Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security access method and device

A data access and data security technology, applied in the computer field, can solve important data theft and other problems, achieve the effect of improving security, improving data access experience, and increasing success rate

Active Publication Date: 2021-08-13
BEIJING CHANGYANG TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the user's account number and password are obtained by criminals, it is easy to cause the important data stored in the cloud storage device to be stolen by criminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access method and device
  • Data security access method and device
  • Data security access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] figure 1 A flowchart showing a data security access method according to an embodiment. It can be understood that the method can be executed by any device, device, platform, or device cluster that has computing and processing capabilities.

[0047] see figure 1 , the method includes:

[0048] Step 101: Receive a data access request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data security access method and device. The method comprises the following steps: receiving a data access request sent by a mobile terminal, wherein the data access request carries an account number, a password, biological characteristic information and reference characteristic information of a user who performs data access, and the reference characteristic information is obtained when the user collects the biological characteristic information by using the mobile terminal; authenticating the identity of the user by using the account number, the password and the biological characteristic information of the user; if the authentication fails, determining a reference actual value of the user based on the reference feature information of the user; if the determined reference actual value is greater than a preset reference threshold value, authenticating the identity of the user again; and when the identity authentication of the user is passed, sending target data corresponding to the data access request to the mobile terminal. According to the scheme, the security of data access can be improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data security access method and device. Background technique [0002] With the gradual improvement of people's data storage capacity and data security, cloud storage devices are widely used due to their massive storage space, high reliability, and high scalability. At the same time, people are increasingly dependent on mobile terminals, that is, people can use application software on mobile terminals to access personal data stored in cloud storage devices. [0003] In related technologies, the user generally only needs to enter a matching account number and password for identity authentication. After passing the authentication, the cloud storage device returns an access token, and the user can use the access token to access personal data in the cloud storage device. However, if the user's account number and password are obtained by criminals, it is easy to cause the importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/602G06F21/604G06F2221/2141
Inventor 李长国姜海昆范宇
Owner BEIJING CHANGYANG TECH CO LTD