CN107707660A - The cloud storage method and system of the selectable identity-based verification technique of algorithm - Google Patents
The cloud storage method and system of the selectable identity-based verification technique of algorithm Download PDFInfo
- Publication number
- CN107707660A CN107707660A CN201710951774.6A CN201710951774A CN107707660A CN 107707660 A CN107707660 A CN 107707660A CN 201710951774 A CN201710951774 A CN 201710951774A CN 107707660 A CN107707660 A CN 107707660A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- user
- information
- cloud server
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000003860 storage Methods 0.000 title claims abstract description 39
- 238000012795 verification Methods 0.000 title claims abstract description 31
- 230000002441 reversible effect Effects 0.000 claims abstract description 23
- 230000006870 function Effects 0.000 claims description 18
- 238000006243 chemical reaction Methods 0.000 claims description 7
- 230000002123 temporal effect Effects 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000012790 confirmation Methods 0.000 claims description 3
- 235000013399 edible fruits Nutrition 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 9
- 238000007405 data analysis Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Biomedical Technology (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;Each random number corresponds to an AES respectively in list of random numbers;S1, obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to configuration information, and be stored in cloud server;S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal and answer degree-of-difficulty factor;S4, cloud server the function answer degree-of-difficulty factor generation Cloud Server data fluctuations according to corresponding to each mobile terminal determined in step S3 confirm block chained list;S5, mobile terminal will be stored in mobile terminal local after non-reversible algorithm and checking information encryption.
Description
Technical field
The present invention relates to big data cloud storage technical field, more particularly to a kind of selectable identity-based checking skill of algorithm
The cloud storage method and system of art.
Background technology
With the rapid development of the applications such as mobile Internet, Internet of Things, there is explosive growth in global metadata amount.Data
Amount is skyrocketed through imply that and has come into the big data epoch now.Virtual network operator possesses huge user, has simultaneously
To terminal and the control ability of user's Internet channel so that there is good data basis in terms of user behavior analysis, deeply
Customer flow behavioural characteristic and rule are analyzed, finds user's potential consumption demand, is effective hand of lifting value and management level
Section.However, not exclusively data scale is increasing, and data type is more and processing real-time requirement all substantially increases
The complexity of big data processing.Big data gives traditional Data Analysis Services technology (such as parallel database, data warehouse) band
The technological challenge come.Conventional data analysis treatment technology can not handle the high scalability and massive demand of big data;Traditional data
For analyzing and processing often just for a certain categorical data and relatively simple, big data has that data volume is huge, complicated, type
The features such as numerous, this storage, processing and analysis to big data propose new challenge.The high efficiency of parallel database and stably
Property turns into first choice of the data analysis in performance.But the consideration based on cost, will be big with the popularization of cloud computing service platform
Scale data analysis task is transferred to less expensive no communion system structure from the high-end server for being deployed in parallel database
On low-end server cluster, turn into the cost bottleneck problem that mass data analysis instantly really needs to solve.
And the data of user's storage beyond the clouds can not be protected well in the prior art so that safety of data protection etc.
Level is not high.
The content of the invention
In view of this, the present invention proposes a kind of cloud storage method of selectable identity-based verification technique of algorithm and is
System.
A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:
S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;With
Each random number corresponds to an AES respectively in machine ordered series of numbers table;
S1, obtain that each user correspond to the unique identifier information of mobile terminal and mobile terminal is corresponding matches somebody with somebody confidence
Breath, and it is stored in cloud server;
S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;
S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal
Answer degree-of-difficulty factor;
The function answer degree-of-difficulty factor generation according to corresponding to each mobile terminal determined in step S3 of S4, cloud server
Cloud Server data fluctuations confirm block chained list;
S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into by non-reversible algorithm
Checking information and the random number series that non-reversible algorithm and checking information are passed through into selection after user's original fingerprint information is deleted
Mobile terminal local is stored in after AES encryption corresponding to random number selection in table;
S6, cloud server obtain the severity level of the various files stored in the high in the clouds that user is sent by mobile terminal
Configuration information;The severity level configuration information of various files is confirmed into the generation movement of block chained list by Cloud Server data fluctuations
Terminal check weight total value;
S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to believe the fingerprint of acquisition
Breath is changed, and the result after conversion is matched with the checking information stored, and step S8 is jumped to after fitting through;
S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent
To cloud server;
The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges to send the text of user
Whether the mobile terminal of part operation requests information is legal, jumps to step S10 when legal;Otherwise step S13 is jumped to;
It is corresponding originally that S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file
People, when belonging to me, jump to step S12;Otherwise step S11 is jumped to;
S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute
There is mobile terminal corresponding to user, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback,
Judge whether to meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;
S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;
S13, the corresponding operation of file operation requests information of cloud server refusal user, and record the file behaviour of user
Make solicited message and correspond to temporal information, IP address information.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
The present invention also provides a kind of cloud storage system of the selectable identity-based verification technique of algorithm, and it includes such as placing an order
Member:
Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure random number series
The renewal frequency of table;Each random number corresponds to an AES respectively in list of random numbers;
Dispensing unit, for obtaining, each user corresponds to the unique identifier information of mobile terminal and mobile terminal corresponds to
Configuration information, and be stored in cloud server;
Computing capability judging unit, moved for the configuration information according to corresponding to mobile terminal by cloud server
The computing capability value of terminal;
Difficulty system unit, for computing capability value, configuration to be each according to corresponding to mobile terminal by cloud server
Function corresponding to mobile terminal answers degree-of-difficulty factor;
Block linked list units, for by cloud server according to each mobile terminal pair determined in difficulty system unit
The function answer degree-of-difficulty factor generation Cloud Server data fluctuations answered confirm block chained list;
Memory cell is encrypted, will by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user
Original fingerprint information is converted into checking information and after user's original fingerprint information is deleted by non-reversible algorithm and checking information
By being stored in mobile terminal local after AES encryption corresponding to the random number selection in the list of random numbers of selection;
Weight total value judging unit, deposited for being obtained by cloud server in the high in the clouds that is sent by mobile terminal of user
The severity level configuration information of the various files of storage;The severity level configuration information of various files is passed through into Cloud Server data wave
It is dynamic to confirm that block chained list generation mobile terminal confirms weight total value;
Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the irreversible of storage inside
Algorithm is changed the finger print information of acquisition, and the result after conversion is matched with the checking information stored, is being matched
Request transmitting unit is jumped to after;
Request transmitting unit, for the file operation requests information by acquisition for mobile terminal user, and by the text of user
Part operation requests information is sent to cloud server;
Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server are sentenced
Whether the mobile terminal of the disconnected file operation requests information for sending user is legal, jumps to my judging unit when legal;It is no
Then jump to recording unit;
My judging unit, for judging that user corresponding to the file operation requests information of user is by cloud server
The no file that belongs to is corresponding in person, when belonging to me, jumps to operating unit;Otherwise computing unit is jumped to;
Computing unit, for the file operation requests information of user to be confirmed into block chained list by Cloud Server data fluctuations
Mobile terminal corresponding to being sent to all users, receive the meter of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback
Result is calculated, judges whether to meet verification value, when meeting, jumps to operating unit;Otherwise recording unit is jumped to;
Operating unit, phase is carried out to the file stored in cloud server for the file operation requests information according to user
It should operate;
Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and remember
The file operation requests information for employing family corresponds to temporal information, IP address information.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation energy in the computing capability judging unit
Force value.
Implement the cloud storage method and system of the selectable identity-based verification technique of algorithm provided by the invention with it is existing
Technology is compared and had the advantage that:Using distributed validation technology, whether the file that can accurately judge to store beyond the clouds pacifies
Entirely, and the illegal operation for file in high in the clouds can only can be identified by block chain technology.
Brief description of the drawings
Fig. 1 is the cloud storage system structured flowchart of the selectable identity-based verification technique of algorithm of the embodiment of the present invention.
Embodiment
A kind of cloud storage method of the selectable identity-based verification technique of algorithm, it comprises the following steps:
S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;With
Each random number corresponds to an AES respectively in machine ordered series of numbers table;
S1, obtain that each user correspond to the unique identifier information of mobile terminal and mobile terminal is corresponding matches somebody with somebody confidence
Breath, and it is stored in cloud server;
S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;
S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal
Answer degree-of-difficulty factor;
The function answer degree-of-difficulty factor generation according to corresponding to each mobile terminal determined in step S3 of S4, cloud server
Cloud Server data fluctuations confirm block chained list;
S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into by non-reversible algorithm
Checking information and the random number series that non-reversible algorithm and checking information are passed through into selection after user's original fingerprint information is deleted
Mobile terminal local is stored in after AES encryption corresponding to random number selection in table;
S6, cloud server obtain the severity level of the various files stored in the high in the clouds that user is sent by mobile terminal
Configuration information;The severity level configuration information of various files is confirmed into the generation movement of block chained list by Cloud Server data fluctuations
Terminal check weight total value;
S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to believe the fingerprint of acquisition
Breath is changed, and the result after conversion is matched with the checking information stored, and step S8 is jumped to after fitting through;
S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent
To cloud server;
The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges to send the text of user
Whether the mobile terminal of part operation requests information is legal, jumps to step S10 when legal;Otherwise step S13 is jumped to;
It is corresponding originally that S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file
People, when belonging to me, jump to step S12;Otherwise step S11 is jumped to;
S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute
There is mobile terminal corresponding to user, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback,
Judge whether to meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;
S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;
S13, the corresponding operation of file operation requests information of cloud server refusal user, and record the file behaviour of user
Make solicited message and correspond to temporal information, IP address information.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage method of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
As shown in figure 1, the present invention also provides a kind of cloud storage system of the selectable identity-based verification technique of algorithm, its
Including such as lower unit:
Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure random number series
The renewal frequency of table;Each random number corresponds to an AES respectively in list of random numbers;
Dispensing unit, for obtaining, each user corresponds to the unique identifier information of mobile terminal and mobile terminal corresponds to
Configuration information, and be stored in cloud server;
Computing capability judging unit, moved for the configuration information according to corresponding to mobile terminal by cloud server
The computing capability value of terminal;
Difficulty system unit, for computing capability value, configuration to be each according to corresponding to mobile terminal by cloud server
Function corresponding to mobile terminal answers degree-of-difficulty factor;
Block linked list units, for by cloud server according to each mobile terminal pair determined in difficulty system unit
The function answer degree-of-difficulty factor generation Cloud Server data fluctuations answered confirm block chained list;
Memory cell is encrypted, will by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user
Original fingerprint information is converted into checking information and after user's original fingerprint information is deleted by non-reversible algorithm and checking information
By being stored in mobile terminal local after AES encryption corresponding to the random number selection in the list of random numbers of selection;
Weight total value judging unit, deposited for being obtained by cloud server in the high in the clouds that is sent by mobile terminal of user
The severity level configuration information of the various files of storage;The severity level configuration information of various files is passed through into Cloud Server data wave
It is dynamic to confirm that block chained list generation mobile terminal confirms weight total value;
Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the irreversible of storage inside
Algorithm is changed the finger print information of acquisition, and the result after conversion is matched with the checking information stored, is being matched
Request transmitting unit is jumped to after;
Request transmitting unit, for the file operation requests information by acquisition for mobile terminal user, and by the text of user
Part operation requests information is sent to cloud server;
Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server are sentenced
Whether the mobile terminal of the disconnected file operation requests information for sending user is legal, jumps to my judging unit when legal;It is no
Then jump to recording unit;
My judging unit, for judging that user corresponding to the file operation requests information of user is by cloud server
The no file that belongs to is corresponding in person, when belonging to me, jumps to operating unit;Otherwise computing unit is jumped to;
Computing unit, for the file operation requests information of user to be confirmed into block chained list by Cloud Server data fluctuations
Mobile terminal corresponding to being sent to all users, receive the meter of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback
Result is calculated, judges whether to meet verification value, when meeting, jumps to operating unit;Otherwise recording unit is jumped to;
Operating unit, phase is carried out to the file stored in cloud server for the file operation requests information according to user
It should operate;
Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and remember
The file operation requests information for employing family corresponds to temporal information, IP address information.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The non-reversible algorithm is oval algorithm.
In the cloud storage system of the selectable identity-based verification technique of algorithm of the present invention,
The computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation energy in the computing capability judging unit
Force value.
Implement the cloud storage method and system of the selectable identity-based verification technique of algorithm provided by the invention with it is existing
Technology is compared and had the advantage that:Using distributed validation technology, whether the file that can accurately judge to store beyond the clouds pacifies
Entirely, and the illegal operation for file in high in the clouds can only can be identified by block chain technology.
Above method embodiment is one-to-one with system embodiment, and therefore, the extension of embodiment of the method is also applicable
In said system embodiment.
Directly it can be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor
Capable software module, or the two combination are implemented.Software module can be placed in random access memory, internal memory, read-only storage,
Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In the storage medium for any other forms known.
It is understood that for the person of ordinary skill of the art, it can be conceived with the technique according to the invention and done
Go out other various corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention
Enclose.
Claims (6)
- A kind of 1. cloud storage method of the selectable identity-based verification technique of algorithm, it is characterised in that it comprises the following steps:S0, list of random numbers is configured in mobile terminal corresponding to user;And configure the renewal frequency of list of random numbers;Random number Each random number corresponds to an AES respectively in list;S1, obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to configuration information, and It is stored in cloud server;S2, the cloud server configuration information according to corresponding to mobile terminal obtain the computing capability value of mobile terminal;S3, cloud server the computing capability value according to corresponding to mobile terminal, configure function corresponding to each mobile terminal and answer Degree-of-difficulty factor;S4, cloud server the function answer degree-of-difficulty factor generation cloud clothes according to corresponding to each mobile terminal determined in step S3 Device data fluctuations of being engaged in confirm block chained list;S5, the original fingerprint information of acquisition for mobile terminal user, original fingerprint information is converted into verifying by non-reversible algorithm Information simultaneously passes through non-reversible algorithm and checking information in the list of random numbers of selection after user's original fingerprint information is deleted Random number selection corresponding to AES encryption after be stored in mobile terminal local;The severity level that S6, cloud server obtain the various files stored in the high in the clouds that user is sent by mobile terminal is set Information;The severity level configuration information of various files is confirmed that block chained list generates mobile terminal by Cloud Server data fluctuations Confirm weight total value;S7, the finger print information of acquisition for mobile terminal user, the non-reversible algorithm of storage inside is called to enter the finger print information of acquisition Row conversion, and the result after conversion is matched with the checking information stored, step S8 is jumped to after fitting through;S8, the file operation requests information of acquisition for mobile terminal user, and the file operation requests information of user is sent to cloud Hold server;The unique identifier information that S9, cloud server judge to correspond to mobile terminal by user judges that the file for sending user is grasped Whether legal make the mobile terminal of solicited message, jump to step S10 when legal;Otherwise step S13 is jumped to;S10, cloud server judge whether user corresponding to the file operation requests information of user belongs to file and correspond to me, When belonging to me, step S12 is jumped to;Otherwise step S11 is jumped to;S11, by the file operation requests information of user by Cloud Server data fluctuations confirm block chained list be sent to institute it is useful Mobile terminal corresponding to family, receive the result of calculation of mobile terminal function answer degree-of-difficulty factor corresponding to of feedback, judge Whether meet verification value, when meeting, jump to step S12;Otherwise step S13 is jumped to;S12, corresponding operating carried out to the file stored in cloud server according to the file operation requests information of user;S13, the corresponding operation of file operation requests information of cloud server refusal user, and the file operation for recording user please Information is asked to correspond to temporal information, IP address information.
- 2. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 1, it is characterised in thatThe non-reversible algorithm is oval algorithm.
- 3. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 1, it is characterised in thatThe computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation ability values in the step S2.
- 4. a kind of cloud storage system of the selectable identity-based verification technique of algorithm, it is characterised in that it includes such as lower unit:Algorithm configuration unit, for configuring list of random numbers in mobile terminal corresponding to user;And configure list of random numbers Renewal frequency;Each random number corresponds to an AES respectively in list of random numbers;Dispensing unit, for obtain each user correspond to mobile terminal unique identifier information and mobile terminal corresponding to match somebody with somebody Confidence ceases, and is stored in cloud server;Computing capability judging unit, mobile terminal is obtained for the configuration information according to corresponding to mobile terminal by cloud server Computing capability value;Difficulty system unit, for by cloud server according to corresponding to mobile terminal computing capability value, configure each movement Function corresponding to terminal answers degree-of-difficulty factor;Block linked list units, for by cloud server according to corresponding to each mobile terminal determined in difficulty system unit Function answer degree-of-difficulty factor generation Cloud Server data fluctuations confirm block chained list;Memory cell is encrypted, will be original by non-reversible algorithm for the original fingerprint information by acquisition for mobile terminal user Finger print information is converted into checking information and passes through non-reversible algorithm and checking information after user's original fingerprint information is deleted Mobile terminal local is stored in after AES encryption corresponding to random number selection in the list of random numbers of selection;Weight total value judging unit, for obtaining what is stored in the high in the clouds that is sent by mobile terminal of user by cloud server The severity level configuration information of various files;The severity level configuration information of various files is true by Cloud Server data fluctuations Recognize block chained list generation mobile terminal and confirm weight total value;Fingerprint obtaining unit, for the finger print information by acquisition for mobile terminal user, call the non-reversible algorithm of storage inside The finger print information of acquisition is changed, and the result after conversion is matched with the checking information stored, is being fitted through After jump to request transmitting unit;Request transmitting unit, grasped for the file operation requests information by acquisition for mobile terminal user, and by the file of user Cloud server is sent to as solicited message;Confirmation unit, the unique identifier information for judging to correspond to mobile terminal by user by cloud server judge hair Send the mobile terminal of the file operation requests information of user whether legal, jump to my judging unit when legal;Otherwise jump Go to recording unit;Judging unit in person, for judging whether user corresponding to the file operation requests information of user belongs to by cloud server It is corresponding in person in file, when belonging to me, jump to operating unit;Otherwise computing unit is jumped to;Computing unit, for the file operation requests information of user to be confirmed into block chained list is sent by Cloud Server data fluctuations To mobile terminal corresponding to all users, the mobile terminal function corresponding to for receiving feedback answers the calculating knot of degree-of-difficulty factor Fruit, judge whether to meet verification value, when meeting, jump to operating unit;Otherwise recording unit is jumped to;Operating unit, the file stored in cloud server is accordingly grasped for the file operation requests information according to user Make;Recording unit, for refusing operation corresponding to the file operation requests information of user by cloud server, and record use The file operation requests information at family corresponds to temporal information, IP address information.
- 5. the cloud storage system of the selectable identity-based verification technique of algorithm as claimed in claim 4, it is characterised in thatThe non-reversible algorithm is oval algorithm.
- 6. the cloud storage method of the selectable identity-based verification technique of algorithm as claimed in claim 5, it is characterised in thatThe computing capability value of mobile terminal is that mobile terminal corresponds to CPU floating operation abilities in the computing capability judging unit Value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710951774.6A CN107707660B (en) | 2017-10-13 | 2017-10-13 | Cloud storage method and system with selectable algorithm and based on identity verification technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710951774.6A CN107707660B (en) | 2017-10-13 | 2017-10-13 | Cloud storage method and system with selectable algorithm and based on identity verification technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107707660A true CN107707660A (en) | 2018-02-16 |
CN107707660B CN107707660B (en) | 2020-06-23 |
Family
ID=61184102
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710951774.6A Active CN107707660B (en) | 2017-10-13 | 2017-10-13 | Cloud storage method and system with selectable algorithm and based on identity verification technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707660B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
CN109743304A (en) * | 2018-12-26 | 2019-05-10 | 重庆工程职业技术学院 | A kind of network safety pre-warning method and system towards cloud computing |
CN111767557A (en) * | 2020-06-22 | 2020-10-13 | 重庆渝抗医药科技有限公司 | Data encryption working method based on block chain |
CN111899103A (en) * | 2018-10-25 | 2020-11-06 | 创新先进技术有限公司 | Transaction processing method and device based on block chain and electronic equipment |
CN115208655A (en) * | 2022-07-11 | 2022-10-18 | 成都信息工程大学 | Equipment authentication processing method applied to industrial internet cloud service platform |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for on-line adding of instant file dynamic label and on-line encryption |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
-
2017
- 2017-10-13 CN CN201710951774.6A patent/CN107707660B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for on-line adding of instant file dynamic label and on-line encryption |
CN105071927A (en) * | 2015-07-17 | 2015-11-18 | 上海众人网络安全技术有限公司 | Mobile device data local storage method |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
Non-Patent Citations (2)
Title |
---|
NAZRI ABDULLAH等: "Blockchain based Approach to Enhance Big Data Authentication in Distributed Environment", 《2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN)》 * |
从立钢等: "云存储系统安全技术研究", 《长春理工大学学报(自然科学版)》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108900507A (en) * | 2018-06-29 | 2018-11-27 | 全链通有限公司 | Block chain real name identification method and system |
CN108900507B (en) * | 2018-06-29 | 2020-12-22 | 全链通有限公司 | Block chain real-name authentication method and system |
CN111899103A (en) * | 2018-10-25 | 2020-11-06 | 创新先进技术有限公司 | Transaction processing method and device based on block chain and electronic equipment |
CN111899103B (en) * | 2018-10-25 | 2024-05-03 | 创新先进技术有限公司 | Transaction processing method and device based on blockchain and electronic equipment |
CN109743304A (en) * | 2018-12-26 | 2019-05-10 | 重庆工程职业技术学院 | A kind of network safety pre-warning method and system towards cloud computing |
CN109743304B (en) * | 2018-12-26 | 2021-03-16 | 重庆工程职业技术学院 | Cloud computing-oriented network security early warning method and system |
CN111767557A (en) * | 2020-06-22 | 2020-10-13 | 重庆渝抗医药科技有限公司 | Data encryption working method based on block chain |
CN111767557B (en) * | 2020-06-22 | 2021-07-30 | 王仁义 | Data encryption working method based on block chain |
CN115208655A (en) * | 2022-07-11 | 2022-10-18 | 成都信息工程大学 | Equipment authentication processing method applied to industrial internet cloud service platform |
CN115208655B (en) * | 2022-07-11 | 2023-09-26 | 成都信息工程大学 | Equipment authentication processing method applied to industrial Internet cloud service platform |
Also Published As
Publication number | Publication date |
---|---|
CN107707660B (en) | 2020-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107707660A (en) | The cloud storage method and system of the selectable identity-based verification technique of algorithm | |
US11138300B2 (en) | Multi-factor profile and security fingerprint analysis | |
KR102514325B1 (en) | Model training system and method, storage medium | |
US20210297240A1 (en) | Systems and methods for distributed data storage and delivery using blockchain | |
TWI736673B (en) | Incoming call processing method, device and terminal | |
US9118669B2 (en) | Method and apparatus for voice signature authentication | |
EP2748781B1 (en) | Multi-factor identity fingerprinting with user behavior | |
US10243945B1 (en) | Managed identity federation | |
US11153435B2 (en) | Method and system for automatically blocking robocalls | |
Lam et al. | Identity in the Internet-of-Things (IoT): New challenges and opportunities | |
US20140237570A1 (en) | Authentication based on social graph transaction history data | |
Cui et al. | Efficient verification of edge data integrity in edge computing environment | |
CN105763547B (en) | Third party's authorization method and third party's authoring system | |
US11570203B2 (en) | Edge network-based account protection service | |
CN106372499A (en) | Systems and methods for securing virtual machine computing environments | |
Chen et al. | A security framework of group location-based mobile applications in cloud computing | |
CN109241352A (en) | The acquisition methods and server of Profile information | |
US11483428B2 (en) | Method and system for automatically detecting and blocking robocalls | |
CN112308561A (en) | Block chain-based evidence storing method and system, computer equipment and storage medium | |
CN109754322A (en) | A kind of data service system | |
WO2014043360A1 (en) | Multi-factor profile and security fingerprint analysis | |
CN109474626A (en) | A kind of method for network authorization and device based on SNS | |
Krishnan et al. | Zero Trust-Based Adaptive Authentication using Composite Attribute Set | |
CN109831492A (en) | Access the method and device of OTT application, server push message | |
CN110248326A (en) | A kind of data processing method and its device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231120 Address after: No. 109 Huanhua Road, Liwan District, Guangzhou City, Guangdong Province, 510375, China 8045-8046 Patentee after: Guangdong Majestic Industrial Co.,Ltd. Address before: Room 203, 2nd Floor, No. 26 Tianxin Road, Yuancun, Tianhe District, Guangzhou City, Guangdong Province, 510032 Patentee before: GUANGZHOU DIANCHUANG INFORMATION TECHNOLOGY CO.,LTD. |