22 | 2019-04-16 | 深圳市博远交通设施有限公司 | A kind of complexity traffic environment downlink people living things feature recognition and traffic control system |
Non-Patent Citations (1)
Title |
---|
"(*-*)浩": ""防火墙的作用是防止不希望的、未授权的通信进出被保护的网络对吗"", 《"PHP中文网"首页 >常见问题》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112699380A (en) * | 2021-01-14 | 2021-04-23 | 杭州猿宝互联网科技有限公司 | Method for screening high-quality clients to improve wind control efficiency |
CN114339254A (en) * | 2022-01-08 | 2022-04-12 | 南京锦兰瑞科技信息有限公司 | Internet cloud video coding and decoding transmission method and storage mode |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9100425B2 (en) | Method and apparatus for detecting malicious software using generic signatures | |
US9147127B2 (en) | Verification of user photo IDs | |
CN103842985A (en) | Security-enhanced cloud system and security management method thereby | |
CN111935154A (en) | Cache system of cloud computing network and account security and confidentiality method thereof | |
CN108293044A (en) | System and method for detecting malware infection via domain name service flow analysis | |
US11381972B2 (en) | Optimizing authentication and management of wireless devices in zero trust computing environments | |
US12111901B2 (en) | System for face authentication and method for face authentication | |
JPWO2016043120A1 (en) | Information processing apparatus and cooperative distributed storage system | |
US20210304571A1 (en) | Cognitive automation platform for providing enhanced automated teller machine (atm) security | |
US20210342577A1 (en) | Face recognition method and face recognition device | |
US20240232343A1 (en) | Attack Detection Method and Apparatus | |
CN107315974A (en) | A kind of image-forming media protection device based on Internet of Things | |
CA3152996A1 (en) | A method for obtaining data from an image of an object of a user that has a biometric characteristic of the user | |
CN117201184A (en) | Active defense method and system | |
WO2021233474A1 (en) | External network identity authentication method, system, device, and storage medium based on internal network connection | |
JP7065413B2 (en) | Face recognition machine and face recognition method | |
CN108985062B (en) | File transmission control method, device and equipment | |
CN112328998A (en) | Computer information security monitoring method | |
CN110634219A (en) | Access control identification system, method, equipment and storage medium | |
CN112367317B (en) | Endogenous safe WAF fingerprint transformation method | |
Chavan et al. | Traceability Analysis of Face Spoofing Detection Techniques Using Machine Learning | |
CN112200168B (en) | Method and system for secure access of mobile storage device | |
CN113420613B (en) | Identity verification method based on face recognition, face recognition system and associated equipment | |
US12107854B2 (en) | Continuous multifactor authentication system integration with corporate security systems | |
JP7336681B2 (en) | Face authentication system and face authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201113 |