Cloud security access system and method
A security access and cloud technology, applied in the field of network security management, can solve the problems of information leakage and easy interception of data transmission process by others, and achieve the effect of high comparison efficiency and accurate comparison efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] figure 1 A block diagram of a cloud security access system is shown. In an embodiment of the present invention, a cloud security access system is provided. The system 10 includes:
[0072] A risk level determining module 11, configured to receive an access request, acquire location information, and determine a risk level according to the location information;
[0073] Monitoring module 12, used for real-time monitoring information entry port when the risk level reaches a preset level threshold;
[0074] The image information acquisition module 13 is used to lock the information input port when monitoring the information input port, determine the cloud address, and obtain the image information of the information input interface;
[0075] Comparison and verification module 14, used to obtain the base image according to the cloud address, and compare and verify the image information based on the base image;
[0076] The data transmission module 15 is configured to unlock...
Embodiment 2
[0122] Figure 8 A block flow diagram of a cloud security access system and method is shown. In an embodiment of the present invention, a cloud security access method is provided, and the method includes:
[0123] Step S100: receiving an access request, acquiring location information, and determining a risk level according to the location information;
[0124] Step S200: When the risk level reaches a preset level threshold, real-time monitoring information is entered into the port;
[0125] Step S300: When the information input port is detected, lock the information input port, determine the cloud address, and acquire the image information of the information input interface;
[0126] Step S400: Obtain a base image according to the cloud address, and compare and verify the image information based on the base image;
[0127] Step S500: When the image information passes the comparison and verification, unlock the information input port, acquire user account information, and sen...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com