CN113094671A - Authorization method and device of personal cloud storage equipment and personal cloud storage equipment - Google Patents

Authorization method and device of personal cloud storage equipment and personal cloud storage equipment Download PDF

Info

Publication number
CN113094671A
CN113094671A CN202110397933.9A CN202110397933A CN113094671A CN 113094671 A CN113094671 A CN 113094671A CN 202110397933 A CN202110397933 A CN 202110397933A CN 113094671 A CN113094671 A CN 113094671A
Authority
CN
China
Prior art keywords
client
dimensional code
standard
cloud storage
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110397933.9A
Other languages
Chinese (zh)
Other versions
CN113094671B (en
Inventor
王俊
王太顺
曾后杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Chooseme Information Technology Co ltd
Original Assignee
Guangzhou Chooseme Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Chooseme Information Technology Co ltd filed Critical Guangzhou Chooseme Information Technology Co ltd
Priority to CN202110397933.9A priority Critical patent/CN113094671B/en
Publication of CN113094671A publication Critical patent/CN113094671A/en
Application granted granted Critical
Publication of CN113094671B publication Critical patent/CN113094671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of cloud storage, and provides an authorization method and an authorization device for personal cloud storage equipment and the personal cloud storage equipment. The authorization method of the personal cloud storage device comprises the following steps: in response to an authorization application initiated by a first client, extracting a device serial number of the first client from the authorization application; generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client; receiving a two-dimensional code which is scanned and displayed on the first client side by a second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code; and when the verification is determined to be passed, allowing the authorized access of the second client. The invention initiates an authorization application through the first client, controls the authorization access of the second client by the first client, and improves the data security; and authorization verification is carried out on the second client side in a two-dimensional code mode, and the operation is simple and rapid.

Description

Authorization method and device of personal cloud storage equipment and personal cloud storage equipment
Technical Field
The invention relates to the technical field of cloud storage, in particular to an authorization method and an authorization device for personal cloud storage equipment and the personal cloud storage equipment.
Background
With the continuous development of internet technology, the "cloud on data" gradually permeates governments, enterprises and individuals. Cloud storage is a major branch of data cloud, and has been developed into a popular internet service, and any file and any data can be stored in the cloud regardless of enterprises or individuals and then accessed through devices such as computers and smart phones anytime and anywhere.
While cloud storage services are relatively convenient and have several GB of free space available, when one public cloud storage service is used, control over the data is essentially relinquished: these data are stored on the server of the service provider and are most likely to be copied out. Therefore, personal cloud storage devices suitable for the personal field have come to the fore.
However, when the user binding is performed on the existing personal cloud storage device, only one manager can be allowed to bind, and a non-manager user cannot perform the device binding to use the personal cloud storage device, so that the use effect of the personal cloud storage device is poor, and the user experience is influenced.
Disclosure of Invention
The invention provides an authorization method and an authorization device of personal cloud storage equipment and the personal cloud storage equipment, which are used for realizing the binding of multiple users of the personal cloud storage equipment and facilitating the use of other users.
In order to solve the problems, the invention adopts the following technical scheme:
the invention provides an authorization method of personal cloud storage equipment, which comprises the following steps:
in response to an authorization application initiated by a first client, extracting a device serial number of the first client from the authorization application;
generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
receiving a two-dimensional code which is scanned and displayed on the first client side by a second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code;
and when the verification is determined to be passed, allowing the authorized access of the second client.
Further, before the step of verifying the target two-dimensional code, the method further includes:
judging whether the first client and the second client are in the same local area network or not;
and if so, executing the step of verifying the target two-dimensional code.
Preferably, the step of verifying the target two-dimensional code includes:
judging whether the target two-dimensional code is consistent with a standard two-dimensional code or not;
and if so, determining that the verification is passed.
Preferably, the step of receiving the two-dimensional code scanned by the second client and displayed on the first client includes:
when the condition that the two-dimensional code which is scanned and displayed on the first client side by the second client side is not received within the preset time is monitored, refreshing the standard two-dimensional code;
and sending the refreshed standard two-dimensional code to a second client, and stopping refreshing the standard two-dimensional code until the two-dimensional code which is scanned and displayed on the first client by the second client is monitored to be received in a preset time period.
