CN106506635A - A kind of portable method for cloud storage - Google Patents
A kind of portable method for cloud storage Download PDFInfo
- Publication number
- CN106506635A CN106506635A CN201610964951.XA CN201610964951A CN106506635A CN 106506635 A CN106506635 A CN 106506635A CN 201610964951 A CN201610964951 A CN 201610964951A CN 106506635 A CN106506635 A CN 106506635A
- Authority
- CN
- China
- Prior art keywords
- password
- storage device
- computer
- removable storage
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
- G06F21/43—User authentication using separate channels for security data wireless channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention discloses a kind of method for cloud storage of movable type, it is applied on mobile phone, server, computer and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, removable storage device includes the second near-field communication module and includes the second near-field communication module, comprises the steps:Whether computer detection removable storage device inserts USB interface, judges whether removable storage device is stored with finger print data after detecting insertion;If not storing finger print data, fingerprint and device password initialization step is entered, step to be initiated completes laggard checking procedure.Prior art is different from, above-mentioned technical proposal can realize safe file storage.
Description
Technical field
A kind of the present invention relates to areas of information technology, more particularly to portable method for cloud storage.
Background technology
Existing data storage method has various ways, but all there is information leakage.Such as using movement
The storage device of formula, directly stores data on movable storage device, then there is a problem that storage device is lost, after loss
Will result in the leakage of information.Or the mode using the network storage, network storage needs are on computers every time using user
Name password login, is so easy to software or camera records user name password, causes user name password to reveal, so as to make
Into leaking data.I.e. existing data storage method is still very dangerous.Existing cell-phone function is relatively more, and
Staff one, if the repeatability input of module as far as possible using the functional module on mobile phone, can be reduced, reduce user into
This.
Content of the invention
For this reason, it may be necessary to provide a kind of method for cloud storage of movable type, solve available data and store unsafe problem.
For achieving the above object, a kind of method for cloud storage of movable type is inventor provided, mobile phone, service is applied to
On device, computer and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module,
Removable storage device includes the second near-field communication module and includes the second near-field communication module, comprises the steps:
Whether computer detection removable storage device inserts USB interface, judges removable storage device after detecting insertion
Whether be stored with finger print data;
If not storing finger print data, fingerprint and device password initialization step is entered, after the completion of step to be initiated
Enter checking procedure;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input equipment code data and is dealt into portable storage and sets
Standby, mobile phone obtains finger print data by fingerprint module and is dealt into removable storage device by the first near-field communication module, mobile
After formula storage device gets finger print data and device password data, and it is compared with the data in removable storage device,
Continue below step if all passing through, otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, enters username and password initialization step, stand-by
After the completion of name in an account book and cryptographic initialization step, data storing steps are entered;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer detection sends, to after files passe operation, the fileinfo for uploading
Arrive removable storage device, removable storage device obtain computer time, and the time to computer and fileinfo carry out plus
Close, and username and password is encrypted, the username and password, fileinfo after near-field communication module is by encryption is sent out
Mobile phone is given, user name of the mobile phone after mobile phone radio frequency module sends encryption, password and fileinfo are to server, server
Record user name, password and fileinfo start the time for receiving, after server is decrypted and verifies that username and password passes through, solution
The close time for obtaining computer and fileinfo, were preset less than one with the time difference for starting to receive of record when the time of computer
During value, under storage file information to the corresponding file of user name, storage file information is otherwise abandoned.
Further, the fingerprint and device password initialization step include:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, sends after getting finger print data
Device password prompting is obtained, after waiting the keyboard of computer to get device password data, finger print data and device password number is stored
According to in removable storage device, and enter checking procedure.
Further, username and password initialization step comprises the steps:Prompting user is defeated for computer pop-up dialogue box
Access customer name and password, after computer gets user name password, by near-field communication module by user name, password and finger print data
Mobile phone is sent to, then server, server detection user name, password and finger print data are sent to by the mobile phone radio frequency module of mobile phone
Whether by checking, and the result is dealt into mobile phone, mobile phone is forwarded to computer by near-field communication module, and computer is being received
Result is judged after the result, judged result is by then user name password storage to removable storage device
In, and data storing steps are entered, and the judged result username and password mistake which is not input into by then prompting user, this method
Terminate.
