CN106506148A - A kind of date storage method based on mobile fingerprint - Google Patents

A kind of date storage method based on mobile fingerprint Download PDF

Info

Publication number
CN106506148A
CN106506148A CN201610969119.9A CN201610969119A CN106506148A CN 106506148 A CN106506148 A CN 106506148A CN 201610969119 A CN201610969119 A CN 201610969119A CN 106506148 A CN106506148 A CN 106506148A
Authority
CN
China
Prior art keywords
password
storage device
removable storage
mobile phone
user name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610969119.9A
Other languages
Chinese (zh)
Inventor
郑建钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610969119.9A priority Critical patent/CN106506148A/en
Publication of CN106506148A publication Critical patent/CN106506148A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones

Abstract

The present invention discloses a kind of date storage method based on mobile fingerprint, it is applied on mobile phone, server, computer and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, removable storage device includes the second near-field communication module, comprises the steps:Whether computer detection removable storage device inserts USB interface, judges whether removable storage device is stored with finger print data after detecting insertion;If not storing finger print data, fingerprint and device password initialization step is entered, step to be initiated completes laggard checking procedure.Prior art is different from, above-mentioned technical proposal can improve the security of data storage, and be easy to the storage of data.

Description

A kind of date storage method based on mobile fingerprint
Technical field
A kind of the present invention relates to data security arts, more particularly to date storage method based on mobile fingerprint.
Background technology
Existing data storage method has various ways, but all there is information leakage.Such as using movement The storage device of formula, directly stores data on movable storage device, then there is a problem that storage device is lost, after loss Will result in the leakage of information.Or the mode using the network storage, network storage needs are on computers every time using user Name password login, is so easy to software or camera records user name password, causes user name password to reveal, so as to make Into leaking data.I.e. existing data storage method is still very dangerous.Existing cell-phone function is relatively more, and Staff one, if the repeatability input of module as far as possible using the functional module on mobile phone, can be reduced, reduce user into This.
Content of the invention
For this reason, it may be necessary to provide a kind of date storage method based on mobile fingerprint, available data storage is solved unsafe Problem.
For achieving the above object, inventor provide a kind of date storage method based on mobile fingerprint, be applied to mobile phone, On server, computer and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication mould Block, removable storage device include the second near-field communication module, comprise the steps:
Whether computer detection removable storage device inserts USB interface, judges removable storage device after detecting insertion Whether be stored with finger print data;
If not storing finger print data, fingerprint and device password initialization step is entered, after the completion of step to be initiated Enter checking procedure;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input equipment code data and is dealt into portable storage and sets Standby, mobile phone obtains finger print data by fingerprint module and is dealt into removable storage device by the first near-field communication module, mobile After formula storage device gets finger print data and device password data, and it is compared with the data in removable storage device, Continue below step if all passing through, otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, enters username and password initialization step, stand-by After the completion of name in an account book and cryptographic initialization step, server generate related to user name the first encryption rule, the second encryption rule, Corresponding with the first encryption rule first decrypts rule the second decryption rule corresponding with the second encryption rule, returns first and adds Close rule and the second decryption rule enter data storing steps to removable storage device;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer sends file and reads instruction, and removable storage device receives text Part read instruction after, password is encrypted using the first encryption rule, by near-field communication module by file read instruction and Password after user name and encryption is sent to mobile phone, mobile phone send user name, encrypt by mobile phone radio frequency module after password and File reads instruction and arrives server, and server obtains the first decryption rule decrypted user name and password according to user name and verifies logical Later, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, hand Machine sends the information after encrypting to removable storage device by near-field communication module, and removable storage device enters to fileinfo Row decryption is simultaneously sent to computer, and computer shows the fileinfo for reading;
Computer detection sends the fileinfo for uploading to removable storage device to after files passe operation, and movable type is deposited Storage equipment generates random number, and random number and fileinfo is encrypted using the first encryption rule, and using the first encryption Rule is encrypted to password, and the password after user name and encryption, fileinfo are sent to mobile phone by near-field communication module, Mobile phone sends user name by mobile phone radio frequency module, the password after encryption and fileinfo to server, server is decrypted and is tested After card username and password passes through, decryption obtains random number and fileinfo, and storage file information is to the corresponding file of user name Under folder.
Further, the fingerprint and device password initialization step include:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, sends after getting finger print data Device password prompting is obtained, after waiting the keyboard of computer to get device password data, finger print data and device password number is stored According to in removable storage device, and enter checking procedure.
Further, username and password initialization step comprises the steps:Prompting user is defeated for computer pop-up dialogue box Access customer name and password, after computer gets user name password, by near-field communication module by user name, password and finger print data Mobile phone is sent to, then server, server detection user name, password and finger print data are sent to by the mobile phone radio frequency module of mobile phone Whether by checking, server generate after being verified the first encryption rule related to user name, the second encryption rule and First encryption rule corresponding first decryption rule corresponding with the second encryption rule second decryption rule, and by the result, First encryption rule and the second decryption rule are dealt into mobile phone, and mobile phone is forwarded to removable storage device by near-field communication module, Removable storage device stores the first encryption rule and the second decryption rule and the result is forwarded to computer, and computer is being received Result is judged to after the result, judged result is by then user name password storage to removable storage device In, and data storing steps are entered, and the judged result username and password mistake which is not input into by then prompting user, this method Terminate.
Further, data storing steps comprise the steps:
Computer detection is deleted after instruction to file, after removable storage device receives file deletion instruction, adopts first Encryption rule is encrypted to password, and the password after near-field communication module to be deleted instruction and user name and encryption by file is sent out Mobile phone is given, password and file of the mobile phone after mobile phone radio frequency module sends user name, encrypts delete instruction to server, clothes After business device obtains the first decryption rule decrypted user name and password and be verified according to user name, file deletion instruction is deleted right The file that answers.
Prior art is different from, above-mentioned technical proposal 1. is associated with username and password by fingerprint, and user is not required to User name password to be input again, it is to avoid the problem that user name password is revealed.2. pass through username and password in server Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data is caused repeats and occurs The problem of information leakage.3. computer and server communicate away be mobile phone radio frequency passage, reduce network monitored can Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, while fileinfo and user name password In the case of being all encryption.5. using the cipher mode of random number so that the file after encryption has more confusion, it is to avoid data Decrypted problem after coated intercepting and capturing.6th, the fingerprint module using mobile phone also reduces the cost of removable storage device.
Description of the drawings
Flow charts of the Fig. 1 for the inventive method;
Structure charts of the Fig. 2 for present system.
Specific embodiment
By describing the technology contents of technical scheme, structural feature in detail, realizing purpose and effect, below in conjunction with concrete reality Apply example and coordinate accompanying drawing to be explained in detail.
Fig. 1 to Fig. 2 is referred to, the present embodiment provides a kind of date storage method based on mobile fingerprint, is applied to mobile phone 205th, on server 207, computer 201 and removable storage device 203, specifically, can apply in the system 200 such as Fig. 2 Face.Mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, and mobile phone can be with by mobile phone radio frequency module It is attached with base station, such that it is able to surfing the Net and being connected with server.Removable storage device includes the second near-field communication mould Block, specifically, removable storage device also includes processing module and memory module, processing module respectively with memory module, second Near-field communication module and USB interface connection, removable storage device are connected with computer by USB interface, and processing module can be right Realize that the hardware to memory module data is encrypted, it is to avoid directly read the data of memory module.Removable storage device only has Second near-field communication module, memory module and processing module, cost can be very low, and head can be made thin little, without the need for power supply, its Power supply has USB interface to power, and can carry with, easy to carry.
This method comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102 Judge after detecting insertion whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry Instruction is asked to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then By result feedback to the computer, it is to avoid computer directly reads the finger print data and causes the problem that data may reveal.
If not storing finger print data, S103 fingerprints and device password initialization step is entered, step to be initiated is complete Into laggard checking procedure S104;If being stored with finger print data, checking procedure S104 is directly entered.Fingerprint and device password are all It is used to the necessary condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password It is placed in the memory module of removable storage device.
When having fingerprint inside memory module, need to use removable storage device, then will be verified.Verification step Suddenly comprise the steps:S104 computers obtain user input equipment code data and are dealt into removable storage device, and mobile phone passes through Fingerprint module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is obtained After getting finger print data and device password data, and it is compared with the data in removable storage device, i.e. step S105, such as Fruit all passes through then to continue below step.Otherwise enter step S106 this method to terminate.Here checking will be carried out after receiving simultaneously Checking, rather than verified one by one, it thus is avoided that disabled user is cracked one by one.As long as checking has one simultaneously Mistake be exactly not all right, and disabled user do not know that error, increased and crack difficulty, simultaneously because verification process is being moved Carry out inside formula storage device, this equipment does not have autgmentability, and for computer, this equipment is difficult to invade and breaks Solution.
It is verified, represents user and there is the right for using the removable storage device, then enters step S107, Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence Disconnected, it is could to be interacted with people due to computer, but computer is only to obtain a result, the process of judgement also needs to moving In dynamic formula storage device.
Removable storage device does not have username and password information, enters step S108 username and password initialization step Suddenly, after the completion for the treatment of user name and cryptographic initialization step, server generation the first encryption rule related to user name, second add Close rule corresponding with the first encryption rule first decrypts rule the second decryption rule corresponding with the second encryption rule, returns First encryption rule and the second decryption rule enter data storing steps S109 and S110 to removable storage device;Portable Storage device has username and password information, is directly put into data storing steps S109 and step S110.User name and close Code is logged on the key of server because user name password can be unique, but finger print data according to sampled point not With, it is likely that it is not unique.If sampled point is little, then the finger print data of different fingerprints is possible to occur identical.Such as Fruit is directly logged in using finger print data, then when user's radix is very big, it is likely that have one or two finger print data It is the same, can so causes data obfuscation.This is absolutely not allowed in data security arts.User name cryptographic initialization Afterwards, be just stored with removable storage device username and password.But during use below, avoid the need for again Input username and password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file and uploading files to server Step.Before upload should first reading service device file file directory, so under the catalogue that specifies, i.e., file can be stored The fileinfo of the application can be file directory information, it is also possible to be directly file, be so equal to and download from a server text Part.Wherein, include the step of reading service device file:Computer sends file and reads instruction, and removable storage device receives text Part read instruction after, password is encrypted using the first encryption rule, by near-field communication module by file read instruction and Password after user name and encryption is sent to mobile phone, mobile phone send user name, encrypt by mobile phone radio frequency module after password and File reads instruction and arrives server, and server obtains the first decryption rule decrypted user name and password according to user name and verifies logical Later, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, hand Machine sends the information after encrypting to removable storage device by near-field communication module, and removable storage device enters to fileinfo Row decryption is simultaneously sent to computer, and computer shows the fileinfo for reading.
Here the encryption to password is using random the first encryption rule related to user name for generating when initialized Then, this first encryption rule is stored in removable storage device, and is associated with user name, then corresponding first solution Close rule storage is on the server.The encryption of the fileinfo of server adopts the second encryption rule, equally and user name Association, then corresponding second decryption are stored in removable storage device and fileinfo can be decrypted.Movable type is deposited The data that storage equipment is gone out can be encrypted using the first encryption rule except user name, and the data that server is returned all may be used To be encrypted using the second encryption rule, i.e., these information are not transmission in plain text, thus considerably increase security. Simultaneously because being associated using user name, the user name of each removable storage device is different, even if user name is identical, by Different in being generated only when initialized at random, the removable storage device of such the past will fail, and so exist When removable storage device is lost, it is only necessary to be updated by a new removable storage device again.So i.e. Disabled user is made to have cracked the encryption and decryption rule of some removable storage device, also will not be to other removable storage devices Threat is produced, the Information Security between different removable storage devices is substantially increased.
The step of uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection The file for surveying user drags to upload frame operation, detects the fileinfo of the file that user drags, as the fileinfo for uploading. Then computer sends the fileinfo for uploading and arrives removable storage device, and removable storage device generation random number, and to random Number and fileinfo are encrypted.The encryption of file can be adopted and user name password the first encryption rule of identical, and adopt First encryption rule is encrypted to password.The password after user name and encryption, file are believed by the second near-field communication module Breath is sent to mobile phone, and password and fileinfo of the mobile phone after mobile phone radio frequency module sends user name, encrypts are to server, clothes After business device is decrypted and verifies that username and password passes through, decryption obtains random number and fileinfo, and storage file information is to user Under the corresponding file of name.
The transmission of data is carried out using random number here, and the fileinfo that can be allowed after encrypting is more chaotic, because with Machine number is unique, and is to change always.Accordingly even when being identical file, its data after encrypting is also different , it is to avoid disabled user reversely decrypting encryption rule, is increased and cracks difficulty by file constantly using variable quantity very little Degree, it is ensured that security.Simultaneously because the passage of this programme data transfer is not through computer, so, computer need not be networked, On the computer of some concerning security matters, just there is no the possibility for being cracked and shooting, it is ensured that the safety of computer data.By mobile phone radio frequency Module is directly connected with base station, the possibility that also there is no monitoring.Mobile phone is also without data storage, removable storage device Without data storage, the two all lost, and also not result in the problem of loss of data.Even if removable storage device is lost , without fingerprint and corresponding device password, also have no idea to use removable storage device.And even with movable type Storage device, and the username and password of inside cannot be got, because username and password will be used, portable storage Equipment will be encrypted to which.The user discover that removable storage device lost, it is only necessary to user is changed on server The password of name just because removable storage device will be cracked will need certainly for a period of time, even and if having cracked movement Formula storage device, as username and password cannot pass through checking, is also otiose.Data safety is so substantially increased Property, without the problem that concern of data is lost.
The change of password can also be like above step carry out, user first goes to buy a blank portable storage and sets Standby, finger print data and device password is initialized then, then initialising subscriber name and password, then can be carried out more to password Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device, Removable storage device, will be taken after user name, password before server verification pass through to being sent to server after these encryptions After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone More new password.Certainly, in order to prevent Brute Force password, the intensity of password can be required, and such as want upper and lower case letter to add Upper numeral, digit can be more than 10 etc..And if username and password checking is not by default number of times in one day, Just no longer by the checking of the user name, it is to avoid Brute Force.
Specifically, the fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited Storage equipment waits fingerprint module to get finger print data, and after getting finger print data, removable storage device informs computer, computer Acquisition device password prompting is sent, after waiting the keyboard of computer to get device password data, computer sends device password to shifting Dynamic formula storage device, such removable storage device just store finger print data and device password data in, and enter verification step Suddenly.
User name cryptographic initialization is similar with line and device password initialization, username and password initialization step include as Lower step:Computer pop-up dialogue box points out user input username and password, after computer gets user name password, by near field User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone, Whether, by checking, server is generated after being verified and user famous prime minister for server detection user name, password and finger print data The first encryption rule, the second encryption rule the first decryption rule corresponding with the first encryption rule and the second encryption rule for closing Corresponding second decryption rule, and the result, the first encryption rule and the second decryption rule are dealt into mobile phone, mobile phone is by near Field communication module is forwarded to removable storage device, and removable storage device stores the first encryption rule and the second decryption is regular simultaneously The result is forwarded to computer, computer judges to result that after the result is received judged result is by then User name password storage in removable storage device, and data storing steps are entered, judged result is not used by then prompting The username and password mistake of its input of family, this method terminate.
Further, data storing steps include following delete step:Computer detection is deleted after instruction to file, portable After storage device receives file deletion instruction, password is encrypted using the first encryption rule, by near-field communication module The password that file is deleted after instruction and user name and encryption is sent to mobile phone, mobile phone sends user by mobile phone radio frequency module Password and file after name, encryption is deleted instruction and arrives server, and server obtains the first decryption rule decryption according to user name and uses Name in an account book and password after being verified, delete file and delete the corresponding file of instruction.It is achieved thereby that the browsing and download of file, on Pass and delete.
Although being described to the various embodiments described above, those skilled in the art once know basic wound The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only, Not thereby the scope of patent protection of the present invention, equivalent structure that every utilization description of the invention and accompanying drawing content made are limited Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, it is included in the patent of the present invention in the same manner Within protection domain.

