[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112732527A - Electric power system information safety monitoring method and system - Google Patents

Electric power system information safety monitoring method and system Download PDF

Info

Publication number
CN112732527A
CN112732527A CN202110021597.8A CN202110021597A CN112732527A CN 112732527 A CN112732527 A CN 112732527A CN 202110021597 A CN202110021597 A CN 202110021597A CN 112732527 A CN112732527 A CN 112732527A
Authority
CN
China
Prior art keywords
mobile terminal
user
information
power system
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110021597.8A
Other languages
Chinese (zh)
Inventor
张靖
李明
王旭东
雷霆
韩学民
郑高峰
陈清萍
刘朋熙
郭洋
徐道磊
张永梅
唐轶轩
方锐
吴跃
路宇
李周
马俊杰
查伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Anhui Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Anhui Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Anhui Electric Power Co Ltd, Information and Telecommunication Branch of State Grid Anhui Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202110021597.8A priority Critical patent/CN112732527A/en
Publication of CN112732527A publication Critical patent/CN112732527A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a system for monitoring information safety of a power system. The method comprises the steps of judging whether an administrator account and a password are correct or not by receiving a request for accessing an electric power system information server, which is sent by a mobile terminal; if the answer is correct, the access of the mobile terminal to the information server of the power system is accepted; acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server; judging whether the real-time fingerprint information is a legal fingerprint which is input in advance; if so, sending finger keeping prompt information to the mobile terminal to guide the user to keep the fingerprint input state all the time; identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not; if the real-time fingerprint information of the mobile terminal is input and interrupted, the mobile terminal exits from the administrator account to terminate the access of the mobile terminal to the power system information server, so that the information security monitoring of the power system can be realized, the information of the power system is prevented from being stolen by lawbreakers, and the information security of the power system is improved.

Description

Electric power system information safety monitoring method and system
Technical Field
The invention relates to the technical field of information security monitoring of electric power systems, in particular to an information security monitoring method and system of an electric power system.
Background
Two aspects are involved for network security: on the one hand, physical security is included, which means that tangible objects such as communication, computer equipment and related facilities in a network system are protected from being wetted by rainwater. Another aspect also includes what we commonly speak of logical security. Including information integrity, confidentiality, availability, etc. Physical security and logical security are very important, and network security is affected when no protection is provided on any aspect, so that the security protection must be reasonably arranged while considering the two aspects. With the rapid development of the mobile internet era, the network safety protection work of the power system faces more serious challenges, and the mobile application technology rapidly enters multiple links of national grid power transmission, power transformation, power distribution, marketing and the like. The introduction of the mobile application technology provides a quick and efficient tool for production, operation and maintenance, inspection and supervision personnel going deep into the first line, but at the same time, the introduction of the mobile application technology is independent of an informatization application system outside a national grid and brings great hidden dangers to related data safety, and the existing electric power system information safety monitoring mode still has the problem of low safety, so that a method and a system for monitoring the information safety of the electric power system are necessary to be provided to solve the problems.
Disclosure of Invention
The invention provides a method and a system for monitoring information security of an electric power system, which aim to solve the problem that the existing method for monitoring information security of the electric power system is low in security.
In a first aspect, the present invention provides a method for monitoring information security of an electrical power system, including:
receiving a request for accessing an electric power system information server sent by a mobile terminal, wherein the request for accessing the electric power system information server carries an administrator account and a password;
judging whether the administrator account number and the password are correct or not;
if the administrator account number and the password are correct, the access of the mobile terminal to the information server of the power system is accepted;
acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server;
judging whether the real-time fingerprint information is a legal fingerprint which is input in advance;
if the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time;
identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not;
and if the real-time fingerprint information of the mobile terminal is in input interruption, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
With reference to the first aspect, in a first implementable manner of the first aspect, the method further includes:
acquiring real-time shooting information of a front camera of a mobile terminal accessing an electric power system information server;
extracting face information of a user from the real-time shooting information of the front-facing camera;
matching the face information of the user with preset safe user face information, and identifying whether the user is a legal user according to a matching result;
and if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
With reference to the first implementable manner of the first aspect, in a second implementable manner of the first aspect, the method further includes:
if the user is a legal user, sending face keeping prompt information to the mobile terminal to guide the user to keep a face input state all the time;
identifying whether the real-time face information of the mobile terminal generates input interruption or not;
and if the real-time face information of the mobile terminal generates input interruption, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
With reference to the second implementable manner of the first aspect, in a third implementable manner of the first aspect, the method further includes:
sending living body detection action prompt information to the mobile terminal to guide the head and the face of the user to make corresponding actions;
judging whether the current user is a living user or not according to the action;
and if the current user is not a living user, logging out of the administrator account to terminate the access of the mobile terminal to the power system information server.
With reference to the third implementable manner of the first aspect, in a fourth implementable manner of the first aspect, the method further includes:
sending sound wave detection prompt information to the mobile terminal to guide a user to read corresponding text information according to the sound wave detection prompt information;
receiving voice information generated by reading corresponding text information by a user;
comparing the voice information with safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to a comparison result;
and if the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
In a second aspect, the present invention provides an information security monitoring system for an electrical power system, including: the system comprises a mobile terminal and a power system information server in communication connection with the mobile terminal;
the mobile terminal is used for sending a request for accessing the information server of the power system and acquiring real-time fingerprint information of a user;
the power system information server is used for receiving a request for accessing the power system information server, which is sent by the mobile terminal, wherein the request for accessing the power system information server carries an administrator account and a password; judging whether the administrator account number and the password are correct or not; under the condition that the administrator account number and the password are correct, the access of the mobile terminal to the information server of the power system is accepted; acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server; judging whether the real-time fingerprint information is a legal fingerprint which is input in advance; under the condition that the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time; identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not; and under the condition that the real-time fingerprint information of the mobile terminal is recorded and interrupted, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
With reference to the second aspect, in a first implementable manner of the second aspect, the mobile terminal is further configured to acquire real-time shooting information;
the power system information server is also used for acquiring real-time shooting information of a front camera of a mobile terminal accessing the power system information server; extracting face information of a user from the real-time shooting information of the front-facing camera; matching the face information of the user with preset safe user face information, and identifying whether the user is a legal user according to a matching result; and if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
With reference to the first implementable manner of the second aspect, in a second implementable manner of the second aspect, the power system information server is further configured to send face keeping prompt information to the mobile terminal to guide the user to always keep a face entry state when the user is a legal user; identifying whether the real-time face information of the mobile terminal generates input interruption or not; and under the condition that the real-time face information of the mobile terminal is in input interruption, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
With reference to the second implementable manner of the second aspect, in a third implementable manner of the second aspect, the power system information server is further configured to send a living body detection action prompting message to the mobile terminal to guide the head and the face of the user to make a corresponding action; judging whether the current user is a living user or not according to the action; and in the case that the current user is not a living user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
With reference to the third implementable manner of the second aspect, in a fourth implementable manner of the second aspect, the power system information server is further configured to send sound wave detection prompt information to the mobile terminal to guide the user to read corresponding text information according to the sound wave detection prompt information; receiving voice information generated by reading corresponding text information by a user; comparing the voice information with safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to a comparison result; and in the case that the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
The invention has the following beneficial effects: according to the method and the system for monitoring the information security of the power system, the request for accessing the information server of the power system, which is sent by the mobile terminal, is received, and the request for accessing the information server of the power system carries the administrator account and the password; judging whether the account number and the password of the administrator are correct or not; if the account number and the password of the administrator are correct, the access of the mobile terminal to the information server of the power system is accepted; acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server; judging whether the real-time fingerprint information is a legal fingerprint which is input in advance; if the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time; identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not; if the real-time fingerprint information of the mobile terminal is input and interrupted, the mobile terminal exits from the administrator account to terminate the access of the mobile terminal to the power system information server, so that the information security monitoring of the power system can be realized, the information of the power system is prevented from being stolen by lawbreakers, and the information security of the power system is improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any inventive exercise.
Fig. 1 is a flowchart of an information security monitoring method for an electrical power system according to an embodiment of the present invention.
Fig. 2 is a flowchart of an alternative implementation of a method for monitoring information security of an electrical power system according to an embodiment of the present invention.
Fig. 3 is a flowchart of an alternative implementation of a method for monitoring information security of an electrical power system according to an embodiment of the present invention.
Fig. 4 is a flowchart of an alternative implementation of a method for monitoring information security of an electrical power system according to an embodiment of the present invention.
Fig. 5 is a flowchart of an alternative implementation of a method for monitoring information security of an electrical power system according to an embodiment of the present invention.
Fig. 6 is a schematic diagram of an information security monitoring system of an electrical power system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the specific embodiments of the present invention and the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Referring to fig. 1, the present invention provides a method for monitoring information security of an electrical power system, where an execution subject of the method is an electrical power system information server, and the method includes:
step S101, receiving a request for accessing the electric power system information server sent by the mobile terminal, wherein the request for accessing the electric power system information server carries an administrator account and a password.
Specifically, the mobile terminal and the power system information server can communicate through a 5G network, and an administrator account and a password are set for a user in advance.
And step S102, judging whether the administrator account and the password are correct or not.
And step S103, if the administrator account and the password are correct, the access of the mobile terminal to the information server of the power system is accepted.
Specifically, the mobile terminal can check data such as relevant operating states and parameters of the electric power equipment through accessing the electric power system information server.
And step S104, acquiring real-time fingerprint information of the mobile terminal accessing the power system information server.
Specifically, the mobile terminal is provided with a fingerprint acquisition module, and can acquire real-time fingerprint information of a user.
And step S105, judging whether the real-time fingerprint information is a legal fingerprint which is input in advance.
Specifically, the user may enter fingerprint information when using the mobile terminal for the first time.
And step S106, if the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time.
Specifically, for example, the user may be prompted to always stop a finger on the fingerprint acquisition module, so as to ensure that a person who views data such as a related operating state and parameters of the power equipment is the user himself.
And S107, identifying whether the real-time fingerprint information of the mobile terminal generates recording interruption or not.
And S108, if the real-time fingerprint information of the mobile terminal is recorded and interrupted, quitting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
Specifically, if the real-time fingerprint information of the mobile terminal is input and interrupted, it is indicated that the finger of the user is separated from the fingerprint acquisition module, and whether the current person viewing the data such as the related operating state and parameters of the power equipment is the user cannot be guaranteed, so that the mobile terminal exits from the administrator account to terminate the access of the mobile terminal to the information server of the power system, and the login and verification process needs to be performed again when the related information needs to be viewed.
As an alternative embodiment, as shown in fig. 2, the method may further include:
step S201, acquiring real-time shooting information of a front camera of the mobile terminal accessing the power system information server.
Particularly, the mobile terminal is provided with a front camera module and can collect real-time shooting information.
And step S202, extracting the face information of the user from the real-time shooting information of the front camera.
Specifically, the face information of the user can be extracted from the real-time shooting information of the front-facing camera by adopting the prior art.
Step S203, matching the face information of the user with the face information of a preset safe user, and identifying whether the user is a legal user according to a matching result.
Specifically, the user may enter face information when using the mobile terminal for the first time.
And step S204, if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
As an alternative embodiment, as shown in fig. 3, the method may further include:
step S301, if the user is a legal user, sending face keeping prompt information to the mobile terminal to guide the user to keep a face input state all the time.
Specifically, for example, the user may be prompted to always stay a human face in the acquisition area of the front camera, so as to ensure that the user who currently views the data such as the related operating state and parameters of the power equipment is the user himself.
Step S302, identifying whether the real-time face information of the mobile terminal generates input interruption or not.
And step S303, if the real-time face information of the mobile terminal generates input interruption, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
Specifically, if the entry of the face information of the mobile terminal is interrupted, it is indicated that the face of the user is separated from the acquisition area of the front-facing camera, and it is impossible to ensure whether the current person viewing the data such as the relevant operating state and parameters of the power equipment is the user himself, so that the user logs out of the administrator account to terminate the access of the mobile terminal to the information server of the power system, and the login and authentication process needs to be performed again when the relevant information needs to be viewed.
As an alternative embodiment, as shown in fig. 4, the method further includes:
step S401, sending the living body detection action prompt information to the mobile terminal to guide the head and the face of the user to make corresponding actions.
And step S402, judging whether the current user is a living user according to the action.
Specifically, the existing technology can be adopted to determine whether the current user is a living user.
And step S403, if the current user is not a living user, logging out of the administrator account to terminate the access of the mobile terminal to the power system information server.
Specifically, if the current user is not a living user, it is indicated that the face of the current user may be a still picture or a prerecorded video, and it cannot be ensured whether the current person viewing the data such as the relevant operating state and parameters of the power equipment is the user himself or herself, so the administrator account is exited to terminate the access of the mobile terminal to the information server of the power system, and the login and authentication process needs to be performed again when the relevant information needs to be viewed.
As an alternative embodiment, as shown in fig. 5, the method further includes:
step S501, sound wave detection prompt information is sent to the mobile terminal to guide a user to read corresponding text information according to the sound wave detection prompt information.
Specifically, a user may enter voice information through a microphone module of the mobile terminal when using the mobile terminal for the first time.
Step S502, receiving the voice information generated by the user reading the corresponding text information.
Step S503, comparing the voice information with the safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to the comparison result.
And step S504, if the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
Specifically, if the voice information is not matched with the safety user sound wave data preset by the administrator account, it is impossible to ensure whether the current person viewing the data such as the related operating state and parameters of the power equipment is the user himself or herself, so that the administrator account is exited to terminate the access of the mobile terminal to the information server of the power system, and the login and authentication process needs to be performed again when the related information needs to be viewed.
As shown in fig. 6, the present invention provides an information security monitoring system for an electric power system, including: the system comprises a mobile terminal 61 and a power system information server 62 which is in communication connection with the mobile terminal.
The mobile terminal 61 is configured to send a request for accessing an information server of the power system, and collect real-time fingerprint information of a user.
The power system information server 62 is configured to receive a request sent by the mobile terminal to access the power system information server, where the request to access the power system information server carries an administrator account and a password; judging whether the administrator account number and the password are correct or not; under the condition that the administrator account number and the password are correct, the access of the mobile terminal to the information server of the power system is accepted; acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server; judging whether the real-time fingerprint information is a legal fingerprint which is input in advance; under the condition that the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time; identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not; and under the condition that the real-time fingerprint information of the mobile terminal is recorded and interrupted, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
In an implementation manner, the mobile terminal 61 is further configured to collect real-time shooting information;
the power system information server 62 is further configured to obtain real-time shooting information of a front camera of the mobile terminal accessing the power system information server; extracting face information of a user from the real-time shooting information of the front-facing camera; matching the face information of the user with preset safe user face information, and identifying whether the user is a legal user according to a matching result; and if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
In an implementation manner, the power system information server 62 is further configured to send a face keeping prompt message to the mobile terminal to guide the user to always keep a face entry state if the user is a legal user; identifying whether the real-time face information of the mobile terminal generates input interruption or not; and under the condition that the real-time face information of the mobile terminal is in input interruption, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
In one implementation manner, the power system information server 62 is further configured to send a living body detection action prompt message to the mobile terminal to guide the head and the face of the user to make corresponding actions; judging whether the current user is a living user or not according to the action; and in the case that the current user is not a living user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
In an implementation manner, the power system information server 62 is further configured to send sound wave detection prompt information to the mobile terminal, so as to guide the user to read corresponding text information according to the sound wave detection prompt information; receiving voice information generated by reading corresponding text information by a user; comparing the voice information with safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to a comparison result; and in the case that the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
The embodiment of the present invention further provides a storage medium, and the storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements part or all of the steps in each embodiment of the power system information security monitoring method provided by the present invention. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM) or a Random Access Memory (RAM).
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the embodiment of the information security monitoring system of the power system, since it is basically similar to the embodiment of the method, the description is simple, and the relevant points can be referred to the description in the embodiment of the method.
The above-described embodiments of the present invention should not be construed as limiting the scope of the present invention.

Claims (10)

1. A power system information safety monitoring method is characterized by comprising the following steps:
receiving a request for accessing an electric power system information server sent by a mobile terminal, wherein the request for accessing the electric power system information server carries an administrator account and a password;
judging whether the administrator account number and the password are correct or not;
if the administrator account number and the password are correct, the access of the mobile terminal to the information server of the power system is accepted;
acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server;
judging whether the real-time fingerprint information is a legal fingerprint which is input in advance;
if the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time;
identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not;
and if the real-time fingerprint information of the mobile terminal is in input interruption, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
2. The method of claim 1, wherein the method further comprises:
acquiring real-time shooting information of a front camera of a mobile terminal accessing an electric power system information server;
extracting face information of a user from the real-time shooting information of the front-facing camera;
matching the face information of the user with preset safe user face information, and identifying whether the user is a legal user according to a matching result;
and if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
3. The method of claim 2, wherein the method further comprises:
if the user is a legal user, sending face keeping prompt information to the mobile terminal to guide the user to keep a face input state all the time;
identifying whether the real-time face information of the mobile terminal generates input interruption or not;
and if the real-time face information of the mobile terminal generates input interruption, exiting the administrator account to terminate the access of the mobile terminal to the information server of the power system.
4. The method of claim 3, wherein the method further comprises:
sending living body detection action prompt information to the mobile terminal to guide the head and the face of the user to make corresponding actions;
judging whether the current user is a living user or not according to the action;
and if the current user is not a living user, logging out of the administrator account to terminate the access of the mobile terminal to the power system information server.
5. The method of claim 4, wherein the method further comprises:
sending sound wave detection prompt information to the mobile terminal to guide a user to read corresponding text information according to the sound wave detection prompt information;
receiving voice information generated by reading corresponding text information by a user;
comparing the voice information with safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to a comparison result;
and if the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
6. An electrical power system information security monitoring system, comprising: the system comprises a mobile terminal and a power system information server in communication connection with the mobile terminal;
the mobile terminal is used for sending a request for accessing the information server of the power system and acquiring real-time fingerprint information of a user;
the power system information server is used for receiving a request for accessing the power system information server, which is sent by the mobile terminal, wherein the request for accessing the power system information server carries an administrator account and a password; judging whether the administrator account number and the password are correct or not; under the condition that the administrator account number and the password are correct, the access of the mobile terminal to the information server of the power system is accepted; acquiring real-time fingerprint information of a mobile terminal accessing an electric power system information server; judging whether the real-time fingerprint information is a legal fingerprint which is input in advance; under the condition that the real-time fingerprint information is a legal fingerprint which is input in advance, sending finger keeping prompt information to the mobile terminal to guide a user to keep a fingerprint input state all the time; identifying whether the real-time fingerprint information of the mobile terminal generates input interruption or not; and under the condition that the real-time fingerprint information of the mobile terminal is recorded and interrupted, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
7. The system of claim 6, wherein the mobile terminal is further configured to collect real-time shooting information;
the power system information server is also used for acquiring real-time shooting information of a front camera of a mobile terminal accessing the power system information server; extracting face information of a user from the real-time shooting information of the front-facing camera; matching the face information of the user with preset safe user face information, and identifying whether the user is a legal user according to a matching result; and if the user is an illegal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
8. The system of claim 7, wherein the power system information server is further configured to send a face keeping prompt message to the mobile terminal to guide the user to always keep a face entry state if the user is a legal user; identifying whether the real-time face information of the mobile terminal generates input interruption or not; and under the condition that the real-time face information of the mobile terminal is in input interruption, the mobile terminal quits the administrator account to terminate the access of the mobile terminal to the information server of the power system.
9. The system of claim 8, wherein the power system information server is further configured to send a live body detection action prompt message to the mobile terminal to guide the head and face of the user to make corresponding actions; judging whether the current user is a living user or not according to the action; and in the case that the current user is not a living user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
10. The system of claim 9, wherein the power system information server is further configured to send a sound wave detection prompt message to the mobile terminal to guide the user to read corresponding text information according to the sound wave detection prompt message; receiving voice information generated by reading corresponding text information by a user; comparing the voice information with safety user sound wave data preset by the administrator account, and identifying whether the user is a legal user according to a comparison result; and in the case that the current user is not a legal user, exiting the administrator account to terminate the access of the mobile terminal to the power system information server.
CN202110021597.8A 2021-01-08 2021-01-08 Electric power system information safety monitoring method and system Pending CN112732527A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110021597.8A CN112732527A (en) 2021-01-08 2021-01-08 Electric power system information safety monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110021597.8A CN112732527A (en) 2021-01-08 2021-01-08 Electric power system information safety monitoring method and system

Publications (1)

Publication Number Publication Date
CN112732527A true CN112732527A (en) 2021-04-30

Family

ID=75589555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110021597.8A Pending CN112732527A (en) 2021-01-08 2021-01-08 Electric power system information safety monitoring method and system

Country Status (1)

Country Link
CN (1) CN112732527A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113590439A (en) * 2021-06-08 2021-11-02 国电南瑞科技股份有限公司 Dispatcher seat real-time monitoring system and method based on D5000 system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017031703A1 (en) * 2015-08-25 2017-03-02 张焰焰 Method and mobile terminal for indicating patent information upon fingerprint login to account
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017031703A1 (en) * 2015-08-25 2017-03-02 张焰焰 Method and mobile terminal for indicating patent information upon fingerprint login to account
CN106603563A (en) * 2016-12-30 2017-04-26 厦门市美亚柏科信息股份有限公司 Information safety realization method and system based on biometric features identification

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113590439A (en) * 2021-06-08 2021-11-02 国电南瑞科技股份有限公司 Dispatcher seat real-time monitoring system and method based on D5000 system

Similar Documents

Publication Publication Date Title
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
EP2353125A1 (en) User authentication for social networks
KR102141934B1 (en) Computing device and system for serving smart contact center of using the same
CN105554741A (en) Communication information transmission method and system, and apparatus
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
CN105429943B (en) Information processing method and terminal thereof
CN110598383B (en) Method and device for removing account authority limit
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
US9025746B2 (en) System and method for visual caller identification
CN112732527A (en) Electric power system information safety monitoring method and system
CN106127034B (en) A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment
KR102151430B1 (en) Computing device for executing smart contact center service
CN111490973A (en) Network account security protection method and device
CN106782498A (en) Voice messaging player method, device and terminal
CN117692193A (en) Safe processing method, device, equipment and medium for video conference
CN104009963B (en) The security authentication mechanism of remote password
CN106254226A (en) A kind of information synchronization method and device
CN117715048A (en) Telecommunication fraud recognition method, device, electronic equipment and storage medium
US11546390B1 (en) Peer-supervised video conference based account recovery
CN116389089A (en) Safe operation and maintenance method and device
CN112398793B (en) Social engineering interaction method and device and storage medium
CN114710328A (en) Identity recognition processing method and device
WO2016112792A1 (en) Identity authentication method and device
CN112702359A (en) Data information safety management method, system, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210430

RJ01 Rejection of invention patent application after publication