Prior art is different from, above-mentioned technical proposal 1. is associated with username and password by fingerprint, and user is not required to
User name password to be input again, it is to avoid the problem that user name password is revealed.2. pass through username and password in server
Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data is caused repeats and occurs
The problem of information leakage.3. computer and server communicate away be mobile phone radio frequency passage, reduce network monitored can
Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, while fileinfo and user name password
In the case of being all encryption.5. using the cipher mode of the time of computer so that the file after encryption has more confusion, it is to avoid
Packet be trapped after decrypted problem, also avoid packet from being repeated to be submitted to server by disabled user and cause server to deposit
The situation that stores up a large amount of same files and affect user normally to use.6th, the fingerprint module using mobile phone also reduces portable storage
The cost of equipment.
Description of the drawings
Flow charts of the Fig. 1 for the inventive method;
Structure charts of the Fig. 2 for present system.
Specific embodiment
By describing the technology contents of technical scheme, structural feature in detail, realizing purpose and effect, below in conjunction with concrete reality
Apply example and coordinate accompanying drawing to be explained in detail.
Fig. 1 to Fig. 2 is referred to, the present embodiment provides a kind of portable method for cloud storage, is applied to mobile phone 205, clothes
On business device 207, computer 201 and removable storage device 203, specifically, can apply to above the system 200 such as Fig. 2.Mobile phone
Mobile phone radio frequency module, fingerprint module and the first near-field communication module is included, mobile phone can be with base station by mobile phone radio frequency module
It is attached, such that it is able to surfing the Net and being connected with server.Removable storage device includes the second near-field communication module and includes
There is the second near-field communication module, specifically, removable storage device also includes that processing module and memory module, processing module are distinguished
Be connected with fingerprint module, memory module, the second near-field communication module and USB interface, removable storage device by USB interface with
Computer connects, and processing module can be to realizing that the hardware to memory module data is encrypted, it is to avoid directly reads memory module
Data.Removable storage device only has the second near-field communication module, memory module and processing module, and cost can be very low, head
Can be made thin little, without the need for power supply, its power supply has USB interface to power, and can carry with, easy to carry.
This method comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102
Judge after detecting insertion whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry
Instruction is asked to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then
By result feedback to the computer, it is to avoid computer directly reads the finger print data and causes the problem that data may reveal.
If not storing finger print data, S103 fingerprints and device password initialization step is entered, step to be initiated is complete
Into laggard checking procedure S104;If being stored with finger print data, checking procedure S104 is directly entered.Fingerprint and device password are all
It is used to the necessary condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password
It is placed in the memory module of removable storage device.
When having fingerprint inside memory module, need to use removable storage device, then will be verified.Verification step
Suddenly comprise the steps:S104 computers obtain user input equipment code data and are dealt into removable storage device, and mobile phone passes through
Fingerprint module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is obtained
After getting finger print data and device password data, and it is compared with the data in removable storage device, i.e. step S105, such as
Fruit all passes through then to continue below step.Otherwise enter step S106 this method to terminate.Here checking will be carried out after receiving simultaneously
Checking, rather than verified one by one, it thus is avoided that disabled user is cracked one by one.As long as checking has one simultaneously
Mistake be exactly not all right, and disabled user do not know that error, increased and crack difficulty, simultaneously because verification process is being moved
Carry out inside formula storage device, this equipment does not have autgmentability, and for computer, this equipment is difficult to invade and breaks
Solution.
It is verified, represents user and there is the right for using the removable storage device, then enters step S107,
Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence
Disconnected, it is could to be interacted with people due to computer, but computer is only to obtain a result, the process of judgement also needs to moving
In dynamic formula storage device.
Removable storage device does not have username and password information, enters step S108 username and password initialization step
Suddenly, after the completion for the treatment of user name and cryptographic initialization step, data storing steps S109 and S110 are entered;Removable storage device is deposited
There are user name and encrypted message, be directly put into data storing steps S109 and step S110.Username and password is logged on
The key of server, because user name password can be unique, but finger print data is according to the difference of sampled point, it is likely that no
It is unique.If sampled point is little, then the finger print data of different fingerprints is possible to occur identical.If adopting fingerprint number
According to directly logging in, then when user's radix is very big, it is likely that have one or two finger print data be the same, so
Data obfuscation can be caused.This is absolutely not allowed in data security arts.After user name cryptographic initialization, portable storage
Just be stored with equipment username and password.But during use below, avoid the need for inputing again user name and
Password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file and uploading files to server
Step.Before upload should first reading service device file file directory, so under the catalogue that specifies, i.e., file can be stored
The fileinfo of the application can be file directory information, it is also possible to be directly file, be so equal to and download from a server text
Part.Wherein, include the step of reading service device file:Computer sends file and reads instruction, and removable storage device receives text
After part reads instruction, username and password is encrypted, after file to be read near-field communication module instruction and encryption
Username and password is sent to mobile phone, and user name of the mobile phone after mobile phone radio frequency module sends encryption, password and file read
Server is instructed, after server authentication passes through, the fileinfo for reading is encrypted, and is returned the fileinfo after encryption
Mobile phone is arrived, information of the mobile phone after near-field communication module sends encryption is to removable storage device, removable storage device pair
Fileinfo is decrypted and is sent to computer, and computer shows the fileinfo for reading.
Here default first encryption rule can be adopted to the encryption of username and password, this first encryption rule can
To be stored in removable storage device, then corresponding first decryption rule storage is on the server.The file of server
The encryption of information can adopt the second encryption rule, and then corresponding second decryption is stored in removable storage device can be right
Fileinfo is decrypted.Be these information be not in plain text transmission, thus considerably increase security.
The step of uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection
The file for surveying user drags to upload frame operation, detects the fileinfo of the file that user drags, as the fileinfo for uploading.
Then computer sends the fileinfo for uploading and arrives removable storage device, the time of removable storage device acquisition computer, and right
The time of computer and fileinfo are encrypted.The encryption of file can be adopted and the encryption rule of user name password identical first
Then, and to username and password it is encrypted.Username and password after the second near-field communication module is by encryption, file letter
Breath is sent to mobile phone, and user name of the mobile phone after mobile phone radio frequency module sends encryption, password and fileinfo are to server, clothes
Business device record user name, password and fileinfo start the time for receiving, and server is decrypted and verifies that username and password passes through
Afterwards, decryption obtains time and the fileinfo of computer, is less than one when the time of computer with the time difference for starting to receive of record
During individual preset value, under storage file information to the corresponding file of user name, storage file information is otherwise abandoned.
Here the transmission of data is carried out using the time of computer, the fileinfo that can be allowed after encrypting is more chaotic, because
For computer time with the difference of uplink time, be different, and be to change always.Accordingly even when being identical
File, the data after which is encrypted are also different, it is to avoid disabled user is by file constantly using variable quantity very little come anti-
To encryption rule is decrypted, increase and crack difficulty, it is ensured that security.Server was judged to this time simultaneously, can be kept away
Exempt from after disabled user is truncated to packet, to submit a large amount of identical packets to, can so cause on server, to store substantial amounts of repetition
File, it is easy to have influence on the normal use of user, so as to avoid disabled user from constituting a threat to the normal operation of server.
Simultaneously because the passage of this programme data transfer is not through computer, so, computer need not be networked, in the computer of some concerning security matters
On, just there is no the possibility for being cracked and shooting, it is ensured that the safety of computer data.By mobile phone radio frequency module directly and base station
Connected, also there is no the possibility of monitoring.Mobile phone also without data storage, removable storage device also without data storage,
The two all lost, and also not result in the problem of loss of data.Even if removable storage device lost, without fingerprint and right
The device password that answers, also has no idea to use removable storage device.And even with removable storage device, and nothing
Method gets the username and password of inside, because username and password, removable storage device will be used to enter which
Row encryption.The user discover that removable storage device lost, it is only necessary to the password of user name is changed on server just,
Because crack removable storage device to need certainly a period of time, even and if cracked removable storage device, due to
Username and password cannot pass through checking, be also otiose.Information Security is so substantially increased, is lost without concern of data
The problem of mistake.
The change of password can also be like above step carry out, user first goes to buy a blank portable storage and sets
Standby, finger print data and device password is initialized then, then initialising subscriber name and password, then can be carried out more to password
Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device,
Removable storage device, will be taken after user name, password before server verification pass through to being sent to server after these encryptions
After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone
More new password.Certainly, in order to prevent Brute Force password, the intensity of password can be required, and such as want upper and lower case letter to add
Upper numeral, digit can be more than 10 etc..And if username and password checking is not by default number of times in one day,
Just no longer by the checking of the user name, it is to avoid Brute Force.
Specifically, the fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited
Storage equipment waits fingerprint module to get finger print data, and after getting finger print data, removable storage device informs computer, computer
Acquisition device password prompting is sent, after waiting the keyboard of computer to get device password data, computer sends device password to shifting
Dynamic formula storage device, such removable storage device just store finger print data and device password data in, and enter verification step
Suddenly.
User name cryptographic initialization is similar with line and device password initialization, username and password initialization step include as
Lower step:Computer pop-up dialogue box points out user input username and password, after computer gets user name password, by near field
User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone,
Whether server detection user name, password and finger print data are by checking, and the result is dealt into mobile phone, and mobile phone passes through near field
Communication module is forwarded to computer, and computer is judged to result after the result is received, judged result by then
User name password storage is in removable storage device, and enters data storing steps, and judged result is not by then pointing out user
Its username and password mistake being input into, this method terminate.
Further, data storing steps include following delete step:Computer detection is deleted after instruction to file, portable
After storage device receives file deletion instruction, username and password is encrypted, file is deleted by near-field communication module
Except the username and password after instruction and encryption is sent to mobile phone, user of the mobile phone after mobile phone radio frequency module sends encryption
Name, password and file are deleted instruction and arrive server, after server authentication passes through, delete file and delete the corresponding file of instruction.From
And the browsing and download of file are achieved, upload and delete.
Although being described to the various embodiments described above, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, equivalent structure that every utilization description of the invention and accompanying drawing content made are limited
Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, it is included in the patent of the present invention in the same manner
Within protection domain.
Claims (3)
1. a kind of portable method for cloud storage, is applied on mobile phone, server, computer and removable storage device, mobile phone
Mobile phone radio frequency module, fingerprint module and the first near-field communication module is included, removable storage device includes the second near field and leads to
Letter module includes the second near-field communication module, it is characterised in that comprise the steps:
Whether computer detection removable storage device inserts USB interface, whether judges removable storage device after detecting insertion
Be stored with finger print data;
If not storing finger print data, fingerprint and device password initialization step is entered, step to be initiated completes laggard school
Test step;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input equipment code data and is dealt into removable storage device, hand
Machine obtains finger print data by fingerprint module and is dealt into removable storage device by the first near-field communication module, portable storage
After equipment gets finger print data and device password data, and it is compared with the data in removable storage device, if all
By then continuing below step, otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, enters username and password initialization step, treats user name
After the completion of cryptographic initialization step, data storing steps are entered;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer detection sends the fileinfo for uploading to shifting to after files passe operation
Dynamic formula storage device, removable storage device obtain the time of computer, and the time and fileinfo to computer is encrypted, and
Username and password is encrypted, the username and password, fileinfo after near-field communication module is by encryption is sent to
Mobile phone, user name of the mobile phone after mobile phone radio frequency module sends encryption, password and fileinfo are to server, server record
User name, password and fileinfo start the time for receiving, and after server is decrypted and verifies that username and password passes through, decryption is obtained
The time of power taking brain and fileinfo, are less than a preset value when the time of computer with the time difference for starting to receive of record
When, under storage file information to the corresponding file of user name, otherwise abandon storage file information.
2. a kind of portable method for cloud storage according to claim 1, it is characterised in that:The fingerprint and equipment are close
Code initialization step includes:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, sends acquisition after getting finger print data
Device password is pointed out, and after waiting the keyboard of computer to get device password data, storage finger print data and device password data are arrived
In removable storage device, and enter checking procedure.
3. a kind of portable method for cloud storage according to claim 1, it is characterised in that:Username and password is initial
Change step to comprise the steps:Computer pop-up dialogue box points out user input username and password, and it is close that computer gets user name
After code, user name, password and finger print data are sent to by mobile phone, then the mobile phone radio frequency module by mobile phone by near-field communication module
Server is sent to, whether server detection user name, password and finger print data are by checking, and the result is dealt into hand
Machine, mobile phone are forwarded to computer by near-field communication module, and computer is judged to result after the result is received, and judge knot
Fruit is by then user name password storage in removable storage device, and enters data storing steps, and judged result does not have
The username and password mistake which is input into by then prompting user, this method terminate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610964951.XA CN106506635A (en) | 2016-10-28 | 2016-10-28 | A kind of portable method for cloud storage |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610964951.XA CN106506635A (en) | 2016-10-28 | 2016-10-28 | A kind of portable method for cloud storage |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106506635A true CN106506635A (en) | 2017-03-15 |
Family
ID=58322644
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610964951.XA Pending CN106506635A (en) | 2016-10-28 | 2016-10-28 | A kind of portable method for cloud storage |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106506635A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391043A (en) * | 2017-07-29 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of mobile memory system |
CN111385656A (en) * | 2020-03-04 | 2020-07-07 | 四川长虹电器股份有限公司 | Authority management and control method for program file imported by outdoor electronic advertising machine |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739659A (en) * | 2012-06-16 | 2012-10-17 | 华南师范大学 | Authentication method for preventing replay attack |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN104780158A (en) * | 2015-03-19 | 2015-07-15 | 赵姗姗 | A plug and play long-distance authorization and control system for terminal |
CN104834873A (en) * | 2015-04-03 | 2015-08-12 | 王爱华 | U disk for cloud data information encryption and decryption, and realization method |
US20160014605A1 (en) * | 2013-03-06 | 2016-01-14 | Assa Abloy Ab | Instant mobile device based capture and credentials issuance system |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
CN105871892A (en) * | 2016-05-17 | 2016-08-17 | 北京联合大学 | File cloud storage security solution method and system |
CN105956496A (en) * | 2016-06-21 | 2016-09-21 | 新昌县七星街道明盛模具厂 | Security and secrecy method for sharing storage files |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
-
2016
- 2016-10-28 CN CN201610964951.XA patent/CN106506635A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739659A (en) * | 2012-06-16 | 2012-10-17 | 华南师范大学 | Authentication method for preventing replay attack |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
US20160014605A1 (en) * | 2013-03-06 | 2016-01-14 | Assa Abloy Ab | Instant mobile device based capture and credentials issuance system |
CN104780158A (en) * | 2015-03-19 | 2015-07-15 | 赵姗姗 | A plug and play long-distance authorization and control system for terminal |
CN104834873A (en) * | 2015-04-03 | 2015-08-12 | 王爱华 | U disk for cloud data information encryption and decryption, and realization method |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105871892A (en) * | 2016-05-17 | 2016-08-17 | 北京联合大学 | File cloud storage security solution method and system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
CN105956496A (en) * | 2016-06-21 | 2016-09-21 | 新昌县七星街道明盛模具厂 | Security and secrecy method for sharing storage files |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391043A (en) * | 2017-07-29 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of mobile memory system |
CN111385656A (en) * | 2020-03-04 | 2020-07-07 | 四川长虹电器股份有限公司 | Authority management and control method for program file imported by outdoor electronic advertising machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9350548B2 (en) | Two factor authentication using a protected pin-like passcode | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN104363250B (en) | A kind of method and system for equipment connection | |
CN104731612B (en) | Mobile equipment safety component software is tied to SIM | |
US10491588B2 (en) | Local and remote access apparatus and system for password storage and management | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
US20070297610A1 (en) | Data protection for a mobile device | |
Arias-Cabarcos et al. | Comparing password management software: toward usable and secure enterprise authentication | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN103428176A (en) | Mobile user accessing mobile Internet application method and system and application server | |
CN106503529A (en) | A kind of cloud storage system based on fingerprint | |
CN106506635A (en) | A kind of portable method for cloud storage | |
KR101831381B1 (en) | Method of smart login using messenger service and device thereof | |
CN106570417A (en) | Data security storage method | |
CN107612691A (en) | Authentication information transmission method and device and user information authentication system | |
CN106570416A (en) | Fingerprint-based cloud storage method | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System | |
CN106485128A (en) | A kind of system based on removable storage device fingerprint | |
CN117494151A (en) | Improved memory system | |
CN104270342B (en) | The access method and system of virtual desktop | |
JP2011192129A (en) | Log-in authentication system using portable telephone terminal | |
EP2940618A1 (en) | Method, system, user equipment and program for authenticating a user | |
Lu | Keeping your API keys in a safe | |
CN106506148A (en) | A kind of date storage method based on mobile fingerprint | |
CN106570418A (en) | Method for improving data security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170315 |
|
WD01 | Invention patent application deemed withdrawn after publication |