Cloud access control method, device and equipment based on mobile storage device

A mobile storage device and access control technology, applied in the field of information security, can solve the problems of high control and research and development requirements, poor system quality, etc., to reduce the difficulty of research and development, improve the quality, and avoid the introduction of risks.

Active Publication Date: 2022-02-18
核芯互联科技(青岛)有限公司
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the embodiment of the present invention is to provide a cloud access control method, device and equipment based on a mobile storage device to solve the problems of poor system quality control and high research and development requirements when the existing cloud identifies the identity of the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud access control method, device and equipment based on mobile storage device
  • Cloud access control method, device and equipment based on mobile storage device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The implementation of the present invention will be illustrated by specific specific examples below, and those skilled in the art can easily understand other advantages and effects of the present invention from the contents disclosed in this specification.

[0023] In the following description, for purposes of illustration rather than limitation, specific details, such as specific system architectures, interfaces, and techniques, are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0024] figure 1 It is a flowchart of a cloud access control method based on a mobile storage device according to an embodiment of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a cloud access control method, device, and device based on a mobile storage device. The cloud access control method includes: using a preset algorithm for the client address to obtain the final information of the client algorithm, and according to the client address and the algorithm. The information is obtained from the client 2-tuple; the mobile storage device 2-tuple is obtained from the mobile storage device; if the client 2-tuple and the mobile storage device 2-tuple information are consistent, the client is allowed to authenticate to the cloud, otherwise the client is controlled Exit, the client is not allowed to authenticate to the cloud. The present invention uses mobile storage devices that can be purchased anywhere on the market to control the quality of the system, and any part of the entire system is controlled by the service provider, thereby avoiding the introduction of risks, improving quality, and reducing the research and development difficulty of the supplier.

Description

technical field [0001] The embodiments of the present invention relate to the field of information security, and in particular to a cloud access control method, device and device based on a mobile storage device. Background technique [0002] There are currently many Internet applications with B / S and C / S architectures. A basic problem in this Internet application is what kind of clients are allowed to access cloud services. [0003] The current main methods include: [0004] 1. The client first conducts identification before accessing the cloud service. A notable feature of this solution is that as long as the client software can complete the entire identification work, it does not matter which hardware the client software is deployed on. Customers may only want to buy client software in order to reduce costs, and deploy On hardware purchased separately. But this will bring uncontrollable risks to the entire system, because every component of the entire C / S system shoul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/60
CPCH04L63/0876H04L63/0853H04L63/10G06F21/604
Inventor 张华胡康桥
Owner 核芯互联科技(青岛)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products