CN107707660A - The cloud storage method and system of the selectable identity-based verification technique of algorithm - Google Patents

The cloud storage method and system of the selectable identity-based verification technique of algorithm Download PDF

Info

Publication number
CN107707660A
CN107707660A CN201710951774.6A CN201710951774A CN107707660A CN 107707660 A CN107707660 A CN 107707660A CN 201710951774 A CN201710951774 A CN 201710951774A CN 107707660 A CN107707660 A CN 107707660A
Authority
CN
China
Prior art keywords
mobile terminal
user
information
cloud server
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710951774.6A
Other languages
Chinese (zh)
Other versions
CN107707660B (en
Inventor
卢家锐
郑涛
卢家锋
刘燃
梁欢
郑浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Majestic Industrial Co ltd
Original Assignee
Guangzhou Drives Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Drives Mdt Infotech Ltd filed Critical Guangzhou Drives Mdt Infotech Ltd
Priority to CN201710951774.6A priority Critical patent/CN107707660B/en
Publication of CN107707660A publication Critical patent/CN107707660A/en
Application granted granted Critical
Publication of CN107707660B publication Critical patent/CN107707660B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Biomedical Technology (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;Each random number corresponds to an AES respectively in list of random numbers;S1, obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to configuration information, and be stored in cloud server;S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal and answer degree-of-difficulty factor;S4, cloud server the function answer degree-of-difficulty factor generation Cloud Server data fluctuations according to corresponding to each mobile terminal determined in step S3 confirm block chained list;S5, mobile terminal will be stored in mobile terminal local after non-reversible algorithm and checking information encryption.

Description

The cloud storage method and system of the selectable identity-based verification technique of algorithm
Technical field
The present invention relates to big data cloud storage technical field, more particularly to a kind of selectable identity-based checking skill of algorithm The cloud storage method and system of art.
Background technology
With the rapid development of the applications such as mobile Internet, Internet of Things, there is explosive growth in global metadata amount.Data Amount is skyrocketed through imply that and has come into the big data epoch now.Virtual network operator possesses huge user, has simultaneously To terminal and the control ability of user's Internet channel so that there is good data basis in terms of user behavior analysis, deeply Customer flow behavioural characteristic and rule are analyzed, finds user's potential consumption demand, is effective hand of lifting value and management level Section.However, not exclusively data scale is increasing, and data type is more and processing real-time requirement all substantially increases The complexity of big data processing.Big data gives traditional Data Analysis Services technology (such as parallel database, data warehouse) band The technological challenge come.Conventional data analysis treatment technology can not handle the high scalability and massive demand of big data;Traditional data For analyzing and processing often just for a certain categorical data and relatively simple, big data has that data volume is huge, complicated, type The features such as numerous, this storage, processing and analysis to big data propose new challenge.The high efficiency of parallel database and stably Property turns into first choice of the data analysis in performance.But the consideration based on cost, will be big with the popularization of cloud computing service platform Scale data analysis task is transferred to less expensive no communion system structure from the high-end server for being deployed in parallel database On low-end server cluster, turn into the cost bottleneck problem that mass data analysis instantly really needs to solve.
And the data of user's storage beyond the clouds can not be protected well in the prior art so that safety of data protection etc. Level is not high.
The content of the invention
In view of this, the present invention proposes a kind of cloud storage method of selectable identity-based verification technique of algorithm and is System.
A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:
S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;With Each random number corresponds to an AES respectively in machine ordered series of numbers table;
S1, obtain that each user correspond to the unique identifier information of mobile terminal and mobile terminal is corresponding matches somebody with somebody confidence Breath, and it is stored in cloud server;
S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;
S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal Answer degree-of-difficulty factor;
The function answer degree-of-difficulty factor generation according to corresponding to each mobile terminal determined in step S3 of S4, cloud server Cloud Server data fluctuations confirm block chained list;
S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into by non-reversible algorithm Checking information and the random number series that non-reversible algorithm and checking information are passed through into selection after user's original fingerprint information is deleted Mobile terminal local is stored in after AES encryption corresponding to random number selection in table;
S6, cloud server obtain the severity level of the various files stored in the high in the clouds that user is sent by mobile terminal Configuration information;The severity level configuration information of various files is confirmed into the generation movement of block chained list by Cloud Server data fluctuations Terminal check weight total value;
S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to believe the fingerprint of acquisition Breath is changed, and the result after conversion is matched with the checking information stored, and step S8 is jumped to after fitting through;
S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent To cloud server;
The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges to send the text of user Whether the mobile terminal of part operation requests information is legal, jumps to step S10 when legal;Otherwise step S13 is jumped to;
It is corresponding originally that S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file People, when belonging to me, jump to step S12;Otherwise step S11 is jumped to;
S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute There is mobile terminal corresponding to user, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback, Judge whether to meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;
S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;
S13, the corresponding operation of file operation requests information of cloud server refusal user, and record the file behaviour of user Make solicited message and correspond to temporal information, IP address information.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
The present invention also provides a kind of cloud storage system of the selectable identity-based verification technique of algorithm, and it includes such as placing an order Member:
Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure random number series The renewal frequency of table;Each random number corresponds to an AES respectively in list of random numbers;
Dispensing unit, for obtaining, each user corresponds to the unique identifier information of mobile terminal and mobile terminal corresponds to Configuration information, and be stored in cloud server;
Computing capability judging unit, moved for the configuration information according to corresponding to mobile terminal by cloud server The computing capability value of terminal;
Difficulty system unit, for computing capability value, configuration to be each according to corresponding to mobile terminal by cloud server Function corresponding to mobile terminal answers degree-of-difficulty factor;
Block linked list units, for by cloud server according to each mobile terminal pair determined in difficulty system unit The function answer degree-of-difficulty factor generation Cloud Server data fluctuations answered confirm block chained list;
Memory cell is encrypted, will by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user Original fingerprint information is converted into checking information and after user's original fingerprint information is deleted by non-reversible algorithm and checking information By being stored in mobile terminal local after AES encryption corresponding to the random number selection in the list of random numbers of selection;
Weight total value judging unit, deposited for being obtained by cloud server in the high in the clouds that is sent by mobile terminal of user The severity level configuration information of the various files of storage;The severity level configuration information of various files is passed through into Cloud Server data wave It is dynamic to confirm that block chained list generation mobile terminal confirms weight total value;
Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the irreversible of storage inside Algorithm is changed the finger print information of acquisition, and the result after conversion is matched with the checking information stored, is being matched Request transmitting unit is jumped to after;
Request transmitting unit, for the file operation requests information by acquisition for mobile terminal user, and by the text of user Part operation requests information is sent to cloud server;
Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server are sentenced Whether the mobile terminal of the disconnected file operation requests information for sending user is legal, jumps to my judging unit when legal;It is no Then jump to recording unit;
My judging unit, for judging that user corresponding to the file operation requests information of user is by cloud server The no file that belongs to is corresponding in person, when belonging to me, jumps to operating unit;Otherwise computing unit is jumped to;
Computing unit, for the file operation requests information of user to be confirmed into block chained list by Cloud Server data fluctuations Mobile terminal corresponding to being sent to all users, receive the meter of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback Result is calculated, judges whether to meet verification value, when meeting, jumps to operating unit;Otherwise recording unit is jumped to;
Operating unit, phase is carried out to the file stored in cloud server for the file operation requests information according to user It should operate;
Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and remember The file operation requests information for employing family corresponds to temporal information, IP address information.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation energy in the computing capability judging unit Force value.
Implement the cloud storage method and system of the selectable identity-based verification technique of algorithm provided by the invention with it is existing Technology is compared and had the advantage that:Using distributed validation technology, whether the file that can accurately judge to store beyond the clouds pacifies Entirely, and the illegal operation for file in high in the clouds can only can be identified by block chain technology.
Brief description of the drawings
Fig. 1 is the cloud storage system structured flowchart of the selectable identity-based verification technique of algorithm of the embodiment of the present invention.
Embodiment
A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:
S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;With Each random number corresponds to an AES respectively in machine ordered series of numbers table;
S1, obtain that each user correspond to the unique identifier information of mobile terminal and mobile terminal is corresponding matches somebody with somebody confidence Breath, and it is stored in cloud server;
S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;
S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal Answer degree-of-difficulty factor;
The function answer degree-of-difficulty factor generation according to corresponding to each mobile terminal determined in step S3 of S4, cloud server Cloud Server data fluctuations confirm block chained list;
S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into by non-reversible algorithm Checking information and the random number series that non-reversible algorithm and checking information are passed through into selection after user's original fingerprint information is deleted Mobile terminal local is stored in after AES encryption corresponding to random number selection in table;
S6, cloud server obtain the severity level of the various files stored in the high in the clouds that user is sent by mobile terminal Configuration information;The severity level configuration information of various files is confirmed into the generation movement of block chained list by Cloud Server data fluctuations Terminal check weight total value;
S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to believe the fingerprint of acquisition Breath is changed, and the result after conversion is matched with the checking information stored, and step S8 is jumped to after fitting through;
S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent To cloud server;
The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges to send the text of user Whether the mobile terminal of part operation requests information is legal, jumps to step S10 when legal;Otherwise step S13 is jumped to;
It is corresponding originally that S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file People, when belonging to me, jump to step S12;Otherwise step S11 is jumped to;
S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute There is mobile terminal corresponding to user, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback, Judge whether to meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;
S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;
S13, the corresponding operation of file operation requests information of cloud server refusal user, and record the file behaviour of user Make solicited message and correspond to temporal information, IP address information.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
As shown in figure 1, the present invention also provides a kind of cloud storage system of the selectable identity-based verification technique of algorithm, its Including such as lower unit:
Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure random number series The renewal frequency of table;Each random number corresponds to an AES respectively in list of random numbers;
Dispensing unit, for obtaining, each user corresponds to the unique identifier information of mobile terminal and mobile terminal corresponds to Configuration information, and be stored in cloud server;
Computing capability judging unit, moved for the configuration information according to corresponding to mobile terminal by cloud server The computing capability value of terminal;
Difficulty system unit, for computing capability value, configuration to be each according to corresponding to mobile terminal by cloud server Function corresponding to mobile terminal answers degree-of-difficulty factor;
Block linked list units, for by cloud server according to each mobile terminal pair determined in difficulty system unit The function answer degree-of-difficulty factor generation Cloud Server data fluctuations answered confirm block chained list;
Memory cell is encrypted, will by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user Original fingerprint information is converted into checking information and after user's original fingerprint information is deleted by non-reversible algorithm and checking information By being stored in mobile terminal local after AES encryption corresponding to the random number selection in the list of random numbers of selection;
Weight total value judging unit, deposited for being obtained by cloud server in the high in the clouds that is sent by mobile terminal of user The severity level configuration information of the various files of storage;The severity level configuration information of various files is passed through into Cloud Server data wave It is dynamic to confirm that block chained list generation mobile terminal confirms weight total value;
Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the irreversible of storage inside Algorithm is changed the finger print information of acquisition, and the result after conversion is matched with the checking information stored, is being matched Request transmitting unit is jumped to after;
Request transmitting unit, for the file operation requests information by acquisition for mobile terminal user, and by the text of user Part operation requests information is sent to cloud server;
Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server are sentenced Whether the mobile terminal of the disconnected file operation requests information for sending user is legal, jumps to my judging unit when legal;It is no Then jump to recording unit;
My judging unit, for judging that user corresponding to the file operation requests information of user is by cloud server The no file that belongs to is corresponding in person, when belonging to me, jumps to operating unit;Otherwise computing unit is jumped to;
Computing unit, for the file operation requests information of user to be confirmed into block chained list by Cloud Server data fluctuations Mobile terminal corresponding to being sent to all users, receive the meter of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback Result is calculated, judges whether to meet verification value, when meeting, jumps to operating unit;Otherwise recording unit is jumped to;
Operating unit, phase is carried out to the file stored in cloud server for the file operation requests information according to user It should operate;
Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and remember The file operation requests information for employing family corresponds to temporal information, IP address information.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation energy in the computing capability judging unit Force value.
Implement the cloud storage method and system of the selectable identity-based verification technique of algorithm provided by the invention with it is existing Technology is compared and had the advantage that:Using distributed validation technology, whether the file that can accurately judge to store beyond the clouds pacifies Entirely, and the illegal operation for file in high in the clouds can only can be identified by block chain technology.
Above method embodiment is one-to-one with system embodiment, and therefore, the extension of embodiment of the method is also applicable In said system embodiment.
Directly it can be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor Capable software module, or the two combination are implemented.Software module can be placed in random access memory, internal memory, read-only storage, Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In the storage medium for any other forms known.
It is understood that for the person of ordinary skill of the art, it can be conceived with the technique according to the invention and done Go out other various corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention Enclose.

Claims (6)

  1. A kind of 1. cloud storage method of the selectable identity-based verification technique of algorithm, it is characterised in that it comprises the following steps:
    S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;Random number Each random number corresponds to an AES respectively in list;
    S1, obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to configuration information, and It is stored in cloud server;
    S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;
    S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal and answer Degree-of-difficulty factor;
    S4, cloud server the function answer degree-of-difficulty factor generation cloud clothes according to corresponding to each mobile terminal determined in step S3 Device data fluctuations of being engaged in confirm block chained list;
    S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into verifying by non-reversible algorithm Information simultaneously passes through non-reversible algorithm and checking information in the list of random numbers of selection after user's original fingerprint information is deleted Random number selection corresponding to AES encryption after be stored in mobile terminal local;
    The severity level that S6, cloud server obtain the various files stored in the high in the clouds that user is sent by mobile terminal is set Information;The severity level configuration information of various files is confirmed that block chained list generates mobile terminal by Cloud Server data fluctuations Confirm weight total value;
    S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to enter the finger print information of acquisition Row conversion, and the result after conversion is matched with the checking information stored, step S8 is jumped to after fitting through;
    S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent to cloud Hold server;
    The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges that the file for sending user is grasped Whether legal make the mobile terminal of solicited message, jump to step S10 when legal;Otherwise step S13 is jumped to;
    S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file and correspond to me, When belonging to me, step S12 is jumped to;Otherwise step S11 is jumped to;
    S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute it is useful Mobile terminal corresponding to family, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback, judge Whether meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;
    S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;
    S13, the corresponding operation of file operation requests information of cloud server refusal user, and the file operation for recording user please Information is asked to correspond to temporal information, IP address information.
  2. 2. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 1, it is characterised in that
    The non-reversible algorithm is oval algorithm.
  3. 3. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 1, it is characterised in that
    The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
  4. 4. a kind of cloud storage system of the selectable identity-based verification technique of algorithm, it is characterised in that it includes such as lower unit:
    Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure list of random numbers Renewal frequency;Each random number corresponds to an AES respectively in list of random numbers;
    Dispensing unit, for obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to match somebody with somebody Confidence ceases, and is stored in cloud server;
    Computing capability judging unit, mobile terminal is obtained for the configuration information according to corresponding to mobile terminal by cloud server Computing capability value;
    Difficulty system unit, for by cloud server according to corresponding to mobile terminal computing capability value, configure each movement Function corresponding to terminal answers degree-of-difficulty factor;
    Block linked list units, for by cloud server according to corresponding to each mobile terminal determined in difficulty system unit Function answer degree-of-difficulty factor generation Cloud Server data fluctuations confirm block chained list;
    Memory cell is encrypted, will be original by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user Finger print information is converted into checking information and passes through non-reversible algorithm and checking information after user's original fingerprint information is deleted Mobile terminal local is stored in after AES encryption corresponding to random number selection in the list of random numbers of selection;
    Weight total value judging unit, for obtaining what is stored in the high in the clouds that is sent by mobile terminal of user by cloud server The severity level configuration information of various files;The severity level configuration information of various files is true by Cloud Server data fluctuations Recognize block chained list generation mobile terminal and confirm weight total value;
    Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the non-reversible algorithm of storage inside The finger print information of acquisition is changed, and the result after conversion is matched with the checking information stored, is being fitted through After jump to request transmitting unit;
    Request transmitting unit, grasped for the file operation requests information by acquisition for mobile terminal user, and by the file of user Cloud server is sent to as solicited message;
    Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server judge hair Send the mobile terminal of the file operation requests information of user whether legal, jump to my judging unit when legal;Otherwise jump Go to recording unit;
    Judging unit in person, for judging whether user corresponding to the file operation requests information of user belongs to by cloud server It is corresponding in person in file, when belonging to me, jump to operating unit;Otherwise computing unit is jumped to;
    Computing unit, for the file operation requests information of user to be confirmed into block chained list is sent by Cloud Server data fluctuations To mobile terminal corresponding to all users, the mobile terminal function corresponding to for receiving feedback answers the calculating knot of degree-of-difficulty factor Fruit, judge whether to meet verification value, when meeting, jump to operating unit;Otherwise recording unit is jumped to;
    Operating unit, the file stored in cloud server is accordingly grasped for the file operation requests information according to user Make;
    Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and record use The file operation requests information at family corresponds to temporal information, IP address information.
  5. 5. the cloud storage system of the selectable identity-based verification technique of algorithm as claimed in claim 4, it is characterised in that
    The non-reversible algorithm is oval algorithm.
  6. 6. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 5, it is characterised in that
    The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation abilities in the computing capability judging unit Value.
CN201710951774.6A 2017-10-13 2017-10-13 Cloud storage method and system with selectable algorithm and based on identity verification technology Active CN107707660B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710951774.6A CN107707660B (en) 2017-10-13 2017-10-13 Cloud storage method and system with selectable algorithm and based on identity verification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710951774.6A CN107707660B (en) 2017-10-13 2017-10-13 Cloud storage method and system with selectable algorithm and based on identity verification technology

Publications (2)

Publication Number Publication Date
CN107707660A true CN107707660A (en) 2018-02-16
CN107707660B CN107707660B (en) 2020-06-23

Family

ID=61184102

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710951774.6A Active CN107707660B (en) 2017-10-13 2017-10-13 Cloud storage method and system with selectable algorithm and based on identity verification technology

Country Status (1)

Country Link
CN (1) CN107707660B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900507A (en) * 2018-06-29 2018-11-27 全链通有限公司 Block chain real name identification method and system
CN109743304A (en) * 2018-12-26 2019-05-10 重庆工程职业技术学院 A kind of network safety pre-warning method and system towards cloud computing
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain
CN111899103A (en) * 2018-10-25 2020-11-06 创新先进技术有限公司 Transaction processing method and device based on block chain and electronic equipment
CN115208655A (en) * 2022-07-11 2022-10-18 成都信息工程大学 Equipment authentication processing method applied to industrial internet cloud service platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN105071927A (en) * 2015-07-17 2015-11-18 上海众人网络安全技术有限公司 Mobile device data local storage method
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NAZRI ABDULLAH等: "Blockchain based Approach to Enhance Big Data Authentication in Distributed Environment", 《2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN)》 *
从立钢等: "云存储系统安全技术研究", 《长春理工大学学报(自然科学版)》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900507A (en) * 2018-06-29 2018-11-27 全链通有限公司 Block chain real name identification method and system
CN108900507B (en) * 2018-06-29 2020-12-22 全链通有限公司 Block chain real-name authentication method and system
CN111899103A (en) * 2018-10-25 2020-11-06 创新先进技术有限公司 Transaction processing method and device based on block chain and electronic equipment
CN111899103B (en) * 2018-10-25 2024-05-03 创新先进技术有限公司 Transaction processing method and device based on blockchain and electronic equipment
CN109743304A (en) * 2018-12-26 2019-05-10 重庆工程职业技术学院 A kind of network safety pre-warning method and system towards cloud computing
CN109743304B (en) * 2018-12-26 2021-03-16 重庆工程职业技术学院 Cloud computing-oriented network security early warning method and system
CN111767557A (en) * 2020-06-22 2020-10-13 重庆渝抗医药科技有限公司 Data encryption working method based on block chain
CN111767557B (en) * 2020-06-22 2021-07-30 王仁义 Data encryption working method based on block chain
CN115208655A (en) * 2022-07-11 2022-10-18 成都信息工程大学 Equipment authentication processing method applied to industrial internet cloud service platform
CN115208655B (en) * 2022-07-11 2023-09-26 成都信息工程大学 Equipment authentication processing method applied to industrial Internet cloud service platform

Also Published As

Publication number Publication date
CN107707660B (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN107707660A (en) The cloud storage method and system of the selectable identity-based verification technique of algorithm
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
KR102514325B1 (en) Model training system and method, storage medium
US20210297240A1 (en) Systems and methods for distributed data storage and delivery using blockchain
TWI736673B (en) Incoming call processing method, device and terminal
US9118669B2 (en) Method and apparatus for voice signature authentication
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
US10243945B1 (en) Managed identity federation
US11153435B2 (en) Method and system for automatically blocking robocalls
Lam et al. Identity in the Internet-of-Things (IoT): New challenges and opportunities
US20140237570A1 (en) Authentication based on social graph transaction history data
Cui et al. Efficient verification of edge data integrity in edge computing environment
CN105763547B (en) Third party's authorization method and third party's authoring system
US11570203B2 (en) Edge network-based account protection service
CN106372499A (en) Systems and methods for securing virtual machine computing environments
Chen et al. A security framework of group location-based mobile applications in cloud computing
CN109241352A (en) The acquisition methods and server of Profile information
US11483428B2 (en) Method and system for automatically detecting and blocking robocalls
CN112308561A (en) Block chain-based evidence storing method and system, computer equipment and storage medium
CN109754322A (en) A kind of data service system
WO2014043360A1 (en) Multi-factor profile and security fingerprint analysis
CN109474626A (en) A kind of method for network authorization and device based on SNS
Krishnan et al. Zero Trust-Based Adaptive Authentication using Composite Attribute Set
CN109831492A (en) Access the method and device of OTT application, server push message
CN110248326A (en) A kind of data processing method and its device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231120

Address after: No. 109 Huanhua Road, Liwan District, Guangzhou City, Guangdong Province, 510375, China 8045-8046

Patentee after: Guangdong Majestic Industrial Co.,Ltd.

Address before: Room 203, 2nd Floor, No. 26 Tianxin Road, Yuancun, Tianhe District, Guangzhou City, Guangdong Province, 510032

Patentee before: GUANGZHOU DIANCHUANG INFORMATION TECHNOLOGY CO.,LTD.