CN109087415A - A kind of method and apparatus of the data transmission based on cloud - Google Patents

A kind of method and apparatus of the data transmission based on cloud Download PDF

Info

Publication number
CN109087415A
CN109087415A CN201810784717.8A CN201810784717A CN109087415A CN 109087415 A CN109087415 A CN 109087415A CN 201810784717 A CN201810784717 A CN 201810784717A CN 109087415 A CN109087415 A CN 109087415A
Authority
CN
China
Prior art keywords
user
characteristic information
terminal
cloud
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810784717.8A
Other languages
Chinese (zh)
Inventor
李坤
宋德超
陈道远
彭磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810784717.8A priority Critical patent/CN109087415A/en
Publication of CN109087415A publication Critical patent/CN109087415A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of method and apparatus of data transmission based on cloud, poor to solve the problems, such as data safety in transmission process exists in the prior art.It after the second terminal of the embodiment of the present invention gets user's characteristic information, is sent to encryption device and is encrypted, then be uploaded to cloud server by encrypted data for what is received from encryption device;The data that the first terminal is downloaded from cloud server need to be sent to decryption device and are decrypted, then the data after the decryption device decryption received from decryption device are sent to the first terminal and are used.In this way, data are in transmission process, all in encrypted state, and encryption and decryption processes need external encryption device and decryption device to be used cooperatively, data transmission procedure is safer, and it is higher to break close difficulty, it further reduced the risk of leakage user information, there is higher safety.

Description

A kind of method and apparatus of the data transmission based on cloud
Technical field
The present invention relates to data communication field, in particular to the method and apparatus of a kind of data transmission based on cloud.
Background technique
With fast development scientific and technological in recent years, smart machine such as emerges rapidly in large numbersBamboo shoots after a spring rain, emerges one after another, and is full of the side in life Aspect face.Wherein, the smart home device for the purpose of the family life and living environment of creating higher quality has entered quick-fried The hair phase, for example, it is big to the air-conditioning and cooking apparatus that can remotely control, and small arrive can be with the network shooting head etc. of remote visible intercommunication.
Most places have all been laid with the intelligent terminal of bio-identification in life.For example, intelligent door lock is generally not Need user's carrying keys, but by the fingerprint of the user of acquisition, vein, iris, sound, the characteristic informations such as facial image carry out Storage, then collected characteristic information is compared with the characteristic information of storage, comparison result unanimously then unlocks.
With the continuous development of science and technology, the application range of many intelligent terminals goes to enterprise from family, for enterprise The storage and management of huge user information have aggravated the load of intelligent terminal.
In order to reduce the load of intelligent terminal, occurs cloud storage at present.By taking intelligent door lock as an example, cloud storage is that user will Data are uploaded and are saved in private account beyond the clouds, intelligent door lock used by a user need to carry out aspect ratio clock synchronization can be with By logging on to the private account in cloud, the user's characteristic information stored in the private account of cloud is downloaded, and then will adopt The characteristic information collected is compared with the characteristic information of downloading.
User upload the data to cloud and the process from cloud downloading data at present, is easy to be stolen, if user Data are stolen, and user information is possible to will be leaked, and cause the threat of property and personal safety.
In conclusion data are easy leakage user information in transmission process, safety is poor.
Summary of the invention
The present invention provides a kind of method and apparatus of data transmission based on cloud, and number exists in the prior art to solve According to the problem that the safety in transmission process is poor.
The method of the present invention includes:
In a first aspect, a kind of method of the data transmission based on cloud, this method comprises:
First terminal sends downloading request to cloud;The user's characteristic information downloaded from cloud is sent to external decryption dress It sets and is decrypted;And receive the user's characteristic information after the decryption device is decrypted.
The above method, the first terminal need to be sent to decryption device and are decrypted from the data after the downloading of cloud, then Data after the decryption device decryption are sent to the first terminal to use.Pass through this data transfer mode, number According in downloading process, data file is by the way of ciphertext, and decrypting process needs to decrypt device and is used cooperatively, and data are broken It is higher to solve difficulty, there is higher safety.
In a kind of optional embodiment, the data include some or all of in following: fingerprint, vein, iris, Sound, face, numerical ciphers and the unlocking pattern.
The above method, biological characteristic of the data type that first terminal can be downloaded for user, wide variety, In, everyone is different for the biological characteristics such as fingerprint, iris, and numerical ciphers and the unlocking pattern also only have the people of setting to know.Therefore, There is more extensive suitable application area and higher safety using the terminal of the data.
In a kind of optional embodiment, the terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;Receive the decryption dress After setting the user's characteristic information after being decrypted, further includes: the user after the user's characteristic information and decryption that will acquire is special Reference breath is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses;If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication failure.
The above method, the first terminal need to carry out data downloading, number from cloud after getting user's characteristic information According to after downloading successfully by decryption device decryption, then by the user's characteristic information ratio of the user's characteristic information and acquisition after decryption It is right.The first terminal requires to carry out aforesaid operations, the information of this subscriber authentication when obtaining user characteristics every time Can be with real-time update, and user's operation simple and convenient is highly-safe.
In a kind of optional embodiment, the first terminal is intelligent door lock;
After the first terminal verifies user identity according to comparison result, further includes: if subscriber authentication Pass through, then the terminal is unlocked operation.
The above method, the intelligent door lock require to carry out aforesaid operations, user information when obtaining user characteristics every time It updates quickly, in time, the first line of defence of the intelligent door lock as home life safety has preferably ensured the safety of user.
Second aspect, a method of the data transmission based on cloud, this method comprises:
Second terminal obtains user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, And it receives the external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to Cloud is saved.
The above method after the second terminal gets user's characteristic information, needs to be sent to encryption device and is encrypted, Again cloud will be uploaded to by encrypted data.By this data transfer mode, data are in upload procedure, data file By the way of ciphertext, and ciphering process needs external encryption device to be used cooperatively, and data transmission procedure is safer, has more High safety.
The third aspect, the embodiment of the present invention also provide a kind of first terminal of data transmission based on cloud, first end End includes:
At least one processing unit and at least one storage unit, wherein the storage unit is stored with program code, When said program code is executed by the processing unit, so that the processing unit executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to solve It is close;And receive the user's characteristic information after the decryption device is decrypted.
Fourth aspect, the embodiment of the present invention also provide a kind of second terminal of data transmission based on cloud, second end End includes:
At least one processing unit and at least one storage unit, wherein the storage unit is stored with program code, When said program code is executed by the processing unit, so that the processing unit executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives institute It states external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is carried out It saves.
5th aspect, the embodiment of the present invention also provide a kind of first terminal based on the transmission of cloud data, the first terminal Include:
Download module: for sending downloading request to cloud;
First sending module: it is solved for the user's characteristic information downloaded from cloud to be sent to external decryption device It is close;
First processing module: for receiving the user's characteristic information after the decryption device is decrypted.
6th aspect, the embodiment of the present invention also provide a kind of second terminal based on the transmission of cloud data, the second terminal Include:
Obtain module: for obtaining user's characteristic information;
Second sending module: the user's characteristic information for will acquire is sent to external encryption device, and receives institute It states external encryption device and carries out encrypted user's characteristic information;
Second processing module: it is saved for the user's characteristic information received to be sent to cloud.
7th aspect, a kind of computer can storage medium, be stored thereon with computer program, which is executed by processor The step of Shi Shixian method as described in first aspect or second aspect.
In addition, third aspect technical effect brought by any implementation into the 7th aspect can be found in first party Face technical effect brought by different implementations into second aspect, details are not described herein again.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without any creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of system structure diagram of the data transmission based on cloud of the embodiment of the present invention;
Fig. 2 is multiple terminals of embodiment of the present invention cloud data sharing structural schematic diagram;
Fig. 3 is the device structure schematic diagram of the first first terminal entity of the embodiment of the present invention;
Fig. 4 is the device structure schematic diagram of second of first terminal entity of the embodiment of the present invention;
Fig. 5 is the device structure schematic diagram of the first second terminal of the embodiment of the present invention;
Fig. 6 is the device structure schematic diagram of second of second terminal of the embodiment of the present invention;
Fig. 7 is that the embodiment of the present invention illustrates the method flow of first terminal side in the method transmitted based on cloud data Figure;
Fig. 8 is that the embodiment of the present invention illustrates the method flow of second terminal side in the method transmitted based on cloud data Figure.
Specific embodiment
The some words occurred in text are explained below:
(1) in the embodiment of the present application, noun " cloud " and " terminal " are often used alternatingly, but those skilled in the art can To understand its meaning.
(2) "and/or" describes the incidence relation of affiliated partner, indicates may exist three kinds of relationships, for example, A and/or B, Can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.Character "/" typicallys represent forward-backward correlation pair As if a kind of relationship of "or".
(3) " terminal " of meaning of the embodiment of the present invention refers to the intelligent terminal for being able to carry out bio-identification, such as intelligent door Lock, mobile phone and tablet computer etc..
(4) UUID (Universally Unique Identifier, Universally Unique Identifier), purpose are to allow distribution All elements in formula system can have unique identification information, without doing identification information by central control terminal It is specified.
Important component of the intelligent terminal as High Level information technology, development prospect is wide, and the scene of application is very Extensively, in present example, intelligent door lock is as intelligent terminal in use, can be applied to the neck such as business, house, automobile Domain.
For example, when intelligent door lock is applied to house or Office Area, intelligent door lock and second terminal and cloud server Three is used cooperatively, and the user characteristics that second terminal will acquire are sent to after encryption device encrypted, then are uploaded to cloud clothes Business device, is stored by cloud server.Intelligent door lock sends to cloud server and downloads after getting user's characteristic information Request after device decryption is decrypted in the user's characteristic information downloaded from cloud server, is believed with the user characteristics got Breath compares, the operation of further progress verifying unlock.Data transmission is more safe and reliable, improves the safety that user uses Property.
The embodiment of the present invention is described in further detail with reference to the accompanying drawings of the specification.
As shown in Figure 1, a kind of method and apparatus of information configuration of the embodiment of the present invention includes: first terminal 10, cloud Server 20, second terminal 30.
First terminal 10, for sending downloading request, the user characteristics that will be downloaded from cloud server to cloud server Information is sent to external decryption device and is decrypted, and receives the user's characteristic information after the decryption device is decrypted.
Cloud server 20, for receiving and storing the user's characteristic information by encryption uploaded by second terminal, After the downloading request for receiving first terminal, by the user's characteristic information by encryption, it is sent to first terminal.
Second terminal 30, for obtaining user's characteristic information, the user's characteristic information that will acquire is sent to external Encryption device, and receive the external encryption device and carry out encrypted user's characteristic information;The encrypted use that will be received Family characteristic information is uploaded to cloud server and is stored.
After the second terminal of the embodiment of the present invention gets user's characteristic information, need to be sent to encryption device progress Encryption, then cloud server will be uploaded to by encrypted data;The first terminal from cloud server downloading after number According to, need to be sent to decryption device be decrypted, then by by it is described decryption device decryption after data be sent to described first Terminal uses.In this way, data are in transmission process, and data file encrypts and decrypted all in encrypted state Journey needs external encryption device and decryption device to be used cooperatively, and data transmission procedure is safer, and it is higher to crack difficulty, further The risk of user information leakage is reduced, there is higher safety.
Optionally, in order to improve the safeties of the data stored in cloud server, cloud server can be to second eventually The user's characteristic information by encryption that end uploads carries out secondary or multiple encryption.
It, will be by secondary or repeatedly encrypt correspondingly, cloud server is after the downloading request for receiving first terminal User's characteristic information is sent to first terminal after being decrypted.
Accordingly even when other people, which have stolen data also by cloud, to decrypt, the wind of cloud leakage user information is avoided Danger.
Wherein, when cloud server carries out secondary or multiple encryption, MD5 (Message-Digest can be used Algorithm 5, message digest algorithm), DES (Data Encryption Standard, data encryption standards), ECC (Elliptic curve cryptography, Elliptic Curve Cryptography) scheduling algorithm.
In an implementation, user needs to register one's own private account beyond the clouds, and the second terminal needs to pass through use The private account at family logs in cloud server, can carry out data upload operation to cloud after logining successfully.
Optionally, when the user's characteristic information that second terminal will acquire uploads data to cloud server:
The user's characteristic information of the embodiment of the present invention includes but is not limited to some or all of in following:
Fingerprint, vein, iris, sound, facial image, numerical ciphers and the unlocking pattern.
The second terminal is sent to encryption dress after getting the user's characteristic information, by the user's characteristic information It sets, is encrypted by the user's characteristic information that encryption device will acquire, and it is encrypted to receive the encryption device progress User's characteristic information finally uploads encrypted user's characteristic information from the second terminal to cloud server.
Wherein, the encryption device be external device, be mobile embedded device, itself have an input port and one it is defeated Outlet, and it is integrated with OTG (On-The-Go, for the connection between mobile terminal) function, it can be used in the terminals such as mobile phone.
Wherein, the encryption device receives the user characteristics got that the second terminal is sent by input port and believes Breath;
The encryption device is sent to the second terminal after being encrypted the user's characteristic information by delivery outlet.
Wherein, encryption device is added by the user characteristics original data that the secret key pair generated receives second terminal transmission It is close.The method for generating code key has very much, be set forth below it is several by UUID (Universally Unique Identifier, it is logical With unique identifier) generate code key mode:
Mode one: user's only one second terminal before being uploaded by second terminal.
Encryption device and decryption device are inserted into host computer by user simultaneously, using code key Core Generator, to encryption device The UUID of the second terminal is inputted with decryption device;
The UUID that encryption device and decryption device pass through the second terminal received respectively generates code key, described at this time to add Close device and the decryption device possess identical code key.
When user is subsequent to be downloaded using first terminal, decryption device is inserted into the first terminal.Due to described Encryption device and the decryption device possess identical code key, so decryption device can be with successful decryption.Institute need not be reconfigured The code key for stating encryption device and the decryption device, facilitates equipment replacement.
Mode two: user possesses a second terminal and N number of first terminal, and N is positive integer.
Encryption device and decryption device are inserted into host computer by user simultaneously, using code key Core Generator, to encryption device The UUID of the second terminal and N number of first terminal is inputted with decryption device;
Encryption device and decryption device pass through the second terminal received respectively and the UUID of N number of first terminal is raw At code key, the encryption device and the decryption device possess identical code key at this time.
For mode two, for second terminal after being sent to encryption device data, encryption device can verify second terminal UUID just carries out the data received after the UUID for only including in determining the UUID of second terminal of insertion and code key is identical Encryption.
Correspondingly, first terminal, after being sent to decryption device data, decryption device can verify the UUID of first terminal, only Have determine insertion first terminal UUID and code key in include the UUID it is identical after just the data received are solved It is close.
The encryption device and the decryption device are required to the UUID of verifying terminal installation in use.Therefore, Even if encryption device and decryption device are lost, the third party also can not obtain user by the encryption device and the decryption device Characteristic information.
Wherein, host computer can be the equipment such as PC machine, intelligent terminal.
In an implementation, the second terminal is connect with cloud server telecommunication.
Wherein, there are many second terminal and cloud server connection types, such as: by wireless router connection, pass through Mobile network (such as 4G) connection etc..
Specifically, after terminal logs on to cloud server by private account itself UUID can be pushed to cloud server;
Cloud server can recorde the UUID of the terminal logined successfully by the private account, by the terminal UUID storage to cloud server;And the UUID of storage is placed in the permissions list bound with the private account logged in.
When the terminal carries out data transmission every time, cloud server can all verify the terminal by permissions list UUID.
Optionally, the UUID of itself can be reported to cloud service when carrying out data upload operation by the second terminal Device;
Cloud server determines the private account binding that second terminal logs in after the UUID for receiving the second terminal Permissions list in UUID;
Whether cloud server judges in the UUID in the permissions list to include the UUID received;
If including being verified, cloud server can receive and store the process encryption that the second terminal uploads User's characteristic information, and the user's characteristic information of the encryption and private account are bound.
If not including, authentication failed, cloud server will not receive the user characteristics of the upload of the second terminal Information forbids the second terminal to upload.
In an implementation, it when first terminal is to cloud server downloading data, needs to log in cloud by the private account of user Hold server.
User can log in cloud by first terminal when needing first terminal to download cloud server data every time Private account;It can also be logged in for the first time, subsequent first terminal can save the corresponding log-on message of private account (such as user Name, password etc.), when needing to download, first terminal is logged in by the log-on message saved.
In an implementation, the first terminal is connect with cloud server telecommunication.
Wherein, there are many first terminal and cloud server connection types, such as: by wireless router connection, Connected by mobile network (such as 4G) etc..
Correspondingly, sending downloading request to cloud server, together after the first terminal logs on to the private account in cloud When the UUID of first terminal is reported to cloud server;
Cloud server determines the private account binding that first terminal logs in after the UUID for receiving the first terminal Permissions list in UUID;
Whether cloud server judges in the UUID in the permissions list to include the UUID received;
If including being verified, cloud server can will be sent to the user's characteristic information that private account is bound First terminal;
If not including, authentication failed, cloud server will not respond the downloading request of the first terminal, forbid the One terminal downloads.
Correspondingly, encrypted user's characteristic information can be sent out after the first terminal is downloaded successfully from cloud server Decryption device is given to be decrypted.
The decryption device is external device, is mobile embedded device, itself there is an input port and a delivery outlet, And it is integrated with OTG (On-The-Go, for the connection between mobile terminal) function, it can be used on mobile phone.
Wherein, the device of decrypting is added by the process that input port receives the slave cloud server downloading that first terminal is sent User's characteristic information after close;
The decryption device by from first terminal it is received after the user's characteristic information of encryption is decrypted by defeated Outlet is sent to first terminal.
It should be noted that the method content for specifically generating code key to decryption device is referred to described above, Details are not described herein.
In an implementation, triggering first terminal can be first terminal to the condition that cloud server sends downloading request and obtain To user's characteristic information, that is to say, that first terminal is requested after getting user's characteristic information to cloud server transmission downloading.
Optionally, the user's characteristic information after the first terminal will acquire user's characteristic information and decryption is compared It is right;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication Failure.
Such as: if the user's characteristic information that the first terminal receives after decryption includes fingerprint A, fingerprint B and refers to Line C.
Assuming that the user's characteristic information got is fingerprint A, it is determined that subscriber authentication passes through;
Assuming that the user's characteristic information got is fingerprint D, it is determined that subscriber authentication failure.
Optionally, the first terminal itself can integrate store function, can choose different functional modes also to be applicable in Different scenes are illustrated respectively with different usage scenarios:
Scene one, security level require lower place.
The first terminal is memory module, and the user's characteristic information after decryption is carried out persistence.Using Cheng Zhong, the first terminal send downloading request when getting user's characteristic information, without to cloud server, and only needing will be every The secondary user's characteristic information got is compared with the user's characteristic information after the decryption stored in the first terminal.
This mode when the first terminal carries out data transmission with cloud server for the first time, needs to fill with the decryption It sets and is used cooperatively, the use process later does not depend on decryption device and need not remotely connect with cloud server holding, unlocks It is more quick, but can not real-time update user's characteristic information, safety is poor.
The more demanding place of scene two, security level.
The first terminal is non-memory mode, and in use, the first terminal once gets user characteristics When information, downloading request will be sent to cloud server, and the user's characteristic information after downloading successfully every time is sent to institute It states decryption device to be decrypted, after receiving the user's characteristic information after decryption device decryption, the user that will acquire is special It is compared after reference breath and the user's characteristic information after decryption.
This mode, the first terminal in use, need to carry out communication connection with cloud server, it is also desirable to It is inserted into the decryption device always to be used cooperatively, unlocking process is more safe and reliable.
In an implementation, the first terminal can keep in communication in real time with cloud server and connect, can also need from Communication connection is carried out with cloud server when cloud server downloading data.
It should be noted that the above-mentioned corresponding function mode for selecting the first terminal according to different scenes is only to illustrate It is bright.During realization, it can be configured according to user demand.
Optionally, if the first terminal be intelligent door lock, the intelligent door lock according to comparison result to user identity into After row verifying:
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses, the intelligent door lock is unlocked operation;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication Failure, the intelligent door lock forbid unlock to operate.
In an implementation, when user possesses a plurality of similar first terminals, the side of cloud data sharing can also be passed through Formula carries out the data transmission of multiple terminals.
After the second terminal will upload to cloud into the user's characteristic information for crossing encryption, each first terminal can divide Cloud server is not logged in by private account, from cloud server downloading data, without typing is repeated, to realize mostly eventually The cloud data sharing at end.
By taking Fig. 2 as an example, multiple terminals of embodiment of the present invention cloud data sharing structural schematic diagram:
User possesses N number of terminal, wherein each terminal requires after logging on to cloud server by private account, and to Cloud server pushes respective UUID;
Cloud server will pass through the power with the binding of the private account of login after the UUID for receiving each terminal Each terminal identity is verified in limit list.
Cloud server returns to the user's characteristic information bound with private account to the terminal being verified;
Cloud server is forbidden downloading to unacceptable terminal is verified.
It should be noted that carrying out method, the method for decryption etc. that the shared terminal in cloud carries out data transmission with cloud It is referred to described above, details are not described herein.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
As shown in figure 3, the embodiment of the present invention provides a kind of first terminal based on the transmission of cloud data, the first terminal packet It includes: at least one processing unit 300 and at least one storage unit 301, wherein the storage unit 301 is stored with program Code, when said program code is executed by the processing unit 300, so that the processing unit 300 executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to solve It is close;And receive the user's characteristic information after the decryption device is decrypted.
Optionally, the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
Optionally, the processing unit 300 is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
After receiving the user's characteristic information after the decryption device is decrypted, the user's characteristic information that will acquire with User's characteristic information after decryption is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication Failure.
Optionally, the first terminal is intelligent door lock, and the processing unit 300 is also used to:
After being verified according to comparison result to user identity, if subscriber authentication passes through, the terminal is carried out Unlock operation.
As shown in figure 4, the embodiment of the present invention provides a kind of first terminal of data transmission based on cloud, comprising:
Download module 400: for sending downloading request to cloud;
First sending module 401: it is carried out for the user's characteristic information downloaded from cloud to be sent to external decryption device Decryption;
First processing module 402: for receiving the user's characteristic information after the decryption device is decrypted.
Optionally, the download module 400 is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
Optionally, the first processing module 402 is specifically used for:
After receiving the user's characteristic information after the decryption device is decrypted, the user's characteristic information that will acquire with User's characteristic information after decryption is compared;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication Failure.
Optionally, the first terminal is intelligent door lock;
The first processing units 402 are also used to:
It is described if subscriber authentication passes through after the terminal verifies user identity according to comparison result Terminal is unlocked operation.
As shown in figure 5, the embodiment of the present invention provides a kind of first terminal based on the transmission of cloud data, the first terminal packet It includes: at least one processing unit 500 and at least one storage unit 501, wherein the storage unit 501 is stored with program Code, when said program code is executed by the processing unit 500, so that the processing unit 500 executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives institute It states external encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is carried out It saves.
As shown in fig. 6, the embodiment of the present invention provides a kind of second terminal of data transmission based on cloud, comprising:
Obtain module 600: for obtaining user's characteristic information;
Second sending module 601: the user's characteristic information for will acquire is sent to external encryption device, and receives The external encryption device carries out encrypted user's characteristic information;
Second processing module 602: it is saved for the user's characteristic information received to be sent to cloud.
The embodiment of the present invention also provides a kind of computer-readable non-volatile memory medium, including program code, when described When program code is run on the computing device, said program code is for making the calculating equipment execute system of the embodiment of the present invention The step of method of the middle data transmission carried out based on cloud.
Based on the same inventive concept, a kind of method of data transmission based on cloud is additionally provided in the embodiment of the present invention, It is the corresponding method of terminal in system that the embodiment of the present invention carries out data transmission due to the corresponding equipment of this method, and should The principle that method solves the problems, such as is similar to the terminal, therefore the implementation of this method may refer to the reality of the system carried out data transmission It applies, overlaps will not be repeated.
As shown in fig. 7, the embodiment of the present invention provides a kind of method of data transmission based on cloud, this method comprises:
Step 700, first terminal sends downloading request to cloud;
Step 701, the user's characteristic information downloaded from cloud is sent to external decryption device and carried out by the first terminal Decryption;
Step 702, the first terminal receives the user's characteristic information after the decryption device is decrypted.
Optionally, the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
Optionally, the first terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;
The first terminal receives after the user's characteristic information after the decryption device is decrypted, further includes:
The user's characteristic information that the first terminal will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication is logical It crosses;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication Failure.
Optionally, the first terminal is intelligent door lock:
After the terminal verifies user identity according to comparison result, further includes:
If subscriber authentication passes through, the terminal is unlocked operation.
As shown in figure 8, the embodiment of the present invention provides a kind of method of data transmission based on cloud, this method comprises:
Step 800, second terminal obtains user's characteristic information;
Step 801, the user's characteristic information that the second terminal will acquire is sent to external encryption device, and receives The external encryption device carries out encrypted user's characteristic information;
Step 802, the user's characteristic information received is sent to cloud and saved by the second terminal.
Above by reference to showing according to the method, apparatus (system) of the embodiment of the present application and/or the frame of computer program product Figure and/or flow chart describe the application.It should be understood that can realize that block diagram and or flow chart is shown by computer program instructions The combination of the block of a block and block diagram and or flow chart diagram for figure.These computer program instructions can be supplied to logical With computer, the processor of special purpose computer and/or other programmable data processing units, to generate machine, so that via meter The instruction that calculation machine processor and/or other programmable data processing units execute creates for realizing block diagram and or flow chart block In specified function action method.
Correspondingly, the application can also be implemented with hardware and/or software (including firmware, resident software, microcode etc.).More Further, the application can take computer usable or the shape of the computer program product on computer readable storage medium Formula has the computer realized in the medium usable or computer readable program code, to be made by instruction execution system It is used with or in conjunction with instruction execution system.In the present context, computer can be used or computer-readable medium can be with It is arbitrary medium, may include, stores, communicates, transmits or transmit program, is made by instruction execution system, device or equipment With, or instruction execution system, device or equipment is combined to use.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of method of the data transmission based on cloud, which is characterized in that this method comprises:
First terminal sends downloading request to cloud;
The user's characteristic information downloaded from cloud is sent to external decryption device and is decrypted by the first terminal;
The first terminal receives the user's characteristic information after the decryption device is decrypted.
2. the method as described in claim 1, which is characterized in that the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
3. the method as described in claim 1, which is characterized in that the terminal sends downloading request to cloud, comprising:
The first terminal sends downloading request after getting user's characteristic information, to cloud;
The first terminal receives after the user's characteristic information after the decryption device is decrypted, further includes:
The user's characteristic information that the first terminal will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication passes through;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication is lost It loses.
4. method as claimed in claim 3, which is characterized in that the first terminal is intelligent door lock;
After the first terminal verifies user identity according to comparison result, further includes:
If subscriber authentication passes through, the first terminal is unlocked operation.
5. a kind of method of the data transmission based on cloud, which is characterized in that this method comprises:
Second terminal obtains user's characteristic information;
The user's characteristic information that the second terminal will acquire is sent to external encryption device, and receives the external encryption Device carries out encrypted user's characteristic information;
The user's characteristic information received is sent to cloud and saved by the second terminal.
6. a kind of first terminal of the data transmission based on cloud, which is characterized in that the first terminal includes: at least one processing Unit and at least one storage unit, wherein the storage unit is stored with program code, when said program code is described When processing unit executes, so that the processing unit executes following process:
Downloading request is sent to cloud;The user's characteristic information downloaded from cloud is sent to external decryption device to be decrypted; And receive the user's characteristic information after the decryption device is decrypted.
7. first terminal as claimed in claim 6, which is characterized in that the data include some or all of in following:
Fingerprint, vein, iris, sound, face, numerical ciphers and the unlocking pattern.
8. first terminal as claimed in claim 7, which is characterized in that the processing unit is specifically used for:
After getting user's characteristic information, downloading request is sent to cloud;
After receiving the user's characteristic information after the decryption device is decrypted, after the reception decryption device is decrypted After user's characteristic information, the user's characteristic information that will acquire is compared with the user's characteristic information after decryption;
If in the user's characteristic information after decryption including the user's characteristic information got, it is determined that subscriber authentication passes through;
If not including the user's characteristic information got in the user's characteristic information after decryption, it is determined that subscriber authentication is lost It loses.
9. first terminal as claimed in claim 8, which is characterized in that the first terminal is intelligent door lock;
The processing unit is also used to:
After verifying according to comparison result to user identity, if subscriber authentication passes through, it is unlocked operation.
10. a kind of second terminal of the data transmission based on cloud, which is characterized in that the second terminal includes: at least one Manage unit and at least one storage unit, wherein the storage unit is stored with program code, when said program code is by institute When stating processing unit execution, so that the processing unit executes following process:
Obtain user's characteristic information;The user's characteristic information that will acquire is sent to external encryption device, and receives described outer It sets encryption device and carries out encrypted user's characteristic information;And the user's characteristic information received is sent to cloud and is protected It deposits.
CN201810784717.8A 2018-07-17 2018-07-17 A kind of method and apparatus of the data transmission based on cloud Pending CN109087415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810784717.8A CN109087415A (en) 2018-07-17 2018-07-17 A kind of method and apparatus of the data transmission based on cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810784717.8A CN109087415A (en) 2018-07-17 2018-07-17 A kind of method and apparatus of the data transmission based on cloud

Publications (1)

Publication Number Publication Date
CN109087415A true CN109087415A (en) 2018-12-25

Family

ID=64838179

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810784717.8A Pending CN109087415A (en) 2018-07-17 2018-07-17 A kind of method and apparatus of the data transmission based on cloud

Country Status (1)

Country Link
CN (1) CN109087415A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN114244551A (en) * 2021-09-28 2022-03-25 自然资源部第三地形测量队 Data application protection method and device and field painting checking method
CN115776413A (en) * 2023-02-09 2023-03-10 航天宏图信息技术股份有限公司 Data transmission method and system based on iris encryption

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424676A (en) * 2013-08-28 2015-03-18 北京数码视讯科技股份有限公司 Identity information sending method, identity information sending device, access control card reader and access control system
CN105160744A (en) * 2015-10-09 2015-12-16 广州市坤拓智能科技有限公司 System and method for opening door by utilizing mobile phone based on cloud platform
CN106504375A (en) * 2016-10-09 2017-03-15 胡家安 Fingerprint lock management method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424676A (en) * 2013-08-28 2015-03-18 北京数码视讯科技股份有限公司 Identity information sending method, identity information sending device, access control card reader and access control system
CN105160744A (en) * 2015-10-09 2015-12-16 广州市坤拓智能科技有限公司 System and method for opening door by utilizing mobile phone based on cloud platform
CN106504375A (en) * 2016-10-09 2017-03-15 胡家安 Fingerprint lock management method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112202768A (en) * 2020-09-29 2021-01-08 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN112202768B (en) * 2020-09-29 2023-05-12 四川长虹网络科技有限责任公司 Data encryption method, device and system and readable storage medium
CN114244551A (en) * 2021-09-28 2022-03-25 自然资源部第三地形测量队 Data application protection method and device and field painting checking method
CN114244551B (en) * 2021-09-28 2024-01-30 自然资源部第三地形测量队 Data application protection method, equipment and wild external painting verification method
CN115776413A (en) * 2023-02-09 2023-03-10 航天宏图信息技术股份有限公司 Data transmission method and system based on iris encryption

Similar Documents

Publication Publication Date Title
CN108064440B (en) FIDO authentication method, device and system based on block chain
CN102546155B (en) On-demand safe key generates method and system
US9118661B1 (en) Methods and apparatus for authenticating a user using multi-server one-time passcode verification
CN107979514A (en) A kind of method and apparatus bound to equipment
CN109150835A (en) Method, apparatus, equipment and the computer readable storage medium of cloud data access
CN111552935B (en) Block chain data authorized access method and device
CN106302502A (en) A kind of secure access authentication method, user terminal and service end
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
US9154304B1 (en) Using a token code to control access to data and applications in a mobile platform
CN106789024B (en) A kind of remote de-locking method, device and system
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN113411187B (en) Identity authentication method and system, storage medium and processor
US9443069B1 (en) Verification platform having interface adapted for communication with verification agent
CN109495251A (en) Anti- quantum calculation wired home cloud storage method and system based on key card
CN109936552A (en) A kind of cipher key authentication method, server and system
CN111243133A (en) Bluetooth door lock system based on dynamic password generation and matching and unlocking method
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN109087415A (en) A kind of method and apparatus of the data transmission based on cloud
CN107911211B (en) Two-dimensional code authentication system based on quantum communication network
CN110519052A (en) Data interactive method and device based on Internet of Things operating system
CN111031540B (en) Wireless network connection method and computer storage medium
CN107888376B (en) NFC authentication system based on quantum communication network
CN111405537A (en) Bidirectional security authentication method based on ble connection, system and equipment thereof
CN107786978B (en) NFC authentication system based on quantum encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181225