Unlock instant, AI-driven research and patent intelligence for your innovation.

A data security access method and device

A data access and data security technology, applied in the computer field, can solve problems such as important data theft, and achieve the effect of improving security, increasing success rate, and improving data access experience

Active Publication Date: 2021-10-01
BEIJING CHANGYANG TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the user's account number and password are obtained by criminals, it is easy to cause the important data stored in the cloud storage device to be stolen by criminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data security access method and device
  • A data security access method and device
  • A data security access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0046] figure 1 A flowchart showing a data security access method according to an embodiment. It can be understood that the method can be executed by any device, device, platform, or device cluster that has computing and processing capabilities.

[0047] see figure 1 , the method includes:

[0048] Step 101: Receive a data access request ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a data security access method and device. The method includes: receiving a data access request sent by a mobile terminal; wherein, the data access request carries the account number, password, and biometric information of the user performing data access. and reference feature information, the reference feature information is obtained by the user when using the mobile terminal to collect the biometric information; using the user's account number, password and biometric information, the user's identity Perform authentication; if the authentication fails, then determine the reference actual value of the user based on the reference feature information of the user; if the determined reference actual value is greater than the preset reference threshold, the user is again authenticate the identity of the user; and send the target data corresponding to the data access request to the mobile terminal when the identity authentication of the user passes. The solution of the invention can improve the security of data access.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a data security access method and device. Background technique [0002] With the gradual improvement of people's data storage capacity and data security, cloud storage devices are widely used due to their massive storage space, high reliability, and high scalability. At the same time, people are increasingly dependent on mobile terminals, that is, people can use application software on mobile terminals to access personal data stored in cloud storage devices. [0003] In related technologies, the user generally only needs to enter a matching account number and password for identity authentication. After passing the authentication, the cloud storage device returns an access token, and the user can use the access token to access personal data in the cloud storage device. However, if the user's account number and password are obtained by criminals, it is easy to cause the importa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/60
CPCG06F21/31G06F21/602G06F21/604G06F2221/2141
Inventor 李长国姜海昆范宇
Owner BEIJING CHANGYANG TECH CO LTD