Preferably, the step of sending the standard two-dimensional code to the first client includes:
encrypting the standard two-dimensional code according to a preset encryption algorithm;
and sending the encrypted standard two-dimensional code to the first client.
Preferably, after the step of allowing the authorized access of the second client, the method further includes:
acquiring the connection state of the second client, and sending the connection state of the second client to the first client;
and when a disconnection instruction of the first client is received, forbidding authorized access of the second client.
Preferably, when the standard two-dimensional code includes a plurality of standard two-dimensional codes, the step of receiving the two-dimensional code scanned by the second client and displayed on the first client includes:
alternately displaying a plurality of standard two-dimensional codes at random on the first client, and recording the display time node of each standard two-dimensional code;
receiving a standard two-dimensional code which is scanned and displayed on a first client side by a second client side to obtain a target two-dimensional code and a scanning time node of the target two-dimensional code;
the step of verifying the target two-dimensional code comprises the following steps:
judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes;
if so, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node;
and if so, determining that the verification is passed.
The invention provides an authorization device of personal cloud storage equipment, which comprises:
the device comprises an extraction module, a storage module and a processing module, wherein the extraction module is used for responding to an authorization application initiated by a first client and extracting a device serial number of the first client from the authorization application;
the generating module is used for generating a standard two-dimensional code according to the equipment serial number and sending the standard two-dimensional code to the first client;
the receiving module is used for receiving the two-dimensional code which is scanned and displayed on the first client side by the second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code;
and the allowing module is used for allowing the authorized access of the second client after the verification is determined to be passed.
The invention provides a personal cloud storage device, which comprises a memory and a processor, wherein computer readable instructions are stored in the memory, and when the computer readable instructions are executed by the processor, the processor is caused to execute the steps of the authorization method of the personal cloud storage device.
The invention provides a storage medium on which a computer program is stored, which, when executed by a processor, implements a method of authorizing a personal cloud storage device as recited in any one of the above.
Compared with the prior art, the technical scheme of the invention at least has the following advantages:
according to the authorization method and device for the personal cloud storage device and the personal cloud storage device, firstly, the device serial number of the first client is extracted from an authorization application in response to the authorization application initiated by the first client. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain the target two-dimensional code. Finally, the target two-dimensional code is verified, and after the verification is confirmed to be passed, authorized access of the second client is allowed, so that an authorization application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the data security is improved; and authorization verification is carried out on the second client side in a two-dimensional code mode, and the operation is simple and rapid.
Drawings
FIG. 1 is a flow chart of an embodiment of an authorization method of a personal cloud storage device according to the present invention;
FIG. 2 is a flow chart of another embodiment of an authorization method of a personal cloud storage device according to the present invention;
FIG. 3 is a block diagram of an authorization apparatus of a personal cloud storage device according to an embodiment of the present invention;
fig. 4 is a block diagram of an internal structure of a personal cloud storage device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
In some of the flows described in the present specification and claims and in the above-described figures, a number of operations are included that occur in a particular order, but it should be clearly understood that these operations may be performed out of order or in parallel as they occur herein, with the order of the operations being numbered, e.g., S11, S12, etc., merely to distinguish between various operations, and the order of the operations by themselves is not meant to imply any order of execution. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor limit the types of "first" and "second" to be different.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
It will be understood by those of ordinary skill in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 in combination with fig. 2, the authorization method for a personal cloud storage device provided by the present invention uses the personal cloud storage device as an execution subject, and is used to solve the problem that when a current personal cloud storage device performs user binding, only one administrator is allowed to bind, and a non-administrator user cannot perform device binding to use the personal cloud storage device, so that the usage effect of the personal cloud storage device is poor and user experience is affected. The personal cloud storage device can be connected with the client of the user only and is not connected with an external network, and is used for storing data uploaded by the user and ensuring the safety of the data. In one embodiment, the authorization method of the personal cloud storage device comprises the following steps:
s11, responding to an authorization application initiated by a first client, and extracting the equipment serial number of the first client from the authorization application;
s12, generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
s13, receiving a two-dimensional code which is scanned and displayed on the first client side by a second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code;
and S14, when the verification is passed, allowing the authorized access of the second client.
