Cloud access control method and device based on mobile storage equipment and equipment

A mobile storage device and access control technology, applied in the field of information security, can solve the problems of high control and research and development requirements, poor system quality, etc., to reduce the difficulty of research and development, improve the quality, and avoid the introduction of risks.

Active Publication Date: 2020-01-03
核芯互联科技(青岛)有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present invention is to provide a cloud access control method, device and equipment based on a mobile storage device to solve the problems of poor system quality control and high research and development requirements when the existing cloud identifies the identity of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud access control method and device based on mobile storage equipment and equipment
  • Cloud access control method and device based on mobile storage equipment and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The implementation of the present invention will be illustrated by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification.

[0023] In the following description, for purposes of illustration rather than limitation, specific details, such as specific system architectures, interfaces, and techniques, are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0024] figure 1 It is a flowchart of a cloud access control method based on a mobile storage device according to an embodiment of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a cloud access control method and device based on mobile storage equipment and equipment. The cloud access control method comprises the steps: employing a preset algorithm for a client address to obtain the final information of a client algorithm, and obtaining a client two-tuple according to the client address and the final information of the algorithm; obtaining a two-tuple of the mobile storage device from the mobile storage device; and if the client two-tuples and the mobile storage device two-tuples are consistent in information, allowing the client to authenticate to the cloud, otherwise, controlling the client to exit, and not allowing the client to authenticate to the cloud. The cloud access control method can control the system quality byusing mobile storage equipment which can be purchased anywhere on the market, and can control any part of the whole system by a service provider, so that introduction of risks is avoided, and the quality is improved, and the research and development difficulty of suppliers is reduced.

Description

technical field [0001] The embodiments of the present invention relate to the field of information security, and in particular to a cloud access control method, device and device based on a mobile storage device. Background technique [0002] There are currently many Internet applications with B / S and C / S architectures. A basic problem in this Internet application is what kind of clients are allowed to access cloud services. [0003] The current main methods include: [0004] 1. The client first conducts identification before accessing the cloud service. A notable feature of this solution is that as long as the client software can complete the entire identification work, it does not matter which hardware the client software is deployed on. Customers may only want to buy client software in order to reduce costs, and deploy On hardware purchased separately. But this will bring uncontrollable risks to the entire system, because every component of the entire C / S system shoul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60
CPCH04L63/0876H04L63/0853H04L63/10G06F21/604
Inventor 张华胡康桥
Owner 核芯互联科技(青岛)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products