Claims (4)

1. a kind of date storage method based on mobile fingerprint, is applied to mobile phone, server, computer and removable storage device On, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, and removable storage device includes second Near-field communication module, it is characterised in that comprise the steps:
Whether computer detection removable storage device inserts USB interface, whether judges removable storage device after detecting insertion Be stored with finger print data;
If not storing finger print data, fingerprint and device password initialization step is entered, step to be initiated completes laggard school Test step;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input equipment code data and is dealt into removable storage device, hand Machine obtains finger print data by fingerprint module and is dealt into removable storage device by the first near-field communication module, portable storage After equipment gets finger print data and device password data, and it is compared with the data in removable storage device, if all By then continuing below step, otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, enters username and password initialization step, treats user name After the completion of cryptographic initialization step, server generates related to user name the first encryption rule, the second encryption rule and the The corresponding first decryption rule of one encryption rule the second decryption rule corresponding with the second encryption rule, returns the first encryption rule Then with the second decryption rule enters data storing steps to removable storage device;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer sends file and reads instruction, and removable storage device receives file reading After instruction fetch, password is encrypted using the first encryption rule, file is read by instruction and user by near-field communication module Password after name and encryption is sent to mobile phone, password and file of the mobile phone after mobile phone radio frequency module sends user name, encrypts Read instruction and arrive server, server obtains the first decryption rule decrypted user name and password according to user name and is verified Afterwards, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, mobile phone Information after encrypting is sent to removable storage device by near-field communication module, removable storage device is carried out to fileinfo Computer is decrypted and is sent to, computer shows the fileinfo for reading;
Computer detection sends the fileinfo for uploading to removable storage device to after files passe operation, and portable storage sets Standby generation random number, and random number and fileinfo are encrypted using the first encryption rule, and adopt the first encryption rule Password is encrypted, the password after user name and encryption, fileinfo are sent to by mobile phone, mobile phone by near-field communication module User name is sent by mobile phone radio frequency module, the password after encryption and fileinfo to server, server is decrypted and verifies use After name in an account book and password pass through, decryption obtains random number and fileinfo, under storage file information to the corresponding file of user name.
2. a kind of date storage method based on mobile fingerprint according to claim 1, it is characterised in that:The fingerprint and Device password initialization step includes:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, sends acquisition after getting finger print data Device password is pointed out, and after waiting the keyboard of computer to get device password data, storage finger print data and device password data are arrived In removable storage device, and enter checking procedure.
3. a kind of date storage method based on mobile fingerprint according to claim 1, it is characterised in that:User name and close Code initialization step comprises the steps:Computer pop-up dialogue box points out user input username and password, computer to get use After name in an account book password, user name, password and finger print data are sent to by mobile phone by near-field communication module, then are penetrated by the mobile phone of mobile phone Frequency module is sent to server, and whether, by checking, server is logical in checking for server detection user name, password and finger print data The first decryption corresponding with the first encryption rule of the first encryption rule related to user name, the second encryption rule is generated later Rule the second decryption rule corresponding with the second encryption rule, and will be regular to the result, the first encryption rule and the second decryption Mobile phone is dealt into, mobile phone is forwarded to removable storage device by near-field communication module, and removable storage device storage first is encrypted Rule and second is decrypted rule and the result is forwarded to computer, and computer is sentenced to result after the result is received Disconnected, judged result is by then user name password storage in removable storage device, and enters data storing steps, sentences The disconnected result username and password mistake which is not input into by then prompting user, this method terminate.
4. a kind of date storage method based on mobile fingerprint according to claim 1, it is characterised in that:Data storage is walked Suddenly comprise the steps:
Computer detection is deleted after instruction to file, after removable storage device receives file deletion instruction, using the first encryption Rule is encrypted to password, and the password after near-field communication module to be deleted instruction and user name and encryption by file is sent to Mobile phone, password and file of the mobile phone after mobile phone radio frequency module sends user name, encrypts are deleted instruction and arrive server, server After the first decryption rule decrypted user name and password being obtained and be verified according to user name, delete file deletion instruction corresponding File.
CN201610969119.9A 2016-10-28 2016-10-28 A kind of date storage method based on mobile fingerprint Pending CN106506148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610969119.9A CN106506148A (en) 2016-10-28 2016-10-28 A kind of date storage method based on mobile fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610969119.9A CN106506148A (en) 2016-10-28 2016-10-28 A kind of date storage method based on mobile fingerprint

Publications (1)

Publication Number Publication Date
CN106506148A true CN106506148A (en) 2017-03-15

Family

ID=58322805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610969119.9A Pending CN106506148A (en) 2016-10-28 2016-10-28 A kind of date storage method based on mobile fingerprint

Country Status (1)

Country Link
CN (1) CN106506148A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112601219A (en) * 2021-03-03 2021-04-02 四川微巨芯科技有限公司 Data encryption and decryption method and system, server, storage device and mobile device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010677A (en) * 2004-09-06 2007-08-01 皇家飞利浦电子股份有限公司 Portable storage device and method for exchanging data
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
KR20150050280A (en) * 2013-10-30 2015-05-08 크루셜텍 (주) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN104834873A (en) * 2015-04-03 2015-08-12 王爱华 U disk for cloud data information encryption and decryption, and realization method
CN205104233U (en) * 2015-10-09 2016-03-23 北京智博联科技股份有限公司 USB removes magnetic disc with bluetooth transmit system
KR20160065716A (en) * 2014-12-01 2016-06-09 삼성전자주식회사 Method of data transfer in electronic device
CN105847305A (en) * 2016-06-21 2016-08-10 新昌县七星街道明盛模具厂 Safe processing and accessing method of cloud resource
CN106022157A (en) * 2015-05-04 2016-10-12 深圳市魔力信息技术有限公司 Cloud and local secure storage method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010677A (en) * 2004-09-06 2007-08-01 皇家飞利浦电子股份有限公司 Portable storage device and method for exchanging data
KR20150050280A (en) * 2013-10-30 2015-05-08 크루셜텍 (주) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
KR20160065716A (en) * 2014-12-01 2016-06-09 삼성전자주식회사 Method of data transfer in electronic device
CN104834873A (en) * 2015-04-03 2015-08-12 王爱华 U disk for cloud data information encryption and decryption, and realization method
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN106022157A (en) * 2015-05-04 2016-10-12 深圳市魔力信息技术有限公司 Cloud and local secure storage method and device
CN205104233U (en) * 2015-10-09 2016-03-23 北京智博联科技股份有限公司 USB removes magnetic disc with bluetooth transmit system
CN105847305A (en) * 2016-06-21 2016-08-10 新昌县七星街道明盛模具厂 Safe processing and accessing method of cloud resource

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112601219A (en) * 2021-03-03 2021-04-02 四川微巨芯科技有限公司 Data encryption and decryption method and system, server, storage device and mobile device

Similar Documents

Publication Publication Date Title
Bojinov et al. Kamouflage: Loss-resistant password management
CN107302539B (en) Electronic identity registration and authentication login method and system
CN102223364B (en) Method and system for accessing e-book data
CN101272237B (en) Method and system for automatically generating and filling login information
CN104731612B (en) Mobile equipment safety component software is tied to SIM
CN106304074B (en) Auth method and system towards mobile subscriber
CN102685110B (en) Universal method and system for user registration authentication based on fingerprint characteristics
CN102685093A (en) Mobile-terminal-based identity authentication system and method
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN101621794A (en) Method for realizing safe authentication of wireless application service system
Al Maqbali et al. AutoPass: An automatic password generator
CN109740319B (en) Digital identity verification method and server
CN106503529A (en) A kind of cloud storage system based on fingerprint
CN110022207B (en) Method, apparatus, device and computer readable medium for key management and data processing
CN108701200B (en) Improved memory system
CN106570416A (en) Fingerprint-based cloud storage method
CN106570417A (en) Data security storage method
CN106485128A (en) A kind of system based on removable storage device fingerprint
CN106506635A (en) A kind of portable method for cloud storage
CN106506148A (en) A kind of date storage method based on mobile fingerprint
CN202495964U (en) Identity authentication system based on mobile terminal
JP2004295761A (en) Terminal device and information processor
CN106503531A (en) A kind of server data storage system for improving security
CN106570418A (en) Method for improving data security

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170315

WD01 Invention patent application deemed withdrawn after publication