As described in the above step S11, the first client is the terminal used by the first user, i.e., the terminal used by the administrator. The second client is a terminal used by a second user except the first user, namely a terminal used by a joining user, and the number of the second users can be multiple, so that the binding use of multiple users of the personal cloud storage device is realized under the control of the first user, and further the resource sharing of the personal cloud storage device is realized.
The equipment serial number is called international mobile equipment identification code, which is the only identification code when the equipment leaves the factory. Taking a mobile phone as an example, each mobile phone corresponds to a unique imei (gsm) or esn (cdma) number, and the unique imei (gsm) or esn (cdma) number is solidified in a mobile phone chip in the production process, cannot be modified, becomes an 'identification number' of the mobile phone, and can play roles in checking the phone number and identifying authenticity.
When the second client needs to use the personal cloud storage device, an authorization application is initiated to the personal cloud storage device through the first client, wherein the authorization application carries the device serial number of the first client. When receiving an authorization application initiated by a first client, the personal cloud storage device extracts the equipment serial number of the first client from the authorization application, and verifies the equipment serial number to judge whether the first client initiating the authorization application is a terminal used by an administrator.
As described in step S12, when it is determined that the first client initiating the authorization application is the terminal used by the administrator, the standard two-dimensional code is generated according to the device serial number, sent to the first client, and displayed on the first client. Because the standard two-dimensional code is generated through the personal cloud storage device, the risk of being cracked is reduced.
The two-dimensional code is a readable bar code expanded on the basis of a one-dimensional bar code. The apparatus having the scanning function scans the two-dimensional code, and by identifying binary data described in the length and width of the two-dimensional code, information contained therein can be acquired. Compared with a one-dimensional code, the two-dimensional code is recorded with more complex data, such as pictures, network links and the like. The information in the two-dimensional code in the embodiment of the invention comprises information such as request time of authorization application, user information of the first user and the like.
As described in step S13, the second client receives the standard two-dimensional code sent by the personal cloud storage device, and displays the standard two-dimensional code for the second client to scan. When the second client side is displayed on the two-dimensional code of the first client side through the intelligent APP scanning, a target two-dimensional code is obtained, the target two-dimensional code is verified, and verification information is generated. The verification information is information for prompting whether to authorize the second client, and the content may be "confirm to authorize the second client", or "disallow to authorize the second client", and may be set according to an actual application condition, which is not limited herein.
And when the verification is determined not to pass, forbidding the authorized access of the second client, and sending a message that the authorization does not pass to the second client.
As described in step S14, after the verification is determined to be passed, the authorized access of the second client is allowed, so that the second client can upload data to the personal cloud storage device, view or download data from the personal cloud storage device. Therefore, the second client can be authorized only by scanning the corresponding two-dimensional code, the operation is simple, the operation time is reduced, the user does not need to input an account number and a password, and the safety is improved.
According to the authorization method and device for the personal cloud storage device and the personal cloud storage device, firstly, the device serial number of the first client is extracted from an authorization application in response to the authorization application initiated by the first client. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain the target two-dimensional code. Finally, the target two-dimensional code is verified, and after the verification is confirmed to be passed, authorized access of the second client is allowed, so that an authorization application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the data security is improved; and authorization verification is carried out on the second client side in a two-dimensional code mode, and the operation is simple and rapid.
In an embodiment, in step S12, the step of sending the standard two-dimensional code to the first client may specifically include:
s121, encrypting the standard two-dimensional code according to a preset encryption algorithm;
and S122, sending the encrypted standard two-dimensional code to the first client.
In this embodiment, identification information may be added to the standard two-dimensional code to encrypt the standard two-dimensional code, and the encrypted standard two-dimensional code is sent to the first client, and when the received target two-dimensional code sent by the second client contains the identification information, the verification is passed, so that the security of the data is improved. Of course, the preset encryption algorithm may also adopt a symmetric encryption manner or an asymmetric encryption manner, which is not specifically limited herein.
In an embodiment, in step S13, before the step of verifying the target two-dimensional code, the method may further include:
judging whether the first client and the second client are in the same local area network or not;
and if so, executing the step of verifying the target two-dimensional code.
In this embodiment, account information of a network connected with a first client and account information of a network connected with a second client can be acquired, the account information of the network connected with the first client and the account information of the network connected with the second client are compared, whether the two account information are consistent or not is judged, if the two account information are consistent, the first client and the second client are in the same local area network or intranet, so that the user and an administrator can be ensured to face each other below a line, tedious authentication of the administrator is avoided, personal cloud storage equipment is prevented from being exposed to an external network, and privacy and data security of the equipment are sacrificed.
In addition, when the personal cloud storage device is provided with the AP hotspot, the first client and the second client can be accessed to the AP hotspot of the personal cloud storage device, so that the first client and the second client are in the same local area network. Among them, the AP is the HUB in the traditional wired network, and is also the most commonly used device for building the small wireless lan. The AP acts as a bridge connecting the network and the wireless network, and mainly functions to connect the wireless network clients together and then to access the wireless network to the ethernet. The personal cloud storage device with the AP hotspot can send out WIFI named by the ID number of the personal cloud storage device after being powered on. The mobile phone and the personal cloud storage device form a local area network by connecting the WIFI, and the WIFI can be added by searching the local area network.
In an embodiment, in step S13, the step of verifying the target two-dimensional code may specifically include:
s131, judging whether the target two-dimensional code is consistent with a standard two-dimensional code;
and S132, if so, determining that the verification is passed.
In this embodiment, the target two-dimensional code is compared with the standard two-dimensional code to determine whether the target two-dimensional code is the standard two-dimensional code sent to the first client by the personal cloud storage device, and when the target two-dimensional code is inconsistent with the standard two-dimensional code, it indicates that the target two-dimensional code is not the standard two-dimensional code sent to the first client by the personal cloud storage device, and if the target two-dimensional code is not the standard two-dimensional code, the verification is not passed, and the authorized access of the second client is prohibited.
When the target two-dimensional code is consistent with the standard two-dimensional code, the verification is determined to be passed, so that a hacker is effectively prevented from tampering the client data to pass the verification, and the verification reliability is improved.
In an embodiment, in step S13, the step of receiving the two-dimensional code that is displayed on the first client by the second client through scanning may specifically include:
d131, refreshing the standard two-dimensional code when monitoring that the two-dimensional code scanned and displayed on the first client side by the second client side is not received within the preset time;
and D132, sending the refreshed standard two-dimensional code to a second client, and stopping refreshing the standard two-dimensional code until the two-dimensional code which is scanned and displayed on the first client by the second client is monitored to be received in a preset time period.
In this embodiment, the personal cloud storage device determines whether the two-dimensional code scanned and displayed on the first client by the second client exceeds a preset time, if not, the target two-dimensional code is checked, otherwise, the standard two-dimensional code is refreshed, and the refreshed standard two-dimensional code is sent to the second client until the two-dimensional code scanned and displayed on the first client is received within a preset time period, so that the uniqueness, timeliness and safety of the two-dimensional code are ensured.
The preset time period may be 30 seconds, 1 minute, 10 minutes, and the like, and may be set according to an actual application situation, which is not limited.
Specifically, when the personal cloud storage device sends the standard two-dimensional code to the first client, if the two-dimensional code which is scanned and displayed on the first client by the second client is not received within one minute, the standard two-dimensional code is refreshed, a new two-dimensional code is generated, and the new two-dimensional code is sent to the first client.
In an embodiment, when the standard two-dimensional code includes a plurality of standard two-dimensional codes, the step of receiving the two-dimensional code that is scanned and displayed on the first client by the second client may specifically include:
alternately displaying a plurality of standard two-dimensional codes at random on the first client, and recording the display time node of each standard two-dimensional code;
receiving a standard two-dimensional code which is scanned and displayed on a first client side by a second client side to obtain a target two-dimensional code and a scanning time node of the target two-dimensional code;
the step of verifying the target two-dimensional code comprises the following steps:
judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes;
if so, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node;
and if so, determining that the verification is passed.
In this embodiment, when a plurality of standard two-dimensional codes are generated, the plurality of standard two-dimensional codes may be randomly and alternately displayed at the first client, and display time nodes of each standard two-dimensional code are recorded, for example, the display time nodes include a standard two-dimensional code a, a standard two-dimensional code B, and a standard two-dimensional code C, and three standard two-dimensional codes are randomly displayed, and the display time node of the standard two-dimensional code a is 00:01, the display time node of the standard two-dimensional code B is 00:10, and the display time node of the standard two-dimensional code C is 00: 20.
And then receiving a standard two-dimensional code which is scanned and displayed on the first client side by the second client side to obtain a target two-dimensional code, receiving a scanning time node of the second client side for scanning the target two-dimensional code, judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes, and if the target two-dimensional code is not matched with the plurality of standard two-dimensional codes, checking the target two-dimensional code and forbidding authorized access of the second client side.
And when the target two-dimensional code is matched with one of the plurality of standard two-dimensional codes, further judging whether the scanning time node of the target two-dimensional code is consistent with the display time node, and when the scanning time node of the target two-dimensional code is consistent with the display time node, determining that the verification is passed. If the target two-dimensional code is consistent with the standard two-dimensional code B, the scanning time node of the target two-dimensional code is also 00:10, and the scanning time node of the target two-dimensional code is consistent with the display time node of the standard two-dimensional code B, the verification is determined to be passed, so that the authorization is ensured to be completed under the face-to-face condition, and the data security is further improved.
In an embodiment, in step S14, after the step of allowing the authorized access of the second client, the method may further include:
s15, acquiring the connection state of the second client, and sending the connection state of the second client to the first client;
and S16, when the disconnection instruction of the first client is received, forbidding the authorized access of the second client.
In this embodiment, after the authorized access of the second client is allowed, the connection status and the access record of the second client may be obtained, and the connection status and the access record of the second client are sent to the first client and displayed on the first client. When a plurality of second clients exist, the connection states and the access records of the plurality of second clients can be displayed on the first client in a list form, so that an administrator can check the use condition of the user.
When the user is found to have the unauthorized behavior, a disconnection instruction for disconnecting the second client can be initiated on the first client, for example, the second client is deleted from the list, so as to prohibit the authorized access of the second client, and realize effective control over the unauthorized user.
Referring to fig. 3, an embodiment of the present invention further provides an authorization apparatus for a personal cloud storage device, and in one embodiment, the authorization apparatus includes an extracting module 11, a generating module 12, a receiving module 13, and an allowing module 14. Wherein the content of the first and second substances,
an extracting module 11, configured to, in response to an authorization application initiated by a first client, extract a device serial number of the first client from the authorization application;
the generating module 12 is configured to generate a standard two-dimensional code according to the device serial number, and send the standard two-dimensional code to the first client;
the receiving module 13 is configured to receive a two-dimensional code which is scanned and displayed on the first client by a second client, obtain a target two-dimensional code, and verify the target two-dimensional code;
and the allowing module 14 is used for allowing the authorized access of the second client after the verification is determined to be passed.
In this embodiment, the first client is a terminal used by the first user, that is, a terminal used by an administrator. The second client is a terminal used by a second user except the first user, namely a terminal used by a joining user. The second users can be multiple, so that under the control of the first user, the binding use of multiple users of the personal cloud storage device is realized, and further the resource sharing of the personal cloud storage device is realized.
The equipment serial number is called international mobile equipment identification code, which is the only identification code when the equipment leaves the factory. Taking a mobile phone as an example, each mobile phone corresponds to a unique imei (gsm) or esn (cdma) number, and the unique imei (gsm) or esn (cdma) number is solidified in a mobile phone chip in the production process, cannot be modified, becomes an 'identification number' of the mobile phone, and can play roles in checking the phone number and identifying authenticity.
