CN106503531A - A kind of server data storage system for improving security - Google Patents
A kind of server data storage system for improving security Download PDFInfo
- Publication number
- CN106503531A CN106503531A CN201610968413.8A CN201610968413A CN106503531A CN 106503531 A CN106503531 A CN 106503531A CN 201610968413 A CN201610968413 A CN 201610968413A CN 106503531 A CN106503531 A CN 106503531A
- Authority
- CN
- China
- Prior art keywords
- password
- module
- mobile phone
- storage device
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention discloses a kind of server data storage system for improving security, include mobile phone, server, computer and removable storage device, mobile phone includes mobile phone radio frequency module and the first near-field communication module, removable storage device includes USB interface, the second near-field communication module and fingerprint module, and computer includes fingerprint and device password initialization module, correction verification module, user name crypto module and data memory module.Prior art is different from, above-mentioned technical proposal improves the security of data storage, and is easy to the storage of data.
Description
Technical field
A kind of the present invention relates to data security arts, more particularly to server data storage system for improving security.
Background technology
Existing data storage method has various ways, but all there is information leakage.Such as using movement
The storage device of formula, directly stores data on movable storage device, then there is a problem that storage device is lost, after loss
Will result in the leakage of information.Or the mode using the network storage, network storage needs are on computers every time using user
Name password login, is so easy to software or camera records user name password, causes user name password to reveal, so as to make
Into leaking data.I.e. existing data storage method is still very dangerous.
Content of the invention
For this reason, it may be necessary to provide a kind of server data storage system for improving security, available data storage is solved uneasy
Full problem.
For achieving the above object, a kind of server data storage system for improving security is inventor provided, is included
Mobile phone, server, computer and removable storage device, mobile phone include mobile phone radio frequency module and the first near-field communication module, move
Dynamic formula storage device includes USB interface, the second near-field communication module and fingerprint module, and computer is included at the beginning of fingerprint and device password
Beginningization module, correction verification module, user name crypto module and data memory module, removable storage device be stored with sequence number and with
The first related encryption rule of sequence number and the second decryption rule related to sequence number, server storage have and the first encryption rule
Then corresponding first decryption is regular, and server storage has and regular corresponding second encryption rule of the second decryption, the first encryption rule
Then different from the second encryption rule, wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, judges to move after detecting insertion
Whether formula storage device is stored with finger print data;If not storing finger print data, fingerprint and device password initialization is enabled
Module, fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling calibration mode after initialization
Block;If being stored with finger print data, correction verification module is directly enabled;
Correction verification module is used for obtaining user input equipment code data and is dealt into removable storage device, and portable storage sets
It is ready for use on after getting finger print data and device password data, and is compared with the data in removable storage device, if
All pass through then to enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Movable type is deposited
Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization are completed
Afterwards, data memory module is enabled;Removable storage device has username and password information, enables data memory module;
Data memory module is used for sending file reading instruction;Removable storage device is used for receiving file reading instruction
Afterwards, username and password is encrypted using the first encryption rule, file is read by instruction, sequence by near-field communication module
Number and encryption after username and password be sent to mobile phone;Mobile phone is used for after mobile phone radio frequency module transmits Sequence Number, encrypts
User name, password and file read instruction and arrive server;Server is used for obtaining the first decryption rule decryption according to sequence number
Username and password after being verified, is encrypted using the second encryption rule to the fileinfo for reading, and returns encryption
Fileinfo afterwards is to mobile phone;Mobile phone is used for the information after near-field communication module sends encryption to removable storage device,
Removable storage device is used for being decrypted fileinfo and being sent to computer, and computer is used for showing the fileinfo for reading;
After data memory module is additionally operable to detect files passe operation, the fileinfo for uploading is sent to portable storage
Equipment;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption
Rule is encrypted to username and password, the username and password, file by near-field communication module by sequence number, after encrypting
Information is sent to mobile phone;Mobile phone is used for the user name after mobile phone radio frequency module transmits Sequence Number, encrypts, password and file letter
Cease server;After server is used for decrypting and verifying that username and password passes through, decryption obtains random number and fileinfo, deposits
Storage fileinfo is under the corresponding file of user name.
Further, fingerprint and device password initialization module are used for sending acquisition fingerprint prompting, wait fingerprint module to obtain
Finger print data is got, and acquisition device password prompting is sent after getting finger print data, waits the keyboard of computer to get equipment close
After code data, storage finger print data and device password data are in removable storage device, and enable correction verification module.
Further, user name crypto module carry out username and password initialized when, user name crypto module use
User input username and password is pointed out in pop-up dialogue box, after computer gets user name password, by near-field communication module
User name, password and finger print data are sent to mobile phone, and mobile phone is used for user name, close being sent by the mobile phone radio frequency module of mobile phone
, to server, whether server is used for detecting user name, password and finger print data by checking, and will verify for code and finger print data
As a result mobile phone is dealt into, and mobile phone is used for being forwarded to computer by near-field communication module, and it is right after the result is received that computer is used for
As a result judged, judged result is by then user name password storage in removable storage device, and enables data
Memory module, the judged result username and password mistake which is not input into by then prompting user, does not enable data memory module.
Prior art is different from, above-mentioned technical proposal 1. is associated with username and password by fingerprint, and user is not required to
User name password to be input again, it is to avoid the problem that user name password is revealed.2. pass through username and password in server
Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data is caused repeats and occurs
The problem of information leakage.3. computer and server communicate away be mobile phone radio frequency passage, reduce network monitored can
Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, while fileinfo and user name password
In the case of being all encryption.5. using the cipher mode of random number so that the file after encryption has more confusion, it is to avoid data
Decrypted problem after coated intercepting and capturing.
Description of the drawings
Flow charts of the Fig. 1 for the inventive method;
Structure charts of the Fig. 2 for present system.
Specific embodiment
By describing the technology contents of technical scheme, structural feature in detail, realizing purpose and effect, below in conjunction with concrete reality
Apply example and coordinate accompanying drawing to be explained in detail.
Fig. 1 to Fig. 2 is referred to, the present embodiment provides a kind of server data storage system for improving security, including hand
Machine 205, server 207, computer 201 and removable storage device 203, specifically, system architecture diagram can be such as the system of Fig. 2
200.Mobile phone includes mobile phone radio frequency module and the first near-field communication module, and mobile phone can be entered with base station by mobile phone radio frequency module
Row connection, such that it is able to surfing the Net and being connected with server.Portable storage includes the second near-field communication module and fingerprint module,
Specifically, removable storage device also includes processing module and memory module, processing module respectively with fingerprint module, storage mould
The connection of block, the second near-field communication module and USB interface, removable storage device are connected with computer by USB interface, processing module
Can be to realizing that the hardware to memory module data is encrypted, it is to avoid directly read the data of memory module.Portable storage sets
Standby head is little, without the need for power supply, its power supply has USB interface to power, and can carry with, easy to carry.Removable storage device is deposited
Contain sequence number and the first encryption rule related to sequence number and the second decryption rule related with sequence number, server storage
There are the first decryption rule corresponding with the first encryption rule, server storage there are the second encryption rule corresponding with the second decryption rule
Then, the first encryption rule is different from the second encryption rule.The system is illustrated below by the handling process of the system.
This flow process comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102
Judge after detecting insertion whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry
Instruction is asked to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then
By result feedback to the computer, it is to avoid computer directly reads the finger print data and causes the problem that data may reveal.
If not storing finger print data, S103 fingerprints and device password initialization step is entered, step to be initiated is complete
Into laggard checking procedure S104;If being stored with finger print data, checking procedure S104 is directly entered.Fingerprint and device password are all
It is used to the necessary condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password
It is placed in the memory module of removable storage device.
When having fingerprint inside memory module, need to use removable storage device, then will be verified.Verification step
Suddenly comprise the steps:S104 computers obtain user input equipment code data and are dealt into removable storage device, and movable type is deposited
After storage equipment gets finger print data and device password data, and it is compared with the data in removable storage device, that is, walks
Rapid S105, continues below step if passing through.Otherwise enter step S106 this method to terminate.Here checking will be received simultaneously
Verified to after, rather than verified one by one, thus be avoided that disabled user is cracked one by one.Checking simultaneously is only
It is exactly not all right to have mistake, and disabled user does not know that error, increased and cracks difficulty, simultaneously because authenticated
Journey is carried out inside removable storage device, this equipment not have autgmentability, for computer, this equipment be difficult into
Invade and crack.
It is verified, represents user and there is the right for using the removable storage device, then enters step S107,
Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence
Disconnected, it is could to be interacted with people due to computer, but computer is only to obtain a result, the process of judgement also needs to moving
In dynamic formula storage device.
Removable storage device does not have username and password information, enters step S108 username and password initialization step
Suddenly, after the completion for the treatment of user name and cryptographic initialization step, data storing steps S109 and S110 are entered;Removable storage device is deposited
There are user name and encrypted message, be directly put into data storing steps S109 and step S110.Username and password is logged on
The key of server, because user name password can be unique, but finger print data is according to the difference of sampled point, it is likely that no
It is unique.If sampled point is little, then the finger print data of different fingerprints is possible to occur identical.If adopting fingerprint number
According to directly logging in, then when user's radix is very big, it is likely that have one or two finger print data be the same, so
Data obfuscation can be caused.This is absolutely not allowed in data security arts.After user name cryptographic initialization, portable storage
Just be stored with equipment username and password.But during use below, avoid the need for inputing again user name and
Password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file and uploading files to server
Step.Before upload should first reading service device file file directory, so under the catalogue that specifies, i.e., file can be stored
The fileinfo of the application can be file directory information, it is also possible to be directly file, be so equal to and download from a server text
Part.Wherein, include the step of reading service device file:Computer sends file and reads instruction, and removable storage device receives text
After part reads instruction, username and password is encrypted using the first encryption rule, file is read by near-field communication module
Username and password after instruction fetch, sequence number and encryption is sent to mobile phone, mobile phone transmitted Sequence Number by mobile phone radio frequency module,
User name, password after encryption and file read instruction and arrive server, and server is used for obtaining the first decryption rule according to sequence number
Then decrypted user name and password after being verified, are encrypted using the second encryption rule to the fileinfo for reading, and are returned
Return encryption after fileinfo arrive mobile phone, mobile phone by near-field communication module send encryption after information to movable type store set
Standby, removable storage device is decrypted and is sent to computer to fileinfo, and computer shows the fileinfo for reading.
Here default first encryption rule, this first encryption rule is adopted to be stored in the encryption of username and password
Removable storage device, and associated with sequence number, then corresponding first decryption rule storage is on the server.
The encryption of the fileinfo of server is equally associated with sequence number using the second encryption rule, and then corresponding second decryption is deposited
Storage can be decrypted in removable storage device and to fileinfo.The data that removable storage device is gone out are except sequence number
Can be encrypted using the first encryption rule, server return data can be carried out using the second encryption rule plus
Close, i.e., these information are not transmission in plain text, thus considerably increase security.Simultaneously because associated using sequence number,
The sequence number of each removable storage device is different, accordingly even when disabled user has cracked some movable type storage setting
Other removable storage devices also will not be produced threat by standby encryption and decryption rule, substantially increase different portable storages
Information Security between equipment.
The step of uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection
The file for surveying user drags to upload frame operation, detects the fileinfo of the file that user drags, as the fileinfo for uploading.
Then computer sends the fileinfo for uploading and arrives removable storage device, and removable storage device generation random number, and to random
Number and fileinfo are encrypted.The encryption of file can be adopted and user name password the first encryption rule of identical, and adopt
First encryption rule is encrypted to username and password.By user of second near-field communication module by sequence number, after encrypting
Name and password, fileinfo are sent to mobile phone, user name of the mobile phone after mobile phone radio frequency module transmits Sequence Number, encrypts, close
, to server, after server is decrypted and verifies that username and password passes through, decryption obtains random number and file for code and fileinfo
Information, under storage file information to the corresponding file of user name.
The transmission of data is carried out using random number here, and the fileinfo that can be allowed after encrypting is more chaotic, because with
Machine number is unique, and is to change always.Accordingly even when being identical file, its data after encrypting is also different
, it is to avoid disabled user reversely decrypting encryption rule, is increased and cracks difficulty by file constantly using variable quantity very little
Degree, it is ensured that security.Simultaneously because the passage of this programme data transfer is not through computer, so, computer need not be networked,
On the computer of some concerning security matters, just there is no the possibility for being cracked and shooting, it is ensured that the safety of computer data.By mobile phone radio frequency
Module is directly connected with base station, the possibility that also there is no monitoring.Mobile phone is also without data storage, removable storage device
Without data storage, the two all lost, and also not result in the problem of loss of data.Even if removable storage device is lost
, without fingerprint and corresponding device password, also have no idea to use removable storage device.And even with movable type
Storage device, and the username and password of inside cannot be got, because username and password will be used, portable storage
Equipment will be encrypted to which.The user discover that removable storage device lost, it is only necessary to user is changed on server
The password of name just because removable storage device will be cracked will need certainly for a period of time, even and if having cracked movement
Formula storage device, as username and password cannot pass through checking, is also otiose.Data safety is so substantially increased
Property, without the problem that concern of data is lost.
The change of password can also be like above step carry out, user first goes to buy a blank portable storage and sets
Standby, finger print data and device password is initialized then, then initialising subscriber name and password, then can be carried out more to password
Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device,
Removable storage device, will be taken after user name, password before server verification pass through to being sent to server after these encryptions
After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone
More new password.Certainly, in order to prevent Brute Force password, the intensity of password can be required, and such as want upper and lower case letter to add
Upper numeral, digit can be more than 10 etc..And if username and password checking is not by default number of times in one day,
Just no longer by the checking of the user name, it is to avoid Brute Force.
Specifically, the fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited
Storage equipment waits fingerprint module to get finger print data, and after getting finger print data, removable storage device informs computer, computer
Acquisition device password prompting is sent, after waiting the keyboard of computer to get device password data, computer sends device password to shifting
Dynamic formula storage device, such removable storage device just store finger print data and device password data in, and enter verification step
Suddenly.
User name cryptographic initialization is similar with line and device password initialization, username and password initialization step include as
Lower step:Computer pop-up dialogue box points out user input username and password, after computer gets user name password, by near field
User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone,
Whether server detection user name, password and finger print data are by checking, and the result is dealt into mobile phone, and mobile phone passes through near field
Communication module is forwarded to computer, and computer is judged to result after the result is received, judged result by then
User name password storage is in removable storage device, and enters data storing steps, and judged result is not by then pointing out user
Its username and password mistake being input into, this method terminate.
Further, data storing steps include following delete step:Computer detection is deleted after instruction to file, portable
After storage device receives file deletion instruction, username and password is encrypted using the first encryption rule, by near field
The username and password that file is deleted after instruction and sequence number, encryption is sent to mobile phone by communication module, and mobile phone is penetrated by mobile phone
Frequency module transmits Sequence Number, encrypt after user name, password and file delete instruction to server, server is used for according to sequence
After number obtaining the first decryption rule decrypted user name and password and being verified, delete file and delete the corresponding file of instruction.From
And the browsing and download of file are achieved, upload and delete.
Similar with said method embodiment, the invention provides a kind of server data storage system for improving security
System, includes mobile phone, server, computer and removable storage device, and mobile phone includes mobile phone radio frequency module and the first near field is logical
Letter module, removable storage device include USB interface, the second near-field communication module and fingerprint module, computer include fingerprint and
Device password initialization module, correction verification module, user name crypto module and data memory module, removable storage device are stored with
Sequence number and the first encryption rule related to sequence number and the second decryption rule related with sequence number, server storage have with
The corresponding first decryption rule of first encryption rule, server storage have the second encryption rule corresponding with the second decryption rule,
First encryption rule is different from the second encryption rule, wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, judges to move after detecting insertion
Whether formula storage device is stored with finger print data;If not storing finger print data, fingerprint and device password initialization is enabled
Module, fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling calibration mode after initialization
Block;If being stored with finger print data, correction verification module is directly enabled;
Correction verification module is used for obtaining user input equipment code data and is dealt into removable storage device, and portable storage sets
It is ready for use on after getting finger print data and device password data, and is compared with the data in removable storage device, if
All pass through then to enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Movable type is deposited
Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization are completed
Afterwards, data memory module is enabled;Removable storage device has username and password information, enables data memory module;
Data memory module is used for sending file reading instruction;Removable storage device is used for receiving file reading instruction
Afterwards, username and password is encrypted using the first encryption rule, file is read by instruction, sequence by near-field communication module
Number and encryption after username and password be sent to mobile phone;Mobile phone is used for after mobile phone radio frequency module transmits Sequence Number, encrypts
User name, password and file read instruction and arrive server;Server is used for obtaining the first decryption rule decryption according to sequence number
Username and password after being verified, is encrypted using the second encryption rule to the fileinfo for reading, and returns encryption
Fileinfo afterwards is to mobile phone;Mobile phone is used for the information after near-field communication module sends encryption to removable storage device,
Removable storage device is used for being decrypted fileinfo and being sent to computer, and computer is used for showing the fileinfo for reading;
After data memory module is additionally operable to detect files passe operation, the fileinfo for uploading is sent to portable storage
Equipment;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption
Rule is encrypted to username and password, the username and password, file by near-field communication module by sequence number, after encrypting
Information is sent to mobile phone;Mobile phone is used for the user name after mobile phone radio frequency module transmits Sequence Number, encrypts, password and file letter
Cease server;After server is used for decrypting and verifying that username and password passes through, decryption obtains random number and fileinfo, deposits
Storage fileinfo is under the corresponding file of user name.
Further, fingerprint and device password initialization module are used for sending acquisition fingerprint prompting, wait fingerprint module to obtain
Finger print data is got, and acquisition device password prompting is sent after getting finger print data, waits the keyboard of computer to get equipment close
After code data, storage finger print data and device password data are in removable storage device, and enable correction verification module.
Further, user name crypto module carry out username and password initialized when, user name crypto module use
User input username and password is pointed out in pop-up dialogue box, after computer gets user name password, by near-field communication module
User name, password and finger print data are sent to mobile phone, and mobile phone is used for user name, close being sent by the mobile phone radio frequency module of mobile phone
, to server, whether server is used for detecting user name, password and finger print data by checking, and will verify for code and finger print data
As a result mobile phone is dealt into, and mobile phone is used for being forwarded to computer by near-field communication module, and it is right after the result is received that computer is used for
As a result judged, judged result is by then user name password storage in removable storage device, and enables data
Memory module, the judged result username and password mistake which is not input into by then prompting user, does not enable data memory module.
Although being described to the various embodiments described above, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, equivalent structure that every utilization description of the invention and accompanying drawing content made are limited
Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, it is included in the patent of the present invention in the same manner
Within protection domain.
Claims (3)
1. a kind of improve security server data storage system, it is characterised in that include mobile phone, server, computer and
Removable storage device, mobile phone include mobile phone radio frequency module and the first near-field communication module, and removable storage device includes
USB interface, the second near-field communication module and fingerprint module, computer include fingerprint and device password initialization module, correction verification module,
User name crypto module and data memory module, removable storage device be stored with sequence number and related to sequence number first plus
Close rule and the second decryption rule related to sequence number, server storage have the first decryption rule corresponding with the first encryption rule
Then, server storage has the second encryption rule corresponding with the second decryption rule, the first encryption rule and the second encryption rule not
With wherein:
Computer is used for detecting whether removable storage device inserts the USB interface of computer, to detect and judge that movable type is deposited after inserting
Whether storage equipment is stored with finger print data;If not storing finger print data, fingerprint and device password initialization module is enabled,
Fingerprint and device password initialization module are used for initializing fingerprint and device password and enabling correction verification module after initialization;If
Be stored with finger print data, then directly enable correction verification module;
Correction verification module is used for obtaining user input equipment code data and is dealt into removable storage device, and removable storage device is used
After finger print data and device password data is got, and it is compared with the data in removable storage device, if all led to
Cross then enable user name crypto module, otherwise user name crypto module;
User name crypto module is used for judging whether removable storage device has username and password information;Portable storage sets
Standby do not have username and password information, carries out username and password initialization, after the completion for the treatment of user name and cryptographic initialization, makes
Can data memory module;Removable storage device has username and password information, enables data memory module;
Data memory module is used for sending file reading instruction;After removable storage device is used for receiving file reading instruction,
Username and password is encrypted using the first encryption rule, file is read by instruction, sequence number by near-field communication module
Mobile phone is sent to the username and password after encryption;Mobile phone is used for after mobile phone radio frequency module transmits Sequence Number, encrypts
User name, password and file read instruction and arrive server;Server is used for obtaining the first decryption rule decryption use according to sequence number
Name in an account book and password after being verified, are encrypted using the second encryption rule to the fileinfo for reading, and after returning encryption
Fileinfo to mobile phone;Mobile phone is used for the information after near-field communication module sends encryption to removable storage device, moves
Dynamic formula storage device is used for being decrypted fileinfo and being sent to computer, and computer is used for showing the fileinfo for reading;
After data memory module is additionally operable to detect files passe operation, sends the fileinfo for uploading and set to portable storage
Standby;Removable storage device is used for generating random number, and random number and fileinfo are encrypted, and using the first encryption rule
Then username and password is encrypted, the username and password after sequence number, encryption, file is believed by near-field communication module
Breath is sent to mobile phone;Mobile phone is used for the user name after mobile phone radio frequency module transmits Sequence Number, encrypts, password and fileinfo
Arrive server;After server is used for decrypting and verifying that username and password passes through, decryption obtains random number and fileinfo, storage
Fileinfo is under the corresponding file of user name.
2. according to claim 1 a kind of improve security server data storage system, it is characterised in that:Fingerprint and
Device password initialization module is used for sending acquisition fingerprint prompting, waits fingerprint module to get finger print data, gets fingerprint
Send after data acquisition device password prompting, wait computer keyboard get device password data after, storage finger print data and
Device password data are in removable storage device, and enable correction verification module.
3. according to claim 1 a kind of improve security server data storage system, it is characterised in that:User name
Crypto module carry out username and password initialized when, user name crypto module be used for pop-up dialogue box point out user input
User name, password and finger print data, after computer gets user name password, are sent out by username and password by near-field communication module
Mobile phone is sent to, and mobile phone is used for user name, password and finger print data being sent to server, service by the mobile phone radio frequency module of mobile phone
Whether device is used for detecting user name, password and finger print data by checking, and the result is dealt into mobile phone, and mobile phone is used for passing through
Near-field communication module is forwarded to computer, and computer is used for after the result is received judging result that judged result to be logical
Cross then user name password storage in removable storage device, and enable data memory module, judged result is by then
Point out user the username and password mistake which is input into, do not enable data memory module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610968413.8A CN106503531A (en) | 2016-10-28 | 2016-10-28 | A kind of server data storage system for improving security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610968413.8A CN106503531A (en) | 2016-10-28 | 2016-10-28 | A kind of server data storage system for improving security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106503531A true CN106503531A (en) | 2017-03-15 |
Family
ID=58321903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610968413.8A Withdrawn CN106503531A (en) | 2016-10-28 | 2016-10-28 | A kind of server data storage system for improving security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503531A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395561A (en) * | 2020-11-25 | 2021-02-23 | 航天信息股份有限公司 | Database fingerprint generation and verification method and device, storage medium and equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
-
2016
- 2016-10-28 CN CN201610968413.8A patent/CN106503531A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112395561A (en) * | 2020-11-25 | 2021-02-23 | 航天信息股份有限公司 | Database fingerprint generation and verification method and device, storage medium and equipment |
CN112395561B (en) * | 2020-11-25 | 2023-12-26 | 航天信息股份有限公司 | Database fingerprint generation and verification method, device, storage medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101272237B (en) | Method and system for automatically generating and filling login information | |
CN104363250B (en) | A kind of method and system for equipment connection | |
CN102223364B (en) | Method and system for accessing e-book data | |
CN104731612B (en) | Mobile equipment safety component software is tied to SIM | |
CN102685110B (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN104662870A (en) | Data security management system | |
CN102685093A (en) | Mobile-terminal-based identity authentication system and method | |
CN103188221A (en) | Application login method, application login device and mobile terminal | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
US20150208238A1 (en) | Terminal identity verification and service authentication method, system and terminal | |
Hufstetler et al. | Nfc unlock: Secure two-factor computer authentication using nfc | |
WO2005064430A1 (en) | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |
CN101916350A (en) | Method and system for protecting terminal reading contents | |
CN106503529A (en) | A kind of cloud storage system based on fingerprint | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN103428176A (en) | Mobile user accessing mobile Internet application method and system and application server | |
CN104901967A (en) | Registration method for trusted device | |
CN201717885U (en) | Code providing equipment and code identification system | |
CN106570416A (en) | Fingerprint-based cloud storage method | |
CN106485128A (en) | A kind of system based on removable storage device fingerprint | |
CN106570417A (en) | Data security storage method | |
CN106506635A (en) | A kind of portable method for cloud storage | |
CN117494151A (en) | Improved memory system | |
JP2004295761A (en) | Terminal device and information processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information |
Address after: Minhou County of Fuzhou City, Fujian province 350100 Hou Guan Lu No. 98 building 10 102 Spring Garden Applicant after: Yan Bizhu Address before: Gulou District of Fuzhou City, Fujian province 350001 Yangqiao road Fuk Lantau garden 5 building 301 Applicant before: Yan Bizhu |
|
CB02 | Change of applicant information | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170315 |
|
WW01 | Invention patent application withdrawn after publication |