CN112685336A - Method and system for safely realizing quick addressing of data - Google Patents
Method and system for safely realizing quick addressing of data Download PDFInfo
- Publication number
- CN112685336A CN112685336A CN202110033571.5A CN202110033571A CN112685336A CN 112685336 A CN112685336 A CN 112685336A CN 202110033571 A CN202110033571 A CN 202110033571A CN 112685336 A CN112685336 A CN 112685336A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- server
- temporary
- main server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention relates to a method for safely realizing fast addressing of data, which comprises the following steps: recording user characteristics when a user accesses the main server for the first time, and adding an encrypted user account in the temporary server; after distributed storage, the main server stores the storage path in an encrypted user account; when a user does not access the main server for the first time, the main server acquires user characteristics and wakes up the temporary server in a background mode, and the temporary server combines and restores data; according to a data reading instruction sent by a user, the main server correspondingly reads data from the temporary server and sends the data to the user; by the method, the user characteristics are obtained during initial login, the temporary server is awakened in a user login and user characteristic double-verification mode, data is read and restored by addressing in advance when the user is not operated, at least half of waiting time can be saved, and safety performance is greatly improved.
Description
Technical Field
The invention relates to the technical field of data fast addressing, in particular to a method and a system for safely realizing data fast addressing.
Background
In a distributed data storage system, data addressing relates to the reading speed of data, and in a conventional mode, after a user logs in a server, the server performs corresponding data addressing reading operation according to an instruction of the user.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method for safely implementing fast addressing of data and a system for safely implementing fast addressing of data, aiming at the above-mentioned defects of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a method for safely realizing fast addressing of data is constructed, wherein the method comprises the following steps:
the first step is as follows: setting a temporary server only responding to the instruction of the main server, recording user characteristics when a user accesses the main server for the first time, and adding encrypted user accounts corresponding to the users one by one in the temporary server according to the user characteristics;
the second step is that: after the user finishes distributed storage each time, the main server stores the storage path in an encrypted user account corresponding to the user on the temporary server;
the third step: when a user does not access the main server for the first time, the main server acquires user characteristics and wakes up the temporary server in a background mode, and the temporary server reads data in a plurality of memories according to storage paths in corresponding encrypted user accounts and combines and restores the data into originally stored complete data;
the fourth step: and according to the data reading instruction sent by the user, the main server correspondingly reads the data from the temporary server and sends the data to the user.
The method for safely realizing the quick addressing of the data further comprises the fifth step of: and when the user logs out of the main server, clearing the files in the temporary server.
The method for safely realizing the rapid addressing of the data comprises the steps that a temporary storage space is arranged in a temporary server, a plurality of subintervals are divided into the temporary storage space and used for storing the data, and only one encrypted user account is correspondingly connected to a single subinterval at the same time.
The method for safely realizing the rapid addressing of the data comprises the steps that when a user logs out of a main server, the main server sends a corresponding canceling instruction to a temporary server, and the temporary server clears information in a subinterval according to the instruction and disconnects the encrypted user account from the subinterval.
The invention relates to a method for safely realizing quick addressing of data, which further comprises the following steps:
when a user accesses the main server for the first time, the user is reminded to input a plurality of items of different user characteristic data, and when the user does not access the main server for the first time, one or more items of user characteristic data are randomly extracted for verification.
The invention relates to a method for safely realizing rapid addressing of data, wherein the user characteristic data is fingerprints, human faces or irises.
In the third step, when the temporary server receives the awakening instruction of the main server, the temporary server sends a user verification request to the main server to verify whether the user logs in, if so, the data reading operation is performed, otherwise, an encrypted user account corresponding to the user is locked and a monitoring center is warned and reminded.
A system for realizing the fast addressing of the data safely is used for realizing the method for realizing the fast addressing of the data safely, and comprises a main server, a temporary server and a plurality of storages, wherein the temporary server only responds to the instruction of the main server;
the main server records user characteristics when a user accesses for the first time, and adds an encrypted user account corresponding to the user characteristics one by one in the temporary server;
the main server stores the storage path in an encrypted user account corresponding to the user on the temporary server after the user finishes distributed storage each time;
the main server acquires user characteristics and wakes up the temporary server in a background mode when a user does not access for the first time, and the temporary server reads data in a plurality of memories according to storage paths in corresponding encrypted user accounts and combines and restores the data into originally stored complete data;
and the main server reads the data from the temporary server correspondingly according to the data reading instruction sent by the user and sends the data to the user.
The invention has the beneficial effects that: by the method, the user characteristics are obtained during initial login, the temporary server is awakened in a user login and user characteristic double-verification mode, data is read and restored by addressing in advance when the user is not operated, at least half of waiting time can be saved, and safety performance is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be further described with reference to the accompanying drawings and embodiments, wherein the drawings in the following description are only part of the embodiments of the present invention, and for those skilled in the art, other drawings can be obtained without inventive efforts according to the accompanying drawings:
FIG. 1 is a flow chart of a method for securely implementing fast addressing of data according to a preferred embodiment of the present invention;
FIG. 2 is a schematic block diagram of a system for securely implementing fast addressing of data according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the following will clearly and completely describe the technical solutions in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without inventive step, are within the scope of the present invention.
The method for safely realizing the fast addressing of the data of the preferred embodiment of the invention, as shown in fig. 1, comprises the following steps:
s01: setting a temporary server only responding to the instruction of the main server, recording user characteristics when a user accesses the main server for the first time, and adding encrypted user accounts corresponding to the users one by one in the temporary server according to the user characteristics;
s02: after the user finishes distributed storage each time, the main server stores the storage path in an encrypted user account corresponding to the user on the temporary server;
s03: when a user does not access the main server for the first time, the main server acquires user characteristics and wakes up the temporary server in a background mode, and the temporary server reads data in a plurality of memories according to storage paths in corresponding encrypted user accounts and combines and restores the data into originally stored complete data;
s04: and according to the data reading instruction sent by the user, the main server correspondingly reads the data from the temporary server and sends the data to the user.
S05: when the user logs out of the main server, the files in the temporary server are cleared;
by the method, the user characteristics are obtained during initial login, the temporary server is awakened in a user login and user characteristic double-verification mode, data is read and restored by addressing in advance when the user is not operated, at least half of waiting time can be saved, and safety performance is greatly improved.
Preferably, the temporary server is provided with a temporary storage space, the temporary storage space is divided into a plurality of subintervals for storing data, and only one encrypted user account is correspondingly connected to a single subinterval at the same time; the data can be read one by one at the same time by multiple users.
Preferably, when the user logs out of the main server, the main server sends a corresponding canceling instruction to the temporary server, and the temporary server clears the information in the subinterval according to the instruction and disconnects the encrypted user account from the subinterval; the sub-intervals are conveniently and timely output in an airspace, and the information throughput rate is improved.
Preferably, the method further comprises the following steps:
when a user accesses the main server for the first time, reminding the user to input a plurality of items of different user characteristic data, and when the user does not access the main server for the first time, randomly extracting one or more items of user characteristic data for verification; the safety performance is further improved.
Preferably, the user characteristic data is a fingerprint, a human face or an iris; it will be appreciated that other data having user identifying characteristics, such as DNA, etc., are also possible.
Preferably, in the third step, when the temporary server receives the wake-up instruction of the main server, the temporary server sends a user verification request to the main server to verify whether the user logs in, if so, data reading operation is performed, otherwise, an encrypted user account corresponding to the user is locked and a warning prompt is performed on the monitoring center; the reverse checking is convenient to carry out, and the condition that the main server is stolen to store information when being occupied is avoided.
A system for realizing data fast addressing safely, is used for realizing the above-mentioned method for realizing data fast addressing safely, as shown in fig. 2, including main server 1, temporary server 2 and multiple memorizer 3, the temporary server 2 only responds to the main server 1 order;
the main server 1 records user characteristics when a user accesses for the first time, and adds encrypted user accounts corresponding to the users one by one in the temporary server 2 according to the user characteristics;
the main server 1 stores the storage path in an encrypted user account corresponding to the user on the temporary server 2 after the user finishes distributed storage each time;
the main server 1 acquires user characteristics and wakes up the temporary server 2 in a background mode when a user does not access for the first time, and the temporary server 2 reads data in the plurality of memories 3 according to a storage path in a corresponding encrypted user account and combines and restores the data into originally stored complete data;
the main server 1 reads data from the temporary server 2 correspondingly according to a data reading instruction sent by a user and sends the data to the user;
by the mode system, the user characteristics are acquired during initial login, the temporary server is awakened by means of user login and user characteristic double verification, data is read and restored by addressing in advance when the user is not operated, at least half of waiting time can be saved, and meanwhile safety performance is greatly improved.
It will be understood that modifications and variations can be made by persons skilled in the art in light of the above teachings and all such modifications and variations are intended to be included within the scope of the invention as defined in the appended claims.
Claims (8)
1. A method for safely realizing fast addressing of data is characterized by comprising the following steps:
the first step is as follows: setting a temporary server only responding to the instruction of the main server, recording user characteristics when a user accesses the main server for the first time, and adding encrypted user accounts corresponding to the users one by one in the temporary server according to the user characteristics;
the second step is that: after the user finishes distributed storage each time, the main server stores the storage path in an encrypted user account corresponding to the user on the temporary server;
the third step: when a user does not access the main server for the first time, the main server acquires user characteristics and wakes up the temporary server in a background mode, and the temporary server reads data in a plurality of memories according to storage paths in corresponding encrypted user accounts and combines and restores the data into originally stored complete data;
the fourth step: and according to the data reading instruction sent by the user, the main server correspondingly reads the data from the temporary server and sends the data to the user.
2. The method for safely realizing fast addressing of data according to claim 1, further comprising a fifth step of: and when the user logs out of the main server, clearing the files in the temporary server.
3. The method for safely realizing fast addressing of data according to claim 2, wherein a temporary storage space is provided in the temporary server, the temporary storage space is divided into a plurality of sub-intervals for storing data, and only one encrypted user account is correspondingly connected to a single sub-interval at the same time.
4. The method for safely implementing data quick addressing according to claim 3, characterized in that, when the user logs out of the main server, the main server sends a corresponding cancel instruction to the temporary server, and the temporary server clears the information in the subinterval according to the instruction and disconnects the connection between the encrypted user account and the subinterval.
5. The method for safely implementing fast addressing of data according to any one of claims 1-4, further comprising the steps of:
when a user accesses the main server for the first time, the user is reminded to input a plurality of items of different user characteristic data, and when the user does not access the main server for the first time, one or more items of user characteristic data are randomly extracted for verification.
6. The method for safely implementing data fast addressing according to claim 5, characterized in that, the user characteristic data is fingerprint, human face or iris.
7. The method for safely implementing fast data addressing according to any one of claims 1-4, wherein in the third step, when the temporary server receives the wake-up instruction of the main server, the temporary server sends a user authentication request to the main server to authenticate whether the user logs in, if so, data reading operation is performed, otherwise, an encrypted user account corresponding to the user is locked and a warning prompt is performed on the supervision center.
8. A system for implementing fast addressing of secure implementation data, for implementing the method of implementing fast addressing of secure implementation data according to any one of claims 1 to 7, comprising a main server, a temporary server and a plurality of memories, wherein the temporary server is only responsive to the main server instructions;
the main server records user characteristics when a user accesses for the first time, and adds encrypted user accounts corresponding to the users one by one in the temporary server according to the user characteristics;
the main server stores the storage path in an encrypted user account corresponding to the user on the temporary server after the user finishes distributed storage each time;
the main server acquires user characteristics and wakes up the temporary server in a background mode when a user does not access for the first time, and the temporary server reads data in a plurality of memories according to storage paths in corresponding encrypted user accounts and combines and restores the data into originally stored complete data;
and the main server reads the data from the temporary server correspondingly according to the data reading instruction sent by the user and sends the data to the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110033571.5A CN112685336B (en) | 2021-01-12 | 2021-01-12 | Method and system for safely realizing quick addressing of data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110033571.5A CN112685336B (en) | 2021-01-12 | 2021-01-12 | Method and system for safely realizing quick addressing of data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112685336A true CN112685336A (en) | 2021-04-20 |
CN112685336B CN112685336B (en) | 2023-10-10 |
Family
ID=75457349
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110033571.5A Active CN112685336B (en) | 2021-01-12 | 2021-01-12 | Method and system for safely realizing quick addressing of data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112685336B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594556A (en) * | 2011-12-09 | 2012-07-18 | 北京工业大学 | Identity authentication method based on synchronization of spatiotemporal chaos |
CN106790122A (en) * | 2016-12-27 | 2017-05-31 | 努比亚技术有限公司 | A kind of login method when terminal, server and access application |
WO2018080201A1 (en) * | 2016-10-28 | 2018-05-03 | 엘지전자(주) | Method and device for authenticating device using bluetooth technology |
US20180357403A1 (en) * | 2015-12-07 | 2018-12-13 | Samsung Electronics Co., Ltd. | Method, apparatus, and system for providing temporary account information |
AU2020100734A4 (en) * | 2019-05-24 | 2020-06-18 | Medikey Australia Pty Ltd | Systems and methods for secure digital file sharing and authenticating |
-
2021
- 2021-01-12 CN CN202110033571.5A patent/CN112685336B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594556A (en) * | 2011-12-09 | 2012-07-18 | 北京工业大学 | Identity authentication method based on synchronization of spatiotemporal chaos |
US20180357403A1 (en) * | 2015-12-07 | 2018-12-13 | Samsung Electronics Co., Ltd. | Method, apparatus, and system for providing temporary account information |
WO2018080201A1 (en) * | 2016-10-28 | 2018-05-03 | 엘지전자(주) | Method and device for authenticating device using bluetooth technology |
CN106790122A (en) * | 2016-12-27 | 2017-05-31 | 努比亚技术有限公司 | A kind of login method when terminal, server and access application |
AU2020100734A4 (en) * | 2019-05-24 | 2020-06-18 | Medikey Australia Pty Ltd | Systems and methods for secure digital file sharing and authenticating |
Non-Patent Citations (2)
Title |
---|
VANGA ODELU等: "A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards", 《IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY》, vol. 10, no. 9, XP011663849, DOI: 10.1109/TIFS.2015.2439964 * |
张倩莉;乔治锡;: "基于SSH的Linux系统远程登录研究", 计算机时代, no. 08 * |
Also Published As
Publication number | Publication date |
---|---|
CN112685336B (en) | 2023-10-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109271115B (en) | Storage sharing method and device and block chain distributed network topology | |
Matyas et al. | Toward reliable user authentication through biometrics | |
US20150143494A1 (en) | Continuous identity authentication method for computer users | |
KR101302562B1 (en) | Apparatus and Method for Falsification Protection of Black Box Data | |
US20090140045A1 (en) | PIV card model # 6800 | |
EP3627796B1 (en) | Dynamic and private security fingerprinting | |
US20150101065A1 (en) | User controlled data sharing platform | |
US9268941B1 (en) | Method for secure software resume from low power mode | |
EP3945443A1 (en) | Distributed data management method based on a blockchain network and apparatus therefor | |
CN112328558B (en) | Access log storage method and system of medical system based on block chain | |
CN113228010A (en) | Trust token for resource access | |
KR102170247B1 (en) | System and apparatus for preventing vehicle mileage forgery based on blockchain | |
CN109377611A (en) | Caller management method, system, computer equipment and storage medium based on bio-identification | |
CN112559996B (en) | Dynamic authentication risk detection method and system | |
JP3589579B2 (en) | Biometric authentication device and recording medium on which processing program is recorded | |
CN112685336B (en) | Method and system for safely realizing quick addressing of data | |
JP3864267B1 (en) | Authentication mobile terminal device and authentication mobile terminal program | |
CN115481427A (en) | Block chain-based electronic signature management method, system, equipment and storage medium | |
US20200134167A1 (en) | Method of registering and authenticating a user of an online system | |
CN110717770B (en) | Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts | |
CN112819617A (en) | Data uplink method and device, electronic equipment and storage medium | |
CN116010926A (en) | Login authentication method, login authentication device, computer equipment and storage medium | |
FR2882839A1 (en) | Computer e.g. fixed computer, access protection device for use as e.g. pendant, has memory to contain stored biometric fingerprints and computer access conditions, and microprocessor to compare captured and stored fingerprints | |
CN113158163A (en) | Computer system and user identity identification method and system thereof | |
CN111179524A (en) | ATM (automatic Teller machine) card retaining and retrieving method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |