CN115994344A - Storage device authentication method, storage device, and storage device authentication system - Google Patents
Storage device authentication method, storage device, and storage device authentication system Download PDFInfo
- Publication number
- CN115994344A CN115994344A CN202111223173.6A CN202111223173A CN115994344A CN 115994344 A CN115994344 A CN 115994344A CN 202111223173 A CN202111223173 A CN 202111223173A CN 115994344 A CN115994344 A CN 115994344A
- Authority
- CN
- China
- Prior art keywords
- authentication
- server
- storage device
- terminal
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The application discloses an authentication method of a storage device. The method is applied to a storage device, and comprises the following steps: when the server is connected to the first terminal equipment, the server is connected to the first terminal equipment through the first terminal equipment so that the server generates an authentication identifier on the first terminal equipment; the authentication identifier is used for interacting with the second terminal equipment so that the server is connected with the second terminal equipment to perform identity authentication, and authentication information is sent to the first terminal equipment after the identity authentication is passed; when authentication information sent by the first terminal equipment is obtained, verifying the authentication information; and after the authentication information passes the verification, opening the operation authority of the first terminal to the storage device. The application also discloses a storage device and a storage device authentication system. By the method, a safer storage device authentication mode and perfect privacy protection for data in the storage device are realized.
Description
Technical Field
The present invention relates to the field of data processing, and in particular, to a storage device authentication method, a storage device, and a storage device authentication system.
Background
With the development of the scientific society, more and more information is generated by users, and more importance is attached to the data privacy of the users. For removable storage devices, to meet the increasing demands of users, there are two main types of ways to protect the privacy of data: the storage device is matched with an encryption program, and the encryption storage device is managed through the encryption program; one is realized by adding hardware devices, such as fingerprint-like chips, NFC sensing chips, bluetooth chips and the like, to a storage device. The former mode is fixed, too simple, has lower safety coefficient and is not beneficial to the use of a storage device and the protection of related data; the latter hardware is too costly and also detrimental to the use of the storage device and the protection of the data associated therewith.
Disclosure of Invention
The present disclosure provides a storage device authentication method, a storage device and a storage device authentication system, so as to solve the technical problem that the existing encryption method for the storage device is not beneficial to the use of the storage device and the protection of part of related data inside the storage device.
In order to solve the technical problems, a first technical scheme adopted by the application is as follows: an authentication method of a storage device is provided. The method is applied to a storage device, and comprises the following steps: when the server is connected to the first terminal equipment, the server is connected to the first terminal equipment through the first terminal equipment so that the server generates an authentication identifier on the first terminal equipment; the authentication identifier is used for interacting with the second terminal equipment so that the server is connected with the second terminal equipment to perform identity authentication, and authentication information is sent to the first terminal equipment after the identity authentication is passed; when authentication information sent by the first terminal equipment is obtained, verifying the authentication information; and after the authentication information passes the verification, opening the operation authority of the first terminal to the storage device.
In order to solve the technical problems, a second technical scheme adopted by the application is as follows: an authentication method of a storage device is provided. The method is applied to the first terminal equipment and comprises the following steps: when being connected to the storage device, the server is connected to enable the server to generate an authentication identifier on the first terminal device; the authentication identifier is used for interacting with the second terminal equipment so that the second terminal equipment is connected with the server for identity authentication, and the server is used for sending authentication information to the first terminal equipment after the identity authentication is passed; when the authentication information sent by the server is obtained, the authentication information is sent to the storage device, so that the storage device verifies the authentication information, and after the authentication information passes the verification, the operation authority of the first terminal to the storage device is started.
In order to solve the technical problem, a third technical scheme adopted in the application is as follows: a storage device is provided. The storage device comprises a memory and a processor, wherein the memory is used for storing data information, the processor is used for connecting with a server through a network connection device to receive authentication information, and authentication information verification is carried out so as to control the operation authority of the memory, so that the authentication method of the storage device in the first technical scheme is realized.
In order to solve the technical problem, a fourth technical scheme adopted in the application is as follows: a storage device authentication system is provided. The storage device authentication system comprises a storage device, a first terminal, a second terminal and a server. The storage device is connected with the first terminal so as to be in communication connection with the server through the first terminal, and the first terminal and the second terminal are in communication connection with the server so as to realize the authentication methods of the storage device in the first technical scheme and the second technical scheme.
