CN109087415A - A kind of method and apparatus of the data transmission based on cloud - Google Patents
A kind of method and apparatus of the data transmission based on cloud Download PDFInfo
- Publication number
- CN109087415A CN109087415A CN201810784717.8A CN201810784717A CN109087415A CN 109087415 A CN109087415 A CN 109087415A CN 201810784717 A CN201810784717 A CN 201810784717A CN 109087415 A CN109087415 A CN 109087415A
- Authority
- CN
- China
- Prior art keywords
- user
- characteristic information
- terminal
- cloud
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of method and apparatus of data transmission based on cloud, poor to solve the problems, such as data safety in transmission process exists in the prior art.It after the second terminal of the embodiment of the present invention gets user's characteristic information, is sent to encryption device and is encrypted, then be uploaded to cloud server by encrypted data for what is received from encryption device;The data that the first terminal is downloaded from cloud server need to be sent to decryption device and are decrypted, then the data after the decryption device decryption received from decryption device are sent to the first terminal and are used.In this way, data are in transmission process, all in encrypted state, and encryption and decryption processes need external encryption device and decryption device to be used cooperatively, data transmission procedure is safer, and it is higher to break close difficulty, it further reduced the risk of leakage user information, there is higher safety.
Description
Technical field
The present invention relates to data communication field, in particular to the method and apparatus of a kind of data transmission based on cloud.
Background technique
With fast development scientific and technological in recent years, smart machine such as emerges rapidly in large numbersBamboo shoots after a spring rain, emerges one after another, and is full of the side in life
Aspect face.Wherein, the smart home device for the purpose of the family life and living environment of creating higher quality has entered quick-fried
The hair phase, for example, it is big to the air-conditioning and cooking apparatus that can remotely control, and small arrive can be with the network shooting head etc. of remote visible intercommunication.
Most places have all been laid with the intelligent terminal of bio-identification in life.For example, intelligent door lock is generally not
Need user's carrying keys, but by the fingerprint of the user of acquisition, vein, iris, sound, the characteristic informations such as facial image carry out
Storage, then collected characteristic information is compared with the characteristic information of storage, comparison result unanimously then unlocks.
With the continuous development of science and technology, the application range of many intelligent terminals goes to enterprise from family, for enterprise
The storage and management of huge user information have aggravated the load of intelligent terminal.
In order to reduce the load of intelligent terminal, occurs cloud storage at present.By taking intelligent door lock as an example, cloud storage is that user will
Data are uploaded and are saved in private account beyond the clouds, intelligent door lock used by a user need to carry out aspect ratio clock synchronization can be with
By logging on to the private account in cloud, the user's characteristic information stored in the private account of cloud is downloaded, and then will adopt
The characteristic information collected is compared with the characteristic information of downloading.
User upload the data to cloud and the process from cloud downloading data at present, is easy to be stolen, if user
Data are stolen, and user information is possible to will be leaked, and cause the threat of property and personal safety.
In conclusion data are easy leakage user information in transmission process, safety is poor.
Summary of the invention
The present invention provides a kind of method and apparatus of data transmission based on cloud, and number exists in the prior art to solve
According to the problem that the safety in transmission process is poor.
The method of the present invention includes:
In a first aspect, a kind of method of the data transmission based on cloud, this method comprises:
First terminal sends downloading request to cloud;The user's characteristic information downloaded from cloud is sent to external decryption dress
It sets and is decrypted;And receive the user's characteristic information after the decryption device is decrypted.
The above method, the first terminal need to be sent to decryption device and are decrypted from the data after the downloading of cloud, then
Data after the decryption device decryption are sent to the first terminal to use.Pass through this data transfer mode, number
According in downloading process, data file is by the way of ciphertext, and decrypting process needs to decrypt device and is used cooperatively, and data are broken
It is higher to solve difficulty, there is higher safety.
In a kind of optional embodiment, the data include some or all of in following: fingerprint, vein, iris,
Sound, face, numerical ciphers and the unlocking pattern.
The above method, biological characteristic of the data type that first terminal can be downloaded for user, wide variety,
In, everyone is different for the biological characteristics such as fingerprint, iris, and numerical ciphers and the unlocking pattern also only have the people of setting to know.Therefore,
There is more extensive suitable application area and higher safety using the terminal of the data.
In a kind of optional embodiment, the terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;Receive the decryption dress
After setting the user's characteristic information after being decrypted, further includes: the user after the user's characteristic information and decryption that will acquire is special
Reference breath is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses;If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication failure.
The above method, the first terminal need to carry out data downloading, number from cloud after getting user's characteristic information
According to after downloading successfully by decryption device decryption, then by the user's characteristic information ratio of the user's characteristic information and acquisition after decryption
It is right.The first terminal requires to carry out aforesaid operations, the information of this subscriber authentication when obtaining user characteristics every time
Can be with real-time update, and user's operation simple and convenient is highly-safe.
In a kind of optional embodiment, the first terminal is intelligent door lock;
After the first terminal verifies user identity according to comparison result, further includes: if subscriber authentication
Pass through, then the terminal is unlocked operation.
The above method, the intelligent door lock require to carry out aforesaid operations, user information when obtaining user characteristics every time
It updates quickly, in time, the first line of defence of the intelligent door lock as home life safety has preferably ensured the safety of user.
Second aspect, a method of the data transmission based on cloud, this method comprises:
Second terminal obtains user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device,
And it receives the external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to
Cloud is saved.
The above method after the second terminal gets user's characteristic information, needs to be sent to encryption device and is encrypted,
Again cloud will be uploaded to by encrypted data.By this data transfer mode, data are in upload procedure, data file
By the way of ciphertext, and ciphering process needs external encryption device to be used cooperatively, and data transmission procedure is safer, has more
High safety.
The third aspect, the embodiment of the present invention also provide a kind of first terminal of data transmission based on cloud, first end
End includes:
At least one processing unit and at least one storage unit, wherein the storage unit is stored with program code,
When said program code is executed by the processing unit, so that the processing unit executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to solve
It is close;And receive the user's characteristic information after the decryption device is decrypted.
Fourth aspect, the embodiment of the present invention also provide a kind of second terminal of data transmission based on cloud, second end
End includes:
At least one processing unit and at least one storage unit, wherein the storage unit is stored with program code,
When said program code is executed by the processing unit, so that the processing unit executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives institute
It states external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is carried out
It saves.
5th aspect, the embodiment of the present invention also provide a kind of first terminal based on the transmission of cloud data, the first terminal
Include:
Download module: for sending downloading request to cloud;
First sending module: it is solved for the user's characteristic information downloaded from cloud to be sent to external decryption device
It is close;
First processing module: for receiving the user's characteristic information after the decryption device is decrypted.
6th aspect, the embodiment of the present invention also provide a kind of second terminal based on the transmission of cloud data, the second terminal
Include:
Obtain module: for obtaining user's characteristic information;
Second sending module: the user's characteristic information for will acquire is sent to external encryption device, and receives institute
It states external encryption device and carries out encrypted user's characteristic information;
Second processing module: it is saved for the user's characteristic information received to be sent to cloud.
7th aspect, a kind of computer can storage medium, be stored thereon with computer program, which is executed by processor
The step of Shi Shixian method as described in first aspect or second aspect.
In addition, third aspect technical effect brought by any implementation into the 7th aspect can be found in first party
Face technical effect brought by different implementations into second aspect, details are not described herein again.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawings
His attached drawing.
Fig. 1 is a kind of system structure diagram of the data transmission based on cloud of the embodiment of the present invention;
Fig. 2 is multiple terminals of embodiment of the present invention cloud data sharing structural schematic diagram;
Fig. 3 is the device structure schematic diagram of the first first terminal entity of the embodiment of the present invention;
Fig. 4 is the device structure schematic diagram of second of first terminal entity of the embodiment of the present invention;
Fig. 5 is the device structure schematic diagram of the first second terminal of the embodiment of the present invention;
Fig. 6 is the device structure schematic diagram of second of second terminal of the embodiment of the present invention;
Fig. 7 is that the embodiment of the present invention illustrates the method flow of first terminal side in the method transmitted based on cloud data
Figure;
Fig. 8 is that the embodiment of the present invention illustrates the method flow of second terminal side in the method transmitted based on cloud data
Figure.
Specific embodiment
The some words occurred in text are explained below:
(1) in the embodiment of the present application, noun " cloud " and " terminal " are often used alternatingly, but those skilled in the art can
To understand its meaning.
(2) "and/or" describes the incidence relation of affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B,
Can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Character "/" typicallys represent forward-backward correlation pair
As if a kind of relationship of "or".
(3) " terminal " of meaning of the embodiment of the present invention refers to the intelligent terminal for being able to carry out bio-identification, such as intelligent door
Lock, mobile phone and tablet computer etc..
(4) UUID (Universally Unique Identifier, Universally Unique Identifier), purpose are to allow distribution
All elements in formula system can have unique identification information, without doing identification information by central control terminal
It is specified.
Important component of the intelligent terminal as High Level information technology, development prospect is wide, and the scene of application is very
Extensively, in present example, intelligent door lock is as intelligent terminal in use, can be applied to the neck such as business, house, automobile
Domain.
For example, when intelligent door lock is applied to house or Office Area, intelligent door lock and second terminal and cloud server
Three is used cooperatively, and the user characteristics that second terminal will acquire are sent to after encryption device encrypted, then are uploaded to cloud clothes
Business device, is stored by cloud server.Intelligent door lock sends to cloud server and downloads after getting user's characteristic information
Request after device decryption is decrypted in the user's characteristic information downloaded from cloud server, is believed with the user characteristics got
Breath compares, the operation of further progress verifying unlock.Data transmission is more safe and reliable, improves the safety that user uses
Property.
The embodiment of the present invention is described in further detail with reference to the accompanying drawings of the specification.
As shown in Figure 1, a kind of method and apparatus of information configuration of the embodiment of the present invention includes: first terminal 10, cloud
Server 20, second terminal 30.
First terminal 10, for sending downloading request, the user characteristics that will be downloaded from cloud server to cloud server
Information is sent to external decryption device and is decrypted, and receives the user's characteristic information after the decryption device is decrypted.
Cloud server 20, for receiving and storing the user's characteristic information by encryption uploaded by second terminal,
After the downloading request for receiving first terminal, by the user's characteristic information by encryption, it is sent to first terminal.
Second terminal 30, for obtaining user's characteristic information, the user's characteristic information that will acquire is sent to external
Encryption device, and receive the external encryption device and carry out encrypted user's characteristic information;The encrypted use that will be received
Family characteristic information is uploaded to cloud server and is stored.
After the second terminal of the embodiment of the present invention gets user's characteristic information, need to be sent to encryption device progress
Encryption, then cloud server will be uploaded to by encrypted data;The first terminal from cloud server downloading after number
According to, need to be sent to decryption device be decrypted, then by by it is described decryption device decryption after data be sent to described first
Terminal uses.In this way, data are in transmission process, and data file encrypts and decrypted all in encrypted state
Journey needs external encryption device and decryption device to be used cooperatively, and data transmission procedure is safer, and it is higher to crack difficulty, further
The risk of user information leakage is reduced, there is higher safety.
Optionally, in order to improve the safeties of the data stored in cloud server, cloud server can be to second eventually
The user's characteristic information by encryption that end uploads carries out secondary or multiple encryption.
It, will be by secondary or repeatedly encrypt correspondingly, cloud server is after the downloading request for receiving first terminal
User's characteristic information is sent to first terminal after being decrypted.
Accordingly even when other people, which have stolen data also by cloud, to decrypt, the wind of cloud leakage user information is avoided
Danger.
Wherein, when cloud server carries out secondary or multiple encryption, MD5 (Message-Digest can be used
Algorithm 5, message digest algorithm), DES (Data Encryption Standard, data encryption standards), ECC
(Elliptic curve cryptography, Elliptic Curve Cryptography) scheduling algorithm.
In an implementation, user needs to register one's own private account beyond the clouds, and the second terminal needs to pass through use
The private account at family logs in cloud server, can carry out data upload operation to cloud after logining successfully.
Optionally, when the user's characteristic information that second terminal will acquire uploads data to cloud server:
The user's characteristic information of the embodiment of the present invention includes but is not limited to some or all of in following:
Fingerprint, vein, iris, sound, facial image, numerical ciphers and the unlocking pattern.
The second terminal is sent to encryption dress after getting the user's characteristic information, by the user's characteristic information
It sets, is encrypted by the user's characteristic information that encryption device will acquire, and it is encrypted to receive the encryption device progress
User's characteristic information finally uploads encrypted user's characteristic information from the second terminal to cloud server.
Wherein, the encryption device be external device, be mobile embedded device, itself have an input port and one it is defeated
Outlet, and it is integrated with OTG (On-The-Go, for the connection between mobile terminal) function, it can be used in the terminals such as mobile phone.
Wherein, the encryption device receives the user characteristics got that the second terminal is sent by input port and believes
Breath;
The encryption device is sent to the second terminal after being encrypted the user's characteristic information by delivery outlet.
Wherein, encryption device is added by the user characteristics original data that the secret key pair generated receives second terminal transmission
It is close.The method for generating code key has very much, be set forth below it is several by UUID (Universally Unique Identifier, it is logical
With unique identifier) generate code key mode:
Mode one: user's only one second terminal before being uploaded by second terminal.
Encryption device and decryption device are inserted into host computer by user simultaneously, using code key Core Generator, to encryption device
The UUID of the second terminal is inputted with decryption device;
The UUID that encryption device and decryption device pass through the second terminal received respectively generates code key, described at this time to add
Close device and the decryption device possess identical code key.
When user is subsequent to be downloaded using first terminal, decryption device is inserted into the first terminal.Due to described
Encryption device and the decryption device possess identical code key, so decryption device can be with successful decryption.Institute need not be reconfigured
The code key for stating encryption device and the decryption device, facilitates equipment replacement.
Mode two: user possesses a second terminal and N number of first terminal, and N is positive integer.
Encryption device and decryption device are inserted into host computer by user simultaneously, using code key Core Generator, to encryption device
The UUID of the second terminal and N number of first terminal is inputted with decryption device;
Encryption device and decryption device pass through the second terminal received respectively and the UUID of N number of first terminal is raw
At code key, the encryption device and the decryption device possess identical code key at this time.
For mode two, for second terminal after being sent to encryption device data, encryption device can verify second terminal
UUID just carries out the data received after the UUID for only including in determining the UUID of second terminal of insertion and code key is identical
Encryption.
Correspondingly, first terminal, after being sent to decryption device data, decryption device can verify the UUID of first terminal, only
Have determine insertion first terminal UUID and code key in include the UUID it is identical after just the data received are solved
It is close.
The encryption device and the decryption device are required to the UUID of verifying terminal installation in use.Therefore,
Even if encryption device and decryption device are lost, the third party also can not obtain user by the encryption device and the decryption device
Characteristic information.
Wherein, host computer can be the equipment such as PC machine, intelligent terminal.
In an implementation, the second terminal is connect with cloud server telecommunication.
Wherein, there are many second terminal and cloud server connection types, such as: by wireless router connection, pass through
Mobile network (such as 4G) connection etc..
Specifically, after terminal logs on to cloud server by private account itself UUID can be pushed to cloud server;
Cloud server can recorde the UUID of the terminal logined successfully by the private account, by the terminal
UUID storage to cloud server;And the UUID of storage is placed in the permissions list bound with the private account logged in.
When the terminal carries out data transmission every time, cloud server can all verify the terminal by permissions list
UUID.
Optionally, the UUID of itself can be reported to cloud service when carrying out data upload operation by the second terminal
Device;
Cloud server determines the private account binding that second terminal logs in after the UUID for receiving the second terminal
Permissions list in UUID;
Whether cloud server judges in the UUID in the permissions list to include the UUID received;
If including being verified, cloud server can receive and store the process encryption that the second terminal uploads
User's characteristic information, and the user's characteristic information of the encryption and private account are bound.
If not including, authentication failed, cloud server will not receive the user characteristics of the upload of the second terminal
Information forbids the second terminal to upload.
In an implementation, it when first terminal is to cloud server downloading data, needs to log in cloud by the private account of user
Hold server.
User can log in cloud by first terminal when needing first terminal to download cloud server data every time
Private account;It can also be logged in for the first time, subsequent first terminal can save the corresponding log-on message of private account (such as user
Name, password etc.), when needing to download, first terminal is logged in by the log-on message saved.
In an implementation, the first terminal is connect with cloud server telecommunication.
Wherein, there are many first terminal and cloud server connection types, such as: by wireless router connection,
Connected by mobile network (such as 4G) etc..
Correspondingly, sending downloading request to cloud server, together after the first terminal logs on to the private account in cloud
When the UUID of first terminal is reported to cloud server;
Cloud server determines the private account binding that first terminal logs in after the UUID for receiving the first terminal
Permissions list in UUID;
Whether cloud server judges in the UUID in the permissions list to include the UUID received;
If including being verified, cloud server can will be sent to the user's characteristic information that private account is bound
First terminal;
If not including, authentication failed, cloud server will not respond the downloading request of the first terminal, forbid the
One terminal downloads.
Correspondingly, encrypted user's characteristic information can be sent out after the first terminal is downloaded successfully from cloud server
Decryption device is given to be decrypted.
The decryption device is external device, is mobile embedded device, itself there is an input port and a delivery outlet,
And it is integrated with OTG (On-The-Go, for the connection between mobile terminal) function, it can be used on mobile phone.
Wherein, the device of decrypting is added by the process that input port receives the slave cloud server downloading that first terminal is sent
User's characteristic information after close;
The decryption device by from first terminal it is received after the user's characteristic information of encryption is decrypted by defeated
Outlet is sent to first terminal.
It should be noted that the method content for specifically generating code key to decryption device is referred to described above,
Details are not described herein.
In an implementation, triggering first terminal can be first terminal to the condition that cloud server sends downloading request and obtain
To user's characteristic information, that is to say, that first terminal is requested after getting user's characteristic information to cloud server transmission downloading.
Optionally, the user's characteristic information after the first terminal will acquire user's characteristic information and decryption is compared
It is right;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication
Failure.
Such as: if the user's characteristic information that the first terminal receives after decryption includes fingerprint A, fingerprint B and refers to
Line C.
Assuming that the user's characteristic information got is fingerprint A, it is determined that subscriber authentication passes through;
Assuming that the user's characteristic information got is fingerprint D, it is determined that subscriber authentication failure.
Optionally, the first terminal itself can integrate store function, can choose different functional modes also to be applicable in
Different scenes are illustrated respectively with different usage scenarios:
Scene one, security level require lower place.
The first terminal is memory module, and the user's characteristic information after decryption is carried out persistence.Using
Cheng Zhong, the first terminal send downloading request when getting user's characteristic information, without to cloud server, and only needing will be every
The secondary user's characteristic information got is compared with the user's characteristic information after the decryption stored in the first terminal.
This mode when the first terminal carries out data transmission with cloud server for the first time, needs to fill with the decryption
It sets and is used cooperatively, the use process later does not depend on decryption device and need not remotely connect with cloud server holding, unlocks
It is more quick, but can not real-time update user's characteristic information, safety is poor.
The more demanding place of scene two, security level.
The first terminal is non-memory mode, and in use, the first terminal once gets user characteristics
When information, downloading request will be sent to cloud server, and the user's characteristic information after downloading successfully every time is sent to institute
It states decryption device to be decrypted, after receiving the user's characteristic information after decryption device decryption, the user that will acquire is special
It is compared after reference breath and the user's characteristic information after decryption.
This mode, the first terminal in use, need to carry out communication connection with cloud server, it is also desirable to
It is inserted into the decryption device always to be used cooperatively, unlocking process is more safe and reliable.
In an implementation, the first terminal can keep in communication in real time with cloud server and connect, can also need from
Communication connection is carried out with cloud server when cloud server downloading data.
It should be noted that the above-mentioned corresponding function mode for selecting the first terminal according to different scenes is only to illustrate
It is bright.During realization, it can be configured according to user demand.
Optionally, if the first terminal be intelligent door lock, the intelligent door lock according to comparison result to user identity into
After row verifying:
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses, the intelligent door lock is unlocked operation;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication
Failure, the intelligent door lock forbid unlock to operate.
In an implementation, when user possesses a plurality of similar first terminals, the side of cloud data sharing can also be passed through
Formula carries out the data transmission of multiple terminals.
After the second terminal will upload to cloud into the user's characteristic information for crossing encryption, each first terminal can divide
Cloud server is not logged in by private account, from cloud server downloading data, without typing is repeated, to realize mostly eventually
The cloud data sharing at end.
By taking Fig. 2 as an example, multiple terminals of embodiment of the present invention cloud data sharing structural schematic diagram:
User possesses N number of terminal, wherein each terminal requires after logging on to cloud server by private account, and to
Cloud server pushes respective UUID;
Cloud server will pass through the power with the binding of the private account of login after the UUID for receiving each terminal
Each terminal identity is verified in limit list.
Cloud server returns to the user's characteristic information bound with private account to the terminal being verified;
Cloud server is forbidden downloading to unacceptable terminal is verified.
It should be noted that carrying out method, the method for decryption etc. that the shared terminal in cloud carries out data transmission with cloud
It is referred to described above, details are not described herein.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
As shown in figure 3, the embodiment of the present invention provides a kind of first terminal based on the transmission of cloud data, the first terminal packet
It includes: at least one processing unit 300 and at least one storage unit 301, wherein the storage unit 301 is stored with program
Code, when said program code is executed by the processing unit 300, so that the processing unit 300 executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to solve
It is close;And receive the user's characteristic information after the decryption device is decrypted.
Optionally, the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
Optionally, the processing unit 300 is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
After receiving the user's characteristic information after the decryption device is decrypted, the user's characteristic information that will acquire with
User's characteristic information after decryption is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication
Failure.
Optionally, the first terminal is intelligent door lock, and the processing unit 300 is also used to:
After being verified according to comparison result to user identity, if subscriber authentication passes through, the terminal is carried out
Unlock operation.
As shown in figure 4, the embodiment of the present invention provides a kind of first terminal of data transmission based on cloud, comprising:
Download module 400: for sending downloading request to cloud;
First sending module 401: it is carried out for the user's characteristic information downloaded from cloud to be sent to external decryption device
Decryption;
First processing module 402: for receiving the user's characteristic information after the decryption device is decrypted.
Optionally, the download module 400 is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
Optionally, the first processing module 402 is specifically used for:
After receiving the user's characteristic information after the decryption device is decrypted, the user's characteristic information that will acquire with
User's characteristic information after decryption is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication
Failure.
Optionally, the first terminal is intelligent door lock;
The first processing units 402 are also used to:
It is described if subscriber authentication passes through after the terminal verifies user identity according to comparison result
Terminal is unlocked operation.
As shown in figure 5, the embodiment of the present invention provides a kind of first terminal based on the transmission of cloud data, the first terminal packet
It includes: at least one processing unit 500 and at least one storage unit 501, wherein the storage unit 501 is stored with program
Code, when said program code is executed by the processing unit 500, so that the processing unit 500 executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives institute
It states external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is carried out
It saves.
As shown in fig. 6, the embodiment of the present invention provides a kind of second terminal of data transmission based on cloud, comprising:
Obtain module 600: for obtaining user's characteristic information;
Second sending module 601: the user's characteristic information for will acquire is sent to external encryption device, and receives
The external encryption device carries out encrypted user's characteristic information;
Second processing module 602: it is saved for the user's characteristic information received to be sent to cloud.
The embodiment of the present invention also provides a kind of computer-readable non-volatile memory medium, including program code, when described
When program code is run on the computing device, said program code is for making the calculating equipment execute system of the embodiment of the present invention
The step of method of the middle data transmission carried out based on cloud.
Based on the same inventive concept, a kind of method of data transmission based on cloud is additionally provided in the embodiment of the present invention,
It is the corresponding method of terminal in system that the embodiment of the present invention carries out data transmission due to the corresponding equipment of this method, and should
The principle that method solves the problems, such as is similar to the terminal, therefore the implementation of this method may refer to the reality of the system carried out data transmission
It applies, overlaps will not be repeated.
As shown in fig. 7, the embodiment of the present invention provides a kind of method of data transmission based on cloud, this method comprises:
Step 700, first terminal sends downloading request to cloud;
Step 701, the user's characteristic information downloaded from cloud is sent to external decryption device and carried out by the first terminal
Decryption;
Step 702, the first terminal receives the user's characteristic information after the decryption device is decrypted.
Optionally, the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
Optionally, the first terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;
The first terminal receives after the user's characteristic information after the decryption device is decrypted, further includes:
The user's characteristic information that the first terminal will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical
It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication
Failure.
Optionally, the first terminal is intelligent door lock:
After the terminal verifies user identity according to comparison result, further includes:
If subscriber authentication passes through, the terminal is unlocked operation.
As shown in figure 8, the embodiment of the present invention provides a kind of method of data transmission based on cloud, this method comprises:
Step 800, second terminal obtains user's characteristic information;
Step 801, the user's characteristic information that the second terminal will acquire is sent to external encryption device, and receives
The external encryption device carries out encrypted user's characteristic information;
Step 802, the user's characteristic information received is sent to cloud and saved by the second terminal.
Above by reference to showing according to the method, apparatus (system) of the embodiment of the present application and/or the frame of computer program product
Figure and/or flow chart describe the application.It should be understood that can realize that block diagram and or flow chart is shown by computer program instructions
The combination of the block of a block and block diagram and or flow chart diagram for figure.These computer program instructions can be supplied to logical
With computer, the processor of special purpose computer and/or other programmable data processing units, to generate machine, so that via meter
The instruction that calculation machine processor and/or other programmable data processing units execute creates for realizing block diagram and or flow chart block
In specified function action method.
Correspondingly, the application can also be implemented with hardware and/or software (including firmware, resident software, microcode etc.).More
Further, the application can take computer usable or the shape of the computer program product on computer readable storage medium
Formula has the computer realized in the medium usable or computer readable program code, to be made by instruction execution system
It is used with or in conjunction with instruction execution system.In the present context, computer can be used or computer-readable medium can be with
It is arbitrary medium, may include, stores, communicates, transmits or transmit program, is made by instruction execution system, device or equipment
With, or instruction execution system, device or equipment is combined to use.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of method of the data transmission based on cloud, which is characterized in that this method comprises:
First terminal sends downloading request to cloud;
The user's characteristic information downloaded from cloud is sent to external decryption device and is decrypted by the first terminal;
The first terminal receives the user's characteristic information after the decryption device is decrypted.
2. the method as described in claim 1, which is characterized in that the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
3. the method as described in claim 1, which is characterized in that the terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;
The first terminal receives after the user's characteristic information after the decryption device is decrypted, further includes:
The user's characteristic information that the first terminal will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication passes through;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication is lost
It loses.
4. method as claimed in claim 3, which is characterized in that the first terminal is intelligent door lock;
After the first terminal verifies user identity according to comparison result, further includes:
If subscriber authentication passes through, the first terminal is unlocked operation.
5. a kind of method of the data transmission based on cloud, which is characterized in that this method comprises:
Second terminal obtains user's characteristic information;
The user's characteristic information that the second terminal will acquire is sent to external encryption device, and receives the external encryption
Device carries out encrypted user's characteristic information;
The user's characteristic information received is sent to cloud and saved by the second terminal.
6. a kind of first terminal of the data transmission based on cloud, which is characterized in that the first terminal includes: at least one processing
Unit and at least one storage unit, wherein the storage unit is stored with program code, when said program code is described
When processing unit executes, so that the processing unit executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to be decrypted;
And receive the user's characteristic information after the decryption device is decrypted.
7. first terminal as claimed in claim 6, which is characterized in that the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
8. first terminal as claimed in claim 7, which is characterized in that the processing unit is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
After receiving the user's characteristic information after the decryption device is decrypted, after the reception decryption device is decrypted
After user's characteristic information, the user's characteristic information that will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication passes through;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication is lost
It loses.
9. first terminal as claimed in claim 8, which is characterized in that the first terminal is intelligent door lock;
The processing unit is also used to:
After verifying according to comparison result to user identity, if subscriber authentication passes through, it is unlocked operation.
10. a kind of second terminal of the data transmission based on cloud, which is characterized in that the second terminal includes: at least one
Manage unit and at least one storage unit, wherein the storage unit is stored with program code, when said program code is by institute
When stating processing unit execution, so that the processing unit executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives described outer
It sets encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is protected
It deposits.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810784717.8A CN109087415A (en) | 2018-07-17 | 2018-07-17 | A kind of method and apparatus of the data transmission based on cloud |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810784717.8A CN109087415A (en) | 2018-07-17 | 2018-07-17 | A kind of method and apparatus of the data transmission based on cloud |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109087415A true CN109087415A (en) | 2018-12-25 |
Family
ID=64838179
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810784717.8A Pending CN109087415A (en) | 2018-07-17 | 2018-07-17 | A kind of method and apparatus of the data transmission based on cloud |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109087415A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112202768A (en) * | 2020-09-29 | 2021-01-08 | 四川长虹网络科技有限责任公司 | Data encryption method, device and system and readable storage medium |
CN114244551A (en) * | 2021-09-28 | 2022-03-25 | 自然资源部第三地形测量队 | Data application protection method and device and field painting checking method |
CN115776413A (en) * | 2023-02-09 | 2023-03-10 | 航天宏图信息技术股份有限公司 | Data transmission method and system based on iris encryption |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424676A (en) * | 2013-08-28 | 2015-03-18 | 北京数码视讯科技股份有限公司 | Identity information sending method, identity information sending device, access control card reader and access control system |
CN105160744A (en) * | 2015-10-09 | 2015-12-16 | 广州市坤拓智能科技有限公司 | System and method for opening door by utilizing mobile phone based on cloud platform |
CN106504375A (en) * | 2016-10-09 | 2017-03-15 | 胡家安 | Fingerprint lock management method |
-
2018
- 2018-07-17 CN CN201810784717.8A patent/CN109087415A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424676A (en) * | 2013-08-28 | 2015-03-18 | 北京数码视讯科技股份有限公司 | Identity information sending method, identity information sending device, access control card reader and access control system |
CN105160744A (en) * | 2015-10-09 | 2015-12-16 | 广州市坤拓智能科技有限公司 | System and method for opening door by utilizing mobile phone based on cloud platform |
CN106504375A (en) * | 2016-10-09 | 2017-03-15 | 胡家安 | Fingerprint lock management method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112202768A (en) * | 2020-09-29 | 2021-01-08 | 四川长虹网络科技有限责任公司 | Data encryption method, device and system and readable storage medium |
CN112202768B (en) * | 2020-09-29 | 2023-05-12 | 四川长虹网络科技有限责任公司 | Data encryption method, device and system and readable storage medium |
CN114244551A (en) * | 2021-09-28 | 2022-03-25 | 自然资源部第三地形测量队 | Data application protection method and device and field painting checking method |
CN114244551B (en) * | 2021-09-28 | 2024-01-30 | 自然资源部第三地形测量队 | Data application protection method, equipment and wild external painting verification method |
CN115776413A (en) * | 2023-02-09 | 2023-03-10 | 航天宏图信息技术股份有限公司 | Data transmission method and system based on iris encryption |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108064440B (en) | FIDO authentication method, device and system based on block chain | |
CN102546155B (en) | On-demand safe key generates method and system | |
US9118661B1 (en) | Methods and apparatus for authenticating a user using multi-server one-time passcode verification | |
CN107979514A (en) | A kind of method and apparatus bound to equipment | |
CN109150835A (en) | Method, apparatus, equipment and the computer readable storage medium of cloud data access | |
CN111552935B (en) | Block chain data authorized access method and device | |
CN106302502A (en) | A kind of secure access authentication method, user terminal and service end | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
US9154304B1 (en) | Using a token code to control access to data and applications in a mobile platform | |
CN106789024B (en) | A kind of remote de-locking method, device and system | |
CN112989426B (en) | Authorization authentication method and device, and resource access token acquisition method | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN113411187B (en) | Identity authentication method and system, storage medium and processor | |
US9443069B1 (en) | Verification platform having interface adapted for communication with verification agent | |
CN109495251A (en) | Anti- quantum calculation wired home cloud storage method and system based on key card | |
CN109936552A (en) | A kind of cipher key authentication method, server and system | |
CN111243133A (en) | Bluetooth door lock system based on dynamic password generation and matching and unlocking method | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN109087415A (en) | A kind of method and apparatus of the data transmission based on cloud | |
CN107911211B (en) | Two-dimensional code authentication system based on quantum communication network | |
CN110519052A (en) | Data interactive method and device based on Internet of Things operating system | |
CN111031540B (en) | Wireless network connection method and computer storage medium | |
CN107888376B (en) | NFC authentication system based on quantum communication network | |
CN111405537A (en) | Bidirectional security authentication method based on ble connection, system and equipment thereof | |
CN107786978B (en) | NFC authentication system based on quantum encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181225 |