[go: up one dir, main page]

CN106027552A - Method and system for accessing cloud storage data by user - Google Patents

Method and system for accessing cloud storage data by user Download PDF

Info

Publication number
CN106027552A
CN106027552A CN201610500995.7A CN201610500995A CN106027552A CN 106027552 A CN106027552 A CN 106027552A CN 201610500995 A CN201610500995 A CN 201610500995A CN 106027552 A CN106027552 A CN 106027552A
Authority
CN
China
Prior art keywords
user
data
security
cloud storage
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610500995.7A
Other languages
Chinese (zh)
Inventor
唐爱华
郝波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA EXPRESS E-COMMERCE Co Ltd
Original Assignee
CHINA EXPRESS E-COMMERCE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA EXPRESS E-COMMERCE Co Ltd filed Critical CHINA EXPRESS E-COMMERCE Co Ltd
Priority to CN201610500995.7A priority Critical patent/CN106027552A/en
Publication of CN106027552A publication Critical patent/CN106027552A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method and system for accessing cloud storage data by a user. Specifically, the method comprises the steps that a server receives a request of the user for accessing the cloud storage data; the server judges whether the request user is a legal user or not through the request; a security level of user access data is further judged through the requested data information if the request user is the legal user; the server sends data encrypted by a public key to the user if it is judged that the security level is a high level selected by the user; the user decrypts the data through a private key to obtain the data; the server directly sends the data in the cloud storage to the user if it is judged that the security level is not the high level selected by the user; and an access request is refused if the server judges that the request user is an illegal user. According to the method and the system, the security level of the cloud data is set by the user; different data storage and encryption operations are carried out for different security levels; and through identification of user information, the user authentication security is realized; and the storage security of important data is realized.

Description

A kind of user accesses the method and system of cloud storage data
Technical field
The present invention relates to cloud storage security fields, particularly relate to the uploading of a kind of cloud data, access control method.
Background technology
Cloud storage is in cloud computing (cloud computing) conceptive extension and the derivative new concept that developed.From the point of view of from functional realiey, it is simply that realize the technology that strange land file access walks altogether with sharing files.Cloud storage generally means that and data is put in storage pool non-indigenous rather than is put into local data center or special remote site.Enterprise, for the expense of reducing investment outlay, optional uses cloud storage service, data are left in also help in cloud obtains data from elsewhere, and the storage needing not move through this locality obtains.So cloud storage has become as a kind of trend of following storage development; but the development along with cloud storage technology; the application that all kinds of search, application technology and cloud storage combine, also needs to take into full account the problem in terms of secret file protection hidden danger, and improves from safety, secret protection angle.
At present, development along with Internet technology, increasing user can select the private file of oneself to leave in cloud storage, photo that such as user is shot oneself by mobile platform or video or other personal informations upload to Dropbox, to such an extent as to liberate the storage pressure of oneself mobile terminal, and the data of cloud storage can be had access to whenever and wherever possible, photo and daily record can be the most immediately fetched in strange land the most efficiently by WEB or pc client, but each the photo that user uploads or alternative document preserve in plain text in the service end of cloud storage, these files are no lack of classified papers or user's privacy of user, once individual cloud storage space is cracked and will cause the leakage of sensitive information;It addition, on the server All Files is all realized key add secret meeting increase cost.
Summary of the invention
In order to solve the problems referred to above, the invention provides a kind of method that user accesses cloud data.
The present invention provides a kind of user and accesses cloud data method, including step: server receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked;Server judges to ask whether user is validated user by the username and password information in described request, if validated user, passes through asked data message the most further and judges the level of security of described user accesses data;
If judge level of security be user select high-level time, then server sends the data after public key encryption to user, and user obtains data by private key deciphering;
If judge that level of security is that user selects non-high-level time, then server directly sends the data in cloud storage to user;
If described server is judged as non-legally user, then denied access request.
Specifically, also included access the request step of cloud storage data server reception user before: server generates PKI and private key according to the personal information of user, and private key is sent to described user.
Specifically, server generates PKI and private key according to the personal information of user, and private key transmission was also included before described user steps:
User uploads data to cloud storage server, and defines the data security levels of storage, and described level of security number is more than or equal to 2.
Preferably, server generates PKI and private key by asymmetric arithmetic.
Specifically, server takes different storage data manipulations according to user-defined level of security, and when user-defined level of security is high-level, the data PKI of storage in this rank is then encrypted by server;When user-defined rank be non-high-level time, server be then not required to storage data be encrypted operation.
Specifically, server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
Specifically, user obtains the data in cloud storage by APP or form web page.
Specifically, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
In sum, compared with existing cloud storage technology, the present invention passes through the user setup level of security of cloud data, and carry out different data for different level of securitys to deposit and cryptographic operation, by the identification to user profile, achieve the safety of user authentication, and achieve the storage security of significant data.
Accompanying drawing explanation
Fig. 1 is the method flow diagram that embodiment of the present invention user accesses cloud storage data;
Fig. 2 is the embodiment of the present invention user flow chart when registering cloud storage platform;
Fig. 3 is the structure chart of embodiment of the present invention cloud storage security access system.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on embodiments of the invention, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into protection scope of the present invention.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " is installed ", " being connected ", " connection ", " transmission " should be interpreted broadly, and connects for example, it may be fixing, can also be to removably connect, or be integrally connected;Can be to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be the connection of two element internals.For the ordinary skill in the art, above-mentioned term concrete meaning in the present invention can be understood with concrete condition.
The core of the present invention is, by arranging of user, cloud storage data are divided into different level of securitys, the cloud data of different level of securitys are respectively provided with corresponding level of security, server carries out authentication and only allows to access user for obtaining the data message in cloud storage during secured user access user, when needs obtain high confidential other file, then need the private key using user oneself just can be decrypted, thus realize the purpose strengthening cloud storage data access safety with privacy.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Fig. 1 is the method flow diagram that embodiment of the present invention user accesses cloud storage data, as it is shown in figure 1, the method comprises the steps:
S1. server receives user and accesses the request of cloud storage data.
Described request includes user name that user inputs, password and the data message asked.Username and password herein is all that user is arranged in the registration process of website, and can preserve the username and password information of user setup at server end.
S2. server judges to ask whether user is validated user by the information in described request.
Specifically, the most consistent with the username and password preserved in server by judging the username and password in solicited message, if consistent, think and belong to validated user;If inconsistent, then it is judged as non-legally user.
When server judges user as validated user, enter step S3;When server judges user as non-legally user, then enter step S6.
Whether the level of security S3. judging user accesses data is high-level.
Level of security in this step is that user defines when uploading data file, and server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Such as user is by time in oneself secret photo or files passe to server, the level of security of these files optional is high-level, server just carries out public key encryption to these files, say, that only user is decrypted by the private key of oneself and could obtain former data.When user need not define data be high level of security time, it is meant that the data of user only do general preservation, and server just will not carry out public key encryption to the data of this type, only carries out stored in clear.
When server is judged as high-level, enter step S4;When be judged as non-high-level time, enter step S5.
S4. server sends the data after public key encryption to user, and user obtains data by private key deciphering.
Data after now user gets the encryption that server sends, then the private key preserved with oneself is decrypted the former data of acquisition.By this step, even if account exists stolen possibility, the other side also will not get the former data content of user's storage, and the private key only preserved by user oneself is decrypted, and could obtain real former data content.
S5. server directly sends the data in cloud storage to user.
User receives the storage data of the plaintext version that server sends, it is not necessary to be decrypted.Also eliminate the step of server end cryptographic operation, release the resource of server end, improve the work efficiency of server end.
S6. user access request is refused.
After user is judged as non-legally user, server directly refuses the access request of user.Preferably, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
Preferably, user uploads data and the data obtained in cloud storage by APP or form web page.
Preferably, server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.This journal file is used for user's lookup operations in the future.
Fig. 2 is user's flow chart when registering cloud storage platform, specifically comprises the following steps that
S21. the registration request of user is received.
Server receives the parking request of user, then can feed back the information needing to arrange username and password to user side.
S22. the username and password of user setup is received.
User, when receiving the request arranging username and password of server end feedback, will arrange username and password, to complete registering functional.
S23. PKI and private key are generated according to the username and password of user setup.
Server after the username and password receiving user setup, then can generate corresponding PKI and private key according to username and password information.The algorithm generating PKI and private key has been prior art, and here is omitted, and those skilled in the art can be realized by existing algorithm.
S24. send private key to preserve in the server to user, PKI.
Server, after generating private key and PKI, will send private key to user, and PKI then can be saved in local server.
S25. user setup uploads the level of security of data.
User will carry out the definition of level of security upon registration to the data uploaded.Level of security at least two grade, is wherein divided into high level of security and not high level of security.
S25. carry out storing the safety operation of data according to user-defined level of security.
Server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Fig. 3 is the structure chart of cloud storage security access system, concrete module annexation and being defined as follows:
A kind of cloud storage security access system, including:
Receiver module, receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked, and receiver module is transferred to judge module the data received.
Described request includes user name that user inputs, password and the data message asked.Username and password herein is all that user is arranged in the registration process of website, and can preserve the username and password information of user setup at server end.
Judge module, judges to ask whether user is validated user by the username and password information in described request, also determines whether the level of security of described user accesses data;
Level of security is that user defines when uploading data file, and system can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Such as user is by time in oneself secret photo or files passe to server, the level of security of these files optional is high-level, server just carries out public key encryption to these files, say, that only user is decrypted by the private key of oneself and could obtain former data.When user need not define data be high level of security time, it is meant that the data of user only do general preservation, and server just will not carry out public key encryption to the data of this type, only carries out stored in clear.
Select module, the result judged according to judge module, select the data sent, if judge module judge level of security be user select high-level time, the data after public key encryption are then selected to send to sending module, if judge module judge that level of security is that user selects non-high-level time, the most directly the data in cloud storage are sent to sending module.
Sending module, the data after selecting selecting module send to user.
Data after now user gets the encryption that system sends, then the private key preserved with oneself is decrypted the former data of acquisition.Being designed by this, even if account exists stolen possibility, the other side also will not get the former data content of user's storage, and the private key only preserved by user oneself is decrypted, and could obtain real former data content.User receives the storage data of the plaintext version that server sends, it is not necessary to be decrypted.Also eliminate the step of server end cryptographic operation, release the resource of server end, improve the work efficiency of server end.
Concrete, native system also includes: generation module, generates PKI and private key according to the personal information of user.
Server after the username and password receiving user setup, then can generate corresponding PKI and private key according to username and password information.The algorithm generating PKI and private key has been prior art, and here is omitted, and those skilled in the art can be realized by existing algorithm.Server, after generating private key and PKI, will send private key to user, and PKI then can be saved in local server.
Preferably, described generation module generates PKI and private key with specific reference to asymmetric arithmetic.
Concrete, native system also includes:
Level of security generation module, defines the data security levels of storage according to user, generates corresponding level of security storage mode, and affiliated level of security number is more than or equal to 2.
User will carry out the definition of level of security upon registration to the data uploaded.Level of security at least two grade, is wherein divided into high level of security and not high level of security.
Concrete, native system also includes:
Memory module, takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, is then encrypted the data PKI of storage in this rank;When user-defined rank be non-high-level time, then be not required to storage data be encrypted operation.
Server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
It addition, native system also includes: log pattern, according to user, the operational circumstances of data in cloud storage is carried out record, form journal file.
Server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.This journal file is used for user's lookup operations in the future.
Concrete, native system also includes:
Alarm locking module, if continuous 3 the input error passwords of user, then locks user account, and cell-phone number or the mailbox registered to user sends a warning message.
Preferably, user uploads data and the data obtained in cloud storage by APP or form web page.
In flow chart or at this, any process described otherwise above or method description are construed as, represent and include one or more module of code, fragment or part for the executable instruction of the step that realizes specific logical function or process, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by order that is shown or that discuss, including according to involved function by basic mode simultaneously or in the opposite order, performing function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.In the above-described embodiment, multiple steps or method can realize with software or the firmware that storage in memory and is performed by suitable instruction execution system.Such as, if realized with hardware, as in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic of logic gates for data signal realizes logic function, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries can be by program and complete to instruct relevant hardware, described program can be stored in a kind of computer-readable recording medium, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.If described integrated module is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
Although above it has been shown and described that embodiments of the invention, it is understandable that, above-described embodiment is exemplary, being not considered as limiting the invention, above-described embodiment can be changed in the case of without departing from the principle of the present invention and objective, revises, replace and modification by those of ordinary skill in the art within the scope of the invention.The scope of the present invention is limited by claims and equivalent thereof.

Claims (15)

1. the method that a user accesses cloud storage data, it is characterised in that comprise the following steps:
Server receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked;
Server judges to ask whether user is validated user by the username and password information in described request, if validated user, passes through asked data message the most further and judges the level of security of described user accesses data;
If judge level of security be user select high-level time, then server sends the data after public key encryption to user, and user obtains data by private key deciphering;
If judge that level of security is that user selects non-high-level time, then server directly sends the data in cloud storage to user;
If described server is judged as non-legally user, then denied access request.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that also included before server reception user accesses the request step of cloud storage data:
Server generates PKI and private key according to the personal information of user, and private key is sent to described user.
The method that a kind of user the most according to claim 2 accesses cloud storage data, it is characterised in that server generates PKI and private key according to the personal information of user, and private key transmission was also included before described user steps:
User uploads data to cloud storage server, and defines the data security levels of storage, and described level of security number is more than or equal to 2.
The method that a kind of user the most according to claim 2 accesses cloud storage data, it is characterised in that server generates PKI and private key by asymmetric arithmetic.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterized in that, server takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, the data PKI of storage in this rank is then encrypted by server;When user-defined rank be non-high-level time, server be then not required to storage data be encrypted operation.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that described server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that user obtains the data in cloud storage by APP or form web page.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterized in that, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
9. a cloud storage security access system, it is characterised in that include with lower module:
Receiver module, receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked, and receiver module is transferred to judge module the data received;
Judge module, judges to ask whether user is validated user by the username and password information in described request, also determines whether the level of security of described user accesses data;
Select module, the result judged according to judge module, select the data sent, if judge module judge level of security be user select high-level time, the data after public key encryption are then selected to send to sending module, if judge module judge that level of security is that user selects non-high-level time, the most directly the data in cloud storage are sent to sending module;
Sending module, the data after selecting selecting module send to user.
A kind of cloud storage security access system the most according to claim 1, it is characterised in that also include:
Generation module, generates PKI and private key according to the personal information of user.
11. a kind of cloud storage security access systems according to claim 2, it is characterised in that described generation module generates PKI and private key with specific reference to asymmetric arithmetic.
12. a kind of cloud storage security access systems according to claim 2, it is characterised in that described generation module also includes:
Level of security generation module, defines the data security levels of storage according to user, generates corresponding level of security storage mode, and affiliated level of security number is more than or equal to 2.
13. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Memory module, takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, is then encrypted the data PKI of storage in this rank;When user-defined rank be non-high-level time, then be not required to storage data be encrypted operation.
14. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Log pattern, carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
15. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Alarm locking module, if continuous 3 the input error passwords of user, then locks user account, and cell-phone number or the mailbox registered to user sends a warning message.
CN201610500995.7A 2016-06-30 2016-06-30 Method and system for accessing cloud storage data by user Pending CN106027552A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610500995.7A CN106027552A (en) 2016-06-30 2016-06-30 Method and system for accessing cloud storage data by user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610500995.7A CN106027552A (en) 2016-06-30 2016-06-30 Method and system for accessing cloud storage data by user

Publications (1)

Publication Number Publication Date
CN106027552A true CN106027552A (en) 2016-10-12

Family

ID=57105162

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610500995.7A Pending CN106027552A (en) 2016-06-30 2016-06-30 Method and system for accessing cloud storage data by user

Country Status (1)

Country Link
CN (1) CN106027552A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650490A (en) * 2016-10-25 2017-05-10 广东欧珀移动通信有限公司 Cloud account number login method and device
WO2018076870A1 (en) * 2016-10-25 2018-05-03 广东欧珀移动通信有限公司 Data processing method and apparatus, storage medium, server, and data processing system
CN108900595A (en) * 2018-06-25 2018-11-27 郑州云海信息技术有限公司 Access method, apparatus, equipment and the calculation medium of cloud storage service device data
WO2018233321A1 (en) * 2017-06-21 2018-12-27 京东方科技集团股份有限公司 Data determination method applied to distributed storage system and distributed storage system
CN109451067A (en) * 2018-12-27 2019-03-08 宝鸡文理学院 Data sharing method in cloud computing system
CN109656884A (en) * 2018-12-14 2019-04-19 郑州云海信息技术有限公司 A kind of method and device accessing file
CN109934002A (en) * 2019-03-13 2019-06-25 淮北师范大学 A multi-path identity authentication method for OA office system
CN110110536A (en) * 2019-04-30 2019-08-09 温州职业技术学院 A kind of data sharing method of cloud computing system
CN110166456A (en) * 2019-05-22 2019-08-23 瀚云科技有限公司 Cloud method for reading data and device
CN110191167A (en) * 2019-05-22 2019-08-30 瀚云科技有限公司 Cloud access control method and device
CN110210246A (en) * 2019-05-31 2019-09-06 阿里巴巴集团控股有限公司 A kind of personal data method of servicing and system based on safety calculating
CN110234110A (en) * 2019-06-26 2019-09-13 恒宝股份有限公司 A kind of mobile network's automatic switching method
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 A computer big data storage system, method and storage medium
CN111698263A (en) * 2020-06-24 2020-09-22 成都卫士通信息产业股份有限公司 Beidou satellite navigation data transmission method and system
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112269837A (en) * 2020-11-17 2021-01-26 珠海大横琴科技发展有限公司 Data processing method and device
CN112511549A (en) * 2020-12-03 2021-03-16 珠海格力电器股份有限公司 Data transmission method, device, equipment and computer readable storage medium
US11120160B2 (en) 2019-05-31 2021-09-14 Advanced New Technologies Co., Ltd. Distributed personal data storage and encrypted personal data service based on secure computation
CN114036480A (en) * 2022-01-07 2022-02-11 北京悦游信息技术有限公司 Security access control method and system for private application and readable storage medium
CN114422265A (en) * 2022-02-28 2022-04-29 海信集团控股股份有限公司 Data access method and server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120131341A1 (en) * 2010-11-22 2012-05-24 Network Appliance, Inc. Method and system for improving storage security in a cloud computing environment
CN103763355A (en) * 2014-01-07 2014-04-30 天地融科技股份有限公司 Cloud data uploading and access control method
CN104113595A (en) * 2014-07-09 2014-10-22 武汉邮电科学研究院 Mixed cloud storage system and method based on safety grading
GB201502262D0 (en) * 2015-02-11 2015-04-01 Livedrive Internet Ltd Methods and systems for virtual file storage and encryption
CN104539610A (en) * 2014-12-25 2015-04-22 华中科技大学 Agent re-encryption method for improving outsourced encrypted data sharing function
US20150365385A1 (en) * 2014-06-11 2015-12-17 Bijit Hore Method and apparatus for securing sensitive data in a cloud storage system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120131341A1 (en) * 2010-11-22 2012-05-24 Network Appliance, Inc. Method and system for improving storage security in a cloud computing environment
CN103763355A (en) * 2014-01-07 2014-04-30 天地融科技股份有限公司 Cloud data uploading and access control method
US20150365385A1 (en) * 2014-06-11 2015-12-17 Bijit Hore Method and apparatus for securing sensitive data in a cloud storage system
CN104113595A (en) * 2014-07-09 2014-10-22 武汉邮电科学研究院 Mixed cloud storage system and method based on safety grading
CN104539610A (en) * 2014-12-25 2015-04-22 华中科技大学 Agent re-encryption method for improving outsourced encrypted data sharing function
GB201502262D0 (en) * 2015-02-11 2015-04-01 Livedrive Internet Ltd Methods and systems for virtual file storage and encryption

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106650490A (en) * 2016-10-25 2017-05-10 广东欧珀移动通信有限公司 Cloud account number login method and device
WO2018076870A1 (en) * 2016-10-25 2018-05-03 广东欧珀移动通信有限公司 Data processing method and apparatus, storage medium, server, and data processing system
CN106650490B (en) * 2016-10-25 2019-07-23 Oppo广东移动通信有限公司 The login method and device of cloud account
WO2018233321A1 (en) * 2017-06-21 2018-12-27 京东方科技集团股份有限公司 Data determination method applied to distributed storage system and distributed storage system
US11249691B2 (en) 2017-06-21 2022-02-15 Boe Technology Group Co., Ltd. Data judging method applied in distributed storage system and distributed storage system
CN108900595A (en) * 2018-06-25 2018-11-27 郑州云海信息技术有限公司 Access method, apparatus, equipment and the calculation medium of cloud storage service device data
CN108900595B (en) * 2018-06-25 2021-08-31 郑州云海信息技术有限公司 Method, apparatus, device and computing medium for accessing cloud storage server data
CN109656884A (en) * 2018-12-14 2019-04-19 郑州云海信息技术有限公司 A kind of method and device accessing file
CN109451067A (en) * 2018-12-27 2019-03-08 宝鸡文理学院 Data sharing method in cloud computing system
CN109934002A (en) * 2019-03-13 2019-06-25 淮北师范大学 A multi-path identity authentication method for OA office system
CN110110536A (en) * 2019-04-30 2019-08-09 温州职业技术学院 A kind of data sharing method of cloud computing system
CN110110536B (en) * 2019-04-30 2022-11-08 温州职业技术学院 A data sharing method of cloud computing system
CN110191167A (en) * 2019-05-22 2019-08-30 瀚云科技有限公司 Cloud access control method and device
CN110166456A (en) * 2019-05-22 2019-08-23 瀚云科技有限公司 Cloud method for reading data and device
CN110210246A (en) * 2019-05-31 2019-09-06 阿里巴巴集团控股有限公司 A kind of personal data method of servicing and system based on safety calculating
CN110210246B (en) * 2019-05-31 2022-01-07 创新先进技术有限公司 Personal data service method and system based on safety calculation
US11120160B2 (en) 2019-05-31 2021-09-14 Advanced New Technologies Co., Ltd. Distributed personal data storage and encrypted personal data service based on secure computation
CN110234110A (en) * 2019-06-26 2019-09-13 恒宝股份有限公司 A kind of mobile network's automatic switching method
CN111581209A (en) * 2020-04-27 2020-08-25 佛山科学技术学院 A computer big data storage system, method and storage medium
CN111581209B (en) * 2020-04-27 2023-04-25 佛山科学技术学院 Computer big data storage system, method and storage medium
CN111698263A (en) * 2020-06-24 2020-09-22 成都卫士通信息产业股份有限公司 Beidou satellite navigation data transmission method and system
CN111698263B (en) * 2020-06-24 2023-04-07 成都卫士通信息产业股份有限公司 Beidou satellite navigation data transmission method and system
CN112039902A (en) * 2020-09-02 2020-12-04 全球能源互联网研究院有限公司 Data encryption method and device
CN112269837A (en) * 2020-11-17 2021-01-26 珠海大横琴科技发展有限公司 Data processing method and device
CN112511549A (en) * 2020-12-03 2021-03-16 珠海格力电器股份有限公司 Data transmission method, device, equipment and computer readable storage medium
CN114036480A (en) * 2022-01-07 2022-02-11 北京悦游信息技术有限公司 Security access control method and system for private application and readable storage medium
CN114036480B (en) * 2022-01-07 2022-04-12 北京悦游信息技术有限公司 Security access control method and system for private application and readable storage medium
CN114422265A (en) * 2022-02-28 2022-04-29 海信集团控股股份有限公司 Data access method and server
CN114422265B (en) * 2022-02-28 2024-05-03 海信集团控股股份有限公司 Data access method and server

Similar Documents

Publication Publication Date Title
CN106027552A (en) Method and system for accessing cloud storage data by user
CN110417750B (en) Block chain technology-based file reading and storing method, terminal device and storage medium
JP6475208B2 (en) Account management for multiple network sites
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN103701611B (en) Method for accessing and uploading data in data storage system
CN103067399B (en) Wireless transmitter/receiver unit
JP5852265B2 (en) COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method
CN103763355B (en) Cloud data uploading and access control method
CN104718526A (en) Secure mobile framework
CA2843292A1 (en) Mobile security fob
CN110445840B (en) File storage and reading method based on block chain technology
JP2015511356A5 (en)
CN102469080A (en) Method for pass user to realize safety login application client and system thereof
CN101689989A (en) creating and validating cryptographically secured documents
CN109446259B (en) Data processing method and device, processor and storage medium
Kikitamara et al. Digital identity management on blockchain for open model energy system
Kwon et al. A secure and efficient audit mechanism for dynamic shared data in cloud storage
Othman et al. A protocol for decentralized biometric-based self-sovereign identity ecosystem
Ferdous et al. Portable personal identity provider in mobile phones
Adlam et al. Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure
Shafqat et al. Identity matrix: architecture framework for trusted cloud computing through cloud intellect
JP2007060581A (en) Information management system and method
Othman et al. The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol
TWI640928B (en) System for generating and decrypting two-dimensional codes and method thereof
Bolourforoush et al. Security challenges of digital transformation in smart cities: Case of banking sector

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161012