The beneficial effects of this application are: the networking program is arranged in the storage device so as to connect the storage device with the server in a network, the storage device is divided into a plurality of parts corresponding to different authorities through the operation authorities, and the operation authorities of the different storage parts of the storage device are transmitted to the server for authentication.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a first embodiment of an authentication method for a storage device of the present application;
FIG. 2 is a flow chart of a second embodiment of an authentication method for a storage device of the present application;
FIG. 3 is a flow diagram of one embodiment of the present application for generating an authorization identification;
FIG. 4 is a flow chart of yet another embodiment of the present application for generating an authorization identification;
FIG. 5 is a flow chart of another embodiment of the present application for generating an authorization identification;
FIG. 6 is a flow chart of an embodiment of an authentication process of the present application;
FIG. 7 is a schematic diagram of an embodiment of a memory device of the present application;
fig. 8 is a schematic structural diagram of an embodiment of a storage device authentication system of the present application.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms "first," "second," and the like in this application are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Fig. 1 is a schematic flow chart of a first embodiment of an authentication method of a storage device according to the present application. The method is applied to a storage device and specifically comprises the following steps of:
s11: is connected to the first terminal device and is connected to the server through the first terminal device.
The storage means, when connected to the first terminal device, is networked via the application program. The application program can be installed in the storage device or in the first terminal equipment for use when the storage device is connected with the first terminal equipment. The storage device is indirectly connected to a specific server through the first terminal device via the program. The particular server is configured to perform a subsequent authentication process for the storage device.
Optionally, after the storage device is networked, the first terminal device is controlled to send address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device later. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity verification, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity verification, the server searches identity information conforming to the related data information for identity verification in a database of the server. If the identity information exists and the related data information meets the verification requirement, the server confirms that the identity authentication is passed. Based on the identity information, the server generates authentication information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device is controlled to send address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device later. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity authentication, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity verification, the server searches identity information conforming to the related data information for identity verification in a database of the server. If the identity information exists and the related data information meets the verification requirement, the server further determines the operation authority of the storage device matched with the identity information. Based on the operation rights and/or the identity information, the server generates authentication information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device is controlled to send address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device later. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity authentication, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity authentication, the server searches identity information conforming to the related data information of the identity authentication in a database of the server. If the identity information exists and the related data information is accurate, the server further sends an authentication information request of the operation authority of the storage device to the second terminal equipment. Based on the request, the second terminal device may continue to display a man-machine interaction interface for the second terminal device to provide the server with relevant data information for operation authority authentication, such as a user name, a password, and the like. After the server receives the related data information submitted by the second terminal equipment and used for operation authority authentication, the server searches operation authority information corresponding to the operation authority authentication related data information in a database of the server and judges whether the related data information is accurate or not. If the operation authority authentication is accurate, the server generates authentication information based on the operation authority information and/or the identity information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device is controlled to send address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device later. And after the storage device establishes a network connection with the server through the first terminal device, the server may send a prompt message to all the users of the storage device. The information about the owner is also sent to the server by the first terminal device by the storage means. For example, when the storage device is connected with the WeChat account of the owner through the computer, the WeChat platform server sends a notification to the WeChat account of the owner, prompting that the storage device has been used and is connected to the network. The hint message may further include: an authentication identification for authorizing authentication is sent. The authentication identifier for authorization authentication is a preset authentication identifier which can be used for identity authentication and/or operation authority authentication. For example, the authentication identifier is a second two-dimensional code, and the two-dimensional code is generated by the WeChat platform in advance based on the identity information and/or the operation authority information. The second terminal equipment can directly pass identity and/or operation authority authentication by scanning the authorized two-dimensional code. When the owner chooses to send the authentication identification for authorizing authentication, the server sends the authentication identification for authorizing authentication to the first terminal equipment according to the address information. The second terminal device can pass the authentication after scanning the identification. After the authentication is passed, the server directly sends authentication information generated based on the operation authority information and/or the identity information to the first terminal equipment which has acquired the address information, and the authentication information is used for starting the operation authority of the first terminal equipment on the storage device.
