CN106570416A - Fingerprint-based cloud storage method - Google Patents
Fingerprint-based cloud storage method Download PDFInfo
- Publication number
- CN106570416A CN106570416A CN201610967320.3A CN201610967320A CN106570416A CN 106570416 A CN106570416 A CN 106570416A CN 201610967320 A CN201610967320 A CN 201610967320A CN 106570416 A CN106570416 A CN 106570416A
- Authority
- CN
- China
- Prior art keywords
- password
- storage device
- mobile phone
- removable storage
- user name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a fingerprint-based cloud storage method and is applied to smart phones, servers, computers and mobile storage devices. A mobile phone comprises a mobile phone radio frequency module and a first near-field communication module; and a mobile storage device comprises a second near-field communication module and a fingerprint module. The fingerprint-based cloud storage method comprises steps that a computer detects whether a mobile storage device is inserted into a USB interface, and then determines whether the mobile storage device stores fingerprint data when the mobile storage device is detected to be inserted into the USB interface; a fingerprint and device code initializing step is accessed if fingerprint is not stored; and a verifying step is conducted after the initializing step is finished. Compared with the prior art, the technical scheme can improve data storage safety; and data storage can be facilitated.
Description
Technical field
The present invention relates to data security arts, more particularly to a kind of cloud storage method based on fingerprint.
Background technology
Existing data storage method has various ways, but all there is information leakage.Such as using movement
The storage device of formula, directly stores data on movable storage device, then there is a problem that storage device is lost, after loss
Will result in the leakage of information.Or using the mode of the network storage, the network storage needs to use user on computers every time
Name password login, is so easy to software or photographic head records user name password, causes user name password to reveal, so as to make
Into leaking data.I.e. existing data storage method is still very dangerous.
The content of the invention
For this reason, it may be necessary to provide a kind of cloud storage method based on fingerprint, solve available data and store unsafe problem.
For achieving the above object, a kind of cloud storage method based on fingerprint is inventor provided, mobile phone, service is applied to
On device, computer and removable storage device, mobile phone includes mobile phone radio frequency module and the first near-field communication module, portable storage
Equipment includes the second near-field communication module and fingerprint module, comprises the steps:
Whether computer detection removable storage device inserts USB interface, judges removable storage device after detecting insertion
Whether be stored with finger print data;
If not storing finger print data, into fingerprint and device password initialization step, after the completion of step to be initiated
Enter checking procedure;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input device code data and is dealt into portable storage and sets
It is standby, after removable storage device gets finger print data and device password data, and enter with the data in removable storage device
Row compares, and continues below step if all passing through, and otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, into username and password initialization step, stand-by
After the completion of name in an account book and cryptographic initialization step, server generate first encryption rule related to user name, the second encryption rule,
Corresponding with the first encryption rule first decrypts rule, the second decryption rule corresponding with the second encryption rule, returns first and adds
Close rule and the second decryption rule arrive removable storage device, into data storing steps;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer sends file and reads instruction, and removable storage device receives text
Part read instruction after, password is encrypted using the first encryption rule, by near-field communication module by file read instruction and
Password after user name and encryption is sent to mobile phone, mobile phone send user name, encrypt by mobile phone radio frequency module after password and
File reads instruction to server, and server obtains the first decryption rule decrypted user name and password according to user name and verifies logical
Later, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, handss
Machine sends the information after encrypting to removable storage device by near-field communication module, and removable storage device enters to fileinfo
Row decryption is simultaneously sent to computer, and computer shows the fileinfo for reading;
Computer detection to after files passe operation, deposit by the fileinfo that transmission is uploaded to removable storage device, movable type
Storage equipment generates random number, and random number and fileinfo is encrypted using the first encryption rule, and using the first encryption
Rule is encrypted to password, and the password after user name and encryption, fileinfo are sent to mobile phone by near-field communication module,
To server, server is decrypted and is tested for password and fileinfo of the mobile phone after mobile phone radio frequency module sends user name, encryption
After card username and password passes through, decryption obtains random number and fileinfo, and storage file information is to the corresponding file of user name
Under folder.
Further, the fingerprint and device password initialization step include:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, sends after getting finger print data
Device password prompting is obtained, after waiting the keyboard of computer to get device password data, finger print data and device password number is stored
According to in removable storage device, and enter checking procedure.
Further, username and password initialization step comprises the steps:Prompting user is defeated for computer pop-up dialogue box
Access customer name and password, after computer gets user name password, by near-field communication module by user name, password and finger print data
Mobile phone is sent to, then server, server detection user name, password and finger print data are sent to by the mobile phone radio frequency module of mobile phone
Whether by checking, server generate after being verified first encryption rule related to user name, the second encryption rule and
First encryption rule it is corresponding first decryption rule, it is corresponding with the second encryption rule second decryption rule, and by the result,
First encryption rule and the second decryption rule are dealt into mobile phone, and mobile phone is forwarded to removable storage device by near-field communication module,
Removable storage device stores the first encryption rule and the second decryption rule and the result is forwarded to computer, and computer is being received
Result is judged to after the result, judged result is by then user name password storage to removable storage device
In, and data storing steps are entered, judged result is not by the username and password mistake of then its input of prompting user, this method
Terminate.
Further, data storing steps comprise the steps:
Computer detection is deleted after instruction to file, after removable storage device receives file deletion instruction, adopts first
Encryption rule is encrypted to password, and the password after near-field communication module to be deleted instruction and user name and encryption by file is sent out
Mobile phone is given, password and file of the mobile phone after mobile phone radio frequency module sends user name, encryption delete instruction to server, clothes
Business device obtains the first decryption rule decrypted user name and password and after being verified according to user name, and deleting file, to delete instruction right
The file answered.
Prior art is different from, above-mentioned technical proposal 1. is associated with username and password by fingerprint, and user is not required to
To input user name password again, it is to avoid the problem that user name password is revealed.2. by server by username and password
Associate with fileinfo, and do not associate finger print data, it is to avoid the file that the finger print data that finger print data is caused repeats and occurs
The problem of information leakage.3. computer and server communicate away be mobile phone radio frequency passage, reduce network it is monitored can
Can, it is to avoid leaking data.4. pair fileinfo adopts each user name cryptographic check, while fileinfo and user name password
In the case of being all encryption.5. using the cipher mode of random number so that the file after encryption has more confusion, it is to avoid data
Coating problem decrypted after intercepting and capturing.
Description of the drawings
Flow charts of the Fig. 1 for the inventive method;
Structure charts of the Fig. 2 for present system.
Specific embodiment
By describing the technology contents of technical scheme, structural features in detail, realizing purpose and effect, below in conjunction with concrete reality
Apply example and coordinate accompanying drawing to be explained in detail.
Fig. 1 to Fig. 2 is referred to, the present embodiment provides a kind of cloud storage method based on fingerprint, be applied to mobile phone 205, clothes
On business device 207, computer 201 and removable storage device 203, specifically, can apply to above the system 200 such as Fig. 2.Mobile phone
Mobile phone radio frequency module and the first near-field communication module are included, mobile phone can be attached with base station by mobile phone radio frequency module,
Such that it is able to surfing the Net and being connected with server.Removable storage device includes the second near-field communication module and fingerprint module, tool
Body ground, removable storage device also include processing module and memory module, processing module respectively with fingerprint module, memory module,
Second near-field communication module and USB interface connection, removable storage device are connected with computer by USB interface, and processing module can
With to realizing that the hardware to memory module data is encrypted, it is to avoid directly read the data of memory module.Removable storage device
Head is little, without the need for power supply, its power supply has USB interface to power, and can carry with, easy to carry.
This method comprises the steps:Whether step S101 computer detection removable storage device inserts USB interface, S102
Judge after detecting insertion whether removable storage device is stored with finger print data;Here judgement can be that computer sends an inquiry
Instruction is asked to removable storage device, removable storage device reads memory module, judges whether the finger print data that is stored with, then
By result feedback to the computer, it is to avoid computer directly reads the finger print data and causes the problem that data may reveal.
If not storing finger print data, into S103 fingerprints and device password initialization step, step to be initiated is complete
Into laggard checking procedure S104;If being stored with finger print data, checking procedure S104 is directly entered.Fingerprint and device password are all
It is used to the essential condition of removable storage device.Fingerprint and device password initialization step are exactly by fingerprint and device password
It is placed in the memory module of removable storage device.
When having fingerprint inside memory module, need to use removable storage device, then will be verified.Verification step
Suddenly comprise the steps:S104 computers obtain user input device code data and are dealt into removable storage device, and movable type is deposited
After storage equipment gets finger print data and device password data, and it is compared with the data in removable storage device, that is, walks
Rapid S105, continues below step if passing through.Otherwise terminate into step S106 this method.Here checking will be received simultaneously
Verified to after, rather than verified one by one, thus be avoided that disabled user is cracked one by one.Checking simultaneously is only
There is mistake to be exactly not all right, and disabled user does not know that error, increased and cracks difficulty, simultaneously because authenticated
Journey is carried out inside removable storage device, this equipment have autgmentability, for computer, this equipment be difficult into
Invade and crack.
It is verified, represents user and there is the right for using the removable storage device, then into step S107,
Step S107 computer judges whether removable storage device has username and password information;Here computer why is needed to sentence
It is disconnected, it is could to be interacted with people due to computer, but computer only obtains a result, the process of judgement also needs to moving
In dynamic formula storage device.
Removable storage device does not have username and password information, walks into the initialization of step S108 username and password
Suddenly, after the completion for the treatment of user name and cryptographic initialization step, server generation first encryption rule related to user name, second add
Close rule, the first decryption rule corresponding with the first encryption rule, the second decryption rule corresponding with the second encryption rule, return
First encryption rule and the second decryption rule arrive removable storage device, into data storing steps S109 and S110;It is portable
Storage device has username and password information, is directly put into data storing steps S109 and step S110.User name and close
Code is logged on the key of server because user name password can be unique, but finger print data according to sampled point not
Together, it is likely that be not unique.If sampled point is little, then it is identical that the finger print data of different fingerprints is possible to appearance.Such as
Fruit is directly logged in using finger print data, then when user radix is very big, it is likely that have one or two finger print data
It is the same, can so causes data obfuscation.This is absolutely not allowed in data security arts.User name cryptographic initialization
Afterwards, be just stored with removable storage device username and password.But during use below, avoid the need for again
Input username and password, it is to avoid the leakage of username and password.
Data storing steps comprise the steps:Including the step of reading service device file and uploading files to server
Step.Before upload should first reading service device file file directory, so under the catalogue specified, i.e., file can be stored
The fileinfo of the application can be file directory information, it is also possible to be directly file, be so equal to and download from a server text
Part.Wherein, include the step of reading service device file:Computer sends file and reads instruction, and removable storage device receives text
Part read instruction after, password is encrypted using the first encryption rule, by near-field communication module by file read instruction and
Password after user name and encryption is sent to mobile phone, mobile phone send user name, encrypt by mobile phone radio frequency module after password and
File reads instruction to server, and server obtains the first decryption rule decrypted user name and password according to user name and verifies logical
Later, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, handss
Machine sends the information after encrypting to removable storage device by near-field communication module, and removable storage device enters to fileinfo
Row decryption is simultaneously sent to computer, and computer shows the fileinfo for reading.
Here the encryption to password encrypts rule using random first related to user name for generating when initialized
Then, this first encryption rule is stored in removable storage device, and is associated with user name, then corresponding first solution
Close rule storage is on the server.The encryption of the fileinfo of server adopts the second encryption rule, equally and user name
Association, then corresponding second decryption are stored in removable storage device and fileinfo can be decrypted.Movable type is deposited
The data that storage equipment is gone out can be encrypted using the first encryption rule except user name, and the data that server is returned all may be used
To be encrypted using the second encryption rule, i.e., these information are not transmission in plain text, thus considerably increase safety.
Simultaneously because being associated using user name, the user name of each removable storage device is different, even if user name is identical, by
Different in being generated only when initialized at random, the removable storage device of such the past will fail, and so exist
When removable storage device is lost, it is only necessary to be updated by a new removable storage device again.So i.e.
Disabled user is made to have cracked the encryption and decryption rule of some removable storage device, also will not be to other removable storage devices
Threat is produced, the Information Security between different removable storage devices is substantially increased.
The step of uploading files to server includes:Computer detection is to after files passe operation.Upload operation can be inspection
The file for surveying user drags to upload frame operation, detects the fileinfo of the file that user drags, as the fileinfo for uploading.
Then computer sends the fileinfo for uploading and arrives removable storage device, removable storage device generation random number, and to random
Number and fileinfo are encrypted.The encryption of file can using with user name password the first encryption rule of identical, and adopt
First encryption rule is encrypted to password.The password after user name and encryption, file are believed by the second near-field communication module
Breath is sent to mobile phone, and password and fileinfo of the mobile phone after mobile phone radio frequency module sends user name, encryption are to server, clothes
After business device is decrypted and verifies that username and password passes through, decryption obtains random number and fileinfo, and storage file information is to user
Under the corresponding file of name.
Here the transmission of data is carried out using random number, the fileinfo that can be allowed after encrypting is more chaotic, because with
Machine number is unique, and is to change always.Accordingly even when being identical file, the data after its encryption are also different
, it is to avoid disabled user is by constantly using the file of variable quantity very little reversely decrypting encryption rule, increase cracks difficulty
Degree, it is ensured that safety.Simultaneously because the passage of this programme data transfer is not through computer, so, computer need not be networked,
On the computer of some concerning security matters, just there is no the possibility for being cracked and shooting, it is ensured that the safety of computer data.By mobile phone radio frequency
Module is directly connected with base station, the possibility that also there is no monitoring.Mobile phone also no data storage, removable storage device
Without data storage, the two all lost, and also not result in the problem of loss of data.Even if removable storage device is lost
, no fingerprint and corresponding device password also have no idea to use removable storage device.And even with movable type
Storage device, and the username and password of inside cannot be got, because username and password will be used, portable storage
What equipment will be encrypted to which.User has found that removable storage device lost, it is only necessary to on server change user
The password of name just because removable storage device will be cracked will need certainly for a period of time, even and if having cracked movement
Formula storage device, as username and password cannot be also otiose by checking.Data safety is substantially increased so
Property, without the problem that concern of data is lost.
The change of password can also be like above step carry out, user first goes to buy a blank portable storage and sets
It is standby, finger print data and device password are then initialized, then initialising subscriber name and password, then can be carried out more to password
Change, computer sends the password after a change directive, user name before, password and change, issues removable storage device,
Removable storage device, will be taken after the user name, password before server verification passes through to server is sent to after these encryptions
After the password modification of business device storage, then the password after changing is returned to removable storage device, removable storage device by mobile phone
More new password.Certainly, in order to prevent Brute Force password, what the intensity of password can be required, such as want upper and lower case letter to add
Upper numeral, digit can be more than 10 etc..And if username and password checking is not by default number of times in one day,
Just no longer by the checking of the user name, it is to avoid Brute Force.
Specifically, the fingerprint and device password initialization step include:Computer sends acquisition fingerprint prompting, and movable type is deposited
Storage equipment waits fingerprint module to get finger print data, and after getting finger print data, removable storage device informs computer, computer
Acquisition device password prompting is sent, after waiting the keyboard of computer to get device password data, computer sends device password to shifting
Dynamic formula storage device, such removable storage device just store finger print data and device password data in, and enter verification step
Suddenly.
User name cryptographic initialization is similar with stricture of vagina and device password initialization, username and password initialization step include as
Lower step:Computer pop-up dialogue box points out user input username and password, after computer gets user name password, by near field
User name, password and finger print data are sent to mobile phone by communication module, then are sent to server by the mobile phone radio frequency module of mobile phone,
Whether, by checking, server is generated after being verified and user famous prime minister for server detection user name, password and finger print data
The first encryption rule for closing, the second encryption rule the first decryption rule corresponding with the first encryption rule, and the second encryption rule
Corresponding second decryption rule, and the result, the first encryption rule and the second decryption rule are dealt into into mobile phone, mobile phone is by near
Field communication module is forwarded to removable storage device, and removable storage device stores the first encryption rule and the second decryption is regular simultaneously
The result is forwarded to into computer, computer judges to result that after the result is received judged result is by then
User name password storage in removable storage device, and data storing steps are entered, judged result is not used by then prompting
The username and password mistake of its input of family, this method terminate.
Further, data storing steps include following delete step:Computer detection is deleted after instruction to file, portable
After storage device receives file deletion instruction, password is encrypted using the first encryption rule, by near-field communication module
Password after file is deleted instruction and user name and encryption is sent to mobile phone, and mobile phone sends user by mobile phone radio frequency module
Password and file after name, encryption deletes instruction to server, and server obtains the first decryption rule decryption according to user name and uses
Name in an account book and password after being verified, delete file and delete the corresponding file of instruction.It is achieved thereby that the browsing and download of file, on
Pass and delete.
Although being described to the various embodiments described above, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, the equivalent structure made by every utilization description of the invention and accompanying drawing content are limited
Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, the patent of the present invention is included in the same manner
Within protection domain.
Claims (4)
1. a kind of cloud storage method based on fingerprint, is applied on mobile phone, server, computer and removable storage device, mobile phone
Mobile phone radio frequency module and the first near-field communication module are included, removable storage device includes the second near-field communication module and refers to
Stricture of vagina module, it is characterised in that comprise the steps:
Whether computer detection removable storage device inserts USB interface, whether judges removable storage device after detecting insertion
Be stored with finger print data;
If not storing finger print data, into fingerprint and device password initialization step, step to be initiated completes laggard school
Test step;
If being stored with finger print data, checking procedure is directly entered;
Checking procedure comprises the steps:Computer obtains user input device code data and is dealt into removable storage device, moves
After dynamic formula storage device gets finger print data and device password data, and compared with the data in removable storage device
Compared with, continuing below step if all passing through, otherwise this method terminates;
Computer judges whether removable storage device has username and password information;
Removable storage device does not have username and password information, into username and password initialization step, treats user name
After the completion of cryptographic initialization step, server generates first encryption rule related to user name, the second encryption rule and the
The corresponding first decryption rule of one encryption rule, the second decryption rule corresponding with the second encryption rule, return the first encryption rule
Then with the second decryption rule arrives removable storage device, into data storing steps;
Removable storage device has username and password information, is directly put into data storing steps;
Data storing steps comprise the steps:Computer sends file and reads instruction, and removable storage device receives file reading
After instruction fetch, password is encrypted using the first encryption rule, file is read by instruction and user by near-field communication module
Password after name and encryption is sent to mobile phone, password and file of the mobile phone after mobile phone radio frequency module sends user name, encryption
Instruction is read to server, server obtains the first decryption rule decrypted user name and password according to user name and is verified
Afterwards, the fileinfo to reading is encrypted using the second encryption rule, and returns the fileinfo after encryption to mobile phone, mobile phone
Information after encrypting is sent to removable storage device by near-field communication module, removable storage device is carried out to fileinfo
Computer is decrypted and is sent to, computer shows the fileinfo for reading;
Computer detection sends the fileinfo for uploading to removable storage device to after files passe operation, and portable storage sets
It is standby to generate random number, and random number and fileinfo are encrypted using the first encryption rule, and adopt the first encryption rule
Password is encrypted, the password after user name and encryption, fileinfo are sent to by mobile phone, mobile phone by near-field communication module
Password and fileinfo after mobile phone radio frequency module sends user name, encryption to server, decrypt and verify use by server
After name in an account book and password pass through, decryption obtains random number and fileinfo, under storage file information to the corresponding file of user name.
2. a kind of cloud storage method based on fingerprint according to claim 1, it is characterised in that:The fingerprint and equipment are close
Code initialization step includes:
Computer sends acquisition fingerprint prompting, waits fingerprint module to get finger print data, acquisition is sent after getting finger print data
Device password is pointed out, and after waiting the keyboard of computer to get device password data, storage finger print data and device password data are arrived
In removable storage device, and enter checking procedure.
3. a kind of cloud storage method based on fingerprint according to claim 1, it is characterised in that:Username and password is initial
Change step to comprise the steps:Computer pop-up dialogue box points out user input username and password, and it is close that computer gets user name
After code, user name, password and finger print data are sent to by mobile phone by near-field communication module, then by the mobile phone radio frequency module of mobile phone
Server is sent to, whether by checking, server is raw after being verified for server detection user name, password and finger print data
Into first encryption rule related to user name, the second encryption rule the first decryption rule corresponding with the first encryption rule, and
The corresponding second decryption rule of second encryption rule, and the result, the first encryption rule and the second decryption rule are dealt into into handss
Machine, mobile phone are forwarded to removable storage device by near-field communication module, removable storage device store the first encryption rule and
The result is simultaneously forwarded to computer by the second decryption rule, and computer is judged to result after the result is received, and is judged
As a result by then user name password storage in removable storage device, and data storing steps are entered, judged result
Not by then pointing out user the username and password mistake of its input, this method terminates.
4. a kind of cloud storage method based on fingerprint according to claim 1, it is characterised in that:Data storing steps include
Following steps:
Computer detection is deleted after instruction to file, after removable storage device receives file deletion instruction, using the first encryption
Rule is encrypted to password, and the password after near-field communication module to be deleted instruction and user name and encryption by file is sent to
Mobile phone, password and file of the mobile phone after mobile phone radio frequency module sends user name, encryption delete instruction to server, server
First decryption rule decrypted user name and password are obtained and after being verified according to user name, deleting file, to delete instruction corresponding
File.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967320.3A CN106570416A (en) | 2016-10-28 | 2016-10-28 | Fingerprint-based cloud storage method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967320.3A CN106570416A (en) | 2016-10-28 | 2016-10-28 | Fingerprint-based cloud storage method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106570416A true CN106570416A (en) | 2017-04-19 |
Family
ID=58539823
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610967320.3A Withdrawn CN106570416A (en) | 2016-10-28 | 2016-10-28 | Fingerprint-based cloud storage method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570416A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391043A (en) * | 2017-07-29 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of mobile memory system |
CN112601219A (en) * | 2021-03-03 | 2021-04-02 | 四川微巨芯科技有限公司 | Data encryption and decryption method and system, server, storage device and mobile device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
CN104615929A (en) * | 2013-11-04 | 2015-05-13 | 安全地带株式会社 | Security key device for secure cloud services, and system and method of providing security cloud services |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN204480256U (en) * | 2015-03-23 | 2015-07-15 | 杭州晟元芯片技术有限公司 | The fingerprint blue-tooth intelligence cipher key that a kind of Multifunctional mobile pays |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
-
2016
- 2016-10-28 CN CN201610967320.3A patent/CN106570416A/en not_active Withdrawn
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101010677A (en) * | 2004-09-06 | 2007-08-01 | 皇家飞利浦电子股份有限公司 | Portable storage device and method for exchanging data |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN104615929A (en) * | 2013-11-04 | 2015-05-13 | 安全地带株式会社 | Security key device for secure cloud services, and system and method of providing security cloud services |
CN103595730A (en) * | 2013-11-28 | 2014-02-19 | 中国科学院信息工程研究所 | Ciphertext cloud storage method and system |
CN204480256U (en) * | 2015-03-23 | 2015-07-15 | 杭州晟元芯片技术有限公司 | The fingerprint blue-tooth intelligence cipher key that a kind of Multifunctional mobile pays |
CN104733008A (en) * | 2015-04-07 | 2015-06-24 | 俞晓东 | Mobile storage equipment capable of realizing cloud storage based on fingerprint identification |
CN106022157A (en) * | 2015-05-04 | 2016-10-12 | 深圳市魔力信息技术有限公司 | Cloud and local secure storage method and device |
CN205104233U (en) * | 2015-10-09 | 2016-03-23 | 北京智博联科技股份有限公司 | USB removes magnetic disc with bluetooth transmit system |
CN105847305A (en) * | 2016-06-21 | 2016-08-10 | 新昌县七星街道明盛模具厂 | Safe processing and accessing method of cloud resource |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107391043A (en) * | 2017-07-29 | 2017-11-24 | 安徽云帮邦网络技术有限公司 | A kind of mobile memory system |
CN112601219A (en) * | 2021-03-03 | 2021-04-02 | 四川微巨芯科技有限公司 | Data encryption and decryption method and system, server, storage device and mobile device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102223364B (en) | Method and system for accessing e-book data | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
CN102685110B (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
CN102685093A (en) | Mobile-terminal-based identity authentication system and method | |
US9372987B1 (en) | Apparatus and method for masking a real user controlling synthetic identities | |
CN103731475B (en) | A kind of data protection system | |
CN104662870A (en) | Data security management system | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN104281794A (en) | Password storing and verifying method and password storing and verifying device | |
CN105101183A (en) | Method and system for protecting private contents at mobile terminal | |
CN107332666A (en) | Terminal document encryption method | |
Arias-Cabarcos et al. | Comparing password management software: toward usable and secure enterprise authentication | |
CN106503529A (en) | A kind of cloud storage system based on fingerprint | |
CN109495500A (en) | A kind of double factor authentication method based on smart phone | |
CN106570416A (en) | Fingerprint-based cloud storage method | |
CN108701200B (en) | Improved memory system | |
CN110022207A (en) | Key management and the method and apparatus for handling data | |
CN106485128A (en) | A kind of system based on removable storage device fingerprint | |
CN106570417A (en) | Data security storage method | |
CN201717885U (en) | Code providing equipment and code identification system | |
CN105743859B (en) | A kind of method, apparatus and system of light application certification | |
CN106506635A (en) | A kind of portable method for cloud storage | |
CN202495964U (en) | Identity authentication system based on mobile terminal | |
EP2940618A1 (en) | Method, system, user equipment and program for authenticating a user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Minhou County of Fuzhou City, Fujian province 350100 Hou Guan Lu No. 98 building 10 102 Spring Garden Applicant after: Yan Bizhu Address before: Gulou District of Fuzhou City, Fujian province 350001 Yangqiao road Fuk Lantau garden 5 building 301 Applicant before: Yan Bizhu |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170419 |