Data security authentication method based on cloud computing
Technical field
The present invention relates to the data information security management system, realize to use service functions such as data realize that data in real time is stored, virtual field recovers on server end storage and the user terminal beyond the clouds safely, check, editor, authentication.
Background technology
Along with the development in science and technology arrival of cybertimes, based on the formation of cloud platform architecture, the basis establish and application service all ripe, also more and more general based on the network storage mode of cloud computing.In the process of the network storage; What the user was concerned about most is its safety of user data problem that is stored in the cloud computing service end, and the core technology of data security is exactly to manage data with the cryptographic technique and the key management technology of PKI, private key, encryption, authentication.But common single cipher mode can not guarantee being perfectly safe of data, so this just needs a better guarantee to be stored in safe solution.
Summary of the invention
In order to solve the above-mentioned cloud computing service end safety of data problem that is stored in, the present invention proposes a kind of solution of the data security authentication method based on cloud computing:
A kind of data security authentication method based on cloud computing; Comprise the high in the clouds certificate server and be connected to the data acquisition equipment of high in the clouds certificate server through network, said high in the clouds certificate server comprises main control module and is connected to the authentication service module of main control module, data acquisition service module and verify data memory module; The user gathers verify data according to self-defining data acquisition equipment, and the verify data that collects is sent to the high in the clouds certificate server carries out authentication;
The implementation step of technical scheme of the present invention is:
(1) user adds self-defining data acquisition equipment to the high in the clouds certificate server;
(2) the high in the clouds certificate server receives data acquisition equipment and adds request, after main control module calls data is gathered service module the type of data collecting device and verify data content are analyzed, stores in the verify data memory module;
(3) when user capture, the high in the clouds certificate server requires the user to send verify data;
(4) user gathers the relevant authentication data through the data acquisition equipment that has defined; Send to the high in the clouds certificate server; The high in the clouds certificate server carries out Treatment Analysis to the type of data collecting device and the data of verify data and the storage of verify data memory module, if characteristic conforms to, then the user is through checking; And can continue the data of safe storage on the accesses network, otherwise then can not visit.
Said data acquisition equipment comprises physical characteristics collecting equipment and various transducer.
Said verify data comprises iris, palmmprint, fingerprint, people's face and vocal print.
Said verify data also comprises environmental characteristic.
Said self-defining data acquisition equipment quantity is one or more.
Said verify data is a kind of verify data of data acquisition equipment collection or the inclusive authentication data that the several data collecting device is gathered.
In sum; The present invention has following remarkable beneficial effect: (1) the present invention utilizes the real-time of cloud computing; Through custom data collecting device (like various physical characteristics collecting equipment and various transducers etc.) user is carried out authentication; Thereby can more convenient and accurately confirm to prevent that other people from stealing user's data information by authentication object.(2) inclusive authentication that provides multiple verify data to combine has been strengthened the accuracy of authentication, the fail safe of better guarantee user's data; (3) data acquisition equipment can also use various transducers to come image data, the site environment when making the user limit authentication as required, and safety is accurate more thereby further make authentication.
Description of drawings
Accompanying drawing 1 is a system configuration sketch map of the present invention.
Embodiment
In order to let those skilled in the art understand technical scheme of the present invention better, the present invention is done further elaboration below in conjunction with accompanying drawing.
As shown in Figure 1; A kind of data security authentication method based on cloud computing; Comprise the high in the clouds certificate server and be connected to the data acquisition equipment of high in the clouds certificate server through network, said high in the clouds certificate server comprises main control module and is connected to the authentication service module of main control module, data acquisition service module and verify data memory module; The user gathers verify data according to self-defining data acquisition equipment, and the verify data that collects is sent to the high in the clouds certificate server carries out authentication.
The implementation step of technical scheme of the present invention is:
(1) user adds self-defining data acquisition equipment to the high in the clouds certificate server.
(2) the high in the clouds certificate server receives data acquisition equipment and adds request, after main control module calls data is gathered service module the type of data collecting device and verify data content are analyzed, stores in the verify data memory module.
(3) when user capture, the high in the clouds certificate server requires the user to send verify data.
(4) user gathers the relevant authentication data through the data acquisition equipment that has defined; Send to the high in the clouds certificate server; The high in the clouds certificate server carries out Treatment Analysis to the type of data collecting device and the data of verify data and the storage of verify data memory module; If characteristic conforms to, then the user passes through checking, and can continue the data of safe storage on the accesses network.
Data acquisition equipment comprises physical characteristics collecting equipment, can gather the biological characteristic of human body, like data such as iris, palmmprint, fingerprint, people's face and vocal prints.
The user can add one or more self-defining data collecting devices to the high in the clouds certificate server; When authentication, can use a kind of verify data to carry out authentication, also can use multiple verify data to carry out comprehensive authentication simultaneously.
Data acquisition equipment can also use various sensor acquisition, the site environment when gathering human body biological characteristics even can also limit authentification of user the time, and safety is accurately more thereby make authentication.
Present embodiment is a more excellent execution mode of the present invention; Need to prove; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these changes and distortion all should belong to the protection range of the appended claim of the present invention.