When the second client needs to use the personal cloud storage device, an authorization application is initiated to the personal cloud storage device through the first client, wherein the authorization application carries the device serial number of the first client. When receiving an authorization application initiated by a first client, the personal cloud storage device extracts the equipment serial number of the first client from the authorization application, and verifies the equipment serial number to judge whether the first client initiating the authorization application is a terminal used by an administrator.
And when the first client initiating the authorization application is determined to be the terminal used by the administrator, generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and displaying the standard two-dimensional code on the first client. Because the standard two-dimensional code is generated through the personal cloud storage device, the risk of being cracked is reduced.
The two-dimensional code is a readable bar code expanded on the basis of a one-dimensional bar code. The apparatus having the scanning function scans the two-dimensional code, and by identifying binary data described in the length and width of the two-dimensional code, information contained therein can be acquired. Compared with a one-dimensional code, the two-dimensional code is recorded with more complex data, such as pictures, network links and the like. The information in the two-dimensional code in the embodiment of the invention comprises information such as request time of authorization application, user information of the first user and the like.
And the second client receives the standard two-dimensional code sent by the personal cloud storage device, and displays the standard two-dimensional code for the second client to scan. When the second client side is displayed on the two-dimensional code of the first client side through the intelligent APP scanning, a target two-dimensional code is obtained, the target two-dimensional code is verified, and verification information is generated. The verification information is information for prompting whether to authorize the second client, and the content may be "confirm to authorize the second client", or "disallow to authorize the second client", and may be set according to an actual application condition, which is not limited herein.
And when the verification is determined not to pass, forbidding the authorized access of the second client, and sending a message that the authorization does not pass to the second client. And after the verification is confirmed to be passed, allowing the authorized access of the second client, so that the second client can upload data to the personal cloud storage device, and view or download data from the personal cloud storage device. Therefore, the second client can be authorized only by scanning the corresponding two-dimensional code, the operation is simple, the operation time is reduced, the user does not need to input an account number and a password, and the safety is improved.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The invention provides a personal cloud storage device, which comprises a memory and a processor, wherein computer readable instructions are stored in the memory, and when the computer readable instructions are executed by the processor, the processor is caused to execute the steps of the authorization method of the personal cloud storage device.
In one embodiment, as shown in FIG. 4. The personal cloud storage device described in this embodiment may be a server, a personal computer, a network device, and other devices. The personal cloud storage device includes a processor 402, a memory 403, an input unit 404, a display unit 405, and the like. Those skilled in the art will appreciate that the device configuration means shown in fig. 4 do not constitute a limitation of all devices and may include more or less components than those shown, or some components in combination. For example, in most cases, a personal cloud storage device need not be equipped with the display unit 405. The memory 403 may be used to store the computer program 401 and the functional modules, and the processor 402 runs the computer program 401 stored in the memory 403 to execute various functional applications of the device and data processing. The memory may be internal or external memory, or include both internal and external memory. The memory may comprise read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, a floppy disk, a ZIP disk, a usb-disk, a magnetic tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The disclosed memory is by way of example only and not by way of limitation.
The input unit 404 is used for receiving input of signals and receiving keywords input by a user. The input unit 404 may include a touch panel and other input devices. The touch panel can collect touch operations of a user on or near the touch panel (for example, operations of the user on or near the touch panel by using any suitable object or accessory such as a finger, a stylus and the like) and drive the corresponding connecting device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like. The display unit 405 may be used to display information input by a user or information provided to the user and various menus of the personal cloud storage device. The display unit 405 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 402 is a control center of the personal cloud storage device, connects various parts of the whole computer by using various interfaces and lines, and executes various functions and processes data by operating or executing software programs and/or modules stored in the memory 402 and calling data stored in the memory.
As one embodiment, the personal cloud storage device includes: one or more processors 402, a memory 403, one or more computer programs 401, wherein the one or more computer programs 401 are stored in the memory 403 and configured to be executed by the one or more processors 402, the one or more computer programs 401 being configured to perform the method of authorizing a personal cloud storage device as described in the above embodiments.
In one embodiment, the present invention also provides a storage medium storing computer-readable instructions, which when executed by one or more processors, cause the one or more processors to execute the method for authorizing a personal cloud storage device described above. For example, the storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which may be stored in a storage medium and executed by a computer, and the processes of the embodiments of the methods may be included. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
The embodiment is combined to show that the invention has the following maximum beneficial effects:
according to the authorization method and device for the personal cloud storage device and the personal cloud storage device, firstly, the device serial number of the first client is extracted from an authorization application in response to the authorization application initiated by the first client. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain the target two-dimensional code. Finally, the target two-dimensional code is verified, and after the verification is confirmed to be passed, authorized access of the second client is allowed, so that an authorization application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the data security is improved; and authorization verification is carried out on the second client side in a two-dimensional code mode, and the operation is simple and rapid.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An authorization method for a personal cloud storage device, comprising:
in response to an authorization application initiated by a first client, extracting a device serial number of the first client from the authorization application;
generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
receiving a two-dimensional code which is scanned and displayed on the first client side by a second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code;
and when the verification is determined to be passed, allowing the authorized access of the second client.
2. The method for authorizing the personal cloud storage device of claim 1, wherein before the step of verifying the target two-dimensional code, the method further comprises:
judging whether the first client and the second client are in the same local area network or not;
and if so, executing the step of verifying the target two-dimensional code.
3. The method for authorizing the personal cloud storage device of claim 1, wherein the step of verifying the target two-dimensional code comprises:
judging whether the target two-dimensional code is consistent with a standard two-dimensional code or not;
and if so, determining that the verification is passed.
4. The method for authorizing the personal cloud storage device of claim 1, wherein the step of receiving the two-dimensional code scanned by the second client and displayed on the first client comprises:
when the condition that the two-dimensional code which is scanned and displayed on the first client side by the second client side is not received within the preset time is monitored, refreshing the standard two-dimensional code;
and sending the refreshed standard two-dimensional code to a second client, and stopping refreshing the standard two-dimensional code until the two-dimensional code which is scanned and displayed on the first client by the second client is monitored to be received in a preset time period.
5. The method for authorizing the personal cloud storage device of claim 1, wherein the step of sending the standard two-dimensional code to the first client comprises:
encrypting the standard two-dimensional code according to a preset encryption algorithm;
and sending the encrypted standard two-dimensional code to the first client.
6. The method for authorizing a personal cloud storage device of claim 1, wherein said step of allowing authorized access of said second client is followed by further comprising:
acquiring the connection state of the second client, and sending the connection state of the second client to the first client;
and when a disconnection instruction of the first client is received, forbidding authorized access of the second client.
7. The method for authorizing the personal cloud storage device of claim 1, wherein when the standard two-dimensional code includes a plurality of standard two-dimensional codes, the step of receiving the two-dimensional code scanned by the second client and displayed on the first client comprises:
alternately displaying a plurality of standard two-dimensional codes at random on the first client, and recording the display time node of each standard two-dimensional code;
receiving a standard two-dimensional code which is scanned and displayed on a first client side by a second client side to obtain a target two-dimensional code and a scanning time node of the target two-dimensional code;
the step of verifying the target two-dimensional code comprises the following steps:
judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes;
if so, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node;
and if so, determining that the verification is passed.
8. An authorization apparatus of a personal cloud storage device, comprising:
the device comprises an extraction module, a storage module and a processing module, wherein the extraction module is used for responding to an authorization application initiated by a first client and extracting a device serial number of the first client from the authorization application;
the generating module is used for generating a standard two-dimensional code according to the equipment serial number and sending the standard two-dimensional code to the first client;
the receiving module is used for receiving the two-dimensional code which is scanned and displayed on the first client side by the second client side to obtain a target two-dimensional code, and verifying the target two-dimensional code;
and the allowing module is used for allowing the authorized access of the second client after the verification is determined to be passed.
9. A personal cloud storage device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the method of authorization of a personal cloud storage device of any of claims 1 to 7.
10. A storage medium on which a computer program is stored, the computer program, when executed by a processor, implementing the method of authorization of a personal cloud storage device according to any of claims 1 to 7.
CN202110397933.9A 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device Active CN113094671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110397933.9A CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110397933.9A CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Publications (2)

Publication Number Publication Date
CN113094671A true CN113094671A (en) 2021-07-09
CN113094671B CN113094671B (en) 2023-09-29

Family

ID=76677127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110397933.9A Active CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Country Status (1)

Country Link
CN (1) CN113094671B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN109598867A (en) * 2019-02-13 2019-04-09 广东好易点科技有限公司 A kind of community intelligent scene method of servicing and system
CN109743598A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Third party is authorized to access method, system and the readable storage medium storing program for executing of TV
CN109961218A (en) * 2019-03-04 2019-07-02 四点零(成都)教育咨询有限公司 A kind of pupil's ensuring pick-up safety management method and system
CN110334783A (en) * 2019-05-06 2019-10-15 深圳市海派特光伏科技有限公司 Electronic cigarette method for anti-counterfeit, verification method, electronic cigarette system and storage medium
CN110472967A (en) * 2019-07-31 2019-11-19 腾讯科技(深圳)有限公司 A kind of method of calibration, identification end and user terminal
CN110751003A (en) * 2019-09-24 2020-02-04 上海掌门科技有限公司 Method and device for acquiring target data information of two-dimensional code
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110912978A (en) * 2019-11-15 2020-03-24 泰康保险集团股份有限公司 Sign-in information generation method and system
CN111478923A (en) * 2020-04-28 2020-07-31 华为技术有限公司 Access request response method and device and electronic equipment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN109743598A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Third party is authorized to access method, system and the readable storage medium storing program for executing of TV
CN109598867A (en) * 2019-02-13 2019-04-09 广东好易点科技有限公司 A kind of community intelligent scene method of servicing and system
CN109961218A (en) * 2019-03-04 2019-07-02 四点零(成都)教育咨询有限公司 A kind of pupil's ensuring pick-up safety management method and system
CN110334783A (en) * 2019-05-06 2019-10-15 深圳市海派特光伏科技有限公司 Electronic cigarette method for anti-counterfeit, verification method, electronic cigarette system and storage medium
CN110472967A (en) * 2019-07-31 2019-11-19 腾讯科技(深圳)有限公司 A kind of method of calibration, identification end and user terminal
CN110751003A (en) * 2019-09-24 2020-02-04 上海掌门科技有限公司 Method and device for acquiring target data information of two-dimensional code
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110912978A (en) * 2019-11-15 2020-03-24 泰康保险集团股份有限公司 Sign-in information generation method and system
CN111478923A (en) * 2020-04-28 2020-07-31 华为技术有限公司 Access request response method and device and electronic equipment

Also Published As

Publication number Publication date
CN113094671B (en) 2023-09-29

Similar Documents

Publication Publication Date Title
US10826882B2 (en) Network-based key distribution system, method, and apparatus
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
US20180295137A1 (en) Techniques for dynamic authentication in connection within applications and sessions
EP3346660B1 (en) Authentication information update method and device
US9998441B2 (en) Client authentication using social relationship data
WO2017197974A1 (en) Biometric characteristic-based security authentication method, device and electronic equipment
US20170063827A1 (en) Data obfuscation method and service using unique seeds
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
EP3138232A1 (en) System and method for carrying strong authentication events over different channels
CN107347049B (en) Account authentication method and server
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN106161348B (en) Single sign-on method, system and terminal
CN109101795A (en) A kind of account number safe login method, apparatus and system
CN105656627A (en) Identity verification method, device and system
WO2016188335A1 (en) Access control method, apparatus and system for user data
CN107484032A (en) Prevent the verification method and device brushed
CN108200037A (en) A kind of method and system that safety operation is performed using safety equipment
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN111405550B (en) WhatsApp key file extraction method and WhatsApp key file extraction equipment
CN108322507A (en) A kind of method and system executing safety operation using safety equipment
CN108337235A (en) A kind of method and system executing safety operation using safety equipment
KR101087698B1 (en) Method for authenticating security of smart-phone
CN108989331B (en) Use authentication method of data storage device, device and storage medium thereof
CN108322440B (en) Card reading login method and security login system by using security equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant