CN110650127B - Cloud access control method, device and equipment based on mobile storage equipment - Google Patents

Cloud access control method, device and equipment based on mobile storage equipment Download PDF

Info

Publication number
CN110650127B
CN110650127B CN201910857908.7A CN201910857908A CN110650127B CN 110650127 B CN110650127 B CN 110650127B CN 201910857908 A CN201910857908 A CN 201910857908A CN 110650127 B CN110650127 B CN 110650127B
Authority
CN
China
Prior art keywords
client
cloud
mobile storage
storage device
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910857908.7A
Other languages
Chinese (zh)
Other versions
CN110650127A (en
Inventor
张华�
胡康桥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hexin Interconnect Technology Qingdao Co ltd
Original Assignee
Hexin Interconnect Technology Qingdao Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hexin Interconnect Technology Qingdao Co ltd filed Critical Hexin Interconnect Technology Qingdao Co ltd
Priority to CN201910857908.7A priority Critical patent/CN110650127B/en
Publication of CN110650127A publication Critical patent/CN110650127A/en
Application granted granted Critical
Publication of CN110650127B publication Critical patent/CN110650127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a cloud access control method, a device and equipment based on mobile storage equipment, wherein the cloud access control method comprises the following steps: obtaining final client algorithm information by adopting a preset algorithm for the client address, and obtaining a client binary group according to the client address and the final algorithm information; acquiring a binary group of the mobile storage device from the mobile storage device; and if the client side binary group information is consistent with the mobile storage device binary group information, allowing the client side to authenticate the cloud side, otherwise, controlling the client side to exit, and not allowing the client side to authenticate the cloud side. The invention can control the system quality by using the mobile storage equipment which can be purchased anywhere in the market, and any part of the whole system is controlled in the hands of the service provider, thereby avoiding introducing risks, improving the quality and reducing the research and development difficulty of the suppliers.

Description

Cloud access control method, device and equipment based on mobile storage equipment
Technical Field
The embodiment of the invention relates to the field of information security, in particular to a cloud access control method, device and equipment based on a mobile storage device.
Background
There are currently many internet applications of the B/S and C/S architectures. A fundamental problem in such internet applications is what clients are allowed to access the services in the cloud.
The current major methods include:
1. the client firstly carries out identity recognition before accessing the cloud service. The scheme has the remarkable characteristics that: the whole identification work can be completed only by the client software, so that the client software does not need to be related to which hardware the client software is deployed on, and the client can only want to buy the client software and deploy the client software on hardware which is purchased separately for reducing the cost. However, this brings uncontrollable risk to the whole system, because each component of the whole C/S system should be controllable by the C/S supplier, so that quality control is easy to be done, otherwise, if a client hardware is left out, and the customer randomly purchases the embedded system, the quality of the whole C/S system will not be controlled well.
2. The cloud server makes a batch of U shields, delivers the U shields and client hardware to the client when the client purchases the cloud service, and leaves the transaction record, so that the client and the U shields have strict corresponding relation. The client side firstly uses the U shield for identity recognition before accessing the cloud service. According to the scheme, the U shield specific to the C/S system can be bound with the client hardware, and the common client hardware cannot be matched with the whole system due to the control of the U shield. However, this solution requires that the C/S system provider can own the U shield, and requires relatively strong research and development efforts.
Disclosure of Invention
The embodiment of the invention aims to provide a mobile storage device-based cloud access control method, device and equipment, which are used for solving the problems of poor system quality control and high research and development requirements when the existing cloud identifies the identity of a client.
In order to achieve the above object, the embodiments of the present invention mainly provide the following technical solutions:
in a first aspect, the present invention provides a cloud access control method based on a mobile storage device, including: obtaining final client algorithm information by adopting a preset algorithm for a client address, and obtaining a client binary group according to the client address and the final client algorithm information; acquiring a mobile storage device binary group from a mobile storage device, wherein the mobile storage device binary group comprises mobile storage device algorithm final information and the client address, and the mobile storage device algorithm final information is obtained by adopting the preset algorithm on the client address; and if the client side binary group information is consistent with the mobile storage device binary group information, allowing the client side to authenticate the cloud side, otherwise, controlling the client side to exit, and not allowing the client side to authenticate the cloud side.
Further, the obtaining of the final information of the client algorithm by adopting a preset algorithm for the client address includes: obtaining client intermediate information by adopting an SM4 algorithm according to the MAC address of the client and preset data provided by the cloud; obtaining final information of the client algorithm by adopting an SM3 algorithm according to the client intermediate information; the final algorithm information of the mobile storage device is obtained by adopting the preset algorithm on the address of the client, and comprises the following steps: and obtaining intermediate information of the mobile storage equipment by adopting the SM4 algorithm according to the client address and the preset data, and obtaining final information of the mobile storage equipment algorithm by adopting the SM3 algorithm according to the intermediate information of the mobile storage equipment.
Further, after allowing the client to authenticate to the cloud, the method further includes: the client sends a cloud service access request to the cloud, and provides identity information of the client to the cloud so that the cloud can send an original random number to the client; and the client encrypts the encrypted result by using a client private key according to the original random number, and sends the encrypted result to the cloud so that the cloud decrypts the encrypted result according to a public key of the client to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud allows the client to access corresponding cloud resources according to the cloud service access request.
Further, the mobile storage device is a USB flash disk.
In a second aspect, the present invention provides a cloud access control apparatus based on a mobile storage device, including: the information acquisition module is used for acquiring a client address and acquiring a mobile storage device binary group from a mobile storage device, wherein the mobile storage device binary group comprises mobile storage device algorithm final information and the client address, and the mobile storage device algorithm final information is obtained by adopting a preset algorithm on the client address; the control processing module is used for obtaining client algorithm final information by adopting the preset algorithm for the client address and obtaining a client binary group according to the client address and the client algorithm final information, and is also used for allowing the client to authenticate to a cloud terminal when the client binary group is consistent with the client algorithm final information, or controlling the client to quit and not allowing the client to authenticate to the cloud terminal.
Further, the control processing module is specifically configured to obtain client intermediate information by using an SM4 algorithm according to the MAC address of the client and preset data provided by the cloud, and further obtain final information of the client algorithm by using an SM3 algorithm according to the client intermediate information; the control processing module is further configured to obtain intermediate information of the mobile storage device by using the SM4 algorithm according to the client address and the preset data, and obtain final information of the algorithm of the mobile storage device by using the SM3 algorithm according to the intermediate information of the mobile storage device.
Further, still include: the communication module is used for sending a cloud service access request to the cloud and providing identity information of the client to the cloud so that the cloud can send an original random number to the client; the control processing module is further configured to encrypt the original random number by using a client private key, and send the encrypted result to the cloud end through the communication module, so that the cloud end decrypts the encrypted result according to a public key of the client to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud end allows the client to access a corresponding cloud resource according to the cloud service access request.
Further, the mobile storage device is a USB flash disk.
In a third aspect, the present invention provides an electronic device comprising: at least one processor and at least one memory; the memory is to store one or more program instructions; the processor is configured to execute one or more program instructions to execute the mobile storage device-based cloud access control method according to the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium containing one or more program instructions for executing the method for cloud access control based on a mobile storage device according to the first aspect
The technical scheme provided by the embodiment of the invention at least has the following advantages:
according to the cloud access control method, device and equipment based on the mobile storage equipment, the mobile storage equipment which can be purchased anywhere in the market is used, namely, the quality of the system can be controlled, and any part of the whole system is controlled by a service provider, so that risks are avoided, the quality is improved, and the research and development difficulty of the provider is reduced.
Drawings
Fig. 1 is a flowchart of a cloud access control method based on a mobile storage device according to an embodiment of the present invention;
fig. 2 is a block diagram of a cloud access control apparatus based on a mobile storage device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
Fig. 1 is a flowchart of a cloud access control method based on a mobile storage device according to an embodiment of the present invention. As shown in fig. 1, a cloud access control method based on a mobile storage device in an embodiment of the present invention includes:
s1: and obtaining the final information of the client algorithm by adopting a preset algorithm for the client address, and obtaining the client binary group according to the client address and the final information of the client algorithm.
In this embodiment, the client address adopts a MAC address MAC _ client of the client, which is a globally unique device identifier.
And obtaining final information final _ result of the client algorithm by adopting a preset algorithm for the MAC _ client. And then the client side binary group < MAC _ client, final _ result > is obtained. The preset algorithm is provided by the cloud.
S2: and acquiring the binary group of the mobile storage device from the mobile storage device. The mobile storage device binary group comprises mobile storage device algorithm final information and client information, and the mobile storage device algorithm final information is obtained by adopting a preset algorithm on a client address. The mobile storage device may be a usb disk, but may also be other mobile storage devices such as a mobile hard disk.
Specifically, the cloud provides the preset algorithm to the client. And the client side adopts the preset algorithm to obtain the final algorithm information of the mobile storage device according to the MAC address of the client side.
In an embodiment of the present invention, in step S1, obtaining the final client algorithm information by using a preset algorithm for the client address includes:
s1-1: and obtaining client intermediate information midle _ result _ client by adopting an SM4 algorithm according to the MAC _ client and preset data provided by the cloud.
middle_result_client=SM4(company_secret,MAC_client)
The company _ secret is the preset data, and the preset data is provided by the cloud and is kept secret.
S1-2: and obtaining final client algorithm information final _ result _ client by adopting an SM3 algorithm according to the middle _ result _ client.
final_result_client=SM3(middle_result)。
Correspondingly, in step S2, the final information of the mobile storage device algorithm is obtained by using a preset algorithm for the client address, and includes:
s2-1: and obtaining the intermediate information midle _ result of the mobile storage device by adopting an SM4 algorithm according to the MAC _ client and the preset data.
middle_result=SM4(company_secret,MAC_client)
The company _ secret is the preset data, which is provided by the cloud and can be used by the client, but the preset data is kept secret.
S2-2: and obtaining final information final _ result of the mobile storage device algorithm by adopting an SM3 algorithm according to the midle _ result.
final_result=SM3(middle_result)。
S3: and if the client side binary group information is consistent with the mobile storage device binary group information, allowing the client side to authenticate the cloud side, otherwise, controlling the client side to exit, and not allowing the client side to authenticate the cloud side.
Specifically, if the MAC _ client obtained from the mobile storage device is the same as the MAC address of the client, and the final _ result _ client obtained from the mobile storage device is the same as the final _ result obtained in step S2-2, the client is allowed to authenticate to the cloud; otherwise, the client is controlled to exit, and the client is not allowed to authenticate the cloud.
After the client is allowed to authenticate to the cloud, the method further comprises the following steps:
s4: the client sends a cloud service access request to the cloud, and provides identity information of the client to the cloud so that the cloud can send the original random number to the client. The client identity information may be an account of the client, or may be identity information provided when the client registers.
S5: the client encrypts the encrypted result by using a client private key according to the original random number, and sends the encrypted result to the cloud, so that the cloud decrypts the encrypted result according to the client public key to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud allows the client to access corresponding cloud resources according to the cloud service access request.
According to the cloud access control method based on the mobile storage device, the mobile storage device which can be purchased anywhere in the market is used, namely the quality of the system can be controlled, and any part of the whole system is controlled by a service provider, so that risks are avoided, the quality is improved, and the research and development difficulty of the provider is reduced.
Fig. 2 is a block diagram of a cloud access control apparatus based on a mobile storage device according to an embodiment of the present invention. As shown in fig. 2, the cloud access control apparatus based on a mobile storage device according to an embodiment of the present invention includes: an information acquisition module 100 and a control processing module 200.
The information obtaining module 100 is configured to obtain a client address, and obtain a binary group of the mobile storage device from the mobile storage device. The mobile storage device binary comprises mobile storage device algorithm final information and a client address. The final information of the algorithm of the mobile storage device is obtained by adopting a preset algorithm on the address of the client. The control processing module 200 is configured to obtain final client algorithm information by using a preset algorithm for the client address, and obtain a client binary group according to the client address and the final client algorithm information. The control processing module 200 is further configured to allow the client to authenticate to the cloud when the client binary information is consistent with the mobile storage device binary information, and otherwise, control the client to exit and disallow the client to authenticate to the cloud.
In an embodiment of the present invention, the control processing module 200 is specifically configured to obtain client intermediate information by using an SM4 algorithm according to the MAC address of the client and preset data provided by the cloud, and further obtain client algorithm final information by using an SM3 algorithm according to the client intermediate information. The control processing module 200 is further configured to obtain intermediate information of the mobile storage device by using an SM4 algorithm according to the client address and the preset data, and obtain final information of the mobile storage device algorithm by using an SM3 algorithm according to the intermediate information of the mobile storage device.
In an embodiment of the present invention, the cloud access control apparatus based on a mobile storage device further includes a communication module. The communication module is used for sending a cloud service access request to the cloud and providing identity information of the client to the cloud so that the cloud can send the original random number to the client conveniently. The control processing module 200 is further configured to encrypt the encrypted result by using a client private key according to the original random number, and send the encrypted result to the cloud end through the communication module, so that the cloud end decrypts the encrypted result according to a public key of the client to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud end allows the client to access the corresponding cloud resource according to the cloud service access request.
In one embodiment of the invention, the mobile storage device is a USB flash disk.
It should be noted that, in the embodiment of the present invention, a specific implementation manner of the mobile storage device-based cloud access control apparatus is similar to a specific implementation manner of the mobile storage device-based cloud access control method in the embodiment of the present invention, and specific reference is specifically made to the description of the mobile storage device-based cloud access control method, and details are not repeated for reducing redundancy.
An embodiment of the present invention discloses an electronic device, including: at least one processor and at least one memory; the memory is used for storing one or more program instructions; the processor is used for executing one or more program instructions to execute the mobile storage device-based cloud access control method.
The embodiment of the invention provides a computer-readable storage medium, wherein computer program instructions are stored in the computer-readable storage medium, and when the computer program instructions run on a computer, the computer is enabled to execute the cloud access control method based on the mobile storage device.
In an embodiment of the invention, the processor may be an integrated circuit chip having signal processing capability. The Processor may be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component.
The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The processor reads the information in the storage medium and completes the steps of the method in combination with the hardware.
The storage medium may be a memory, for example, which may be volatile memory or nonvolatile memory, or which may include both volatile and nonvolatile memory.
The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory.
Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
The storage media described in connection with the embodiments of the invention are intended to comprise, without being limited to, these and any other suitable types of memory.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (10)

1. A cloud access control method based on a mobile storage device is characterized by comprising the following steps:
obtaining final client algorithm information by adopting a preset algorithm for a client address, and obtaining a client binary group according to the client address and the final client algorithm information;
acquiring a mobile storage device binary group from a mobile storage device, wherein the mobile storage device binary group comprises mobile storage device algorithm final information and the client address, and the mobile storage device algorithm final information is obtained by adopting the preset algorithm on the client address;
and if the client side binary group information is consistent with the mobile storage device binary group information, allowing the client side to authenticate the cloud side, otherwise, controlling the client side to exit, and not allowing the client side to authenticate the cloud side.
2. The cloud access control method based on the mobile storage device according to claim 1, wherein the obtaining of the final client algorithm information by using a preset algorithm for the client address comprises:
obtaining client intermediate information by adopting an SM4 algorithm according to the MAC address of the client and preset data provided by the cloud;
obtaining final information of the client algorithm by adopting an SM3 algorithm according to the client intermediate information;
the final algorithm information of the mobile storage device is obtained by adopting the preset algorithm on the address of the client, and comprises the following steps: and obtaining intermediate information of the mobile storage equipment by adopting the SM4 algorithm according to the client address and the preset data, and obtaining final information of the mobile storage equipment algorithm by adopting the SM3 algorithm according to the intermediate information of the mobile storage equipment.
3. The cloud access control method based on the mobile storage device according to claim 1, further comprising, after allowing the client to authenticate to the cloud, the following steps:
the client sends a cloud service access request to the cloud, and provides identity information of the client to the cloud so that the cloud can send an original random number to the client;
and the client encrypts the encrypted result by using a client private key according to the original random number and sends the encrypted result to the cloud so that the cloud decrypts the encrypted result according to the client public key to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud allows the client to access corresponding cloud resources according to the cloud service access request.
4. The cloud access control method based on the mobile storage device according to claim 1 or 2, wherein the mobile storage device is a usb disk.
5. A cloud access control device based on a mobile storage device is characterized by comprising:
the information acquisition module is used for acquiring a client address and acquiring a mobile storage device binary group from a mobile storage device, wherein the mobile storage device binary group comprises mobile storage device algorithm final information and the client address, and the mobile storage device algorithm final information is obtained by adopting a preset algorithm on the client address;
the control processing module is used for obtaining client algorithm final information by adopting the preset algorithm for the client address and obtaining a client binary group according to the client address and the client algorithm final information, and is also used for allowing the client to authenticate to a cloud terminal when the client binary group is consistent with the client algorithm final information, or controlling the client to quit and not allowing the client to authenticate to the cloud terminal.
6. The cloud access control device based on the mobile storage device according to claim 5, wherein the control processing module is specifically configured to obtain client intermediate information by using an SM4 algorithm according to the MAC address of the client and preset data provided by the cloud, and further obtain client algorithm final information by using an SM3 algorithm according to the client intermediate information; the control processing module is further configured to obtain intermediate information of the mobile storage device by using the SM4 algorithm according to the client address and the preset data, and obtain final information of the algorithm of the mobile storage device by using the SM3 algorithm according to the intermediate information of the mobile storage device.
7. The cloud access control device based on the mobile storage device of claim 5, further comprising:
the communication module is used for sending a cloud service access request to the cloud and providing identity information of the client to the cloud so that the cloud can send an original random number to the client;
the control processing module is further configured to encrypt the original random number by using a client private key, and send an encrypted result to the cloud end through the communication module, so that the cloud end decrypts the encrypted result according to a public key of the client to obtain a decrypted random number, and when the decrypted random number is consistent with the original random number, the cloud end allows the client to access a corresponding cloud resource according to the cloud service access request.
8. The cloud access control device based on the mobile storage device of claim 5 or 6, wherein the mobile storage device is a USB flash disk.
9. An electronic device, characterized in that the electronic device comprises: at least one processor and at least one memory;
the memory is to store one or more program instructions;
the processor is configured to execute one or more program instructions to execute the method according to any one of claims 1 to 4.
10. A computer-readable storage medium containing one or more program instructions for executing the mobile storage device-based cloud access control method according to any one of claims 1 to 4.
CN201910857908.7A 2019-09-09 2019-09-09 Cloud access control method, device and equipment based on mobile storage equipment Active CN110650127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910857908.7A CN110650127B (en) 2019-09-09 2019-09-09 Cloud access control method, device and equipment based on mobile storage equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910857908.7A CN110650127B (en) 2019-09-09 2019-09-09 Cloud access control method, device and equipment based on mobile storage equipment

Publications (2)

Publication Number Publication Date
CN110650127A CN110650127A (en) 2020-01-03
CN110650127B true CN110650127B (en) 2022-02-18

Family

ID=68991212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910857908.7A Active CN110650127B (en) 2019-09-09 2019-09-09 Cloud access control method, device and equipment based on mobile storage equipment

Country Status (1)

Country Link
CN (1) CN110650127B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101312453A (en) * 2007-05-21 2008-11-26 联想(北京)有限公司 User terminal, method for login network service system, method for binding and debinding
CN101471867A (en) * 2007-12-27 2009-07-01 深圳华为通信技术有限公司 Method and system for controlling network access authority, access terminal and operation support system
CN101795290A (en) * 2009-05-27 2010-08-04 深圳市朗科科技股份有限公司 Network content pushing method and network content pushing device
CN102281256A (en) * 2010-06-11 2011-12-14 上海薄荷信息科技有限公司 Control method for validating junk information and corresponding control device
CN102291369A (en) * 2010-06-21 2011-12-21 上海薄荷信息科技有限公司 Control method and corresponding control device for verifying junk information settings
CN102622311A (en) * 2011-12-29 2012-08-01 北京神州绿盟信息安全科技股份有限公司 USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
CN104680055A (en) * 2015-03-02 2015-06-03 北京威努特技术有限公司 Control method for performing management on U disk after access into industrial control system network
CN105099691A (en) * 2014-05-23 2015-11-25 李亮 Method achieving computer Internet banking authentication by utilization of mobile phone
CN106341236A (en) * 2016-09-09 2017-01-18 深圳大学 Access control method facing cloud storage service platform and system thereof
US9769163B1 (en) * 2008-05-27 2017-09-19 Open Invention Network Llc System integrating an identity selector and user-portable device and method of use in a user-centric identity management system
US9820099B2 (en) * 2016-02-19 2017-11-14 Electronic Beacons Systems LLC Electronic beacon reader system and method
CN108259440A (en) * 2016-12-29 2018-07-06 航天信息股份有限公司 USBKey authentications based on cloud computing are in the method and system of B/S framework applications
CN108881232A (en) * 2018-06-21 2018-11-23 北京海泰方圆科技股份有限公司 Sign-on access method, apparatus, storage medium and the processor of operation system
US10169567B1 (en) * 2017-11-21 2019-01-01 Lockheed Martin Corporation Behavioral authentication of universal serial bus (USB) devices

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101312453A (en) * 2007-05-21 2008-11-26 联想(北京)有限公司 User terminal, method for login network service system, method for binding and debinding
CN101471867A (en) * 2007-12-27 2009-07-01 深圳华为通信技术有限公司 Method and system for controlling network access authority, access terminal and operation support system
US9769163B1 (en) * 2008-05-27 2017-09-19 Open Invention Network Llc System integrating an identity selector and user-portable device and method of use in a user-centric identity management system
CN101795290A (en) * 2009-05-27 2010-08-04 深圳市朗科科技股份有限公司 Network content pushing method and network content pushing device
CN102281256A (en) * 2010-06-11 2011-12-14 上海薄荷信息科技有限公司 Control method for validating junk information and corresponding control device
CN102291369A (en) * 2010-06-21 2011-12-21 上海薄荷信息科技有限公司 Control method and corresponding control device for verifying junk information settings
CN102622311A (en) * 2011-12-29 2012-08-01 北京神州绿盟信息安全科技股份有限公司 USB (universal serial bus) mobile memory device access control method, USB mobile memory device access control device and USB mobile memory device access control system
CN105099691A (en) * 2014-05-23 2015-11-25 李亮 Method achieving computer Internet banking authentication by utilization of mobile phone
CN104680055A (en) * 2015-03-02 2015-06-03 北京威努特技术有限公司 Control method for performing management on U disk after access into industrial control system network
US9820099B2 (en) * 2016-02-19 2017-11-14 Electronic Beacons Systems LLC Electronic beacon reader system and method
CN106341236A (en) * 2016-09-09 2017-01-18 深圳大学 Access control method facing cloud storage service platform and system thereof
CN108259440A (en) * 2016-12-29 2018-07-06 航天信息股份有限公司 USBKey authentications based on cloud computing are in the method and system of B/S framework applications
US10169567B1 (en) * 2017-11-21 2019-01-01 Lockheed Martin Corporation Behavioral authentication of universal serial bus (USB) devices
CN108881232A (en) * 2018-06-21 2018-11-23 北京海泰方圆科技股份有限公司 Sign-on access method, apparatus, storage medium and the processor of operation system

Also Published As

Publication number Publication date
CN110650127A (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN109347835B (en) Information transmission method, client, server, and computer-readable storage medium
US8484720B2 (en) Service binding method and system
CN111031047B (en) Device communication method, device, computer device and storage medium
US9769654B2 (en) Method of implementing a right over a content
US8984645B2 (en) Accessing memory device content using a network
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN108471403B (en) Account migration method and device, terminal equipment and storage medium
CN109714769B (en) Information binding method, device, equipment and storage medium
WO2019134493A1 (en) Subscriber identity module data writing method, device, platform, and storage medium
US11468177B2 (en) Apparatus and method for encrypting data in a data storage system
CN112398824B (en) Authority verification method, storage medium and electronic equipment
CN111917536A (en) Identity authentication key generation method, identity authentication method, device and system
CN110856170B (en) Data transmission method and device and communication system of Internet of things
CN114143108A (en) Session encryption method, device, equipment and storage medium
CN113438205A (en) Block chain data access control method, node and system
CN112134911A (en) Remote program upgrading method, device and medium
CN110855656B (en) Plug-in flow proxy method, device and system capable of realizing application server protection
CN110650127B (en) Cloud access control method, device and equipment based on mobile storage equipment
US11005651B2 (en) Method and terminal for establishing security infrastructure and device
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
CN115361168B (en) Data encryption method, device, equipment and medium
CN112188308B (en) Method and device for generating encrypted video file library
WO2023240587A1 (en) Device permission configuration method and apparatus, and terminal device
CN117062073A (en) Security authentication method, device, computer equipment and storage medium
KR20240058779A (en) Secure element, associated host terminal, method for generating a certificate in a secure element, and associated computer program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant