CN106570415A - Remote end data storage system - Google Patents

Remote end data storage system Download PDF

Info

Publication number
CN106570415A
CN106570415A CN201610964953.9A CN201610964953A CN106570415A CN 106570415 A CN106570415 A CN 106570415A CN 201610964953 A CN201610964953 A CN 201610964953A CN 106570415 A CN106570415 A CN 106570415A
Authority
CN
China
Prior art keywords
password
module
storage device
mobile phone
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610964953.9A
Other languages
Chinese (zh)
Inventor
郑建钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610964953.9A priority Critical patent/CN106570415A/en
Publication of CN106570415A publication Critical patent/CN106570415A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a remote end data storage system comprising a handset, a server, a computer and a removable storage device. The handset comprises a handset radio frequency module, a fingerprint module and a first near-field communication module; the removable storage device comprises an USB interface and a second near-field communication module; the computer comprises a fingerprint device password initialization module, a verification module, a username password module and a data storage module. The above technical scheme can realize safe file storage, which is different from the prior art.

Description

A kind of remote data storage system
Technical field
The present invention relates to areas of information technology, more particularly to a kind of remote data storage system.
Background technology
Existing data storage method has various ways, but all there is information leakage.Such as using movement The storage device of formula, directly stores data on movable storage device, then there is a problem that storage device is lost, after loss Will result in the leakage of information.Or using the mode of the network storage, the network storage needs to use user every time on computers Name password login, is so easy to software or photographic head records user name password, causes user name password to reveal, so as to make Into leaking data.I.e. existing data storage method is still very dangerous.Existing cell-phone function is relatively more, and Staff one, if as far as possible using the functional module on mobile phone the repeatability input of module can be reduced, reduce user into This.
The content of the invention
For this reason, it may be necessary to provide a kind of remote data storage system, solve available data and store unsafe problem.
For achieving the above object, a kind of remote data storage system is inventor provided, mobile phone, server, electricity is included Brain and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, and movable type is deposited Storage equipment includes USB interface and the second near-field communication module, and computer includes fingerprint equipment cryptographic initialization module, calibration mode Block, user name crypto module and data memory module, wherein:
Computer is used to detect whether removable storage device inserts the USB interface of computer, detects and judge after insertion movement Whether formula storage device is stored with finger print data;If not storing finger print data, fingerprint equipment cryptographic initialization mould is enabled Block, fingerprint equipment cryptographic initialization module is used to initialize fingerprint and device password and enable correction verification module after initialization;Such as Really be stored with finger print data, then directly enable correction verification module;
Correction verification module is used to obtain user input device code data and is dealt into removable storage device, and mobile phone is used to pass through Fingerprint module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is used In getting after finger print data and device password data, and it is compared with the data in removable storage device, if all led to Cross then enable user name crypto module, otherwise user name crypto module;
User name crypto module is used to judge whether removable storage device has username and password information;Movable type is deposited Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization are completed Afterwards, data memory module is enabled;Removable storage device has username and password information, enables data memory module;
Data memory module is used to send file reading instruction;Removable storage device is used to receive file reading instruction Afterwards, username and password is encrypted, the user name and close after near-field communication module file to be read instruction and encrypted Code is sent to mobile phone;Mobile phone be used for by mobile phone radio frequency module send encryption after user name, password and file reading instruction to Server;After server is used to be verified, the fileinfo to reading is encrypted, and the fileinfo returned after encryption is arrived Mobile phone;Mobile phone is used to send the information after encryption to removable storage device, removable storage device by near-field communication module For being decrypted to fileinfo and it is sent to computer, computer is used to show the fileinfo for reading;
Data memory module is additionally operable to detect after files passe operation, sends the fileinfo for uploading to portable storage Equipment;Removable storage device is used to obtain time of computer, and the time and fileinfo to computer is encrypted, and to Name in an account book and password are encrypted, and the username and password after encryption, fileinfo are sent to into mobile phone by near-field communication module; Mobile phone is used to send the user name after encryption, password and fileinfo to server by mobile phone radio frequency module;Server is used for Record user name, password and fileinfo start the time for receiving, and server is used to decrypt and verify that username and password passes through Afterwards, decryption obtains time and the fileinfo of computer, and one is less than with the time difference for starting to receive of record when the time of computer During individual preset value, under storage file information to the corresponding file of user name, storage file information is otherwise abandoned.
Further, fingerprint equipment cryptographic initialization module is used to send acquisition fingerprint prompting, waits fingerprint module to obtain To finger print data, get and send after finger print data acquisition device password prompting, the keyboard for waiting computer gets device password After data, storage finger print data and device password data enable correction verification module in removable storage device.
Further, user name crypto module carry out username and password it is initialized when, user name crypto module use User input username and password, computer is pointed out to get after user name password, by near-field communication module in pop-up dialogue box User name, password and finger print data are sent to into mobile phone, mobile phone is used to send user name, close by the mobile phone radio frequency module of mobile phone , to server, whether server is used to detect user name, password and finger print data by checking, and will verify for code and finger print data As a result mobile phone is dealt into, mobile phone is used to be forwarded to computer by near-field communication module, and it is right after the result is received that computer is used for As a result judged, judged result enables data by then in user name password storage to removable storage device Memory module, judged result by then pointing out user the username and password mistake of its input, does not enable data memory module.
Prior art is different from, above-mentioned technical proposal 1. is associated by fingerprint with username and password, and user is not required to To input user name password again, it is to avoid the problem that user name password is revealed.2. by server by username and password Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data is caused repeats and occurs The problem of information leakage.3. what communication of the computer with server was walked is the passage of mobile phone radio frequency, reduce network it is monitored can Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, while fileinfo and user name password In the case of being all encryption.5. the cipher mode of the time of computer is used so that the file after encryption has more confusion, it is to avoid Packet problem decrypted after being trapped, also avoids packet from being submitted to server by disabled user's repetition and causes server to deposit The situation stored up a large amount of same files and affect user normally to use.6th, portable storage is also reduced using the fingerprint module of mobile phone The cost of equipment.
Description of the drawings
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is the structure chart of present system.
Specific embodiment
To describe the technology contents of technical scheme, structural features in detail, purpose and effect being realized, below in conjunction with concrete reality Apply example and coordinate accompanying drawing to be explained in detail.
Fig. 1 to Fig. 2 is referred to, the present embodiment provides a kind of remote data storage system, including mobile phone 205, server 207th, computer 201 and removable storage device 203, specifically, system architecture diagram can be such as the system 200 of Fig. 2.Mobile phone is included Mobile phone radio frequency module, fingerprint module and the first near-field communication module, mobile phone can be connected by mobile phone radio frequency module with base station Connect, be connected such that it is able to surf the Net and with server.Movable type storage includes the second near-field communication module, specifically, portable Storage device also includes processing module and memory module, processing module respectively with processing module respectively with memory module, second near Field communication module and USB interface connection, removable storage device is connected by USB interface with computer, and processing module can be to reality Now the hardware of memory module data is encrypted, it is to avoid directly read the data of memory module.Removable storage device only has Two near-field communication modules, memory module and processing module, cost can be very low, and head can be made thin little, without the need for power supply, its electricity Source has USB interface to power, and can carry with, easy to carry.The system is said below by the handling process of the system It is bright.
This flow process comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102 Detect and judge after insertion whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry Instruction is asked to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then By result feedback to the computer, it is to avoid computer directly reads the finger print data and causes the problem that data may reveal.
If not storing finger print data, into S103 fingerprints and device password initialization step, step to be initiated is complete Into laggard checking procedure S104;If being stored with finger print data, checking procedure S104 is directly entered.Fingerprint and device password are all It is used to the essential condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password In being placed into the memory module of removable storage device.
When there is fingerprint memory module the inside, need to use removable storage device, then to be verified.Verification step Suddenly comprise the steps:S104 computers obtain user input device code data and are dealt into removable storage device, and mobile phone passes through Fingerprint module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is obtained After getting finger print data and device password data, and it is compared with the data in removable storage device, i.e. step S105, such as Fruit is all by then continuing below step.Otherwise terminate into step S106 this method.Here checking is carried out to receive simultaneously after Checking, rather than verified one by one, it thus is avoided that disabled user is cracked one by one.As long as simultaneously checking has one Mistake is exactly not all right, and disabled user does not know that error, increased and cracks difficulty, simultaneously because proof procedure is being moved Carry out inside formula storage device, this equipment does not have autgmentability, and for computer, this equipment is difficult to invade and breaks Solution.
It is verified, represents user and there is the right for using the removable storage device, then into step S107, Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence It is disconnected, be because computer could be interacted with people, but computer only obtains a result, the process of judgement also needs to moving In dynamic formula storage device.
Removable storage device does not have username and password information, walks into the initialization of step S108 username and password Suddenly, after the completion for the treatment of user name and cryptographic initialization step, into data storing steps S109 and S110;Removable storage device is deposited There are user name and encrypted message, be directly put into data storing steps S109 and step S110.Username and password is logged on The key of server, because user name password can be unique, but finger print data is according to the difference of sampled point, it is likely that no It is unique.If sampled point is little, then it is identical that the finger print data of different fingerprints is possible to appearance.If using fingerprint number According to directly logging in, then when user radix is very big, it is likely that have one or two finger print data be it is the same, so Data obfuscation can be caused.This is absolutely not allowed in data security arts.After user name cryptographic initialization, movable type storage Just be stored with username and password in equipment.But during use below, avoid the need for inputing again user name and Password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file and uploading files to server Step.Before upload should first reading service device file file directory, so under the catalogue specified, i.e., file can be stored The fileinfo of the application can be file directory information, it is also possible to be directly file, be so equal to and download from a server text Part.Wherein, the step of reading service device file includes:Computer sends file and reads instruction, and removable storage device receives text Part is read after instruction, and username and password is encrypted, after near-field communication module file to be read instruction and encrypted Username and password is sent to mobile phone, and mobile phone is sent the user name after encryption, password and file by mobile phone radio frequency module and read After instructing server, server authentication to pass through, the fileinfo to reading is encrypted, and returns the fileinfo after encryption To mobile phone, information of the mobile phone after near-field communication module transmission encryption is to removable storage device, removable storage device pair Fileinfo is decrypted and is sent to computer, and computer shows the fileinfo for reading.
Here the encryption to username and password can adopt default first encryption rule, and this first encryption rule can To be stored in removable storage device, then corresponding first decryption rule storage is on the server.The file of server The encryption of information can adopt the second encryption rule, and then corresponding second decryption is stored in removable storage device and can be right Fileinfo is decrypted.I.e. these information are not transmission in plain text, thus considerably increase safety.
The step of uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection The file for surveying user drags to upload frame operation, the fileinfo of the file that user drags is detected, as the fileinfo for uploading. Then computer sends the fileinfo for uploading to removable storage device, the time of removable storage device acquisition computer, and right The time of computer and fileinfo are encrypted.The encryption of file can be adopted advises with the encryption of user name password identical first Then, and to username and password it is encrypted.The username and password after encryption, file are believed by the second near-field communication module Breath is sent to mobile phone, and mobile phone sends the user name after encryption, password and fileinfo by mobile phone radio frequency module to server, clothes Business device is used to record the time that user name, password and fileinfo start to receive, and username and password is decrypted and verified to server By rear, decryption obtains the time of computer and fileinfo, when the time of computer and the time difference for starting reception of record it is little When a preset value, under storage file information to the corresponding file of user name, storage file information is otherwise abandoned.
Here the transmission of data is carried out using the time of computer, the fileinfo that can be allowed after encrypting is more chaotic, because For computer time with the difference of uplink time, be different, and be to change always.Accordingly even when being identical File, the data after its encryption are also different, it is to avoid disabled user is by constantly using the file of variable quantity very little come anti- To encryption rule is decrypted, increase cracks difficulty, it is ensured that safety.While server was judged this time, can keep away Exempt from disabled user and be truncated to after packet to submit a large amount of identical packets to, so can cause to store substantial amounts of repetition on server File, it is easy to normally using for user is had influence on, so as to avoid normal operation of the disabled user to server from constituting a threat to. Simultaneously because the passage of this programme data transfer is not through computer, so, computer need not network, in the computer of some concerning security matters On, just there is no the possibility for being cracked and shooting, it is ensured that the safety of computer data.By mobile phone radio frequency module directly and base station Connected, also there is no the possibility of monitoring.Mobile phone does not have data storage yet, and removable storage device does not have data storage yet, The two all lost, and also not result in the problem of loss of data.Even if removable storage device lost, without fingerprint and right The device password answered, also has no idea to use removable storage device.And be also nothing even with removable storage device Method gets the username and password of inside, because to use username and password, removable storage device to enter to it Row encryption.User has found that removable storage device lost, it is only necessary to the password of user name is changed on server just, Because crack removable storage device to need certainly a period of time, even and if cracked removable storage device, due to Username and password cannot be also otiose by checking.Information Security is so substantially increased, is lost without concern of data The problem of mistake.
The change of password can also be like above step carry out, user first goes to buy the portable storage of a blank and sets It is standby, finger print data and device password are then initialized, then initialising subscriber name and password, then can be carried out more to password Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device, Removable storage device after the user name, password before server verification passes through, will take to being sent to server after these encryptions After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone More new password.Certainly, in order to prevent Brute Force password, what the intensity of password can be required, such as want upper and lower case letter to add Upper numeral, digit can be more than 10 etc..And if username and password checking is not by default number of times in one day, Just no longer by the checking of the user name, it is to avoid Brute Force.
Specifically, the fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited Storage equipment waits fingerprint module to get finger print data, gets removable storage device after finger print data and informs computer, computer Acquisition device password prompting is sent, the keyboard for waiting computer is got after device password data, and computer sends device password to shifting Dynamic formula storage device, such removable storage device just stores finger print data and device password data in, and enters verification step Suddenly.
User name cryptographic initialization is similar with stricture of vagina and device password initialization, username and password initialization step include as Lower step:Computer pop-up dialogue box points out user input username and password, computer to get after user name password, by near field User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone, Whether the result is dealt into mobile phone by checking by server detection user name, password and finger print data, and mobile phone passes through near field Communication module is forwarded to computer, and computer is judged result after the result is received, judged result by then User name password storage enters data storing steps in removable storage device, and judged result is not by then pointing out user The username and password mistake of its input, this method terminates.
Further, data storing steps include following delete step:Computer detection to file is deleted after instruction, portable Storage device receives file and deletes after instruction, and username and password is encrypted, and is deleted file by near-field communication module Except the username and password after instruction and encryption is sent to mobile phone, mobile phone sends the user after encryption by mobile phone radio frequency module Name, password and file delete instruction to server, after server authentication passes through, delete file and delete the corresponding file of instruction.From And the browsing and download of file are realized, upload and delete.
It is similar with said method embodiment, the invention provides a kind of remote data storage system, include mobile phone, Server, computer and removable storage device, mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication mould Block, removable storage device includes USB interface and the second near-field communication module, and computer includes fingerprint equipment cryptographic initialization mould Block, correction verification module, user name crypto module and data memory module, wherein:
Computer is used to detect whether removable storage device inserts the USB interface of computer, detects and judge after insertion movement Whether formula storage device is stored with finger print data;If not storing finger print data, fingerprint equipment cryptographic initialization mould is enabled Block, fingerprint equipment cryptographic initialization module is used to initialize fingerprint and device password and enable correction verification module after initialization;Such as Really be stored with finger print data, then directly enable correction verification module;
Correction verification module is used to obtain user input device code data and is dealt into removable storage device, and mobile phone is used to pass through Fingerprint module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is used In getting after finger print data and device password data, and it is compared with the data in removable storage device, if all led to Cross then enable user name crypto module, otherwise user name crypto module;
User name crypto module is used to judge whether removable storage device has username and password information;Movable type is deposited Storage equipment does not have username and password information, carries out username and password initialization, treats that user name and cryptographic initialization are completed Afterwards, data memory module is enabled;Removable storage device has username and password information, enables data memory module;
Data memory module is used to send file reading instruction;Removable storage device is used to receive file reading instruction Afterwards, username and password is encrypted, the user name and close after near-field communication module file to be read instruction and encrypted Code is sent to mobile phone;Mobile phone be used for by mobile phone radio frequency module send encryption after user name, password and file reading instruction to Server;After server is used to be verified, the fileinfo to reading is encrypted, and the fileinfo returned after encryption is arrived Mobile phone;Mobile phone is used to send the information after encryption to removable storage device, removable storage device by near-field communication module For being decrypted to fileinfo and it is sent to computer, computer is used to show the fileinfo for reading;
Data memory module is additionally operable to detect after files passe operation, sends the fileinfo for uploading to portable storage Equipment;Removable storage device is used to obtain time of computer, and the time and fileinfo to computer is encrypted, and to Name in an account book and password are encrypted, and the username and password after encryption, fileinfo are sent to into mobile phone by near-field communication module; Mobile phone is used to send the user name after encryption, password and fileinfo to server by mobile phone radio frequency module;Server is used for After decrypting and verifying that username and password passes through, decryption obtains the time of computer and fileinfo, when time and the record of computer Start receive time difference be less than a preset value when, under storage file information to the corresponding file of user name, otherwise Abandon storage file information.
Further, fingerprint equipment cryptographic initialization module is used to send acquisition fingerprint prompting, waits fingerprint module to obtain To finger print data, get and send after finger print data acquisition device password prompting, the keyboard for waiting computer gets device password After data, storage finger print data and device password data enable correction verification module in removable storage device.
Further, user name crypto module carry out username and password it is initialized when, user name crypto module use User input username and password, computer is pointed out to get after user name password, by near-field communication module in pop-up dialogue box User name, password and finger print data are sent to into mobile phone, mobile phone is used to send user name, close by the mobile phone radio frequency module of mobile phone , to server, whether server is used to detect user name, password and finger print data by checking, and will verify for code and finger print data As a result mobile phone is dealt into, mobile phone is used to be forwarded to computer by near-field communication module, and it is right after the result is received that computer is used for As a result judged, judged result enables data by then in user name password storage to removable storage device Memory module, judged result by then pointing out user the username and password mistake of its input, does not enable data memory module.
Although being described to the various embodiments described above, those skilled in the art once know basic wound The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only, Not thereby the scope of patent protection of the present invention, the equivalent structure that every utilization description of the invention and accompanying drawing content are made are limited Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, the patent of the present invention is included in the same manner Within protection domain.

Claims (3)

1. a kind of remote data storage system, it is characterised in that include mobile phone, server, computer and removable storage device, Mobile phone includes mobile phone radio frequency module, fingerprint module and the first near-field communication module, and removable storage device includes USB interface With the second near-field communication module, computer include fingerprint equipment cryptographic initialization module, correction verification module, user name crypto module sum According to memory module, wherein:
Computer is used to detect whether removable storage device inserts the USB interface of computer, to detect and judge that movable type is deposited after insertion Whether storage equipment is stored with finger print data;If not storing finger print data, fingerprint equipment cryptographic initialization module is enabled, referred to Stricture of vagina device password initialization module is used to initialize fingerprint and device password and enable correction verification module after initialization;If storage There is finger print data, then directly enable correction verification module;
Correction verification module is used to obtain user input device code data and is dealt into removable storage device, and mobile phone is used to pass through fingerprint Module obtains finger print data and is dealt into removable storage device by the first near-field communication module, and removable storage device is used to obtain After getting finger print data and device password data, and it is compared with the data in removable storage device, if all by if Enable user name crypto module, otherwise user name crypto module;
User name crypto module is used to judge whether removable storage device has username and password information;Movable type storage sets It is standby not have username and password information, username and password initialization is carried out, after the completion for the treatment of user name and cryptographic initialization, make Can data memory module;Removable storage device has username and password information, enables data memory module;
Data memory module is used to detect after files passe operation, sends the fileinfo for uploading to removable storage device; Removable storage device is used to obtain the time of computer, and the time and fileinfo to computer is encrypted, and to user name It is encrypted with password, the username and password after encryption, fileinfo is sent to by mobile phone by near-field communication module;Mobile phone For the user name after encryption, password and fileinfo to be sent by mobile phone radio frequency module to server;Server is used to record User name, password and fileinfo start the time for receiving, after server is used to decrypt and verify that username and password passes through, solution The close time for obtaining computer and fileinfo, preset with the time difference for starting to receive of record when the time of computer less than one During value, under storage file information to the corresponding file of user name, storage file information is otherwise abandoned.
2. a kind of remote data storage system according to claim 1, it is characterised in that:Fingerprint equipment cryptographic initialization mould Block is used to send acquisition fingerprint prompting, waits fingerprint module to get finger print data, gets and send after finger print data acquisition and set Standby password prompt, the keyboard for waiting computer is got after device password data, and storage finger print data and device password data are to shifting In dynamic formula storage device, and enable correction verification module.
3. a kind of remote data storage system according to claim 1, it is characterised in that:User name crypto module is being carried out When username and password is initialized, user name crypto module is used for pop-up dialogue box and points out user input username and password, Computer is got after user name password, and user name, password and finger print data are sent to into mobile phone, mobile phone by near-field communication module For sending user name, password and finger print data to server by the mobile phone radio frequency module of mobile phone, server is used to detect to be used Whether the result is dealt into mobile phone by checking by name in an account book, password and finger print data, and mobile phone is used to pass through near-field communication module Computer is forwarded to, and computer is used to result is judged after the result is received that judged result to be by then user Name password storage enables data memory module in removable storage device, and by then prompting user, its is not defeated for judged result The username and password mistake for entering, does not enable data memory module.
CN201610964953.9A 2016-10-28 2016-10-28 Remote end data storage system Withdrawn CN106570415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610964953.9A CN106570415A (en) 2016-10-28 2016-10-28 Remote end data storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610964953.9A CN106570415A (en) 2016-10-28 2016-10-28 Remote end data storage system

Publications (1)

Publication Number Publication Date
CN106570415A true CN106570415A (en) 2017-04-19

Family

ID=58536047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610964953.9A Withdrawn CN106570415A (en) 2016-10-28 2016-10-28 Remote end data storage system

Country Status (1)

Country Link
CN (1) CN106570415A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010677A (en) * 2004-09-06 2007-08-01 皇家飞利浦电子股份有限公司 Portable storage device and method for exchanging data
CN102739659A (en) * 2012-06-16 2012-10-17 华南师范大学 Authentication method for preventing replay attack
CN103051664A (en) * 2012-08-14 2013-04-17 深圳市朗科科技股份有限公司 File management method and device for cloud storage system as well as cloud storage system
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
CN104615929A (en) * 2013-11-04 2015-05-13 安全地带株式会社 Security key device for secure cloud services, and system and method of providing security cloud services
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN205104233U (en) * 2015-10-09 2016-03-23 北京智博联科技股份有限公司 USB removes magnetic disc with bluetooth transmit system
CN105847305A (en) * 2016-06-21 2016-08-10 新昌县七星街道明盛模具厂 Safe processing and accessing method of cloud resource
CN106022157A (en) * 2015-05-04 2016-10-12 深圳市魔力信息技术有限公司 Cloud and local secure storage method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101010677A (en) * 2004-09-06 2007-08-01 皇家飞利浦电子股份有限公司 Portable storage device and method for exchanging data
CN102739659A (en) * 2012-06-16 2012-10-17 华南师范大学 Authentication method for preventing replay attack
CN103051664A (en) * 2012-08-14 2013-04-17 深圳市朗科科技股份有限公司 File management method and device for cloud storage system as well as cloud storage system
CN104615929A (en) * 2013-11-04 2015-05-13 安全地带株式会社 Security key device for secure cloud services, and system and method of providing security cloud services
CN103595730A (en) * 2013-11-28 2014-02-19 中国科学院信息工程研究所 Ciphertext cloud storage method and system
CN104733008A (en) * 2015-04-07 2015-06-24 俞晓东 Mobile storage equipment capable of realizing cloud storage based on fingerprint identification
CN106022157A (en) * 2015-05-04 2016-10-12 深圳市魔力信息技术有限公司 Cloud and local secure storage method and device
CN205104233U (en) * 2015-10-09 2016-03-23 北京智博联科技股份有限公司 USB removes magnetic disc with bluetooth transmit system
CN105847305A (en) * 2016-06-21 2016-08-10 新昌县七星街道明盛模具厂 Safe processing and accessing method of cloud resource

Similar Documents

Publication Publication Date Title
CN104363250B (en) A kind of method and system for equipment connection
CN106304074B (en) Auth method and system towards mobile subscriber
EP2657871A2 (en) Secure configuration of mobile application
EP2879421B1 (en) Terminal identity verification and service authentication method, system, and terminal
CN103249045A (en) Identification method, device and system
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN103763308A (en) Method and device for having access to webpage safely and downloading data through intelligent terminal
US7913096B2 (en) Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
CN102984335B (en) Dial the identity identifying method of landline telephone, equipment and system
Rao et al. Authentication using mobile phone as a security token
CN103401686B (en) A kind of user's OTP WEB Authentication System and application process thereof
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN110022207A (en) Key management and the method and apparatus for handling data
CN106503529A (en) A kind of cloud storage system based on fingerprint
CN107612691A (en) Authentication information transmission method and device and user information authentication system
CN106506635A (en) A kind of portable method for cloud storage
CN106570417A (en) Data security storage method
CN201717885U (en) Code providing equipment and code identification system
CN106485128A (en) A kind of system based on removable storage device fingerprint
CN106570416A (en) Fingerprint-based cloud storage method
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user
JP2011192129A (en) Log-in authentication system using portable telephone terminal
CN106570378A (en) System for improving storage security of user
CN106570418A (en) Method for improving data security
CN106570377A (en) Mobile cloud data storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170419

WW01 Invention patent application withdrawn after publication