The authentication identifier used for authorization, for example, the two-dimensional code used for authorization, namely the second two-dimensional code, can be specifically generated by the following steps. And the user uses the mobile terminal to scan a two-dimensional code preset by the WeChat platform server and used for registration so as to register the user and send identity information to the WeChat platform server. As shown in fig. 3, the WeChat platform server stores the identity information after receiving the identity information. Based on the identity information, an authorization two-dimensional code is generated, so that the mobile terminal can directly associate the identity information when scanning the authorization two-dimensional code. Or as shown in fig. 4, further, after receiving the identity information, the WeChat platform server stores the identity information and associates the identity information with the operation authority. Based on the identity information and the operation authority, an authorized two-dimensional code is generated, so that the mobile terminal can directly associate the identity information and/or the operation authority when scanning the authorized two-dimensional code. Or as shown in fig. 5, the two-dimensional code for registration allows the user to send identity information to the WeChat platform server, and further allows the user to send an authentication message of the operation authority. And under the condition that the identity information and the operation authority authentication message are received correctly, the server associates the identity information with the operation authority corresponding to the authentication message. Based on the identity information and the operation authority, an authorized two-dimensional code is generated, so that the mobile terminal can directly associate the identity information and/or the operation authority when scanning the authorized two-dimensional code.
If the server does not find the identity information which accords with the data information related to the identity authentication submitted by the second terminal equipment in the database in the operation, the identity information is stored for registration, the confirmation of whether to apply for the operation authority and the selection of a plurality of corresponding operation authorities are sent to the second terminal equipment, and when the second terminal equipment selects to apply for a certain operation authority, the server sends a prompt message to the account of the related personnel for the related personnel to confirm. Specifically, when the WeChat platform acquires the operation authority application, the WeChat platform sends an application confirmation message to the WeChat account number of the owner of the storage device. The related flow of acquiring the authentication information and opening the operation authority of the storage device can be shown in fig. 6.
S12: and acquiring authentication information sent by the first terminal equipment.
Authentication information forwarded from the first terminal from the server is acquired. The authentication information may further include an identification for the storage device to confirm the accuracy of the authentication information.
S13: and after the authentication information passes verification, opening the operation authority of the first terminal to the storage device.
After the authentication information of the storage device is verified, the opening of the operation authority of the storage device is determined based on the authentication information. The operation authority may be at least one of an open authority of the relevant area in the storage device, an open time of the relevant area, a usage restriction of the relevant area (e.g., editing, sharing, encrypting, etc.). For example, the storage device includes a normal area and a private area, and the operation authority setting is related settings of opening or not, opening time, usage function, and the like for the private area.
Fig. 2 is a schematic flow chart of a second embodiment of an authentication method of the storage device of the present application. The authentication method is applied to the first terminal equipment and specifically comprises the following steps:
s21: when the storage device is connected, the server is connected.
When the storage device is connected, the first terminal device connects to a specific server. The particular server is configured to perform a subsequent authentication process for the storage device. The storage device is indirectly connected with a specific server through a first terminal device by an application program.
Optionally, after the storage device is networked, the first terminal device sends address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity authentication, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity verification, the server searches identity information conforming to the related data information for identity verification in a database of the server. If the identity information exists and the related data information meets the verification requirement, the server confirms that the identity authentication is passed. Based on the identity information, the server generates authentication information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device sends address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity authentication, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity verification, the server searches identity information conforming to the related data information for identity verification in a database of the server. If the identity information exists and the related data information meets the verification requirement, the server further determines the operation authority of the storage device matched with the identity information. Based on the operation rights and/or the identity information, the server generates authentication information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device sends address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device. The authentication identity is used for the server to interact with the second terminal device. The authentication identifier may be a first two-dimensional code, and the first two-dimensional code is sent to the first terminal device by the server for display. The second terminal equipment scans the two-dimension code to log in the server, and a man-machine interaction interface is displayed on the second terminal equipment. The man-machine interaction interface is used for providing relevant data information for identity authentication, such as a user name, a password and the like, for the server by the second terminal equipment. After the server receives the related data information submitted by the second terminal equipment and used for identity authentication, the server searches identity information conforming to the related data information of the identity authentication in a database of the server. If the identity information exists and the related data information is accurate, the server further sends an authentication information request of the operation authority of the storage device to the second terminal equipment. Based on the request, the second terminal device may continue to display a man-machine interaction interface for the second terminal device to provide the server with relevant data information for operation authority authentication, such as a user name, a password, and the like. After the server receives the related data information submitted by the second terminal equipment and used for operation authority authentication, the server searches operation authority information corresponding to the operation authority authentication related data information in a database of the server and judges whether the related data information is accurate or not. If the operation authority authentication is accurate, the server generates authentication information based on the operation authority information and/or the identity information. The server sends the authentication information to the first terminal equipment which has acquired the address information, and the authentication information is used for opening the operation authority of the first terminal equipment to the storage device.
Optionally, after the storage device is networked, the first terminal device sends address information of the first terminal device to the server, so that the server can send an authentication identifier for authentication to the first terminal device. And after the storage device establishes a network connection with the server through the first terminal device, the server may send a prompt message to all the users of the storage device. The information about the owner is also sent to the server by the first terminal device by the storage means. For example, when the storage device is networked with the WeChat platform server through a computer, the WeChat platform server sends a notification to the WeChat account of the storage device owner, prompting that the storage device has been used and is connected to the network. The hint message may further include: an authentication identification for authorizing authentication is sent. The authentication identifier for authorization authentication is a preset authentication identifier which can be used for identity authentication and/or operation authority authentication. For example, the authentication identifier is a second two-dimensional code, and the two-dimensional code is generated by the WeChat platform server in advance based on the identity information and/or the operation authority information. The second terminal equipment can directly pass identity and/or operation authority authentication by scanning the two-dimensional code. When the owner chooses to send the authentication identification for authorizing authentication, the server sends the authentication identification for authorizing authentication to the first terminal equipment according to the address information. The second terminal device can pass the authentication after scanning the identification. After the authentication is passed, the server directly sends authentication information generated based on the operation authority information and/or the identity information to the first terminal equipment, and the authentication information is used for starting the operation authority of the first terminal equipment on the storage device.
The authentication identifier used for authorization, for example, the two-dimensional code used for authorization, namely the second two-dimensional code, can be specifically generated by the following steps. And the user uses the mobile terminal to scan a two-dimensional code preset by the WeChat platform server and used for registration so as to register the user and send identity information to the WeChat platform server. As shown in fig. 3. And after receiving the identity information, the WeChat platform server stores the identity information. Based on the identity information, an authorization two-dimensional code is generated, so that the mobile terminal can directly associate the identity information when scanning the authorization two-dimensional code. Or, as shown in fig. 4, further, after receiving the identity information, the WeChat platform server stores the identity information and associates the identity information with the operation authority. Based on the identity information and the operation authority, an authorized two-dimensional code is generated, so that the mobile terminal can directly associate the identity information and/or the operation authority when scanning the authorized two-dimensional code. Or as shown in fig. 5, the two-dimensional code for registration allows the user to send identity information to the WeChat platform server, and further allows the user to send an authentication message of the operation authority. And under the condition that the identity information and the operation authority authentication message are received correctly, the server associates the identity information with the operation authority corresponding to the authentication message. Based on the identity information and the operation authority, an authorized two-dimensional code is generated, so that the mobile terminal can directly associate the identity information and/or the operation authority when scanning the authorized two-dimensional code.
If the server does not find the identity information which accords with the data information related to the identity authentication submitted by the second terminal equipment in the database in the operation, the identity information is stored for registration, the confirmation of whether to apply for the operation authority and the selection of a plurality of corresponding operation authorities are sent to the second terminal equipment, and when the second terminal equipment selects to apply for a certain operation authority, the server sends a prompt message to the account of the related personnel for the related personnel to confirm. Specifically, when the WeChat platform acquires the operation authority application, the WeChat platform sends an application confirmation message to the WeChat account number of the owner of the storage device. If the application of the operation authority is successful, the first terminal device returns to the authentication of the identity information. Correspondingly, the second terminal equipment receives the information of successful application of the operation authority, so that the second terminal equipment jumps to an interface for providing identity information or a code scanning interface again to perform identity authentication again so as to perform subsequent operation authority authentication. After the operation authority is successfully applied, the operation authority can be authenticated in a password mode or directly bound with the identity information, and the embodiment can be specifically referred to. If the application of the operation authority fails, the flow is directly ended. The related flow of acquiring the authentication information and opening the operation authority of the storage device can be shown in fig. 6.
S22: and acquiring authentication information sent by the server.
S23: and sending authentication information to the storage device to open the operation authority of the storage device.
And when the authentication information sent by the server is received, forwarding the authentication information to the storage device for verification of the authentication information by the storage device, so that after the authentication is passed, the operation authority of the corresponding storage device is opened based on the authentication information. The operation authority may be at least one of an open authority of the relevant area in the storage device, an open time of the relevant area, a usage restriction of the relevant area (e.g., editing, sharing, encrypting, etc.). For example, the storage device includes a normal area and a private area, and the operation authority setting is related settings of opening or not, opening time, usage function, and the like for the private area.
Fig. 7 is a schematic structural diagram of an embodiment of a memory device according to the present application.
The storage device includes a processor 110 and a memory 120.
The processor 110 controls the operation of the storage device, and the processor 110 is connected to the server through the network connection device to receive the authentication information, and perform authentication information verification to control the operation authority of the memory 120. The processor 110 may also be referred to as a CPU (Central Processing Unit ). The processor 110 may be an integrated circuit chip with processing capabilities for signal sequences. Processor 110 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The processor 110 is configured to execute instructions to implement the method and any possible combination described in the first embodiment of the storage device authentication method of the present application.
Fig. 8 is a schematic structural diagram of an embodiment of a storage device authentication system according to the present application.
The storage device authentication system includes a storage device 210, a first terminal 220, a server 230, and a second terminal 240.
The storage device 210 is connected to a first terminal 220, the first terminal 220 is communicatively connected to a server 230, and a second terminal 240 is communicatively connected to the server 230, so as to implement the methods and any possible combinations described in the first and second embodiments of the storage device authentication method of the present application.
In summary, through the above embodiment, by setting the networking program in the storage device, so as to connect the storage device with the server in a network, the storage device is divided into multiple parts corresponding to different authorities through the operation authority, and the operation authorities of the different storage parts of the storage device are handed over to the server for authentication, because the server has better network security, a safer authentication mode and perfect privacy protection for data in the storage device are realized. And because fewer programs or hardware need to be added in the storage device, development cost is saved.
In the several embodiments provided in the present application, it should be understood that the disclosed methods and apparatuses may be implemented in other manners. For example, the above-described device embodiments are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist alone physically, or two or more units may be integrated into one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units of the other embodiments described above may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as stand alone products. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution, in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing description is only exemplary embodiments of the present application and is not intended to limit the scope of the present application, and all equivalent structures or equivalent processes using the descriptions and the drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the present application.
Claims (10)
1. A method of authenticating a storage device, the method being applied to the storage device, the method comprising:
when being connected to a first terminal device, the server is connected to the first terminal device through the first terminal device so that the server generates an authentication identifier on the first terminal device; the authentication identifier is used for interacting with second terminal equipment so that the server is connected with the second terminal equipment to perform identity authentication, and authentication information is sent to the first terminal equipment after the identity authentication is passed;
when the authentication information sent by the first terminal equipment is acquired, verifying the authentication information;
and after the authentication information passes verification, opening the operation authority of the first terminal to the storage device.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the method further comprises the steps of:
the server is connected with the second terminal to carry out operation authority authentication;
and sending authentication information to the first terminal equipment after the identity authentication is passed, wherein the authentication information comprises:
and after the identity authentication and the operation authority authentication are passed, sending the authentication information to the first terminal equipment.
3. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the server is connected with the second terminal for operation authority authentication, and comprises the following steps:
and the server performs the operation authority authentication based on the identity authentication result.
4. The method of claim 2, wherein the step of determining the position of the substrate comprises,
the opening the operation authority of the first terminal to the storage device comprises the following steps:
and opening the operation authority of the first terminal to the corresponding storage area in the storage device according to the result of the operation authority authentication.
5. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the server is connected with the second terminal equipment for identity authentication, and the method comprises the following steps:
the server is connected with the second terminal equipment;
receiving login information sent by the second terminal equipment;
and carrying out identity authentication according to the login information.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the method for generating the authentication identifier on the first terminal device by the server comprises the following steps of:
when being connected to the first terminal equipment, the server is connected through the first terminal equipment;
and controlling the first terminal equipment to send address information to the server so that the server generates the authentication identifier on the first terminal equipment according to the address information.
7. The method according to any one of claims 1 to 6, wherein,
the authentication identifier is a first two-dimensional code, the first two-dimensional code is configured to be scanned by the second terminal equipment, so that the server is connected with the second terminal equipment, and a man-machine interaction interface is displayed on the second terminal equipment and is used for carrying out identity authentication and/or operation authority authentication; or (b)
The authentication identifier is a second two-dimensional code, and the second two-dimensional code is configured to be scanned by the second terminal equipment so that the server passes the identity authentication and/or the operation authority authentication of the second terminal equipment.
8. A method of authentication of a storage device, the method being applied to a first terminal device, the method comprising:
connecting a server when the server is connected to the storage device, so that the server generates an authentication identifier on the first terminal device; the authentication identifier is used for interacting with second terminal equipment so that the second terminal equipment is connected with the server for identity authentication, and the server is used for sending authentication information to the first terminal equipment after the identity authentication is passed;
when the authentication information sent by the server is obtained, the authentication information is sent to the storage device, so that the storage device can verify the authentication information, and after the authentication information passes the verification, the operation authority of the first terminal to the storage device is started.
9. A memory device, comprising:
a memory for storing data information;
a processor for connecting to a server through a network connection device to receive authentication information, performing authentication information verification to control an operation authority of the memory, implementing the authentication method of the storage device according to any one of claims 1 to 7.
10. A storage device authentication system, comprising a storage device, a first terminal, a second terminal, and a server, wherein the storage device is connected to the first terminal to be in communication connection with the server through the first terminal, and the first terminal, the second terminal are in communication connection with the server to implement the authentication method of the storage device according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111223173.6A CN115994344A (en) | 2021-10-20 | 2021-10-20 | Storage device authentication method, storage device, and storage device authentication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111223173.6A CN115994344A (en) | 2021-10-20 | 2021-10-20 | Storage device authentication method, storage device, and storage device authentication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115994344A true CN115994344A (en) | 2023-04-21 |
Family
ID=85993026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111223173.6A Pending CN115994344A (en) | 2021-10-20 | 2021-10-20 | Storage device authentication method, storage device, and storage device authentication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115994344A (en) |
-
2021
- 2021-10-20 CN CN202111223173.6A patent/CN115994344A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI667585B (en) | Method and device for safety authentication based on biological characteristics | |
CN109328348B (en) | Service authentication method, system and related equipment | |
US10205711B2 (en) | Multi-user strong authentication token | |
JP4975762B2 (en) | End-user authentication system, apparatus and method | |
US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
US8341698B2 (en) | Transforming static password systems to become 2-factor authentication | |
JP2024123236A (en) | First factor contactless card authentication system and method | |
JP4095051B2 (en) | Home network device capable of automatic ownership authentication, home network system and method thereof | |
CN107733852A (en) | A kind of auth method and device, electronic equipment | |
US20130023240A1 (en) | System and method for transaction security responsive to a signed authentication | |
US20040266395A1 (en) | Process for securing a mobile terminal and applications of the process for executing applications requiring a high degree of security | |
KR101451359B1 (en) | User account recovery | |
CA2665961C (en) | Method and system for delivering a command to a mobile device | |
EP2751733B1 (en) | Method and system for authorizing an action at a site | |
DK2924944T3 (en) | Presence authentication | |
CN107291432A (en) | Cloud desktop management-control method, device and cloud desktop access method, device | |
KR20210006329A (en) | Remote biometric identification | |
US20220247555A1 (en) | Method for securing an execution of a local application and corresponding first and second user device and system | |
CN115994344A (en) | Storage device authentication method, storage device, and storage device authentication system | |
CN109936522B (en) | Equipment authentication method and equipment authentication system | |
KR101617452B1 (en) | Method for Settling On-Line using One-Time Password | |
JP2005018421A (en) | Management device, service providing device, and communication system | |
KR20160011863A (en) | Authentication system and Method for second authenticating with QR cord with 2 channels | |
CN115174181B (en) | Method, device, equipment and storage medium for realizing single sign-on | |
CN114760628B (en) | Terminal safety access method for railway broadband trunking communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |