CN108173841A - A kind of management method and application based on PC internets - Google Patents
A kind of management method and application based on PC internets Download PDFInfo
- Publication number
- CN108173841A CN108173841A CN201711432382.5A CN201711432382A CN108173841A CN 108173841 A CN108173841 A CN 108173841A CN 201711432382 A CN201711432382 A CN 201711432382A CN 108173841 A CN108173841 A CN 108173841A
- Authority
- CN
- China
- Prior art keywords
- module
- network
- keyword
- internets
- management method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of management method based on PC internets and applications, include the following steps:A. internet is connected in network transmission terminal first, then again connect network transmission terminal with router respectively by cable, then again connect the power supply of router;B. the terminal of router is then opened, the setting of account is then carried out further according to the data information of internet, the setting of password is then carried out again, the title of network is finally set again;C. router is connected respectively to by cable on computer again, then opens the connection that computer carries out network according to the account and password set again;D. network security is carried out by computer again to be set;E. internet is connected in computer again and applied.The present invention has good safety prevention measure, avoids the network information and is stolen by stranger, improves the safety during Web vector graphic, and computer can be allowed to carry out classification using network by router, improves speed during Web vector graphic.
Description
Technical field
The present invention relates to a kind of management method technical field of internet, specially a kind of manager based on PC internets
Method and application.
Background technology
At present, existing PC internets are also there is the place of some shortcomings, such as;Existing PC internets do not have good
Good safety prevention measure, the network information are easily stolen by stranger, reduce the safety during Web vector graphic, obstructed to pass by one's way
Computer can be allowed to carry out classification using network by device, reduce speed during Web vector graphic, and network data cannot be carried out
Monitoring, so as to which the purpose being classified to network data be not achieved.
Invention content
The technical problem to be solved by the present invention is to overcome the defects of the prior art, provide a kind of management based on PC internets
Method and application, the present invention have good safety prevention measure, avoid the network information and stolen by stranger, improving network makes
Computer can be allowed to carry out classification using network with safety in the process, and by router, when improving Web vector graphic
Speed by keyword, is monitored network data, so as to control the permission for accessing network, so that realizing to network number
According to the purpose of classification.
To solve the above problems, the present invention provides following technical solution:A kind of management method based on PC internets and should
With including the following steps:
A. internet is connected in network transmission terminal first, then again by network transmission terminal by cable respectively with routing
Device connects, and then again connects the power supply of router;
B. after the completion for the treatment of step a, the terminal of router is then opened, then carries out account further according to the data information of internet
Setting, then carries out the setting of password, finally sets the title of network again again;
C. after the completion for the treatment of step a, then router is connected respectively to by cable on computer, then open again computer according to
The account and password set carries out the connection of network;
D. after the completion for the treatment of step c, then network security is carried out by computer and is set, when setting will first carry out user information
Registration, then carries out the verification to user information, finally carries out login user information again again;
E. after the completion for the treatment of step d, then internet is connected in computer and is applied.
As a kind of preferred embodiment of the present invention, control module, network data are included during the PC the Internet, applications
Handling module, monitoring module, memory module, network management module, keyword Intelligent management module, keyword authentication module, figure
As acquisition module and image authentication module.
As a kind of preferred embodiment of the present invention, the network data handling module is responsible for in calculator memory
Appearance is captured, and by the data transmission of crawl to monitoring module, and the memory module preserves the keyword of setting and preserves use
Family information.
As a kind of preferred embodiment of the present invention, the number of the monitoring module receiving network data handling module transmission
According to, and the keyword that the data from the transmission of network data handling module of reception are set in memory module compares, such as
The keyword set in data and the memory module of the transmission of fruit network data handling module is identical, and just transmission information is to controlling mould
Block.
As a kind of preferred embodiment of the present invention, the network management module controls net according to the order of control module
The permission that network accesses.
As a kind of preferred embodiment of the present invention, described image acquisition module acquires user's by external camera
Facial information, described image authentication module transfer the user information in memory module and the facial information of image capture module acquisition
Control module is transmitted to compared to pair, and by comparison result.
As a kind of preferred embodiment of the present invention, the control module is according to the comparison result pipe of image authentication module
Reason whether opening network data capture module.
As a kind of preferred embodiment of the present invention, the keyword Intelligent management module in memory module according to preserving
Minor age information, search for the keyword of same age section shared of parent on network, and by the keyword of search with
Keyword in memory module compares, and as not having the keyword of search in memory module, is then transmitted to the keyword of search
Keyword authentication module, the keyword authentication module receive the keyword of keyword Intelligent management module transmission, and this is closed
Keyword is shown to administrator, as administrator updates the keyword to memory module if.
Compared with prior art, beneficial effects of the present invention are as follows:
The present invention a kind of management method and application based on PC internets, the present invention have good safety prevention measure, avoid
The network information is stolen by stranger, improves the safety during Web vector graphic, and by router can allow computer into
Row classification improves speed during Web vector graphic, by keyword, network data is monitored, so as to control using network
The permission of network is accessed, so that realizing the purpose being classified to network data.
Specific embodiment
The present invention provides a kind of technical solution:A kind of management method and application based on PC internets, include the following steps:
A. internet is connected in network transmission terminal first, then again by network transmission terminal by cable respectively with routing
Device connects, and then again connects the power supply of router;
B. after the completion for the treatment of step a, the terminal of router is then opened, then carries out account further according to the data information of internet
Setting, then carries out the setting of password, finally sets the title of network again again;
C. after the completion for the treatment of step a, then router is connected respectively to by cable on computer, then open again computer according to
The account and password set carries out the connection of network;
D. after the completion for the treatment of step c, then network security is carried out by computer and is set, when setting will first carry out user information
Registration, then carries out the verification to user information, finally carries out login user information again again;
E. after the completion for the treatment of step d, then internet is connected in computer and is applied.
Include control module, network data handling module, monitoring module, memory module, net during the PC the Internet, applications
Network management module, keyword Intelligent management module, keyword authentication module, image capture module and image authentication module.
The network data handling module is responsible for capturing the content of calculator memory, and by the data transmission of crawl
To monitoring module, the memory module preserves the keyword of setting and preserves user information.
The data of the monitoring module receiving network data handling module transmission, and reception is captured from network data
Compared with the keyword set in the data of module transfer and memory module, if the data of network data handling module transmission with
The keyword set in memory module is identical, just transmits information to control module.
The network management module controls the permission of network access according to the order of control module.
Described image acquisition module acquires the facial information of user by external camera, and described image authentication module is transferred
User information in memory module is compared pair with the facial information that image capture module acquires, and comparison result is transmitted to control
Module.
The control module according to the comparison result of image authentication module management whether opening network data capture module.
The keyword Intelligent management module is searched for according to the minor age information preserved in memory module on network
The keyword of same age section that parent shares, and keyword of the keyword of search in memory module is compared, such as deposit
There is no the keyword of search in storage module, then the keyword of search is transmitted to keyword authentication module, the keyword verification
Module receives the keyword of keyword Intelligent management module transmission, and the keyword is shown to administrator, as administrator passes through
Then the keyword is updated to memory module.
The management method based on PC internets and using when, first by internet be connected to network transmission end
On end, then network transmission terminal by cable with router is connect respectively again, then the power supply of router is connected again, is connect
The terminal for opening router, the setting of account is then carried out further according to the data information of internet, then carries out password again
Setting, finally sets the title of network, then router is connected respectively to by cable on computer, then opens calculating again again
Machine carries out the connection of network according to the account and password set, then carries out network security by computer and set, and sets
Shi Yaoxian carries out the registration of user information, then carries out the verification to user information again, finally carries out login user information again, then
Internet is connected in computer and is applied.
The basic principles, main features and the advantages of the invention have been shown and described above, for this field skill
For art personnel, it is clear that the present invention is not limited to the details of above-mentioned exemplary embodiment, and without departing substantially from the present invention spirit or
In the case of essential characteristic, the present invention can be realized in other specific forms.Therefore, in all respects, should all incite somebody to action
Embodiment regards exemplary as, and is non-limiting, the scope of the present invention by appended claims rather than on state
Bright restriction, it is intended that including all changes falling within the meaning and scope of the equivalent requirements of the claims in the present invention
It is interior.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, although with reference to aforementioned reality
Example is applied the present invention is described in detail, it for those skilled in the art, still can be to aforementioned each implementation
Technical solution recorded in example modifies or carries out equivalent replacement to which part technical characteristic.All essences in the present invention
With within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention god.
Claims (8)
1. a kind of management method and application based on PC internets, it is characterised in that:Include the following steps:
A. internet is connected in network transmission terminal first, then again by network transmission terminal by cable respectively with routing
Device connects, and then again connects the power supply of router;
B. after the completion for the treatment of step a, the terminal of router is then opened, then carries out account further according to the data information of internet
Setting, then carries out the setting of password, finally sets the title of network again again;
C. after the completion for the treatment of step a, then router is connected respectively to by cable on computer, then open again computer according to
The account and password set carries out the connection of network;
D. after the completion for the treatment of step c, then network security is carried out by computer and is set, when setting will first carry out user information
Registration, then carries out the verification to user information, finally carries out login user information again again;
E. after the completion for the treatment of step d, then internet is connected in computer and is applied.
2. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The PC is mutual
Include control module, network data handling module, monitoring module, memory module, network management module, keyword during working application
Intelligent management module, keyword authentication module, image capture module and image authentication module.
3. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The network
Data capture module is responsible for capturing the content of calculator memory, and by the data transmission of crawl to monitoring module, described
Memory module preserves the keyword of setting and preserves user information.
4. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The monitoring
The data of module receiving network data handling module transmission, and by data of the reception from the transmission of network data handling module with
The keyword set in memory module compares, if set in the data and memory module of the transmission of network data handling module
Keyword is identical, just transmits information to control module.
5. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The network
Management module controls the permission of network access according to the order of control module.
6. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:Described image
Acquisition module acquires the facial information of user by external camera, and described image authentication module transfers the user in memory module
Information is compared pair with the facial information that image capture module acquires, and comparison result is transmitted to control module.
7. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The control
Module according to the comparison result of image authentication module management whether opening network data capture module.
8. a kind of management method and application based on PC internets according to claim 1, it is characterised in that:The key
Word Intelligent management module searches for phase the same year that parent shares on network according to the minor age information preserved in memory module
The keyword of age section, and keyword of the keyword of search in memory module is compared, as do not searched in memory module
Keyword, then the keyword of search is transmitted to keyword authentication module, the keyword authentication module receives keyword intelligence
The keyword of energy management module transmission, and the keyword is shown to administrator, as administrator updates the keyword if
To memory module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711432382.5A CN108173841A (en) | 2017-12-26 | 2017-12-26 | A kind of management method and application based on PC internets |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711432382.5A CN108173841A (en) | 2017-12-26 | 2017-12-26 | A kind of management method and application based on PC internets |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108173841A true CN108173841A (en) | 2018-06-15 |
Family
ID=62521041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711432382.5A Pending CN108173841A (en) | 2017-12-26 | 2017-12-26 | A kind of management method and application based on PC internets |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108173841A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400067A (en) * | 2013-03-29 | 2013-11-20 | 青岛海信电器股份有限公司 | Access control method, system and server |
CN104410624A (en) * | 2014-11-27 | 2015-03-11 | 柳州市网中网络策划中心 | Internet data management system |
-
2017
- 2017-12-26 CN CN201711432382.5A patent/CN108173841A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400067A (en) * | 2013-03-29 | 2013-11-20 | 青岛海信电器股份有限公司 | Access control method, system and server |
CN104410624A (en) * | 2014-11-27 | 2015-03-11 | 柳州市网中网络策划中心 | Internet data management system |
Non-Patent Citations (2)
Title |
---|
曲瑞超: "浅谈家庭局域网的组建", 《赤峰学院学报(自然科学版)》 * |
许榕生 蒋文保编著: "《电子商务安全与保密》", 31 December 2001, 北京:中国电力出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aïvodji et al. | IOTFLA: A secured and privacy-preserving smart home architecture implementing federated learning | |
CN105791047B (en) | A kind of control method of security video private network Network Management System | |
CN108494729B (en) | A kind of zero trust model realization system | |
CN107528856A (en) | Internet of Things mist end equipment based on block chain platform access authentication method beyond the clouds | |
CN107925589A (en) | Remote device management attribute is distributed to service node for service regulation processing | |
CN104751545B (en) | Door lock authorization process system and method and device | |
CN108932776A (en) | A kind of two dimensional code access control system and operation method based on face characteristic value | |
CN206162540U (en) | Intelligent computer network safety isolation device | |
CN108933888A (en) | A kind of camera control method, equipment and computer storage medium | |
CN206686205U (en) | The multiple-protection network architecture | |
US9608973B2 (en) | Security management system including multiple relay servers and security management method | |
CN109587156A (en) | Abnormal network access connection identification and blocking-up method, system, medium and equipment | |
WO2021227465A1 (en) | Security defense method and system for industrial control system network | |
CN107104958A (en) | Manage the method, private clound and public cloud equipment and storage device of private clound equipment | |
Dineva et al. | Security in IoT systems | |
CN202652534U (en) | Mobile terminal safety access platform | |
CN109194616A (en) | A kind of industrial information security protection system for variable frequency vector control device | |
CN206574082U (en) | A kind of terminal user identity authentication system | |
CN108712369A (en) | A kind of more attribute constraint access control decision system and method for industrial control network | |
CN108173841A (en) | A kind of management method and application based on PC internets | |
CN108810892A (en) | A kind of wireless network management method, smart machine and router | |
CN107222436A (en) | Network port management method and system based on MAC address | |
CN107315974A (en) | A kind of image-forming media protection device based on Internet of Things | |
CN106657148A (en) | Architecture for internet of things | |
CN107169363A (en) | A kind of network security terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180615 |