CN103714170A - Data access information release and access method and device - Google Patents

Data access information release and access method and device Download PDF

Info

Publication number
CN103714170A
CN103714170A CN201310753215.6A CN201310753215A CN103714170A CN 103714170 A CN103714170 A CN 103714170A CN 201310753215 A CN201310753215 A CN 201310753215A CN 103714170 A CN103714170 A CN 103714170A
Authority
CN
China
Prior art keywords
information
access tag
user
data
user totem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310753215.6A
Other languages
Chinese (zh)
Inventor
刘嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhigu Ruituo Technology Services Co Ltd
Original Assignee
Beijing Zhigu Ruituo Technology Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhigu Ruituo Technology Services Co Ltd filed Critical Beijing Zhigu Ruituo Technology Services Co Ltd
Priority to CN201310753215.6A priority Critical patent/CN103714170A/en
Publication of CN103714170A publication Critical patent/CN103714170A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a data access information release and access method and device. The data access information release method comprises the steps of generating a corresponding access tag according to biological feature information of a user; establishing a mapping relation between the access tag and data, to be accessed, stored locally; releasing access information, wherein the access information is used for accessing the data to be accessed according to the access tag. According to the data access information release and access method and device, the scheme which can achieve data access without a middle temporary storage is provided, and due to the fact that the access tag corresponds to the biological feature information of the user, data privacy is ensured.

Description

Data access information issue and access method, device
Technical field
The embodiment of the present invention relates to field of computer technology, relates in particular to a kind of data access information issue and access method, device.
Background technology
The data access of striding equipment is user's a basic user demand, such as the data in computer access company computer at home.For the application of this class, active user's common practice comprises: use movable storage device carry out data-moving, by mail transfer, upload to the network communal spaces such as net dish etc.Temporary storage equipment in the middle of aforesaid way all needs.
Summary of the invention
In view of this, the embodiment of the present invention object is to provide a kind of scheme that can realize data access without middle temporary storage equipment.
For achieving the above object, according to the embodiment of the present invention aspect, provide a kind of data access information dissemination method, comprising:
According to user's biological information, generate corresponding access tag;
Set up described access tag and the mapping relations that are stored in local data to be visited;
Issue visit information, described visit information is for accessing described data to be visited according to described access tag.
For achieving the above object, another aspect according to the embodiment of the present invention, provides a kind of data access method, comprising:
According to user's biological information, generate corresponding access tag;
Access and described access tag have the data of mapping relations.
For achieving the above object, according to another aspect of the embodiment of the present invention, provide a kind of data access information distributing device, comprising:
Generation module, for according to user's biological information, generates corresponding access tag;
Mapping block, for setting up described access tag and the mapping relations that are stored in local data to be visited;
Release module, for issuing visit information, described visit information is for accessing described data to be visited according to described access tag.
For achieving the above object, another aspect according to the embodiment of the present invention, provides a kind of DAA, comprising:
Generation module, for according to user's biological information, generates corresponding address tag;
Access modules, for accessing the data that have mapping relations with described access tag.
At least one technical scheme in a plurality of technical schemes has following beneficial effect above:
The embodiment of the present invention is by generating the access tag corresponding with user's biological information, set up described access tag and the mapping relations that are stored in local data to be visited, and issue is for accessing the visit information of described data to be visited according to described access tag, a kind of scheme that can realize data access without middle temporary storage equipment is provided, and, access tag is corresponding with user's biological information, has guaranteed the privacy of data.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of a kind of data access information dissemination method embodiment provided by the invention;
Fig. 2 is the process flow diagram of a kind of data access method embodiment provided by the invention;
Fig. 3 a is the structural drawing of a kind of data access information distributing device embodiment mono-provided by the invention;
Fig. 3 b is the structural drawing of a kind of implementation of Fig. 3 a illustrated embodiment;
Fig. 3 c is the structural drawing of another implementation of Fig. 3 a illustrated embodiment;
Fig. 3 d is the structural drawing of another implementation of Fig. 3 a illustrated embodiment;
Fig. 4 a is the structural drawing of a kind of DAA embodiment mono-provided by the invention;
Fig. 4 b is the structural drawing of a kind of implementation of Fig. 4 a illustrated embodiment;
Fig. 4 c is the structural drawing of another implementation of Fig. 4 a illustrated embodiment;
Fig. 4 d is the structural drawing of another implementation of Fig. 4 a illustrated embodiment;
Fig. 5 is the structural drawing of a kind of data access information distributing device embodiment bis-provided by the invention;
Fig. 6 is the structural drawing of a kind of DAA embodiment bis-provided by the invention.
Embodiment
Below in conjunction with drawings and Examples, the specific embodiment of the present invention is described in further detail.Following examples are used for illustrating the present invention, but are not used for limiting the scope of the invention.
Fig. 1 is the process flow diagram of a kind of data access information dissemination method embodiment provided by the invention.As shown in Figure 1, the present embodiment comprises:
101,, according to user's biological information, generate corresponding access tag.
For instance, the data access information distributing device that can be provided by the embodiment of the present invention is carried out the present embodiment, carries out 101~103.Particularly, data access information distributing device can be realized with the form of software and/or hardware and be arranged in computing equipment, or, data access information distributing device itself is exactly computing equipment, described computing equipment can be mobile phone, personal digital assistant (Personal Digital Assistant is called for short PDA), apparatus such as computer.For convenience of description, in the present embodiment by the equipment that data access information distributing device is corresponding that is called of the set computing equipment being placed in of data access information distributing device or data access information distributing device itself, or, be called local device.
Particularly, described user's biological information can obtain from described user.Alternatively, the present embodiment also comprises: the biological information that obtains described user.
In a kind of possible implementation, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
Wherein, above-mentioned all kinds of physiological characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of physiological characteristic information can be separately or based on array mode arbitrarily, identifies described user.
Alternatively, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user totem information, generate described access tag, described access tag comprises described user totem information.
Wherein, described user totem information can identify described user.Alternatively, different users' physiological characteristic information is different, and correspondingly, the user totem information obtaining is different, and the access tag of generation is different; The user totem information that physiological characteristic information based on same user obtains can be identical, also can be different, and correspondingly, the access tag of generation can be identical, also can be different.For instance, the user totem information obtaining under the scene that is the finger print information of user's left index finger in physiological characteristic information, can from physiological characteristic information, be that the user totem information that obtains under the scene of finger print information of described user's left hand middle finger is different.
In a kind of optional implementation, described access tag comprises URL(uniform resource locator) (Uniform Resource Locator is called for short URL).
When described access tag comprises URL, alternatively, described according to described user totem information, generate described access tag, comprising:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
For instance, using user totem information abc as subdomain name, the URL obtaining according to default Main Domain 123 and this subdomain name can be abc.123.com.
It should be noted that, the mode that generates corresponding URL according to described user totem information is not limited to using described user totem information as subdomain name, can also be using described user totem information as Main Domain, or the complete trails of resource (full path of the resource).For instance, URL user totem information abc being obtained as Main Domain can be www.abc.com; Complete trails using user totem information abc as resource, in conjunction with default Main Domain 123, the URL obtaining can be www.123.com/abc.
In another possible implementation, except described physiological characteristic information, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
Wherein, above-mentioned all kinds of behavior characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of behavior characteristic information can be separately or based on array mode arbitrarily, identifies described user's behavior.
Alternatively, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user's behavior characteristic information, obtain behavior identification information;
According to described user totem information and described behavior identification information, generate described access tag, described access tag comprises described user totem information and described behavior identification information.
Wherein, the mode that generates described access tag according to described user totem information and described behavior identification information can have multiple.When described access tag comprises URL, for instance,
User totem information is abc, default Main Domain is 123, the URL obtaining when " OK " gesture when behavior identification information can be abc.123.com/OK, and the URL obtaining during for " grab(crawl) " gesture when behavior identification information can be abc.123.com/grab.
In above-mentioned various possible implementations, alternatively, describedly according to described user's physiological characteristic information, obtain user totem information, comprising:
The summary that calculates described user's physiological characteristic information, is defined as described user totem information by described summary.
Particularly, can adopt various digest algorithms to calculate the summary of described physiological characteristic information, such as Message Digest Algorithm 5 (Message Digest Algorithm version5 is called for short MD5), the present embodiment does not limit this.
102, set up described access tag and be stored in the mapping relations of local data to be visited.
Particularly, described data to be visited can be stored in the equipment that described data access information distributing device is corresponding.
Wherein, described access tag can have various ways, as long as can be by the described data to be visited of this access tag access.For instance, described access tag can be URL, or, index information, etc.
Conventionally, the mapping relations of setting up described access tag and data to be visited are specially: the mapping relations of setting up the local store path of described access tag and described data to be visited.For instance, described local store path can be D: file work.doc etc.
Particularly, the mapping relations of setting up described access tag and data to be visited can have various ways, relevant with the form of access tag alternatively.For instance, when described access tag is URL, can on local device, open HTML (Hypertext Markup Language) (Hyper Text Transportation Protocol, be called for short HTTP) server service or file transfer protocol (FTP) (File Transportation Protocol, be called for short FTP) server service, and configure the mapping relations of described URL and described data to be visited; When described access tag is index information, can on local device, opens point-to-point (Peer to Peer is called for short P2P) service, and configure the mapping relations of described index information and described data to be visited.
103, issue visit information, described visit information is for accessing described data to be visited according to described access tag.
In a kind of possible implementation, described visit information comprises: described access tag, have the memory address of the data described to be visited of mapping relations with described access tag.
In another possible implementation, described visit information comprises: the mapping relations of the memory address of described access tag, described access tag and described data to be visited.
Particularly, the memory address of above-mentioned data to be visited can be for storing the address of the equipment of described data to be visited, and the address of local device, is the IP address of local device alternatively.For instance, access tag is A, and the address of storing the equipment of described data to be visited is B, has mapping relations F, i.e. B=F(A between A and B), visit information can comprise A and F, or, comprise A and B.Visit information in issue comprises under the scene of A and F, visitor is during according to access tag A visit data, DNS or index server can be determined F(A according to F), determine the address B of the equipment of the described data to be visited of storage, thereby visitor is directed to the equipment of the described data to be visited of storage, the equipment of storing described data to be visited is directed to described data to be visited according to the mapping relations of setting up in 102 by visitor.Visit information in issue comprises under the scene of A and B, visitor is during according to access tag A visit data, DNS or index server can be determined the B corresponding with A according to A, thereby visitor is directed to the equipment of the described data to be visited of storage, the equipment of storing described data to be visited is directed to described data to be visited according to the mapping relations of setting up in 102 by visitor.
Particularly, the published method of visit information has multiple, alternatively, relevant with the form of access tag.For instance, when access tag is index information, access tag can be published to index server, particularly, be published to the index server relevant to data access information distributing device.
In a kind of optional implementation, described access tag comprises URL; Described issue visit information, comprising: according to described visit information, upgrade domain name system (Domain Name System is called for short DNS).
Particularly, if existing resource record corresponding to described access tag in described DNS utilizes the memory address of the data described to be visited of determining according to described visit information to replace the address of shining upon with described URL in existing resource record; If there is no resource record corresponding to described access tag in described DNS, by described URL with according to the memory address of the definite data described to be visited of described visit information, save as accordingly a resource record.
It should be noted that, in access tag, comprise under the scene of URL, while issuing this access tag, can only issue the non-path part in URL.For instance, visit information comprises the address 192.168.0.1 of access tag www.123.com/abc and local device, and wherein, path part is /abc, non-path part is www.123.com, when issue visit information, can issue www.123.com and 192.168.0.1.
In order to improve the security of data, in a kind of possible implementation, the present embodiment also comprises:
Utilize described physiological characteristic information to be encrypted described data to be visited.
Particularly, encryption method can have multiple.For instance, described physiological characteristic information can be carried out to any particular algorithms as key to data to be visited, as the encryption of triple DES (Triple Data Encryption Standard is called for short 3DES) algorithm.
The present embodiment is by generating the access tag corresponding with user's biological information, set up described access tag and the mapping relations that are stored in local data to be visited, and issue is for accessing the visit information of described data to be visited according to described access tag, a kind of scheme that can realize data access without middle temporary storage equipment is provided, and, access tag is corresponding with user's biological information, has guaranteed the privacy of data.
Fig. 2 is the process flow diagram of a kind of data access method embodiment provided by the invention.As shown in Figure 2, the present embodiment comprises:
201,, according to user's biological information, generate corresponding access tag.
For instance, the DAA that can be provided by the embodiment of the present invention is carried out the present embodiment, carries out 201~202.Particularly, DAA can be realized with the form of software and/or hardware and be arranged in computing equipment, or DAA itself is exactly computing equipment, and described computing equipment can be mobile phone, PDA, apparatus such as computer.For convenience of description, by the equipment that DAA is corresponding that is called of the set computing equipment being placed in of DAA or DAA itself.
Particularly, described user's biological information can obtain from described user.Alternatively, the present embodiment also comprises: the biological information that obtains described user.Alternatively, described user is the user who thinks visit data.
In a kind of possible implementation, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
Wherein, above-mentioned all kinds of physiological characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of physiological characteristic information can be separately or based on array mode arbitrarily, identifies described user.
Alternatively, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user totem information, generate described access tag, described access tag comprises described user totem information.
Wherein, described user totem information can identify described user.Alternatively, different users' physiological characteristic information is different, and correspondingly, the user totem information obtaining is different, and the access tag of generation is different; The user totem information that physiological characteristic information based on same user obtains can be identical, also can be different, and correspondingly, the access tag of generation can be identical, also can be different.For instance, the user totem information obtaining under the scene that is the finger print information of user's left index finger in physiological characteristic information, can from physiological characteristic information, be that the user totem information that obtains under the scene of finger print information of described user's left hand middle finger is different.
In a kind of optional implementation, described access tag comprises URL.
When described access tag comprises URL, alternatively, described according to described user totem information, generate described access tag, comprising:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
For instance, using user totem information abc as subdomain name, the URL obtaining according to default Main Domain 123 and this subdomain name can be abc.123.com.
It should be noted that, the mode that generates corresponding URL according to described user totem information is not limited to using described user totem information as subdomain name, can also be using described user totem information as Main Domain, or the complete trails of resource (full path of the resource).For instance, URL user totem information abc being obtained as Main Domain can be www.abc.com; Complete trails using user totem information abc as resource, in conjunction with default Main Domain 123, the URL obtaining can be www.123.com/abc.
In another possible implementation, except described physiological characteristic information, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
Wherein, above-mentioned all kinds of behavior characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of behavior characteristic information can be separately or based on array mode arbitrarily, identifies described user's behavior.
Alternatively, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user's behavior characteristic information, obtain behavior identification information;
According to described user totem information and described behavior identification information, generate described access tag, described access tag comprises described user totem information and described behavior identification information.
Wherein, the mode that generates described access tag according to described user totem information and described behavior identification information can have multiple.When described access tag comprises URL, for instance, user totem information is abc, default Main Domain is 123, the URL obtaining when " OK " gesture when behavior identification information can be abc.123.com/OK, and the URL obtaining during for " grab(crawl) " gesture when behavior identification information can be abc.123.com/grab.
In above-mentioned various possible implementations, alternatively, describedly according to described user's physiological characteristic information, obtain user totem information, comprising:
The summary that calculates described user's physiological characteristic information, is defined as described user totem information by described summary.
Particularly, can adopt various digest algorithms to calculate the summary of described physiological characteristic information, such as Message Digest Algorithm 5 (Message Digest Algorithm version5 is called for short MD5), the present embodiment does not limit this.
It should be noted that, when the method that the biological information adopting in 201 and the method that generates access tag and user want the biological information that adopts in the visit information issuing process of data of access and generation access tag is all consistent, described user can have access to the data of wanting access, wherein, described in, want the visit information issuing process of the data of access to realize with reference to above-mentioned data access information dissemination method embodiment.
202, access and described access tag have the data of mapping relations.
Wherein, described data to be visited can be to be stored in the equipment that described DAA is corresponding, or, being stored in miscellaneous equipment, the present embodiment does not limit this.
Wherein, described access tag can have various ways, as long as can there be by this access tag access and described access tag the data of mapping relations.For instance, described access tag can be URL, or, index information, etc.
For instance, when described access tag is URL, DAA can be inputted described URL and confirm at the address field of web browser, DNS is directed to this access according to described URL the equipment of the described data of storage, store the equipment of described data according to the described URL of configuration in http server service or ftp server service and the mapping relations of described data, the access entrance of described data is provided to user.When described access tag is index information, DAA can be issued index server by described index information, index server is directed to this access according to described index information the equipment of the described data of storage, store the equipment of described data according to the described index information of configuration in P2P service and the mapping relations of described data, the access entrance of described data is provided to user.
In a kind of possible implementation, in order to improve the security of data, described physiological characteristic information encryption for described data, correspondingly, the present embodiment also comprises:
Utilize described biological information to be decrypted described data.
Particularly, decryption method is corresponding with the encryption method of described data, can have multiple.For instance, when described data according to 3DES algorithm by described physiological characteristic information as secret key encryption, correspondingly, in the present embodiment, utilize described biological information described data to be carried out to the deciphering of 3DES algorithm.
In a kind of application scenarios of the present embodiment, user Zhang San wants to access the data D on computer 2 on computer 1, first Zhang San can start the data access information distributing device on computer 2, data access information distributing device obtains the finger print information of Zhang San's right hand forefinger, generate corresponding URL, set up the mapping relations of described URL and data D, and upgrade DNS, afterwards, Zhang San starts the DAA on computer 1, DAA obtains the finger print information of Zhang San's right hand forefinger, generate corresponding URL, access and described URL have the data of mapping relations, be data D.
The present embodiment is by generating the access tag corresponding with user's biological information, access and described access tag have the data of mapping relations, a kind of scheme that can realize data access without middle temporary storage equipment is provided, and, access tag is corresponding with user's biological information, has guaranteed the privacy of data.
Fig. 3 a is the structural drawing of a kind of data access information distributing device embodiment provided by the invention.As shown in Figure 3 a, data access information distributing device 300(hereinafter to be referred as: device 300) comprising:
Generation module 31, for according to user's biological information, generates corresponding access tag;
Mapping block 32, for setting up described access tag and the mapping relations that are stored in local data to be visited;
Release module 33, for issuing visit information, described visit information is for accessing described data to be visited according to described access tag.
Particularly, device 300 can be realized with the form of software and/or hardware and be arranged in computing equipment, or device 300 itself is exactly computing equipment, and described computing equipment can be mobile phone, PDA, apparatus such as computer.For convenience of description, in the present embodiment, will install the 300 set computing equipments that are placed in or the equipment that are called device 300 correspondences of device 300 own, or, local device be called.Particularly, described user's biological information can obtain from described user.Alternatively, device 300 also comprises: acquisition module, and for obtaining described user's biological information.
In a kind of possible implementation, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
Wherein, above-mentioned all kinds of physiological characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of physiological characteristic information can be separately or based on array mode arbitrarily, identifies described user.
In a kind of possible implementation, as shown in Figure 3 b, generation module 31 comprises:
The first identify unit 311, for according to described user's physiological characteristic information, obtains user totem information;
The first generation unit 312, for according to described user totem information, generates described access tag, and described access tag comprises described user totem information.
Wherein, described user totem information can identify described user.Alternatively, different users' physiological characteristic information is different, and correspondingly, the user totem information that the first identify unit 311 obtains is different, and the access tag that the first generation unit 312 generates is different; The user totem information that the physiological characteristic information of the first identify unit 311 based on same user obtains can be identical, also can be different, and correspondingly, the access tag that the first generation unit 312 generates can be identical, also can be different.For instance, the user totem information obtaining under the scene that the first identify unit 311 is the finger print information of user's left index finger in physiological characteristic information, can from physiological characteristic information, be that the user totem information that obtains under the scene of finger print information of described user's left hand middle finger is different.
In a kind of optional implementation, described access tag comprises uniform resource position mark URL.
When described access tag comprises URL, alternatively, the first generation unit 312 specifically for: using described user totem information as subdomain name; According to default Main Domain and described subdomain name, obtain corresponding URL.
For instance, the first generation unit 312 is using user totem information abc as subdomain name, and the URL obtaining according to default Main Domain 123 and this subdomain name can be abc.123.com.
It should be noted that, the mode that the first generation unit 312 generates corresponding URL according to described user totem information is not limited to using described user totem information as subdomain name, the first generation unit 312 can also be using described user totem information as Main Domain, or the complete trails of resource (full path of the resource).For instance, the URL that the first generation unit 312 obtains user totem information abc as Main Domain can be www.abc.com; The complete trails of the first generation unit 312 using user totem information abc as resource, in conjunction with default Main Domain 123, the URL obtaining can be www.123.com/abc.
In another possible implementation, except described physiological characteristic information, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
Wherein, above-mentioned all kinds of behavior characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of behavior characteristic information can be separately or based on array mode arbitrarily, identifies described user's behavior.
In a kind of possible implementation, as shown in Figure 3 c, generation module 31 comprises:
The first identify unit 311, for according to described user's physiological characteristic information, obtains user totem information;
The second identify unit 313, for according to described user's behavior characteristic information, obtains behavior identification information;
The second generation unit 314, for according to described user totem information and described behavior identification information, generates described access tag, and described access tag comprises described user totem information and described behavior identification information.
Wherein, the mode that the second generation unit 314 generates described access tag according to described user totem information and described behavior identification information can have multiple.When described access tag comprises URL, for instance, user totem information is abc, default Main Domain is 123, the URL obtaining when behavior identification information second generation unit 314 when " OK " gesture can be abc.123.com/OK, and when behavior identification information, the URL that the second generation unit 314 obtains during for " grab(crawl) " gesture can be abc.123.com/grab.
In above-mentioned various possible implementations, alternatively, the first identify unit 311 specifically for: calculate the summary of described user's physiological characteristic information, described summary be defined as to described user totem information.
Particularly, the first identify unit 311 can adopt various digest algorithms to calculate the summary of described physiological characteristic information, and such as Message Digest Algorithm 5 (Message Digest Algorithm version5 is called for short MD5), the present embodiment does not limit this.
Particularly, described data to be visited can be stored in the equipment of device 300 correspondences.
Wherein, described access tag can have various ways, as long as can be by the described data to be visited of this access tag access.For instance, described access tag can be URL, or, index information, etc.
Conventionally, mapping block 32 is set up the mapping relations of the local store path of described access tag and data to be visited.For instance, described local store path can be D: file work.doc etc.
Particularly, the mapping relations that mapping block 32 is set up described access tag and data to be visited can have various ways, relevant with the form of access tag alternatively.For instance, when described access tag is URL, mapping block 32 can be opened HTML (Hypertext Markup Language) (Hyper Text Transportation Protocol on local device, be called for short HTTP) server service or file transfer protocol (FTP) (File Transportation Protocol, be called for short FTP) server service, and configure the mapping relations of described URL and described data to be visited; When described access tag is index information, mapping block 32 can be opened P2P service on local device, and configures the mapping relations of described index information and described data to be visited.
In a kind of possible implementation, described visit information comprises: described access tag, have the memory address of the data described to be visited of mapping relations with described access tag.
In another possible implementation, described visit information comprises: the mapping relations of the memory address of described access tag, described access tag and described data to be visited.
Particularly, the memory address of above-mentioned data to be visited can be for storing the address of the equipment of described data to be visited, and the address of local device, is the IP address of local device alternatively.For instance, access tag is A, and the address of storing the equipment of described data to be visited is B, has mapping relations F, i.e. B=F(A between A and B), visit information can comprise A and F, or, comprise A and B.Visit information in release module 33 issues comprises under the scene of A and F, visitor is during according to access tag A visit data, DNS or index server can be determined F(A according to F), determine the address B of the equipment of the described data to be visited of storage, thereby visitor is directed to the equipment of the described data to be visited of storage, the equipment of storing described data to be visited is directed to described data to be visited according to the mapping relations of mapping block 32 foundation by visitor.Visit information in release module 33 issues comprises under the scene of A and B, visitor is during according to access tag A visit data, DNS or index server can be determined the B corresponding with A according to A, thereby visitor is directed to the equipment of the described data to be visited of storage, the equipment of storing described data to be visited is directed to described data to be visited according to the mapping relations of mapping block 32 foundation by visitor.
Particularly, the published method of release module 33 issue visit informations has multiple, alternatively, relevant with the form of access tag.For instance, when access tag is index information, release module 33 can be published to index server by access tag, particularly, is published to and installs 300 relevant index servers.
In a kind of optional implementation, described access tag comprises URL; Release module 33 specifically for: according to described visit information, upgrade DNS.
Particularly, if existing resource record corresponding to described access tag in described DNS utilizes the memory address of the data described to be visited of determining according to described visit information to replace the address of shining upon with described URL in existing resource record; If there is no resource record corresponding to described access tag in described DNS, by described URL with according to the memory address of the definite data described to be visited of described visit information, save as accordingly a resource record.
It should be noted that, comprise under the scene of URL in access tag, release module 33 can only be issued the non-path part in URL when this access tag of issue.For instance, visit information comprises the address 192.168.0.1 of access tag www.123.com/abc and local device, and wherein, path part is /abc, non-path part is www.123.com, and release module 33 can be issued www.123.com and 192.168.0.1.
In order to improve the security of data, in a kind of possible implementation, as shown in Figure 3 d, the present embodiment also comprises: encrypting module 34, and for utilizing described physiological characteristic information to be encrypted described data to be visited.
Particularly, the encryption method of encrypting module 34 can have multiple.For instance, encrypting module 34 can carry out any particular algorithms as key to data to be visited using described physiological characteristic information, as the encryption of triple DES (Triple Data Encryption Standard is called for short 3DES) algorithm.
The present embodiment is by generating the access tag corresponding with user's biological information, set up described access tag and the mapping relations that are stored in local data to be visited, and issue is for accessing the visit information of described data to be visited according to described access tag, a kind of scheme that can realize data access without middle temporary storage equipment is provided, and, access tag is corresponding with user's biological information, has guaranteed the privacy of data.
Fig. 4 a is the structural drawing of a kind of DAA embodiment mono-provided by the invention.As shown in Fig. 4 a, DAA 400(hereinafter to be referred as: device 400) comprising:
Generation module 41, for according to user's biological information, generates corresponding address tag;
Access modules 42, for accessing the data that have mapping relations with described access tag.
Particularly, device 400 can be realized with the form of software and/or hardware and be arranged in computing equipment, or device 400 itself is exactly computing equipment, and described computing equipment can be mobile phone, PDA, apparatus such as computer.For convenience of description, by the equipment that DAA is corresponding that is called of the set computing equipment being placed in of DAA or DAA itself.
Particularly, described user's biological information can obtain from described user.Alternatively, device 400 also comprises: acquisition module, and for obtaining described user's biological information.Alternatively, described user is the user who thinks visit data.
In a kind of possible implementation, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
Wherein, above-mentioned all kinds of physiological characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of physiological characteristic information can be separately or based on array mode arbitrarily, identifies described user.
In a kind of possible implementation, as shown in Figure 3 b, generation module 41 comprises:
The first identify unit 411, for according to described user's physiological characteristic information, obtains user totem information;
The first generation unit 412, for according to described user totem information, generates described access tag, and described access tag comprises described user totem information.
Wherein, described user totem information can identify described user.Alternatively, different users' physiological characteristic information is different, and correspondingly, the user totem information that the first identify unit 411 obtains is different, and the access tag that the first generation unit 412 generates is different; The user totem information that the physiological characteristic information of the first identify unit 411 based on same user obtains can be identical, also can be different, and correspondingly, the access tag that the first generation unit 412 generates can be identical, also can be different.For instance, the user totem information that under the scene that is the finger print information of user's left index finger in physiological characteristic information, the first identify unit 411 obtains, can from physiological characteristic information, be that the user totem information that obtains under the scene of finger print information of described user's left hand middle finger is different.
In a kind of optional implementation, described access tag comprises URL.
When described access tag comprises URL, alternatively, the first generation unit 412 specifically for: using described user totem information as subdomain name; According to default Main Domain and described subdomain name, obtain corresponding URL.
For instance, the first generation unit 412 is using user totem information abc as subdomain name, and the URL obtaining according to default Main Domain 123 and this subdomain name can be abc.123.com.
It should be noted that, the mode that the first generation unit 412 generates corresponding URL according to described user totem information is not limited to using described user totem information as subdomain name, the first generation unit 412 can also be using described user totem information as Main Domain, or the complete trails of resource (full path of the resource).For instance, the URL that the first generation unit 412 obtains user totem information abc as Main Domain can be www.abc.com; The complete trails of the first generation unit 412 using user totem information abc as resource, in conjunction with default Main Domain 123, the URL obtaining can be www.123.com/abc.
In another possible implementation, except described physiological characteristic information, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
Wherein, above-mentioned all kinds of behavior characteristic information all can be obtained by corresponding mode, and the present embodiment does not limit this.Alternatively, above-mentioned all kinds of behavior characteristic information can be separately or based on array mode arbitrarily, identifies described user's behavior.
In a kind of possible implementation, as shown in Fig. 4 c, generation module 41 comprises:
The first identify unit 411, for according to described user's physiological characteristic information, obtains user totem information;
The second identify unit 413, for according to described user's behavior characteristic information, obtains behavior identification information;
The second generation unit 414, for according to described user totem information and described behavior identification information, generates described access tag, and described access tag comprises described user totem information and described behavior identification information.
The second generation unit 414 wherein, the mode that generates described access tag according to described user totem information and described behavior identification information can have multiple.When described access tag comprises URL, for instance, user totem information is abc, default Main Domain is 123, the URL obtaining when behavior identification information second generation unit 414 when " OK " gesture can be abc.123.com/OK, and when behavior identification information, the URL that the second generation unit 414 obtains during for " grab(crawl) " gesture can be abc.123.com/grab.
In above-mentioned various possible implementations, alternatively, the first identify unit 411 specifically for:
The summary that calculates described user's physiological characteristic information, is defined as described user totem information by described summary.
Particularly, the first identify unit 411 can adopt various digest algorithms to calculate the summary of described physiological characteristic information, and such as Message Digest Algorithm 5 (Message Digest Algorithm version5 is called for short MD5), the present embodiment does not limit this.
It should be noted that, when the method for wanting the biological information that adopts in the visit information issuing process of data of access and generation access tag as biological information that generation module 41 adopts and the method that generates access tag and user is all consistent, described user can have access to the data of wanting access, wherein, described in, want the visit information issuing process of the data of access to be realized by above-mentioned data access information dissemination method embodiment.
Wherein, described data to be visited can be to be stored in the equipment of device 400 correspondences, or, being stored in miscellaneous equipment, the present embodiment does not limit this.
Wherein, described access tag can have various ways, as long as can there be by this access tag access and described access tag the data of mapping relations.For instance, described access tag can be URL, or, index information, etc.
For instance, when described access tag is URL, access modules 42 can be inputted described URL and confirm at the address field of web browser, DNS is according to the mapping relations of the address of the main frame of described URL and the described data of storage, this access is directed to the equipment of the described data of storage, store the equipment of described data according to the described URL of configuration in http server service or ftp server service and the mapping relations of described data, to the access entrance that described data are provided.When described access tag is index information, access modules 42 can be issued index server by described index information, index server is directed to this access according to described index information the equipment of the described data of storage, store the equipment of described data according to the described index information of configuration in P2P service and the mapping relations of described data, the access entrance of described data is provided to user.
In a kind of possible implementation, in order to improve the security of data, described physiological characteristic information encryption for described data, correspondingly, as shown in Fig. 4 d, device 400 also comprises: deciphering module 43, and for utilizing described biological information to be decrypted described data.
Particularly, the decryption method of deciphering module 43 is corresponding with the encryption method of described data, can have multiple.For instance, when described data according to 3DES algorithm by described physiological characteristic information as secret key encryption, correspondingly, deciphering module 43 utilizes described biological information described data to be carried out to the deciphering of 3DES algorithm.
In a kind of application scenarios of the present embodiment, user Zhang San wants to access the data D on computer 2 on computer 1, first Zhang San can start the data access information distributing device 300 on computer 2, data access information distributing device 300 obtains the finger print information of Zhang San's right hand forefinger, generate corresponding URL, set up the mapping relations of described URL and data D, and upgrade DNS, afterwards, Zhang San starts the DAA 400 on computer 1, DAA 400 obtains the finger print information of Zhang San's right hand forefinger, generate corresponding URL, access and described URL have the data of mapping relations, be data D.
The present embodiment is by generating the access tag corresponding with user's biological information, access and described access tag have the data of mapping relations, a kind of scheme that can realize data access without middle temporary storage equipment is provided, and, access tag is corresponding with user's biological information, has guaranteed the privacy of data.
Fig. 5 is the structural drawing of a kind of data access information distributing device embodiment bis-provided by the invention.As shown in Figure 5, data access information distributing device 500(hereinafter to be referred as: device 500) comprising:
Processor (processor) 51, communication interface (Communications Interface) 52, storer (memory) 53 and communication bus 54.Wherein:
Processor 51, communication interface 52 and storer 53 complete mutual communication by communication bus 54.
Communication interface 52, for communicating by letter such as external units such as DNS, index servers.
Processor 51, for executive routine 532, specifically can carry out the correlation step in said method embodiment.
Alternatively, device 500 is a computing equipment, and described computing equipment can be mobile phone, PDA, apparatus such as computer.
Particularly, program 532 can comprise program code, and described program code comprises computer-managed instruction.
Processor 51 may be a central processor CPU, or specific integrated circuit ASIC(Application Specific Integrated Circuit), or be configured to implement one or more integrated circuit of the embodiment of the present invention.
Storer 53, for depositing program 532.Storer 53 may comprise high-speed RAM storer, also may also comprise nonvolatile memory (non-volatile memory), for example at least one magnetic disk memory.Program 532 specifically can be for making device 500 carry out following steps:
According to user's biological information, generate corresponding access tag;
Set up described access tag and the mapping relations that are stored in local data to be visited;
Issue visit information, described visit information is for accessing described data to be visited according to described access tag.
In program 532, the specific implementation of each step can, referring to description corresponding in the corresponding steps in above-mentioned data access information dissemination method embodiment and unit, be not repeated herein.Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the equipment of foregoing description and module, can describe with reference to the corresponding process in aforementioned data visit information dissemination method embodiment, does not repeat them here.
Fig. 6 is the structural drawing of a kind of DAA embodiment bis-provided by the invention.As shown in Figure 6, DAA 600(hereinafter to be referred as: device 600) comprising:
Processor (processor) 61, communication interface (Communications Interface) 62, storer (memory) 63 and communication bus 64.Wherein:
Processor 61, communication interface 62 and storer 63 complete mutual communication by communication bus 64.
Communication interface 62, for communicating by letter such as external units such as DNS, index servers.
Processor 61, for executive routine 632, specifically can carry out the correlation step in said method embodiment.
Alternatively, device 600 is a computing equipment, and described computing equipment can be mobile phone, PDA, apparatus such as computer.
Particularly, program 632 can comprise program code, and described program code comprises computer-managed instruction.
Processor 61 may be a central processor CPU, or specific integrated circuit ASIC(Application Specific Integrated Circuit), or be configured to implement one or more integrated circuit of the embodiment of the present invention.
Storer 63, for depositing program 632.Storer 63 may comprise high-speed RAM storer, also may also comprise nonvolatile memory (non-volatile memory), for example at least one magnetic disk memory.Program 632 specifically can be for making device 600 carry out following steps:
According to user's biological information, generate corresponding access tag;
Access and described access tag have the data of mapping relations.
In program 632, the specific implementation of each step can, referring to description corresponding in the corresponding steps in above-mentioned data access method embodiment and unit, be not repeated herein.Those skilled in the art can be well understood to, and for convenience and simplicity of description, the specific works process of the equipment of foregoing description and module, can describe with reference to the corresponding process in aforementioned data access method embodiment, does not repeat them here.
Those of ordinary skills can recognize, unit and the method step of each example of describing in conjunction with embodiment disclosed herein, can realize with the combination of electronic hardware or computer software and electronic hardware.These functions are carried out with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can specifically should be used for realizing described function with distinct methods to each, but this realization should not thought and exceeds scope of the present invention.
If described function usings that the form of SFU software functional unit realizes and during as production marketing independently or use, can be stored in a computer read/write memory medium.Understanding based on such, the part that technical scheme of the present invention contributes to original technology in essence in other words or the part of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprise that some instructions are with so that a computer equipment (can be personal computer, server, or the network equipment etc.) carry out all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium comprises: various media that can be program code stored such as USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CDs.
Above embodiment is only for illustrating the present invention; and be not limitation of the present invention; the those of ordinary skill in relevant technologies field; without departing from the spirit and scope of the present invention; can also make a variety of changes and modification; therefore all technical schemes that are equal to also belong to category of the present invention, and scope of patent protection of the present invention should be defined by the claims.

Claims (38)

1. a data access information dissemination method, is characterized in that, described method comprises:
According to user's biological information, generate corresponding access tag;
Set up described access tag and the mapping relations that are stored in local data to be visited;
Issue visit information, described visit information is for accessing described data to be visited according to described access tag.
2. method according to claim 1, is characterized in that, described visit information comprises: described access tag, have the memory address of the data described to be visited of mapping relations with described access tag; Or described visit information comprises: the mapping relations of the memory address of described access tag, described access tag and described data to be visited.
3. method according to claim 2, is characterized in that, described access tag comprises uniform resource position mark URL; Described issue visit information, comprising:
According to described visit information, upgrade domain name system DNS.
4. according to arbitrary described method in claim 1~3, it is characterized in that, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
5. method according to claim 4, is characterized in that, described according to user's biological information, generates corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user totem information, generate described access tag, described access tag comprises described user totem information.
6. method according to claim 5, is characterized in that, described according to described user totem information, generates described access tag, comprising:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
7. the method for stating according to claim 4, is characterized in that, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
8. method according to claim 7, is characterized in that, described according to user's biological information, generates corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user's behavior characteristic information, obtain behavior identification information;
According to described user totem information and described behavior identification information, generate described access tag, described access tag comprises described user totem information and described behavior identification information.
9. according to the method described in claim 5 or 8, it is characterized in that, describedly according to described user's physiological characteristic information, obtain user totem information, comprising:
The summary that calculates described user's physiological characteristic information, is defined as described user totem information by described summary.
10. method according to claim 4, is characterized in that, described method also comprises:
Utilize described physiological characteristic information to be encrypted described data to be visited.
11. 1 kinds of data access methods, is characterized in that, described method comprises:
According to user's biological information, generate corresponding access tag;
Access and described access tag have the data of mapping relations.
12. methods according to claim 11, is characterized in that, described access tag comprises uniform resource position mark URL.
13. according to the method described in claim 11 or 12, it is characterized in that, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
14. methods according to claim 13, is characterized in that, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user totem information, generate described access tag, described access tag comprises described user totem information.
15. methods according to claim 14, is characterized in that, described according to described user totem information, generate described access tag, comprising:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
16. methods according to claim 13, is characterized in that, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
17. methods according to claim 16, is characterized in that, described according to user's biological information, generate corresponding access tag, comprising:
Physiological characteristic information according to described user, obtains user totem information;
According to described user's behavior characteristic information, obtain behavior identification information;
According to described user totem information and described behavior identification information, generate described access tag, described access tag comprises described user totem information and described behavior identification information.
18. according to the method described in claim 14 or 17, it is characterized in that, describedly according to described user's physiological characteristic information, obtains user totem information, comprising:
The summary that calculates described user's physiological characteristic information, is defined as described user totem information by described summary.
19. methods according to claim 13, is characterized in that, described access and described access tag also comprise after having the data of the relation of hinting obliquely at:
Utilize described biological information to be decrypted described data.
20. 1 kinds of data access information distributing devices, is characterized in that, described device comprises:
Generation module, for according to user's biological information, generates corresponding access tag;
Mapping block, for setting up described access tag and the mapping relations that are stored in local data to be visited;
Release module, for issuing visit information, described visit information is for accessing described data to be visited according to described access tag.
21. devices according to claim 20, is characterized in that, described visit information comprises: described access tag, have the memory address of the data described to be visited of mapping relations with described access tag; Or described visit information comprises: the mapping relations of the memory address of described access tag, described access tag and described data to be visited.
22. devices according to claim 21, is characterized in that, described access tag comprises uniform resource position mark URL; Described release module specifically for:
According to described visit information, upgrade domain name system DNS.
23. according to arbitrary described device in claim 20~22, it is characterized in that, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
24. devices according to claim 23, is characterized in that, described generation module comprises:
The first identify unit, for according to described user's physiological characteristic information, obtains user totem information;
The first generation unit, for according to described user totem information, generates described access tag, and described access tag comprises described user totem information.
25. devices according to claim 24, is characterized in that, described the first generation unit specifically for:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
26. devices according to claim 23, is characterized in that, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
27. devices according to claim 26, is characterized in that, described generation module comprises:
The first identify unit, for according to described user's physiological characteristic information, obtains user totem information;
The second identify unit, for according to described user's behavior characteristic information, obtains behavior identification information;
The second generation unit, for according to described user totem information and described behavior identification information, generates described access tag, and described access tag comprises described user totem information and described behavior identification information.
28. according to the device described in claim 24 or 27, it is characterized in that, described the first identify unit specifically for: calculate the summary of described user's physiological characteristic information, described summary be defined as to described user totem information.
29. devices according to claim 23, is characterized in that, described device also comprises: encrypting module, and for utilizing described physiological characteristic information to be encrypted described data to be visited.
30. 1 kinds of DAAs, is characterized in that, described device comprises:
Generation module, for according to user's biological information, generates corresponding address tag;
Access modules, for accessing the data that have mapping relations with described access tag.
31. devices according to claim 30, is characterized in that, described access tag comprises uniform resource position mark URL.
32. according to the device described in claim 30 or 31, it is characterized in that, described biological information comprises physiological characteristic information, described physiological characteristic information comprise following at least one: finger print information, palmmprint information, acoustic information, facial information, retinal information, iris information.
33. devices according to claim 32, is characterized in that, described generation module comprises:
The first identify unit, for according to described user's physiological characteristic information, obtains user totem information;
The first generation unit, for according to described user totem information, generates described access tag, and described access tag comprises described user totem information.
34. devices according to claim 33, is characterized in that, described the first generation unit specifically for:
Using described user totem information as subdomain name;
According to default Main Domain and described subdomain name, obtain corresponding URL.
35. devices according to claim 32, is characterized in that, described biological information also comprises behavior characteristic information, described behavior characteristic information comprise following at least one: action message, pose information, expression information, handwriting information.
36. devices according to claim 35, is characterized in that, described generation module comprises:
The first identify unit, for according to described user's physiological characteristic information, obtains user totem information;
The second identify unit, for according to described user's behavior characteristic information, obtains behavior identification information;
The second generation unit, for according to described user totem information and described behavior identification information, generates described access tag, and described access tag comprises described user totem information and described behavior identification information.
37. according to the device described in claim 33 or 36, it is characterized in that, described the first identify unit specifically for: calculate the summary of described user's physiological characteristic information, described summary be defined as to described user totem information.
38. devices according to claim 32, is characterized in that, described device also comprises: deciphering module, and for utilizing described biological information to be decrypted described data.
CN201310753215.6A 2013-12-31 2013-12-31 Data access information release and access method and device Pending CN103714170A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310753215.6A CN103714170A (en) 2013-12-31 2013-12-31 Data access information release and access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310753215.6A CN103714170A (en) 2013-12-31 2013-12-31 Data access information release and access method and device

Publications (1)

Publication Number Publication Date
CN103714170A true CN103714170A (en) 2014-04-09

Family

ID=50407145

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310753215.6A Pending CN103714170A (en) 2013-12-31 2013-12-31 Data access information release and access method and device

Country Status (1)

Country Link
CN (1) CN103714170A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573446A (en) * 2015-02-02 2015-04-29 联想(北京)有限公司 Information processing method and device
CN105550644A (en) * 2015-12-08 2016-05-04 北京橙鑫数据科技有限公司 Skin state analysis method and skin state analysis device based on single-sided mirror
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN109726588A (en) * 2018-12-21 2019-05-07 上海邑游网络科技有限公司 Method for secret protection and system based on Information hiding
CN110347456A (en) * 2019-05-28 2019-10-18 北京奇艺世纪科技有限公司 Image processing method, device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610292A (en) * 2003-10-24 2005-04-27 微软公司 Interoperable credential gathering and access modularity
WO2007016351A2 (en) * 2005-07-28 2007-02-08 Grape Technology Group, Inc. Enhanced directory assistance system with enum based features
CN101884188A (en) * 2007-07-12 2010-11-10 创新投资有限责任公司 Identity authentication and secured access systems, components, and methods
CN102067567A (en) * 2008-02-11 2011-05-18 杜比实验室特许公司 Dynamic DNS system for private networks
CN102870093A (en) * 2010-03-23 2013-01-09 富士通株式会社 System and methods for remote maintenance of multiple clients in an electronic network using virtualization and attestation
CN103002052A (en) * 2012-12-24 2013-03-27 百度在线网络技术(北京)有限公司 Resource positioning method and device in cloud database
CN102999713A (en) * 2012-11-15 2013-03-27 沈阳中科博微自动化技术有限公司 Multi-user remote data operating method with authority management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610292A (en) * 2003-10-24 2005-04-27 微软公司 Interoperable credential gathering and access modularity
WO2007016351A2 (en) * 2005-07-28 2007-02-08 Grape Technology Group, Inc. Enhanced directory assistance system with enum based features
CN101884188A (en) * 2007-07-12 2010-11-10 创新投资有限责任公司 Identity authentication and secured access systems, components, and methods
CN102067567A (en) * 2008-02-11 2011-05-18 杜比实验室特许公司 Dynamic DNS system for private networks
CN102870093A (en) * 2010-03-23 2013-01-09 富士通株式会社 System and methods for remote maintenance of multiple clients in an electronic network using virtualization and attestation
CN102999713A (en) * 2012-11-15 2013-03-27 沈阳中科博微自动化技术有限公司 Multi-user remote data operating method with authority management
CN103002052A (en) * 2012-12-24 2013-03-27 百度在线网络技术(北京)有限公司 Resource positioning method and device in cloud database

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573446A (en) * 2015-02-02 2015-04-29 联想(北京)有限公司 Information processing method and device
CN105550644A (en) * 2015-12-08 2016-05-04 北京橙鑫数据科技有限公司 Skin state analysis method and skin state analysis device based on single-sided mirror
CN105631293A (en) * 2015-12-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Data access method, data access system and terminal
CN109726588A (en) * 2018-12-21 2019-05-07 上海邑游网络科技有限公司 Method for secret protection and system based on Information hiding
CN109726588B (en) * 2018-12-21 2021-04-06 上海邑游网络科技有限公司 Privacy protection method and system based on information hiding
CN110347456A (en) * 2019-05-28 2019-10-18 北京奇艺世纪科技有限公司 Image processing method, device, computer equipment and storage medium
CN110347456B (en) * 2019-05-28 2023-05-09 北京奇艺世纪科技有限公司 Image data processing method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
JP7460670B2 (en) Distributed, decentralized data aggregation
Krämer et al. Implementing secure applications in smart city clouds using microservices
US9990507B2 (en) Adapting decoy data present in a network
CN102006300B (en) Method, device and system for encrypting cloud storage data
US10037544B2 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
CN103714170A (en) Data access information release and access method and device
WO2017032980A1 (en) Data access and ownership management
US20150067353A1 (en) Storage management device and storage management method
US8955143B1 (en) Use of decoy data in a data store
CN103607284A (en) Identity authentication method and equipment and server
US20150067354A1 (en) Storage management device and storage management method
WO2015002695A1 (en) Selective data transformation and access for secure cloud analytics
CN102325026A (en) Account password secure encryption system
US10536276B2 (en) Associating identical fields encrypted with different keys
CN106789227B (en) A kind of internet behavior analysis method and internet behavior analytical equipment
Thilakanathan et al. SafeProtect: Controlled data sharing with user-defined policies in cloud-based collaborative environment
AU2018391625A1 (en) Re-encrypting data on a hash chain
CN103888261B (en) Certificate update method and device
CN107251480A (en) Data storing device, data update system, data processing method and data processor
CN104468486A (en) Information processing method and system and electronic device
CN101187917A (en) Method and system for using each part of selective annotation ciphered file
Al-Khafaji et al. Secure android IoT mobile and collaborative machine learning for controlling the management of enterprise
CN104702407B (en) Digital signature device, system and digital signature method
CN106295366B (en) Sensitive data identification method and device
Suthar et al. Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140409

RJ01 Rejection of invention patent application after publication