CN110990862A - VSIM file data access control method, device, equipment and readable storage medium - Google Patents

VSIM file data access control method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN110990862A
CN110990862A CN201911179660.XA CN201911179660A CN110990862A CN 110990862 A CN110990862 A CN 110990862A CN 201911179660 A CN201911179660 A CN 201911179660A CN 110990862 A CN110990862 A CN 110990862A
Authority
CN
China
Prior art keywords
vsim
file data
preset
user
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911179660.XA
Other languages
Chinese (zh)
Inventor
王康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Shenzhen Transsion Holdings Co Ltd
Original Assignee
Shenzhen Microphone Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Microphone Holdings Co Ltd filed Critical Shenzhen Microphone Holdings Co Ltd
Priority to CN201911179660.XA priority Critical patent/CN110990862A/en
Publication of CN110990862A publication Critical patent/CN110990862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a VSIM file data access control method, a device, equipment and a readable storage medium, wherein the VSIM file data access control method comprises the following steps: acquiring preset VSIM file data, encrypting and storing the preset VSIM file data, verifying a VSIM account associated with an access request when the access request is received, and reading the preset VSIM file data when the VSIM account passes the verification. The technical problem of low data security of the virtual SIM card file in the prior art is solved.

Description

VSIM file data access control method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of mobile communication network technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for controlling VSIM file data access.
Background
With the popularization of smart machines, virtual SIM card services included in smart machines are also gradually and widely used, and currently, a smart machine with a virtual SIM card function has a virtual SIM card file system stored in a server, so that a mobile phone user can download relevant files necessary for virtual SIM card network injection from the server to a Modem NV (Non-Volatile storage) end when activating the virtual SIM service, and then can normally inject the virtual SIM card network.
Disclosure of Invention
The present application mainly aims to provide a VSIM (Virtual Subscriber identity module) file data access control method, device, equipment and readable storage medium, and aims to solve the technical problem of low security of Virtual SIM card file data in the prior art.
In order to achieve the above object, the present application provides a VSIM file data access control method, where the VSIM file data access control method is applied to a VSIM file data access control device, and the VSIM file data access control method includes:
acquiring preset VSIM file data, and encrypting and storing the preset VSIM file data;
when an access request is received, verifying a VSIM account related to the access request;
and when the VSIM account passes the verification, reading the preset VSIM file data.
Alternatively, the registered user with the VSIM account is the first user,
the steps of obtaining preset VSIM file data and encrypting and storing the preset VSIM file data comprise:
when a network injection request of the first user is received, generating the preset VSIM file data based on user information in the network injection request;
performing modular processing on the preset VSIM file data to obtain a VSIM file module;
and downloading the VSIM file module, and storing the VSIM file module into a preset resource sharing database.
Optionally, the step of modularizing the preset VSIM file data to obtain a VSIM file module includes:
extracting keywords from the preset VSIM file data to obtain a keyword set corresponding to the preset VSIM file data;
encrypting the preset VSIM file data based on a preset key to obtain a VSIM encrypted file corresponding to the preset VSIM file data;
and inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module.
Optionally, when the VSIM account number passes the verification, the step of reading the preset VSIM file data includes:
when the VSIM account passes the verification, inquiring the VSIM file module in the preset resource sharing database based on the keywords in the keyword set;
and extracting the VSIM encrypted file in the VSIM file module, and decrypting the VSIM encrypted file based on the preset key to obtain preset VSIM file data.
Optionally, the step of obtaining preset VSIM file data and encrypting and storing the preset VSIM file data includes:
when the VSIM account registration request is received, extracting user identity information in the VSIM account registration request;
and checking the user identity information, and generating a VSIM account corresponding to the user identity information when the user identity information passes the checking.
Optionally, the VSIM file data access control method includes:
when an association request is received, associating a second user associated with the association request with the VSIM account to obtain an association authority corresponding to the second user;
and when receiving an access request of the second user, verifying the VSIM account of the first user and the association authority.
Optionally, the associating the second user associated with the association request with the VSIM account, and the step of obtaining the association right corresponding to the second user includes:
extracting second user information in the association request;
verifying the second user information, and setting the second user as a related user of the VSIM account after the second user information is verified;
when a login request of the associated user is received, verifying the login request;
and when the login request passes the verification, giving the second user the associated authority through a preset server.
The present application also provides a VSIM file data access control device, which is applied to a VSIM file data access control apparatus, and includes:
the storage module is used for acquiring preset VSIM file data and encrypting and storing the preset VSIM file data;
the first verification module is used for verifying the VSIM account related to the access request when the access request is received;
and the reading module is used for reading the preset VSIM file data when the VSIM account passes the verification.
Optionally, the storage module comprises:
the generating unit is used for generating the preset VSIM file data based on the user information in the network injection request when the network injection request of the first user is received;
the modularization unit is used for carrying out modularization processing on the preset VSIM file data to obtain a VSIM file module;
and the storage unit is used for downloading the VSIM file module and storing the VSIM file module into a preset resource sharing database.
Optionally, the modular unit comprises:
the extraction subunit is used for extracting keywords from the preset VSIM file data to obtain a keyword set corresponding to the preset VSIM file data;
the encryption subunit is configured to encrypt the preset VSIM file data based on a preset key to obtain a VSIM encrypted file corresponding to the preset VSIM file data;
and the input module is used for inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module.
Optionally, the reading module comprises:
the query unit is used for querying the VSIM file module in the preset resource sharing database based on the keywords in the keyword set when the VSIM account passes the verification;
and the decryption unit is used for extracting the VSIM encrypted file in the VSIM file module, decrypting the VSIM encrypted file based on the preset key and obtaining the preset VSIM file data.
Optionally, the VSIM file data access control apparatus further includes:
the extraction module is used for extracting the user identity information in the VSIM account registration request when the VSIM account registration request is received;
and the checking module is used for checking the user identity information, and generating a VSIM account corresponding to the user identity information when the user identity information passes the checking.
Optionally, the VSIM file data access control apparatus further includes:
the association module is used for associating a second user associated with the association request with the VSIM account when the association request is received, and acquiring association permission corresponding to the second user;
and the second verification module is used for verifying the VSIM account number and the association authority of the first user when receiving the access request of the second user.
Optionally, the associating module includes:
an extracting unit, configured to extract the second user information in the association request;
a verification unit, configured to verify the second user information, and set the second user as an associated user of the VSIM account after the second user information is verified;
the verification unit is used for verifying the login request when the login request of the associated user is received;
and the judging unit is used for endowing the second user with the associated authority through a preset server when the login request passes the verification.
The present application also provides a readable storage medium having stored thereon a program for implementing a VSIM file data access control method, which when executed by a processor, implements the steps of the VSIM file data access control method as described above.
According to the method and the device, firstly, preset VSIM file data are obtained and encrypted for storage, then when an access request is received, a VSIM account number associated with the access request is verified, and when the VSIM account number passes the verification, the preset VSIM file data are read. That is, this application at first acquires and the encryption storage of predetermineeing VSIM file data, and then verifies the VSIM account number of first user, when verifying when passing, carries on predetermineeing VSIM file data's reading, so, this application has carried out the encryption storage to predetermineeing VSIM file data, and before reading predetermineeing VSIM file data, still need carry out the verification of user's identity, and then the effectual acquisition and the falsifying of preventing other illegal users to predetermineeing VSIM file data, so, solved the low technical problem of virtual SIM card file data security among the prior art.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a VSIM file data access control method according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of a VSIM file data access control method according to a second embodiment of the present application;
fig. 3 is a schematic device structure diagram of a hardware operating environment related to a method according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
An embodiment of the present application provides a VSIM file data access control method, where the VSIM file data access control method is applied to a VSIM file data access control device, and in a first embodiment of the VSIM file data access control method of the present application, referring to fig. 1, the VSIM file data access control method includes:
step S10, acquiring preset VSIM file data, and encrypting and storing the preset VSIM file data;
in this embodiment, it should be noted that the preset VSIM file data is file data required by network injection of the virtual SIM card, where the preset VSIM file data includes user identity information data, network injection file information data, and the like, the user identity information data may be used to identify a user identity, and the network injection file information data is used in a normal network injection process.
The method comprises the steps of obtaining preset VSIM file data, carrying out encryption storage on the preset VSIM file data, specifically, downloading the preset VSIM file data from a preset server, wherein the preset VSIM file data are generated by the preset server through user identity information input by a user, and further storing the preset VSIM file data in a preset resource sharing database.
The steps of acquiring preset VSIM file data and encrypting and storing the preset VSIM file data include:
step S11, when receiving the network-injection request of the first user, generating the preset VSIM file data based on the user information in the network-injection request;
in this embodiment, it should be noted that the first user is a user who registers a VSIM account, that is, the first user is a holder of the VSIM account, the network-surfing request includes user information, and when the network-surfing request of the first user is received, the preset VSIM file data is generated based on the user information in the network-surfing request.
Step S12, performing modular processing on the preset VSIM file data to obtain a VSIM file module;
in this embodiment, it should be noted that the VSIM file module includes an encrypted area and other areas, where the encrypted area includes preset VSIM file data after encryption, and the other areas include a keyword set and a root hash value, where the keyword set is used for retrieving the VSIM file module, and the root hash value is used for verifying the integrity of the VSIM file module.
The method comprises the steps of conducting modularization processing on preset VSIM file data to obtain a VSIM file module, specifically, firstly conducting keyword extraction on the preset VSIM file data to generate a keyword set corresponding to the preset VSIM file data, further encrypting the preset VSIM file data based on a preset key to obtain a VSIM encrypted file corresponding to the preset VSIM file data, then storing the keyword set to other areas, and storing the VSIM encrypted file to an encrypted area to obtain the VSIM file module.
The step of modularizing the preset VSIM file data to obtain a VSIM file module includes:
step S121, extracting keywords from the preset VSIM file data to obtain a keyword set corresponding to the preset VSIM file data;
in this embodiment, the preset VSIM file data is subjected to keyword extraction to obtain a keyword set corresponding to the preset VSIM file data, and specifically, a character string of key information is extracted from the preset VSIM file data, for example, if the key information is that the name of the user a is "three", then "one" is extracted as a keyword, and further, a preset number of keywords are extracted to form a keyword set.
Step S122, based on a preset key, encrypting the preset VSIM file data to obtain a VSIM encrypted file corresponding to the preset VSIM file data;
in this embodiment, based on a preset key, encrypting the preset VSIM file data to obtain a VSIM encrypted file corresponding to the preset VSIM file data, specifically, based on the preset key, encrypting the preset VSIM file data by using a preset encryption algorithm to obtain a VSIM encrypted file corresponding to the preset VSIM file data, where the preset encryption algorithm includes a symmetric encryption algorithm and an asymmetric encryption algorithm, for example, assuming that the preset encryption algorithm is a symmetric encryption algorithm, performing an exclusive or operation on the preset VSIM file data and the preset key to obtain the VSIM encrypted file.
Step S123, inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module.
In this embodiment, it should be noted that the preset VSIM template is a preset blank data storage block, where the preset VSIM template includes an encrypted storage block and other storage blocks.
Inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module, specifically, storing the keyword set in the other storage blocks, storing the VSIM encrypted file in the encrypted storage blocks, and after the storage is completed, identifying the preset VSIM template to indicate that the preset VSIM template is occupied, where the identified preset VSIM template is the VSIM file module.
And step S13, downloading the VSIM file module, and storing the VSIM file module in a preset resource sharing database.
In this embodiment, it should be noted that the VSIM file module is stored in the preset resource sharing database, and a query entry of the preset resource sharing database is arranged in a mobile terminal of a user, the VSIM file module is downloaded and stored in the preset resource sharing database, specifically, the VSIM file module is downloaded and integrity of the VSIM file module is verified, and when the verification passes, the VSIM file module is stored in the preset resource sharing database, wherein integrity verification can be performed through a root hash value in the VSIM file module, specifically, when the VSIM file module is downloaded, the VSIM file module is split into a preset number of small blocks for data transmission and hash values of the small blocks are calculated, and after the downloading is completed, a sum of hash values of the small blocks is calculated and compared with the root hash value, and if the VSIM file module is consistent with the VSIM file module, determining that the VSIM file module is complete, namely that the VSIM file module is not lost or tampered in the downloading process.
Step S20, when receiving an access request, verifying a VSIM account associated with the access request;
in this embodiment, it should be noted that the VSIM account is obtained by registering the first user in advance at a preset service end, and the VSIM account includes user identity information, a preset key, and the like, and when an access request is received, the VSIM account associated with the access request is verified, specifically, when the access request of the first user is received, according to the user information in the access request, the preset service end queries whether the VSIM account of the first user is in an open state, when the VSIM account is in the open state, the verification is passed, and when the VSIM account is in the frozen state, the freezing reason is queried and the user is prompted to solve the problem, for example, when the freezing reason is unpaid, the user is prompted to pay in a manner of a short message or a telephone, and the like.
And step S30, reading the preset VSIM file data when the VSIM account passes the verification.
In this embodiment, when the VSIM account passes the verification, the preset VSIM file data is read, specifically, after the verification passes, the VSIM file module is downloaded, and meanwhile, the VSIM account logs in a preset server to obtain a preset key in a user interface of the preset server, and based on the preset key, the VSIM encrypted file in the VSIM file module is decrypted by performing an exclusive or operation to obtain the preset VSIM file data.
When the VSIM account number passes the verification, the step of reading the preset VSIM file data comprises the following steps:
step S31, when the VSIM account passes the verification, inquiring the VSIM file module in the preset resource sharing database based on the keywords in the keyword set;
in this embodiment, it should be noted that, when the keyword set is obtained, the keyword set is already backed up, and the keyword set is sent to a user interface of a preset service end, and after the first user logs in the user interface of the preset service end, the keyword set can be obtained from the user interface.
And when the VSIM account passes the verification, inquiring the VSIM file modules in the preset resource sharing database based on the keywords in the keyword set, specifically, when the verification passes, acquiring the keyword set by logging in a user interface of a preset server, further matching VSIM file modules with consistent keywords in the preset resource sharing database according to the keywords in the keyword set, and if a plurality of VSIM file modules are acquired through matching, inquiring the identification of each VSIM file module, and further acquiring the VSIM file modules.
Step S32, extracting the VSIM encrypted file in the VSIM file module, and decrypting the VSIM encrypted file based on the preset key to obtain the preset VSIM file data.
The steps of obtaining preset VSIM file data and encrypting and storing the preset VSIM file data comprise:
step A10, when receiving the VSIM account registration request, extracting the user identity information in the VSIM account registration request;
in this embodiment, it should be noted that before the user sends the VSIM account registration request, the user needs to fill in information on a registration interface of the preset server, where the information to be filled includes user identity information, and therefore, when the VSIM account registration request of the user is received, the user identity information of the VSIM account registration request may be extracted.
Step A20, the user identity information is checked, and when the user identity information passes the check, a VSIM account corresponding to the user identity information is generated.
In this embodiment, the user identity information is checked, when the user identity information passes the checking, a VSIM account corresponding to the user identity information is generated, specifically, the user identity information may be checked in a short message verification manner or a telephone verification manner, when the user identity information passes the checking, a VSIM account corresponding to the user identity information is generated, where the VSIM account includes a login account and a login password, and after the VSIM account corresponding to the user identity information is generated, a preset key is uploaded to a user interface corresponding to the VSIM account, and a user may obtain the preset key through the login user interface.
In the embodiment, preset VSIM file data is obtained first, encrypted and stored, then when an access request is received, a VSIM account associated with the access request is verified, and when the VSIM account passes the verification, the preset VSIM file data is read. That is, in this embodiment, first, obtaining and encrypted storing of preset VSIM file data is performed, and then, a VSIM account of a first user is verified, and when the verification is passed, the preset VSIM file data is read, so that, in this embodiment, the preset VSIM file data is encrypted and stored, and before the preset VSIM file data is read, user identity verification is also required, and then, obtaining and tampering of the preset VSIM file data by other illegal users are effectively prevented, so that the technical problem of low security of the virtual SIM card file data in the prior art is solved.
Further, referring to fig. 2, in another embodiment of providing a VSIM file data access control method according to the first embodiment of the present application, the VSIM file data access control method is applied to a VSIM file data access control system, and the VSIM file data access control method includes:
step B10, when receiving an association request, associating a second user associated with the association request with the VSIM account to obtain an association right corresponding to the second user;
in this embodiment, it should be noted that the VSIM file data access control system includes an association request detection unit, where the association request detection unit may detect whether an association request is input, the first user is a sole VSIM account holder, and the first user may specify VSIM account associated users of a preset user number, where the preset user number is set by a preset service manager, the association request includes identity information of the first user and the second user, VSIM account information, and the like, and the VSIM account information includes a VSIN login account, a VSIM account status, and the like.
When an association request is received, associating a second user associated with the association request with the VSIM account to obtain an association right corresponding to the second user, specifically, when the association request of the first user is received, verifying identity information of the first user and the second user and VSIM account information in the association request, wherein the verification modes include short message verification, telephone verification, VSIM account status query and other verification modes, and when the verification is passed, associating the second user specified by the first user with the VSIM account, wherein the association includes setting the second user as an associated user of the first user and a user interface allowing the second user to log in the VSIM account of the first user.
In step B10, the associating the second user associated with the association request with the VSIM account, and the step of obtaining the association right corresponding to the second user includes:
step B11, extracting second user information in the association request;
in this embodiment, when the association request of the first user is received, second user information in the association request is extracted, specifically, when the association request of the first user is received, after whether the first user is authenticated with an XSIM account or not is verified, the second user information in the association request is extracted, where the second user information includes information such as an identity card number, a name, a mobile phone number, and the like of the second user.
Step B12, verifying the second user information, and setting the second user as the associated user of the VSIM account when the second user information is verified;
in this embodiment, the second user information is verified, after the second user information is verified, the second user is set as the associated user of the VSIM account, specifically, the second user information is verified in a short message authentication mode, a telephone authentication mode, or the like, and after the second user information is verified, the second user is set as the associated user of the VSIM account, where the associated user can log in a user interface of the first user at a preset service end, and can perform network injection through preset VSIM file data, and when the associated user cannot develop a next-level associated user.
Step B13, when receiving the login request of the associated user, verifying the login request;
in this embodiment, when the login request of the associated user is received, the login request is verified, specifically, when the preset server receives the login request of the associated user, the login request is sent by the second user logging in the preset server through the mobile phone number, that is, when the second user logs in the preset server through the mobile phone number, the login request is sent to the preset server, and then the login request is verified, that is, the mobile phone number in the login request is verified, and whether the mobile phone number is the mobile phone number of the associated user of the first user is determined.
And step B14, when the login request passes the verification, giving the second user the associated authority through a preset server.
In this embodiment, when the login request passes the verification, the second user is given the associated right through a preset server, specifically, when the login request passes the verification, the login request is sent to the first user, after the first user agrees, the associated user can log in the user interface of the preset server and obtain the preset key and the keyword set through the user interface, the second user can obtain the preset VSIM file data in the preset resource sharing database through the preset key and the keyword set, and then perform network injection through the preset VSIM file data, that is, the second user is given the associated right.
And step B20, when receiving the access request of the second user, verifying the VSIM account of the first user and the association authority.
In this embodiment, when receiving an access request of the second user, verifying the VSIM account of the first user and the association permission, specifically, when receiving an access request of the second user, that is, when receiving that the second user accesses a preset resource sharing database, verifying the VSIM account of the first user, that is, verifying information and status of the VSIM account, determining whether the information of the VSIM account is real and whether the status of the VSIM account is in a normal state, that is, when the information of the VSIM account is real and the status of the VSIM account is in a non-frozen state, further verifying the association permission of the second user, that is, verifying whether the mobile phone number of the second user is the associated mobile phone number of the first user, that is, verifying whether the second user is the associated user of the first user, and further retrieving the VSIM file module through a keyword combination, after the VSIM file module is obtained, the VSIM file module can be decrypted through a preset key to obtain preset VSIM file data, and finally, a normal network injection process is started.
In this embodiment, when an association request is received, associating a second user associated with the association request with the VSIM account to obtain an association right corresponding to the second user, and further, when an access request of the second user is received, verifying the VSIM account and the association right of the first user. That is, in this embodiment, the second user is associated with the VSIM account to give the second user an associated right, and when an access request of the second user is received, the second user may be controlled to access the preset VSIM file data by verifying the VSIM account and the associated right. That is, the present embodiment provides a VSIM file data access control mechanism suitable for multiple users, and besides solving the technical problem in the prior art that the security of the virtual SIM card file data is low, the present embodiment is also suitable for a multiple user scenario.
Referring to fig. 3, fig. 3 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present application.
As shown in fig. 3, the VSIM file data access control apparatus may include: a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002. The communication bus 1002 is used for realizing connection communication between the processor 1001 and the memory 1005. The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a memory device separate from the processor 1001 described above.
Optionally, the VSIM file data access control device may further include a target user interface, a network interface, a camera, an RF (Radio Frequency) circuit, a sensor, an audio circuit, a WiFi module, and the like. The target user interface may comprise a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional target user interface may also comprise a standard wired interface, a wireless interface. The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Those skilled in the art will appreciate that the VSIM file data access control device architecture shown in fig. 3 does not constitute a limitation of the VSIM file data access control device and may include more or fewer components than shown, or some components in combination, or a different arrangement of components.
As shown in fig. 3, a memory 1005, which is a kind of computer storage readable storage medium, may include therein an operating system, a network communication module, and a VSIM file data access control program. The operating system is a program that manages and controls the hardware and software resources of the VSIM file data access control device, supporting the operation of the VSIM file data access control program, as well as other software and/or programs. The network communication module is used to implement communication between the components within the memory 1005 and with other hardware and software in the VSIM file data access control system.
In the VSIM file data access control apparatus shown in fig. 3, the processor 1001 is configured to execute a VSIM file data access control program stored in the memory 1005, and implement the steps of the VSIM file data access control method according to any one of the above.
The specific implementation of the VSIM file data access control device of the present application is substantially the same as that of each embodiment of the VSIM file data access control method described above, and details are not described herein again.
An embodiment of the present application further provides a VSIM file data access control device, where the VSIM file data access control device includes:
the storage module is used for acquiring preset VSIM file data and encrypting and storing the preset VSIM file data;
the first verification module is used for verifying the VSIM account related to the access request when the access request is received;
and the reading module is used for reading the preset VSIM file data when the VSIM account passes the verification.
Optionally, the storage module comprises:
the generating unit is used for generating the preset VSIM file data based on the user information in the network injection request when the network injection request of the first user is received;
the modularization unit is used for carrying out modularization processing on the preset VSIM file data to obtain a VSIM file module;
and the storage unit is used for downloading the VSIM file module and storing the VSIM file module into a preset resource sharing database.
Optionally, the modular unit comprises:
the extraction subunit is used for extracting keywords from the preset VSIM file data to obtain a keyword set corresponding to the preset VSIM file data;
the encryption subunit is configured to encrypt the preset VSIM file data based on a preset key to obtain a VSIM encrypted file corresponding to the preset VSIM file data;
and the input module is used for inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module.
Optionally, the reading module comprises:
the query unit is used for querying the VSIM file module in the preset resource sharing database based on the keywords in the keyword set when the VSIM account passes the verification;
and the decryption unit is used for extracting the VSIM encrypted file in the VSIM file module, decrypting the VSIM encrypted file based on the preset key and obtaining the preset VSIM file data.
Optionally, the VSIM file data access control apparatus further includes:
the extraction module is used for extracting the user identity information in the VSIM account registration request when the VSIM account registration request is received;
and the checking module is used for checking the user identity information, and generating a VSIM account corresponding to the user identity information when the user identity information passes the checking.
Optionally, the VSIM file data access control apparatus further includes:
the association module is used for associating a second user associated with the association request with the VSIM account when the association request is received, and acquiring association permission corresponding to the second user;
and the second verification module is used for verifying the VSIM account number and the association authority of the first user when receiving the access request of the second user.
Optionally, the associating module includes:
an extracting unit, configured to extract the second user information in the association request;
a verification unit, configured to verify the second user information, and set the second user as an associated user of the VSIM account after the second user information is verified;
the verification unit is used for verifying the login request when the login request of the associated user is received;
and the judging unit is used for endowing the second user with the associated authority through a preset server when the login request passes the verification.
The specific implementation of the VSIM file data access control apparatus of the present application is substantially the same as that of each embodiment of the VSIM file data access control method described above, and details are not described herein again.
The present application provides a storage-readable storage medium storing one or more programs, which are further executable by one or more processors for implementing the steps of the VSIM file data access control method described in any one of the above.
The specific implementation of the readable storage medium of the present application is substantially the same as the embodiments of the VSIM file data access control method described above, and is not described herein again.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A VSIM file data access control method is characterized by comprising the following steps:
acquiring preset VSIM file data, and encrypting and storing the preset VSIM file data;
when an access request is received, verifying a VSIM account related to the access request;
and when the VSIM account passes the verification, reading the preset VSIM file data.
2. The VSIM file data access control method of claim 1, wherein the registered user having the VSIM account is a first user,
the steps of obtaining preset VSIM file data and encrypting and storing the preset VSIM file data comprise:
when a network injection request of the first user is received, generating the preset VSIM file data based on user information in the network injection request;
performing modular processing on the preset VSIM file data to obtain a VSIM file module;
and downloading the VSIM file module, and storing the VSIM file module into a preset resource sharing database.
3. The VSIM file data access control method of claim 2, wherein the step of modularly processing the preset VSIM file data to obtain a VSIM file module comprises:
extracting keywords from the preset VSIM file data to obtain a keyword set corresponding to the preset VSIM file data;
encrypting the preset VSIM file data based on a preset key to obtain a VSIM encrypted file corresponding to the preset VSIM file data;
and inputting the keyword set and the VSIM encrypted file into a preset VSIM template to obtain the VSIM file module.
4. The VSIM file data access control method of claim 3, wherein the step of reading the preset VSIM file data when the VSIM account number is verified comprises:
when the VSIM account passes the verification, inquiring the VSIM file module in the preset resource sharing database based on the keywords in the keyword set;
and extracting the VSIM encrypted file in the VSIM file module, and decrypting the VSIM encrypted file based on the preset key to obtain preset VSIM file data.
5. The VSIM file data access control method of claim 1, wherein the step of obtaining the preset VSIM file data and storing the preset VSIM file data in an encrypted manner comprises:
when the VSIM account registration request is received, extracting user identity information in the VSIM account registration request;
and checking the user identity information, and generating a VSIM account corresponding to the user identity information when the user identity information passes the checking.
6. The VSIM file data access control method of claim 1, wherein the VSIM file data access control method comprises:
when an association request is received, associating a second user associated with the association request with the VSIM account to obtain an association authority corresponding to the second user;
and when receiving an access request of the second user, verifying the VSIM account and the association authority.
7. The VSIM file data access control method of claim 6, wherein the step of associating the second user associated with the association request with the VSIM account, and obtaining the association right corresponding to the second user comprises:
extracting second user information in the association request;
verifying the second user information, and setting the second user as a related user of the VSIM account after the second user information is verified;
when a login request of the associated user is received, verifying the login request;
and when the login request passes the verification, giving the second user the associated authority through a preset server.
8. A VSIM file data access control apparatus, which is applied to a VSIM file data access control device, the VSIM file data access control apparatus comprising:
the storage module is used for acquiring preset VSIM file data and encrypting and storing the preset VSIM file data;
the verification module is used for verifying the VSIM account related to the access request when the access request is received;
and the reading module is used for reading the preset VSIM file data when the VSIM account passes the verification.
9. A VSIM file data access control device, characterized in that the VSIM file data access control device comprises: a memory, a processor, and a program stored on the memory for implementing the VSIM file data access control method,
the memory is used for storing a program for realizing a VSIM file data access control method;
the processor is configured to execute a program implementing the VSIM file data access control method to implement the steps of the VSIM file data access control method according to any one of claims 1 to 7.
10. A readable storage medium having stored thereon a program for implementing a VSIM file data access control method, the program being executed by a processor to implement the steps of the VSIM file data access control method according to any one of claims 1 to 7.
CN201911179660.XA 2019-11-25 2019-11-25 VSIM file data access control method, device, equipment and readable storage medium Pending CN110990862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911179660.XA CN110990862A (en) 2019-11-25 2019-11-25 VSIM file data access control method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911179660.XA CN110990862A (en) 2019-11-25 2019-11-25 VSIM file data access control method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN110990862A true CN110990862A (en) 2020-04-10

Family

ID=70087313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911179660.XA Pending CN110990862A (en) 2019-11-25 2019-11-25 VSIM file data access control method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110990862A (en)

Similar Documents

Publication Publication Date Title
US10305902B2 (en) Two-channel authentication proxy system capable of detecting application tampering and method therefor
CN110324276B (en) Method, system, terminal and electronic device for logging in application
CN106657152B (en) Authentication method, server and access control device
CN109194625B (en) Client application protection method and device based on cloud server and storage medium
CN111209558B (en) Internet of things equipment identity authentication method and system based on block chain
US11177963B2 (en) Method for authenticating a user based on an image relation rule and corresponding first user device, server and system
CN111666564B (en) Application program safe starting method and device, computer equipment and storage medium
CN109145628B (en) Data acquisition method and system based on trusted execution environment
CN109196891B (en) Method, terminal and server for managing subscription data set
EP1574928A1 (en) Program execution control apparatus, os, client terminal, server, program execution control system, program execution control method, and program execution control program
KR101642267B1 (en) System for preventing forgery of application and method therefor
CN111510442A (en) User verification method and device, electronic equipment and storage medium
US9977907B2 (en) Encryption processing method and device for application, and terminal
CN111148213B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN110399706B (en) Authorization authentication method, device and computer system
Vella et al. D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
JP2016012902A (en) Electronic data utilization system, portable terminal device, and method for electronic data utilization system
CN111132149A (en) Registration method of 5G user terminal, user terminal equipment and medium
KR20140103004A (en) User authenticating method and apparatus
EP3975015B1 (en) Applet package sending method and device and computer readable medium
CN110990862A (en) VSIM file data access control method, device, equipment and readable storage medium
KR20190012026A (en) System and method for login authentication processing
CN113992353A (en) Login certificate processing method and device, electronic equipment and storage medium
CN113297563A (en) Method and device for accessing privileged resources of system on chip and system on chip
CN111132156A (en) Registration method of 5G user terminal, user terminal equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination