CN113094671B - Authorization method and device of personal cloud storage device and personal cloud storage device - Google Patents

Authorization method and device of personal cloud storage device and personal cloud storage device Download PDF

Info

Publication number
CN113094671B
CN113094671B CN202110397933.9A CN202110397933A CN113094671B CN 113094671 B CN113094671 B CN 113094671B CN 202110397933 A CN202110397933 A CN 202110397933A CN 113094671 B CN113094671 B CN 113094671B
Authority
CN
China
Prior art keywords
client
dimensional code
standard
cloud storage
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110397933.9A
Other languages
Chinese (zh)
Other versions
CN113094671A (en
Inventor
王俊
王太顺
曾后杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Chooseme Information Technology Co ltd
Original Assignee
Guangzhou Chooseme Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Chooseme Information Technology Co ltd filed Critical Guangzhou Chooseme Information Technology Co ltd
Priority to CN202110397933.9A priority Critical patent/CN113094671B/en
Publication of CN113094671A publication Critical patent/CN113094671A/en
Application granted granted Critical
Publication of CN113094671B publication Critical patent/CN113094671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of cloud storage, and provides an authorization method and device of personal cloud storage equipment and the personal cloud storage equipment. The authorization method of the personal cloud storage device comprises the following steps: responding to an authorization application initiated by a first client, and extracting a device serial number of the first client from the authorization application; generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client; receiving a two-dimensional code which is scanned and displayed on the first client by a second client, obtaining a target two-dimensional code, and checking the target two-dimensional code; and allowing authorized access of the second client after the verification is determined to pass. According to the method and the device, the first client initiates the authorization application, and the first client controls the authorized access of the second client, so that the security of data is improved; and the second client is authorized and checked in a two-dimensional code mode, so that the operation is simple and quick.

Description

Authorization method and device of personal cloud storage device and personal cloud storage device
Technical Field
The present invention relates to the field of cloud storage technologies, and in particular, to an authorization method and apparatus for a personal cloud storage device, and a personal cloud storage device.
Background
With the continuous development of internet technology, "data clouding" gradually permeates governments, enterprises and individuals. Cloud storage, which is a big branch of "cloud on data", has evolved into a popular internet service, which can store any file, any material to the cloud, and then access it through computers, smartphones, etc. at any time and any place, whether by enterprises or individuals.
Although the cloud storage service is relatively convenient and has several GB of free space available, when a common cloud storage service is used, control over data is basically abandoned: these data are stored on the server of the service provider, most likely being copied out. Therefore, personal cloud storage devices suitable for the personal field are emerging.
However, when the current personal cloud storage device is used for user binding, only one manager can be allowed to bind, and a non-manager user cannot bind the device to use the personal cloud storage device, so that the use effect of the personal cloud storage device is poor, and the user experience is affected.
Disclosure of Invention
The invention provides an authorization method and device for personal cloud storage equipment and the personal cloud storage equipment, which realize the binding of multiple users of the personal cloud storage equipment and are convenient for other users to use.
In order to solve the problems, the invention adopts the following technical scheme:
the invention provides an authorization method of personal cloud storage equipment, which comprises the following steps:
responding to an authorization application initiated by a first client, and extracting a device serial number of the first client from the authorization application;
generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
receiving a two-dimensional code which is scanned and displayed on the first client by a second client, obtaining a target two-dimensional code, and checking the target two-dimensional code;
and allowing authorized access of the second client after the verification is determined to pass.
Further, before the step of verifying the target two-dimensional code, the method further includes:
judging whether the first client and the second client are under the same local area network or not;
if yes, executing the step of checking the target two-dimensional code.
Preferably, the step of verifying the target two-dimensional code includes:
judging whether the target two-dimensional code is consistent with a standard two-dimensional code or not;
if yes, determining that the verification is passed.
Preferably, the step of receiving the two-dimensional code displayed on the first client by the second client includes:
refreshing the standard two-dimensional code when the fact that the second client side does not receive the two-dimensional code scanned and displayed on the first client side in a preset time is monitored;
and sending the refreshed standard two-dimensional code to a second client until the second client is detected to receive the two-dimensional code which is scanned and displayed on the first client in a preset time period, and stopping refreshing the standard two-dimensional code.
Preferably, the step of sending the standard two-dimensional code to the first client includes:
encrypting the standard two-dimensional code according to a preset encryption algorithm;
and sending the encrypted standard two-dimensional code to the first client.
Preferably, after the step of allowing authorized access of the second client, the method further includes:
acquiring a connection state of the second client, and sending the connection state of the second client to the first client;
and when receiving a disconnection instruction of the first client, prohibiting authorized access of the second client.
Preferably, when the standard two-dimensional code includes a plurality of two-dimensional codes, the step of receiving the two-dimensional code scanned and displayed on the first client by the second client includes:
randomly and alternately displaying a plurality of standard two-dimensional codes on the first client, and recording display time nodes of each standard two-dimensional code;
receiving a standard two-dimensional code which is scanned and displayed on the first client by a second client to obtain a target two-dimensional code and a scanning time node of the target two-dimensional code;
the step of verifying the target two-dimensional code comprises the following steps:
judging whether the target two-dimensional code is matched with any one of the standard two-dimensional codes;
if yes, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node;
if yes, determining that the verification is passed.
The invention provides an authorization device of personal cloud storage equipment, which comprises:
the device comprises an extraction module, a first client and a second client, wherein the extraction module is used for responding to an authorization application initiated by the first client and extracting the equipment serial number of the first client from the authorization application;
the generation module is used for generating a standard two-dimensional code according to the equipment serial number and sending the standard two-dimensional code to the first client;
the receiving module is used for receiving the two-dimensional code which is scanned and displayed on the first client by the second client, obtaining a target two-dimensional code and checking the target two-dimensional code;
and the permission module is used for permitting the authorized access of the second client after the verification is determined to pass.
The invention provides a personal cloud storage device comprising a memory and a processor, wherein computer readable instructions are stored in the memory, and when executed by the processor, the computer readable instructions cause the processor to execute the steps of the authorization method of the personal cloud storage device according to any one of the above.
The present invention provides a storage medium having stored thereon a computer program which, when executed by a processor, implements a method of authorising a personal cloud storage device as claimed in any one of the preceding claims.
Compared with the prior art, the technical scheme of the invention has at least the following advantages:
according to the personal cloud storage device authorization method and device and the personal cloud storage device, firstly, an authorization application initiated by a first client is responded, and the device serial number of the first client is extracted from the authorization application. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain a target two-dimensional code. Finally, checking the target two-dimensional code, and allowing the authorized access of the second client after the target two-dimensional code passes the check, so that the authorized application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the safety of data is improved; and the second client is authorized and checked in a two-dimensional code mode, so that the operation is simple and quick.
Drawings
FIG. 1 is a flow chart of one embodiment of an authorization method for a personal cloud storage device of the present invention;
FIG. 2 is a flow chart of another embodiment of an authorization method for a personal cloud storage device of the present invention;
FIG. 3 is a block diagram of one embodiment of an authorization apparatus of the personal cloud storage device of the present invention;
fig. 4 is a block diagram illustrating an internal structure of a personal cloud storage device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
In order to enable those skilled in the art to better understand the present invention, the following description will make clear and complete descriptions of the technical solutions according to the embodiments of the present invention with reference to the accompanying drawings.
In some of the flows described in the specification and claims of the present invention and in the foregoing figures, a plurality of operations appearing in a particular order are included, but it should be clearly understood that the operations may be performed in other than the order in which they appear herein or in parallel, the sequence numbers of the operations such as S11, S12, etc. are merely used to distinguish between the various operations, and the sequence numbers themselves do not represent any order of execution. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by one of ordinary skill in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
It will be understood by those of ordinary skill in the art that unless otherwise defined, all terms used herein (including technical and scientific terms) have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
Referring to fig. 1, and referring to fig. 2, the authorization method for a personal cloud storage device provided by the invention uses the personal cloud storage device as an execution main body, so as to solve the problems that when the current personal cloud storage device is subjected to user binding, only one manager can be allowed to bind, and a non-manager user cannot bind the device to use the personal cloud storage device, so that the personal cloud storage device has poor use effect and influences user experience. The personal cloud storage device can be only connected with a client of a user and is not connected with an external network, and is used for storing data uploaded by the user and ensuring the safety of the data. In one embodiment, the method for authorizing the personal cloud storage device includes the steps of:
s11, responding to an authorization application initiated by a first client, and extracting the equipment serial number of the first client from the authorization application;
s12, generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
s13, receiving a two-dimensional code which is scanned and displayed on the first client by the second client, obtaining a target two-dimensional code, and checking the target two-dimensional code;
and S14, allowing authorized access of the second client after the verification is determined to pass.
As described in step S11, the first client is a terminal used by the first user, that is, a terminal used by the administrator. The second client is a terminal used by a second user except the first user, namely a terminal used by a joining user, and the second user can be multiple, so that binding use of multiple users of the personal cloud storage device is realized under the control of the first user, and resource sharing of the personal cloud storage device is further realized.
The equipment serial number is called IMEI number, which is the unique identification code when the equipment leaves the factory. Taking a mobile phone as an example, each mobile phone corresponds to a unique IMEI (GSM) or ESN (CDMA) number, and the unique IMEI or ESN (CDMA) number is solidified in a mobile phone chip in the production process and cannot be modified, so that the unique IMEI or ESN number becomes an identity card number of the mobile phone, and plays roles in checking the identity number and distinguishing authenticity.
When the second client needs to use the personal cloud storage device, an authorization application is initiated to the personal cloud storage device through the first client, wherein the authorization application carries the device serial number of the first client. When receiving an authorization application initiated by a first client, the personal cloud storage device extracts a device serial number of the first client from the authorization application, and verifies the device serial number to judge whether the first client initiating the authorization application is a terminal used by an administrator.
As described in step S12, when it is determined that the first client that initiates the application for authorization is the terminal used by the administrator, the standard two-dimensional code is generated according to the device serial number, and the standard two-dimensional code is sent to the first client and displayed on the first client. The standard two-dimensional code is generated through the personal cloud storage device, so that the risk of being cracked is reduced.
The two-dimensional bar code is a bar code with readability which is expanded on the basis of a one-dimensional bar code. The apparatus having the scanning function scans the two-dimensional code, and can acquire information contained therein by identifying binary data recorded in the length and width of the two-dimensional code. More complex data, such as pictures, network links, etc., are recorded in the two-dimensional code than the one-dimensional code. In the embodiment of the invention, the information in the two-dimensional code comprises information such as request time of an authorized application, user information of a first user and the like.
And as described in the above step S13, the second client receives the standard two-dimensional code sent by the personal cloud storage device, and displays the standard two-dimensional code for the second client to scan. When the second client side scans and displays the two-dimensional code of the first client side through the intelligent APP, a target two-dimensional code is obtained, and the target two-dimensional code is checked to generate check information. The verification information is information prompting whether to authorize the second client, the content can be "confirm to authorize the second client", or "not allow to authorize the second client", and the verification information can be set according to the actual application condition, and is not limited.
And when the verification is not passed, prohibiting authorized access of the second client, and sending a message that the authorization is not passed to the second client.
After the verification is determined to be passed, the authorized access of the second client is allowed, so that the second client can upload data to the personal cloud storage device, view or download data from the personal cloud storage device, as described in step S14. Therefore, the second client can be authorized only by scanning the corresponding two-dimensional code, the operation is simple, the operation time is shortened, the user does not need to input an account number and a password, and the safety is improved.
According to the personal cloud storage device authorization method and device and the personal cloud storage device, firstly, an authorization application initiated by a first client is responded, and the device serial number of the first client is extracted from the authorization application. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain a target two-dimensional code. Finally, checking the target two-dimensional code, and allowing the authorized access of the second client after the target two-dimensional code passes the check, so that the authorized application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the safety of data is improved; and the second client is authorized and checked in a two-dimensional code mode, so that the operation is simple and quick.
In an embodiment, in step S12, the step of sending the standard two-dimensional code to the first client may specifically include:
s121, encrypting the standard two-dimensional code according to a preset encryption algorithm;
s122, the encrypted standard two-dimensional code is sent to the first client.
In this embodiment, identification information may be added to the standard two-dimensional code to encrypt the standard two-dimensional code, and the encrypted standard two-dimensional code is sent to the first client, and when the target two-dimensional code sent by the second client includes the identification information, verification is passed, so that data security is improved. Of course, the preset encryption algorithm may also adopt a symmetric encryption mode or an asymmetric encryption mode, which is not limited herein.
In an embodiment, in step S13, before the step of verifying the target two-dimensional code, the method may further include:
judging whether the first client and the second client are under the same local area network or not;
if yes, executing the step of checking the target two-dimensional code.
In this embodiment, account information of a network connected to the first client and account information of a network connected to the second client may be obtained, the account information of the network connected to the first client and the account information of the network connected to the second client are compared, whether the two account information are consistent is determined, if so, it is indicated that the first client and the second client are under the same local area network or intranet, so as to ensure that the user and the administrator face each other offline, avoid cumbersome authentication of the administrator from passing, and also avoid exposing the personal cloud storage device to the external network, and sacrifice the device privacy and data security.
In addition, when the personal cloud storage device is provided with the AP hot spot, the first client and the second client can access the AP hot spot of the personal cloud storage device, so that the first client and the second client are in the same local area network. The AP is a HUB in a conventional wired network, and is the most commonly used device for constructing a small wlan. The AP acts as a bridge connecting the wired network and the wireless network, and is mainly used to connect the wireless network clients together and then access the wireless network to the ethernet. And after the personal cloud storage device with the AP hot spot is electrified, a WIFI named by the ID number of the personal cloud storage device is sent out. The mobile phone forms a local area network by connecting the WIFI and the personal cloud storage equipment, and can be added through local area network searching.
In an embodiment, in step S13, the step of verifying the target two-dimensional code may specifically include:
s131, judging whether the target two-dimensional code is consistent with a standard two-dimensional code or not;
and S132, if yes, determining that the verification passes.
The target two-dimensional code is compared with the standard two-dimensional code to judge whether the target two-dimensional code is the standard two-dimensional code sent to the first client by the personal cloud storage device, when the target two-dimensional code is inconsistent with the standard two-dimensional code, the target two-dimensional code is indicated to be not the standard two-dimensional code sent to the first client by the personal cloud storage device, verification is failed, and authorized access of the second client is forbidden.
When the target two-dimensional code is consistent with the standard two-dimensional code, the verification is confirmed to pass, so that a hacker is effectively prevented from tampering with the client data to pass the verification, and the verification reliability is improved.
In an embodiment, in step S13, the step of receiving the two-dimensional code displayed on the first client by the second client may specifically include:
d131, refreshing the standard two-dimensional code when the fact that the second client side does not receive the two-dimensional code which is scanned and displayed on the first client side in a preset time is monitored;
and D132, sending the refreshed standard two-dimensional code to a second client until the second client is detected to receive the two-dimensional code scanned and displayed on the first client in a preset time period, and stopping refreshing the standard two-dimensional code.
In this embodiment, the personal cloud storage device determines whether the two-dimensional code scanned and displayed by the second client at the first client exceeds a preset time, if not, the target two-dimensional code is checked, otherwise, the standard two-dimensional code is refreshed, and the refreshed standard two-dimensional code is sent to the second client until the two-dimensional code scanned and displayed by the second client at the first client is received in the preset time period, so that the uniqueness, timeliness and safety of the two-dimensional code are ensured.
The preset time period may be 30 seconds, 1 minute, 10 minutes, etc., and may be set according to actual application conditions, which is not limited.
Specifically, when the personal cloud storage device sends the standard two-dimensional code to the first client, if the two-dimensional code scanned and displayed on the first client by the second client is not received within one minute, the standard two-dimensional code is refreshed, a new two-dimensional code is generated, and the new two-dimensional code is sent to the first client.
In an embodiment, when the standard two-dimensional code includes a plurality of two-dimensional codes, the step of receiving the two-dimensional code displayed on the first client by the second client may specifically include:
randomly and alternately displaying a plurality of standard two-dimensional codes on the first client, and recording display time nodes of each standard two-dimensional code;
receiving a standard two-dimensional code which is scanned and displayed on the first client by a second client to obtain a target two-dimensional code and a scanning time node of the target two-dimensional code;
the step of verifying the target two-dimensional code comprises the following steps:
judging whether the target two-dimensional code is matched with any one of the standard two-dimensional codes;
if yes, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node;
if yes, determining that the verification is passed.
In this embodiment, when generating a plurality of standard two-dimensional codes, the plurality of standard two-dimensional codes may be randomly and alternately displayed at the first client, and display time nodes of each standard two-dimensional code are recorded, for example, the standard two-dimensional code a, the standard two-dimensional code B, and the standard two-dimensional code C are included, and three standard two-dimensional codes are randomly displayed, and the display time nodes of the standard two-dimensional code a are recorded to be 00:01, the display time node of the standard two-dimensional code B is 00:10, and the display time node of the standard two-dimensional code C is 00:20.
And then receiving a standard two-dimensional code which is displayed on the first client by scanning of the second client, obtaining a target two-dimensional code, receiving a scanning time node of the target two-dimensional code by scanning of the second client, judging whether the target two-dimensional code is matched with any one of the standard two-dimensional codes, and when the target two-dimensional code is not matched with the standard two-dimensional codes, checking not to pass and prohibiting authorized access of the second client.
When the target two-dimensional code is matched with one of the standard two-dimensional codes, whether the scanning time node of the target two-dimensional code is consistent with the display time node is further judged, and when the scanning time node of the target two-dimensional code is consistent with the display time node, verification is determined to pass. If the target two-dimensional code is consistent with the standard two-dimensional code B, and the scanning time node of the target two-dimensional code is also 00:10 and is consistent with the display time node of the standard two-dimensional code B, the verification is determined to pass, so that authorization is completed under the face-to-face condition, and the safety of data is further improved.
In an embodiment, after the step of allowing the authorized access of the second client in step S14, the method may further include:
s15, acquiring a connection state of the second client, and sending the connection state of the second client to the first client;
s16, when a disconnection instruction of the first client is received, prohibiting authorized access of the second client.
In this embodiment, after the authorized access of the second client is allowed, the connection state and the access record of the second client may be obtained, and the connection state and the access record of the second client may be sent to the first client and displayed on the first client. When a plurality of second clients are provided, the connection states and access records of the plurality of second clients can be displayed on the first client in a list form, so that an administrator can check the use condition of the user.
When the user is found to have an unauthorized action, a disconnection instruction for disconnecting the second client can be initiated on the first client, for example, the second client is deleted from the list, so that authorized access of the second client is forbidden, and effective control over the unauthorized user is realized.
Referring to fig. 3, an embodiment of the present invention further provides an authorization apparatus for a personal cloud storage device, and in this embodiment, the authorization apparatus includes an extracting module 11, a generating module 12, a receiving module 13, and an allowing module 14. Wherein, the liquid crystal display device comprises a liquid crystal display device,
an extracting module 11, configured to respond to an authorization application initiated by a first client, and extract a device serial number of the first client from the authorization application;
the generating module 12 is configured to generate a standard two-dimensional code according to the device serial number, and send the standard two-dimensional code to the first client;
the receiving module 13 is configured to receive a two-dimensional code that is scanned and displayed on the first client by the second client, obtain a target two-dimensional code, and verify the target two-dimensional code;
an enabling module 14, configured to enable authorized access of the second client after determining that the verification is passed.
In this embodiment, the first client is a terminal used by the first user, that is, a terminal used by an administrator. The second client is a terminal used by a second user other than the first user, i.e. a terminal used by a joining user. The number of the second users can be multiple, so that the binding use of the multiple users of the personal cloud storage device is realized under the control of the first user, and further the resource sharing of the personal cloud storage device is realized.
The equipment serial number is called IMEI number, which is the unique identification code when the equipment leaves the factory. Taking a mobile phone as an example, each mobile phone corresponds to a unique IMEI (GSM) or ESN (CDMA) number, and the unique IMEI or ESN (CDMA) number is solidified in a mobile phone chip in the production process and cannot be modified, so that the unique IMEI or ESN number becomes an identity card number of the mobile phone, and plays roles in checking the identity number and distinguishing authenticity.
When the second client needs to use the personal cloud storage device, an authorization application is initiated to the personal cloud storage device through the first client, wherein the authorization application carries the device serial number of the first client. When receiving an authorization application initiated by a first client, the personal cloud storage device extracts a device serial number of the first client from the authorization application, and verifies the device serial number to judge whether the first client initiating the authorization application is a terminal used by an administrator.
When the first client initiating the authorized application is determined to be the terminal used by the administrator, generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and displaying the standard two-dimensional code on the first client. The standard two-dimensional code is generated through the personal cloud storage device, so that the risk of being cracked is reduced.
The two-dimensional bar code is a bar code with readability which is expanded on the basis of a one-dimensional bar code. The apparatus having the scanning function scans the two-dimensional code, and can acquire information contained therein by identifying binary data recorded in the length and width of the two-dimensional code. More complex data, such as pictures, network links, etc., are recorded in the two-dimensional code than the one-dimensional code. In the embodiment of the invention, the information in the two-dimensional code comprises information such as request time of an authorized application, user information of a first user and the like.
The second client receives the standard two-dimensional code sent by the personal cloud storage device, and displays the standard two-dimensional code for the second client to scan. When the second client side scans and displays the two-dimensional code of the first client side through the intelligent APP, a target two-dimensional code is obtained, and the target two-dimensional code is checked to generate check information. The verification information is information prompting whether to authorize the second client, the content can be "confirm to authorize the second client", or "not allow to authorize the second client", and the verification information can be set according to the actual application condition, and is not limited.
And when the verification is not passed, prohibiting authorized access of the second client, and sending a message that the authorization is not passed to the second client. And after the verification is determined to pass, allowing the authorized access of the second client, so that the second client can upload data to the personal cloud storage device, view the data or download the data from the personal cloud storage device. Therefore, the second client can be authorized only by scanning the corresponding two-dimensional code, the operation is simple, the operation time is shortened, the user does not need to input an account number and a password, and the safety is improved.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The invention provides personal cloud storage equipment, which comprises a memory and a processor, wherein computer readable instructions are stored in the memory, and when the computer readable instructions are executed by the processor, the processor is caused to execute the steps of the authorization method of the personal cloud storage equipment.
In one embodiment, as shown in FIG. 4. The personal cloud storage device in this embodiment may be a server, a personal computer, a network device, or the like. The personal cloud storage device comprises a processor 402, a memory 403, an input unit 404, a display unit 405 and the like. Those skilled in the art will appreciate that the device architecture shown in fig. 4 does not constitute a limitation of all devices, and may include more or fewer components than shown, or may combine certain components. For example, in most cases, the personal cloud storage device need not be equipped with the display unit 405. The memory 403 may be used to store a computer program 401 and functional modules, and the processor 402 runs the computer program 401 stored in the memory 403 to execute various functional applications of the device and data processing. The memory may be internal memory or external memory, or include both internal memory and external memory. The internal memory may include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, floppy disk, ZIP disk, U-disk, tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The memory disclosed herein is by way of example only and not by way of limitation.
The input unit 404 is used for receiving input of a signal and receiving keywords input by a user. The input unit 404 may include a touch panel and other input devices. The touch panel may collect touch operations on or near the user (e.g., the user's operation on or near the touch panel using any suitable object or accessory such as a finger, stylus, etc.), and drive the corresponding connection device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, mouse, joystick, etc. The display unit 405 may be used to display information input by a user or information provided to the user and various menus of the personal cloud storage device. The display unit 405 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 402 is a control center of the personal cloud storage device, connects various parts of the entire computer using various interfaces and lines, performs various functions and processes data by running or executing software programs and/or modules stored in the memory 402, and invoking data stored in the memory.
As one embodiment, the personal cloud storage device includes: one or more processors 402, a memory 403, one or more computer programs 401, wherein the one or more computer programs 401 are stored in the memory 403 and configured to be executed by the one or more processors 402, the one or more computer programs 401 configured to perform the authorization method of the personal cloud storage device described in the above embodiments.
In one embodiment, the present invention also proposes a storage medium storing computer readable instructions that, when executed by one or more processors, cause the one or more processors to perform the above-described method of authorizing a personal cloud storage device. For example, the storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of a computer program stored in a storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
As can be seen from the above embodiments, the present invention has the following advantages:
according to the personal cloud storage device authorization method and device and the personal cloud storage device, firstly, an authorization application initiated by a first client is responded, and the device serial number of the first client is extracted from the authorization application. And then generating a standard two-dimensional code according to the equipment serial number, sending the standard two-dimensional code to the first client, and receiving the two-dimensional code which is scanned and displayed on the first client by the second client to obtain a target two-dimensional code. Finally, checking the target two-dimensional code, and allowing the authorized access of the second client after the target two-dimensional code passes the check, so that the authorized application is initiated through the first client, the authorized access of the second client is controlled by the first client, and the safety of data is improved; and the second client is authorized and checked in a two-dimensional code mode, so that the operation is simple and quick.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (8)

1. A method for authorizing a personal cloud storage device, comprising:
responding to an authorization application initiated by a first client, and extracting a device serial number of the first client from the authorization application;
generating a standard two-dimensional code according to the equipment serial number, and sending the standard two-dimensional code to the first client;
receiving a two-dimensional code which is scanned and displayed on the first client by the second client to obtain a target two-dimensional code, acquiring account information of a network connected with the first client and account information of a network connected with the second client, comparing the account information of the network connected with the first client with the account information of the network connected with the second client, judging whether the two account information are consistent, and if so, verifying the target two-dimensional code if the two account information are consistent, wherein the first client and the second client are indicated to be under the same local area network or intranet; comprising the following steps: when the standard two-dimensional codes comprise a plurality of standard two-dimensional codes, randomly and alternately displaying the plurality of standard two-dimensional codes on the first client, recording display time nodes of the standard two-dimensional codes, receiving the standard two-dimensional codes displayed on the first client by scanning by the second client, obtaining a target two-dimensional code and a scanning time node of the target two-dimensional code, judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes, if yes, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node, and if yes, determining that verification is passed;
and allowing authorized access of the second client after the verification is determined to pass.
2. The method for authorizing the personal cloud storage device according to claim 1, wherein the step of verifying the target two-dimensional code comprises:
judging whether the target two-dimensional code is consistent with a standard two-dimensional code or not;
if yes, determining that the verification is passed.
3. The method for authorizing a personal cloud storage device according to claim 1, wherein the step of receiving the two-dimensional code that the second client scans for presentation at the first client comprises:
refreshing the standard two-dimensional code when the fact that the second client side does not receive the two-dimensional code scanned and displayed on the first client side in a preset time is monitored;
and sending the refreshed standard two-dimensional code to a second client until the second client is detected to receive the two-dimensional code which is scanned and displayed on the first client in a preset time period, and stopping refreshing the standard two-dimensional code.
4. The method of authorizing a personal cloud storage device according to claim 1, wherein the step of transmitting the standard two-dimensional code to the first client comprises:
encrypting the standard two-dimensional code according to a preset encryption algorithm;
and sending the encrypted standard two-dimensional code to the first client.
5. The method of authorizing a personal cloud storage device as recited in claim 1, further comprising, after the step of allowing authorized access to the second client:
acquiring a connection state of the second client, and sending the connection state of the second client to the first client;
and when receiving a disconnection instruction of the first client, prohibiting authorized access of the second client.
6. An authorization apparatus for a personal cloud storage device, comprising:
the device comprises an extraction module, a first client and a second client, wherein the extraction module is used for responding to an authorization application initiated by the first client and extracting the equipment serial number of the first client from the authorization application;
the generation module is used for generating a standard two-dimensional code according to the equipment serial number and sending the standard two-dimensional code to the first client;
the receiving module is used for receiving the two-dimension code which is scanned and displayed on the first client by the second client to obtain a target two-dimension code, acquiring the account information of the network connected with the first client and the account information of the network connected with the second client, comparing the account information of the network connected with the first client with the account information of the network connected with the second client, judging whether the two account information are consistent, and if so, verifying the target two-dimension code if the two account information are consistent, wherein the first client and the second client are indicated to be under the same local area network or the same intranet; comprising the following steps: when the standard two-dimensional codes comprise a plurality of standard two-dimensional codes, randomly and alternately displaying the plurality of standard two-dimensional codes on the first client, recording display time nodes of the standard two-dimensional codes, receiving the standard two-dimensional codes displayed on the first client by scanning by the second client, obtaining a target two-dimensional code and a scanning time node of the target two-dimensional code, judging whether the target two-dimensional code is matched with any one of the plurality of standard two-dimensional codes, if yes, judging whether the scanning time node of the target two-dimensional code is consistent with the display time node, and if yes, determining that verification is passed;
and the permission module is used for permitting the authorized access of the second client after the verification is determined to pass.
7. A personal cloud storage device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the method of authorisation of a personal cloud storage device as claimed in any one of claims 1 to 5.
8. A storage medium having stored thereon a computer program which, when executed by a processor, implements the method of authorizing a personal cloud storage device according to any one of claims 1 to 5.
CN202110397933.9A 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device Active CN113094671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110397933.9A CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110397933.9A CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Publications (2)

Publication Number Publication Date
CN113094671A CN113094671A (en) 2021-07-09
CN113094671B true CN113094671B (en) 2023-09-29

Family

ID=76677127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110397933.9A Active CN113094671B (en) 2021-04-14 2021-04-14 Authorization method and device of personal cloud storage device and personal cloud storage device

Country Status (1)

Country Link
CN (1) CN113094671B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN109598867A (en) * 2019-02-13 2019-04-09 广东好易点科技有限公司 A kind of community intelligent scene method of servicing and system
CN109743598A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Third party is authorized to access method, system and the readable storage medium storing program for executing of TV
CN109961218A (en) * 2019-03-04 2019-07-02 四点零(成都)教育咨询有限公司 A kind of pupil's ensuring pick-up safety management method and system
CN110334783A (en) * 2019-05-06 2019-10-15 深圳市海派特光伏科技有限公司 Electronic cigarette method for anti-counterfeit, verification method, electronic cigarette system and storage medium
CN110472967A (en) * 2019-07-31 2019-11-19 腾讯科技(深圳)有限公司 A kind of method of calibration, identification end and user terminal
CN110751003A (en) * 2019-09-24 2020-02-04 上海掌门科技有限公司 Method and device for acquiring target data information of two-dimensional code
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110912978A (en) * 2019-11-15 2020-03-24 泰康保险集团股份有限公司 Sign-in information generation method and system
CN111478923A (en) * 2020-04-28 2020-07-31 华为技术有限公司 Access request response method and device and electronic equipment

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101826227A (en) * 2010-04-30 2010-09-08 广州合立正通信息网络集成有限公司 Triple-authentication gate control system and control method
CN103095852A (en) * 2013-02-27 2013-05-08 上海够快网络科技有限公司 Cloud storage file sharing method based on two-dimensional code
CN103957105A (en) * 2014-04-28 2014-07-30 中国联合网络通信集团有限公司 Use identity authentication method and SIM card
CN109743598A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Third party is authorized to access method, system and the readable storage medium storing program for executing of TV
CN109598867A (en) * 2019-02-13 2019-04-09 广东好易点科技有限公司 A kind of community intelligent scene method of servicing and system
CN109961218A (en) * 2019-03-04 2019-07-02 四点零(成都)教育咨询有限公司 A kind of pupil's ensuring pick-up safety management method and system
CN110334783A (en) * 2019-05-06 2019-10-15 深圳市海派特光伏科技有限公司 Electronic cigarette method for anti-counterfeit, verification method, electronic cigarette system and storage medium
CN110472967A (en) * 2019-07-31 2019-11-19 腾讯科技(深圳)有限公司 A kind of method of calibration, identification end and user terminal
CN110751003A (en) * 2019-09-24 2020-02-04 上海掌门科技有限公司 Method and device for acquiring target data information of two-dimensional code
CN110853202A (en) * 2019-11-05 2020-02-28 合肥优尔电子科技有限公司 Control method, device and system of two-dimensional code cabinet remotely controlled by Internet of things
CN110912978A (en) * 2019-11-15 2020-03-24 泰康保险集团股份有限公司 Sign-in information generation method and system
CN111478923A (en) * 2020-04-28 2020-07-31 华为技术有限公司 Access request response method and device and electronic equipment

Also Published As

Publication number Publication date
CN113094671A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
US10771471B2 (en) Method and system for user authentication
US10826882B2 (en) Network-based key distribution system, method, and apparatus
US10397780B2 (en) Anonymous authentication and remote wireless token access
CN106330850B (en) Security verification method based on biological characteristics, client and server
US20190384934A1 (en) Method and system for protecting personal information infringement using division of authentication process and biometric authentication
US9998441B2 (en) Client authentication using social relationship data
US20170063827A1 (en) Data obfuscation method and service using unique seeds
US10176310B2 (en) System and method for privacy-enhanced data synchronization
EP3346660B1 (en) Authentication information update method and device
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
KR102214247B1 (en) Method and apparatus for service implementation
CN107689936B (en) Security verification system, method and device for login account
CN107347049B (en) Account authentication method and server
CN109101795A (en) A kind of account number safe login method, apparatus and system
WO2016188335A1 (en) Access control method, apparatus and system for user data
US20220029803A1 (en) Protecting data using controlled corruption in computer networks
CN105656627A (en) Identity verification method, device and system
CN108965222A (en) Identity identifying method, system and computer readable storage medium
KR101799517B1 (en) A authentication server and method thereof
CN113094671B (en) Authorization method and device of personal cloud storage device and personal cloud storage device
EP3026620A1 (en) Network authentication method using a card device
KR102481213B1 (en) System and method for login authentication processing
CN114070571B (en) Method, device, terminal and storage medium for establishing connection
WO2017197689A1 (en) Sim card processing method and apparatus, terminal, and esam chip
KR101523629B1 (en) Apparatus and method for login authentication, and storage media storing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant