CN106027552A - Method and system for accessing cloud storage data by user - Google Patents
Method and system for accessing cloud storage data by user Download PDFInfo
- Publication number
- CN106027552A CN106027552A CN201610500995.7A CN201610500995A CN106027552A CN 106027552 A CN106027552 A CN 106027552A CN 201610500995 A CN201610500995 A CN 201610500995A CN 106027552 A CN106027552 A CN 106027552A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- security
- cloud storage
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method and system for accessing cloud storage data by a user. Specifically, the method comprises the steps that a server receives a request of the user for accessing the cloud storage data; the server judges whether the request user is a legal user or not through the request; a security level of user access data is further judged through the requested data information if the request user is the legal user; the server sends data encrypted by a public key to the user if it is judged that the security level is a high level selected by the user; the user decrypts the data through a private key to obtain the data; the server directly sends the data in the cloud storage to the user if it is judged that the security level is not the high level selected by the user; and an access request is refused if the server judges that the request user is an illegal user. According to the method and the system, the security level of the cloud data is set by the user; different data storage and encryption operations are carried out for different security levels; and through identification of user information, the user authentication security is realized; and the storage security of important data is realized.
Description
Technical field
The present invention relates to cloud storage security fields, particularly relate to the uploading of a kind of cloud data, access control method.
Background technology
Cloud storage is in cloud computing (cloud computing) conceptive extension and the derivative new concept that developed.From the point of view of from functional realiey, it is simply that realize the technology that strange land file access walks altogether with sharing files.Cloud storage generally means that and data is put in storage pool non-indigenous rather than is put into local data center or special remote site.Enterprise, for the expense of reducing investment outlay, optional uses cloud storage service, data are left in also help in cloud obtains data from elsewhere, and the storage needing not move through this locality obtains.So cloud storage has become as a kind of trend of following storage development; but the development along with cloud storage technology; the application that all kinds of search, application technology and cloud storage combine, also needs to take into full account the problem in terms of secret file protection hidden danger, and improves from safety, secret protection angle.
At present, development along with Internet technology, increasing user can select the private file of oneself to leave in cloud storage, photo that such as user is shot oneself by mobile platform or video or other personal informations upload to Dropbox, to such an extent as to liberate the storage pressure of oneself mobile terminal, and the data of cloud storage can be had access to whenever and wherever possible, photo and daily record can be the most immediately fetched in strange land the most efficiently by WEB or pc client, but each the photo that user uploads or alternative document preserve in plain text in the service end of cloud storage, these files are no lack of classified papers or user's privacy of user, once individual cloud storage space is cracked and will cause the leakage of sensitive information;It addition, on the server All Files is all realized key add secret meeting increase cost.
Summary of the invention
In order to solve the problems referred to above, the invention provides a kind of method that user accesses cloud data.
The present invention provides a kind of user and accesses cloud data method, including step: server receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked;Server judges to ask whether user is validated user by the username and password information in described request, if validated user, passes through asked data message the most further and judges the level of security of described user accesses data;
If judge level of security be user select high-level time, then server sends the data after public key encryption to user, and user obtains data by private key deciphering;
If judge that level of security is that user selects non-high-level time, then server directly sends the data in cloud storage to user;
If described server is judged as non-legally user, then denied access request.
Specifically, also included access the request step of cloud storage data server reception user before: server generates PKI and private key according to the personal information of user, and private key is sent to described user.
Specifically, server generates PKI and private key according to the personal information of user, and private key transmission was also included before described user steps:
User uploads data to cloud storage server, and defines the data security levels of storage, and described level of security number is more than or equal to 2.
Preferably, server generates PKI and private key by asymmetric arithmetic.
Specifically, server takes different storage data manipulations according to user-defined level of security, and when user-defined level of security is high-level, the data PKI of storage in this rank is then encrypted by server;When user-defined rank be non-high-level time, server be then not required to storage data be encrypted operation.
Specifically, server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
Specifically, user obtains the data in cloud storage by APP or form web page.
Specifically, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
In sum, compared with existing cloud storage technology, the present invention passes through the user setup level of security of cloud data, and carry out different data for different level of securitys to deposit and cryptographic operation, by the identification to user profile, achieve the safety of user authentication, and achieve the storage security of significant data.
Accompanying drawing explanation
Fig. 1 is the method flow diagram that embodiment of the present invention user accesses cloud storage data;
Fig. 2 is the embodiment of the present invention user flow chart when registering cloud storage platform;
Fig. 3 is the structure chart of embodiment of the present invention cloud storage security access system.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on embodiments of the invention, the every other embodiment that those of ordinary skill in the art are obtained under not making creative work premise, broadly fall into protection scope of the present invention.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " is installed ", " being connected ", " connection ", " transmission " should be interpreted broadly, and connects for example, it may be fixing, can also be to removably connect, or be integrally connected;Can be to be mechanically connected, it is also possible to be electrical connection;Can be to be joined directly together, it is also possible to be indirectly connected to by intermediary, can be the connection of two element internals.For the ordinary skill in the art, above-mentioned term concrete meaning in the present invention can be understood with concrete condition.
The core of the present invention is, by arranging of user, cloud storage data are divided into different level of securitys, the cloud data of different level of securitys are respectively provided with corresponding level of security, server carries out authentication and only allows to access user for obtaining the data message in cloud storage during secured user access user, when needs obtain high confidential other file, then need the private key using user oneself just can be decrypted, thus realize the purpose strengthening cloud storage data access safety with privacy.
Below in conjunction with accompanying drawing, the embodiment of the present invention is described in further detail.
Fig. 1 is the method flow diagram that embodiment of the present invention user accesses cloud storage data, as it is shown in figure 1, the method comprises the steps:
S1. server receives user and accesses the request of cloud storage data.
Described request includes user name that user inputs, password and the data message asked.Username and password herein is all that user is arranged in the registration process of website, and can preserve the username and password information of user setup at server end.
S2. server judges to ask whether user is validated user by the information in described request.
Specifically, the most consistent with the username and password preserved in server by judging the username and password in solicited message, if consistent, think and belong to validated user;If inconsistent, then it is judged as non-legally user.
When server judges user as validated user, enter step S3;When server judges user as non-legally user, then enter step S6.
Whether the level of security S3. judging user accesses data is high-level.
Level of security in this step is that user defines when uploading data file, and server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Such as user is by time in oneself secret photo or files passe to server, the level of security of these files optional is high-level, server just carries out public key encryption to these files, say, that only user is decrypted by the private key of oneself and could obtain former data.When user need not define data be high level of security time, it is meant that the data of user only do general preservation, and server just will not carry out public key encryption to the data of this type, only carries out stored in clear.
When server is judged as high-level, enter step S4;When be judged as non-high-level time, enter step S5.
S4. server sends the data after public key encryption to user, and user obtains data by private key deciphering.
Data after now user gets the encryption that server sends, then the private key preserved with oneself is decrypted the former data of acquisition.By this step, even if account exists stolen possibility, the other side also will not get the former data content of user's storage, and the private key only preserved by user oneself is decrypted, and could obtain real former data content.
S5. server directly sends the data in cloud storage to user.
User receives the storage data of the plaintext version that server sends, it is not necessary to be decrypted.Also eliminate the step of server end cryptographic operation, release the resource of server end, improve the work efficiency of server end.
S6. user access request is refused.
After user is judged as non-legally user, server directly refuses the access request of user.Preferably, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
Preferably, user uploads data and the data obtained in cloud storage by APP or form web page.
Preferably, server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.This journal file is used for user's lookup operations in the future.
Fig. 2 is user's flow chart when registering cloud storage platform, specifically comprises the following steps that
S21. the registration request of user is received.
Server receives the parking request of user, then can feed back the information needing to arrange username and password to user side.
S22. the username and password of user setup is received.
User, when receiving the request arranging username and password of server end feedback, will arrange username and password, to complete registering functional.
S23. PKI and private key are generated according to the username and password of user setup.
Server after the username and password receiving user setup, then can generate corresponding PKI and private key according to username and password information.The algorithm generating PKI and private key has been prior art, and here is omitted, and those skilled in the art can be realized by existing algorithm.
S24. send private key to preserve in the server to user, PKI.
Server, after generating private key and PKI, will send private key to user, and PKI then can be saved in local server.
S25. user setup uploads the level of security of data.
User will carry out the definition of level of security upon registration to the data uploaded.Level of security at least two grade, is wherein divided into high level of security and not high level of security.
S25. carry out storing the safety operation of data according to user-defined level of security.
Server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Fig. 3 is the structure chart of cloud storage security access system, concrete module annexation and being defined as follows:
A kind of cloud storage security access system, including:
Receiver module, receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked, and receiver module is transferred to judge module the data received.
Described request includes user name that user inputs, password and the data message asked.Username and password herein is all that user is arranged in the registration process of website, and can preserve the username and password information of user setup at server end.
Judge module, judges to ask whether user is validated user by the username and password information in described request, also determines whether the level of security of described user accesses data;
Level of security is that user defines when uploading data file, and system can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
Such as user is by time in oneself secret photo or files passe to server, the level of security of these files optional is high-level, server just carries out public key encryption to these files, say, that only user is decrypted by the private key of oneself and could obtain former data.When user need not define data be high level of security time, it is meant that the data of user only do general preservation, and server just will not carry out public key encryption to the data of this type, only carries out stored in clear.
Select module, the result judged according to judge module, select the data sent, if judge module judge level of security be user select high-level time, the data after public key encryption are then selected to send to sending module, if judge module judge that level of security is that user selects non-high-level time, the most directly the data in cloud storage are sent to sending module.
Sending module, the data after selecting selecting module send to user.
Data after now user gets the encryption that system sends, then the private key preserved with oneself is decrypted the former data of acquisition.Being designed by this, even if account exists stolen possibility, the other side also will not get the former data content of user's storage, and the private key only preserved by user oneself is decrypted, and could obtain real former data content.User receives the storage data of the plaintext version that server sends, it is not necessary to be decrypted.Also eliminate the step of server end cryptographic operation, release the resource of server end, improve the work efficiency of server end.
Concrete, native system also includes: generation module, generates PKI and private key according to the personal information of user.
Server after the username and password receiving user setup, then can generate corresponding PKI and private key according to username and password information.The algorithm generating PKI and private key has been prior art, and here is omitted, and those skilled in the art can be realized by existing algorithm.Server, after generating private key and PKI, will send private key to user, and PKI then can be saved in local server.
Preferably, described generation module generates PKI and private key with specific reference to asymmetric arithmetic.
Concrete, native system also includes:
Level of security generation module, defines the data security levels of storage according to user, generates corresponding level of security storage mode, and affiliated level of security number is more than or equal to 2.
User will carry out the definition of level of security upon registration to the data uploaded.Level of security at least two grade, is wherein divided into high level of security and not high level of security.
Concrete, native system also includes:
Memory module, takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, is then encrypted the data PKI of storage in this rank;When user-defined rank be non-high-level time, then be not required to storage data be encrypted operation.
Server can carry out the storage operation of data for level of security;When the file that user selects storage is high level of security, the data PKI of user's storage is then encrypted by server, and only user just can decrypt former data by the private key of oneself;When user-defined storage data security levels be non-high-level time, server the most directly stores the data that user uploads, does not carry out any type of encryption.
It addition, native system also includes: log pattern, according to user, the operational circumstances of data in cloud storage is carried out record, form journal file.
Server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.This journal file is used for user's lookup operations in the future.
Concrete, native system also includes:
Alarm locking module, if continuous 3 the input error passwords of user, then locks user account, and cell-phone number or the mailbox registered to user sends a warning message.
Preferably, user uploads data and the data obtained in cloud storage by APP or form web page.
In flow chart or at this, any process described otherwise above or method description are construed as, represent and include one or more module of code, fragment or part for the executable instruction of the step that realizes specific logical function or process, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not be by order that is shown or that discuss, including according to involved function by basic mode simultaneously or in the opposite order, performing function, this should be understood by embodiments of the invention person of ordinary skill in the field.
Should be appreciated that each several part of the present invention can realize by hardware, software, firmware or combinations thereof.In the above-described embodiment, multiple steps or method can realize with software or the firmware that storage in memory and is performed by suitable instruction execution system.Such as, if realized with hardware, as in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic of logic gates for data signal realizes logic function, there is the special IC of suitable combination logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries can be by program and complete to instruct relevant hardware, described program can be stored in a kind of computer-readable recording medium, this program upon execution, including one or a combination set of the step of embodiment of the method.
Additionally, each functional unit in each embodiment of the present invention can be integrated in a processing module, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a module.Above-mentioned integrated module both can realize to use the form of hardware, it would however also be possible to employ the form of software function module realizes.If described integrated module is using the form realization of software function module and as independent production marketing or use, it is also possible to be stored in a computer read/write memory medium.
Storage medium mentioned above can be read only memory, disk or CD etc..
Although above it has been shown and described that embodiments of the invention, it is understandable that, above-described embodiment is exemplary, being not considered as limiting the invention, above-described embodiment can be changed in the case of without departing from the principle of the present invention and objective, revises, replace and modification by those of ordinary skill in the art within the scope of the invention.The scope of the present invention is limited by claims and equivalent thereof.
Claims (15)
1. the method that a user accesses cloud storage data, it is characterised in that comprise the following steps:
Server receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked;
Server judges to ask whether user is validated user by the username and password information in described request, if validated user, passes through asked data message the most further and judges the level of security of described user accesses data;
If judge level of security be user select high-level time, then server sends the data after public key encryption to user, and user obtains data by private key deciphering;
If judge that level of security is that user selects non-high-level time, then server directly sends the data in cloud storage to user;
If described server is judged as non-legally user, then denied access request.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that also included before server reception user accesses the request step of cloud storage data:
Server generates PKI and private key according to the personal information of user, and private key is sent to described user.
The method that a kind of user the most according to claim 2 accesses cloud storage data, it is characterised in that server generates PKI and private key according to the personal information of user, and private key transmission was also included before described user steps:
User uploads data to cloud storage server, and defines the data security levels of storage, and described level of security number is more than or equal to 2.
The method that a kind of user the most according to claim 2 accesses cloud storage data, it is characterised in that server generates PKI and private key by asymmetric arithmetic.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterized in that, server takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, the data PKI of storage in this rank is then encrypted by server;When user-defined rank be non-high-level time, server be then not required to storage data be encrypted operation.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that described server carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterised in that user obtains the data in cloud storage by APP or form web page.
The method that a kind of user the most according to claim 1 accesses cloud storage data, it is characterized in that, when server judges user validation, if continuous 3 the input error passwords of user, then lock user account, and cell-phone number or the mailbox registered to user send a warning message.
9. a cloud storage security access system, it is characterised in that include with lower module:
Receiver module, receives user and accesses the request of cloud storage data, and described request includes user name that user inputs, password and the data message asked, and receiver module is transferred to judge module the data received;
Judge module, judges to ask whether user is validated user by the username and password information in described request, also determines whether the level of security of described user accesses data;
Select module, the result judged according to judge module, select the data sent, if judge module judge level of security be user select high-level time, the data after public key encryption are then selected to send to sending module, if judge module judge that level of security is that user selects non-high-level time, the most directly the data in cloud storage are sent to sending module;
Sending module, the data after selecting selecting module send to user.
A kind of cloud storage security access system the most according to claim 1, it is characterised in that also include:
Generation module, generates PKI and private key according to the personal information of user.
11. a kind of cloud storage security access systems according to claim 2, it is characterised in that described generation module generates PKI and private key with specific reference to asymmetric arithmetic.
12. a kind of cloud storage security access systems according to claim 2, it is characterised in that described generation module also includes:
Level of security generation module, defines the data security levels of storage according to user, generates corresponding level of security storage mode, and affiliated level of security number is more than or equal to 2.
13. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Memory module, takes different storage data manipulations according to user-defined level of security, when user-defined level of security is high-level, is then encrypted the data PKI of storage in this rank;When user-defined rank be non-high-level time, then be not required to storage data be encrypted operation.
14. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Log pattern, carries out record according to user to the operational circumstances of data in cloud storage, forms journal file.
15. a kind of cloud storage security access systems according to claim 1, it is characterised in that also include:
Alarm locking module, if continuous 3 the input error passwords of user, then locks user account, and cell-phone number or the mailbox registered to user sends a warning message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610500995.7A CN106027552A (en) | 2016-06-30 | 2016-06-30 | Method and system for accessing cloud storage data by user |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610500995.7A CN106027552A (en) | 2016-06-30 | 2016-06-30 | Method and system for accessing cloud storage data by user |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106027552A true CN106027552A (en) | 2016-10-12 |
Family
ID=57105162
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610500995.7A Pending CN106027552A (en) | 2016-06-30 | 2016-06-30 | Method and system for accessing cloud storage data by user |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027552A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106650490A (en) * | 2016-10-25 | 2017-05-10 | 广东欧珀移动通信有限公司 | Cloud account number login method and device |
WO2018076870A1 (en) * | 2016-10-25 | 2018-05-03 | 广东欧珀移动通信有限公司 | Data processing method and apparatus, storage medium, server, and data processing system |
CN108900595A (en) * | 2018-06-25 | 2018-11-27 | 郑州云海信息技术有限公司 | Access method, apparatus, equipment and the calculation medium of cloud storage service device data |
WO2018233321A1 (en) * | 2017-06-21 | 2018-12-27 | 京东方科技集团股份有限公司 | Data determination method applied to distributed storage system and distributed storage system |
CN109451067A (en) * | 2018-12-27 | 2019-03-08 | 宝鸡文理学院 | Data sharing method in cloud computing system |
CN109656884A (en) * | 2018-12-14 | 2019-04-19 | 郑州云海信息技术有限公司 | A kind of method and device accessing file |
CN109934002A (en) * | 2019-03-13 | 2019-06-25 | 淮北师范大学 | A multi-path identity authentication method for OA office system |
CN110110536A (en) * | 2019-04-30 | 2019-08-09 | 温州职业技术学院 | A kind of data sharing method of cloud computing system |
CN110166456A (en) * | 2019-05-22 | 2019-08-23 | 瀚云科技有限公司 | Cloud method for reading data and device |
CN110191167A (en) * | 2019-05-22 | 2019-08-30 | 瀚云科技有限公司 | Cloud access control method and device |
CN110210246A (en) * | 2019-05-31 | 2019-09-06 | 阿里巴巴集团控股有限公司 | A kind of personal data method of servicing and system based on safety calculating |
CN110234110A (en) * | 2019-06-26 | 2019-09-13 | 恒宝股份有限公司 | A kind of mobile network's automatic switching method |
CN111581209A (en) * | 2020-04-27 | 2020-08-25 | 佛山科学技术学院 | A computer big data storage system, method and storage medium |
CN111698263A (en) * | 2020-06-24 | 2020-09-22 | 成都卫士通信息产业股份有限公司 | Beidou satellite navigation data transmission method and system |
CN112039902A (en) * | 2020-09-02 | 2020-12-04 | 全球能源互联网研究院有限公司 | Data encryption method and device |
CN112269837A (en) * | 2020-11-17 | 2021-01-26 | 珠海大横琴科技发展有限公司 | Data processing method and device |
CN112511549A (en) * | 2020-12-03 | 2021-03-16 | 珠海格力电器股份有限公司 | Data transmission method, device, equipment and computer readable storage medium |
US11120160B2 (en) | 2019-05-31 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Distributed personal data storage and encrypted personal data service based on secure computation |
CN114036480A (en) * | 2022-01-07 | 2022-02-11 | 北京悦游信息技术有限公司 | Security access control method and system for private application and readable storage medium |
CN114422265A (en) * | 2022-02-28 | 2022-04-29 | 海信集团控股股份有限公司 | Data access method and server |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120131341A1 (en) * | 2010-11-22 | 2012-05-24 | Network Appliance, Inc. | Method and system for improving storage security in a cloud computing environment |
CN103763355A (en) * | 2014-01-07 | 2014-04-30 | 天地融科技股份有限公司 | Cloud data uploading and access control method |
CN104113595A (en) * | 2014-07-09 | 2014-10-22 | 武汉邮电科学研究院 | Mixed cloud storage system and method based on safety grading |
GB201502262D0 (en) * | 2015-02-11 | 2015-04-01 | Livedrive Internet Ltd | Methods and systems for virtual file storage and encryption |
CN104539610A (en) * | 2014-12-25 | 2015-04-22 | 华中科技大学 | Agent re-encryption method for improving outsourced encrypted data sharing function |
US20150365385A1 (en) * | 2014-06-11 | 2015-12-17 | Bijit Hore | Method and apparatus for securing sensitive data in a cloud storage system |
-
2016
- 2016-06-30 CN CN201610500995.7A patent/CN106027552A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120131341A1 (en) * | 2010-11-22 | 2012-05-24 | Network Appliance, Inc. | Method and system for improving storage security in a cloud computing environment |
CN103763355A (en) * | 2014-01-07 | 2014-04-30 | 天地融科技股份有限公司 | Cloud data uploading and access control method |
US20150365385A1 (en) * | 2014-06-11 | 2015-12-17 | Bijit Hore | Method and apparatus for securing sensitive data in a cloud storage system |
CN104113595A (en) * | 2014-07-09 | 2014-10-22 | 武汉邮电科学研究院 | Mixed cloud storage system and method based on safety grading |
CN104539610A (en) * | 2014-12-25 | 2015-04-22 | 华中科技大学 | Agent re-encryption method for improving outsourced encrypted data sharing function |
GB201502262D0 (en) * | 2015-02-11 | 2015-04-01 | Livedrive Internet Ltd | Methods and systems for virtual file storage and encryption |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106650490A (en) * | 2016-10-25 | 2017-05-10 | 广东欧珀移动通信有限公司 | Cloud account number login method and device |
WO2018076870A1 (en) * | 2016-10-25 | 2018-05-03 | 广东欧珀移动通信有限公司 | Data processing method and apparatus, storage medium, server, and data processing system |
CN106650490B (en) * | 2016-10-25 | 2019-07-23 | Oppo广东移动通信有限公司 | The login method and device of cloud account |
WO2018233321A1 (en) * | 2017-06-21 | 2018-12-27 | 京东方科技集团股份有限公司 | Data determination method applied to distributed storage system and distributed storage system |
US11249691B2 (en) | 2017-06-21 | 2022-02-15 | Boe Technology Group Co., Ltd. | Data judging method applied in distributed storage system and distributed storage system |
CN108900595A (en) * | 2018-06-25 | 2018-11-27 | 郑州云海信息技术有限公司 | Access method, apparatus, equipment and the calculation medium of cloud storage service device data |
CN108900595B (en) * | 2018-06-25 | 2021-08-31 | 郑州云海信息技术有限公司 | Method, apparatus, device and computing medium for accessing cloud storage server data |
CN109656884A (en) * | 2018-12-14 | 2019-04-19 | 郑州云海信息技术有限公司 | A kind of method and device accessing file |
CN109451067A (en) * | 2018-12-27 | 2019-03-08 | 宝鸡文理学院 | Data sharing method in cloud computing system |
CN109934002A (en) * | 2019-03-13 | 2019-06-25 | 淮北师范大学 | A multi-path identity authentication method for OA office system |
CN110110536A (en) * | 2019-04-30 | 2019-08-09 | 温州职业技术学院 | A kind of data sharing method of cloud computing system |
CN110110536B (en) * | 2019-04-30 | 2022-11-08 | 温州职业技术学院 | A data sharing method of cloud computing system |
CN110191167A (en) * | 2019-05-22 | 2019-08-30 | 瀚云科技有限公司 | Cloud access control method and device |
CN110166456A (en) * | 2019-05-22 | 2019-08-23 | 瀚云科技有限公司 | Cloud method for reading data and device |
CN110210246A (en) * | 2019-05-31 | 2019-09-06 | 阿里巴巴集团控股有限公司 | A kind of personal data method of servicing and system based on safety calculating |
CN110210246B (en) * | 2019-05-31 | 2022-01-07 | 创新先进技术有限公司 | Personal data service method and system based on safety calculation |
US11120160B2 (en) | 2019-05-31 | 2021-09-14 | Advanced New Technologies Co., Ltd. | Distributed personal data storage and encrypted personal data service based on secure computation |
CN110234110A (en) * | 2019-06-26 | 2019-09-13 | 恒宝股份有限公司 | A kind of mobile network's automatic switching method |
CN111581209A (en) * | 2020-04-27 | 2020-08-25 | 佛山科学技术学院 | A computer big data storage system, method and storage medium |
CN111581209B (en) * | 2020-04-27 | 2023-04-25 | 佛山科学技术学院 | Computer big data storage system, method and storage medium |
CN111698263A (en) * | 2020-06-24 | 2020-09-22 | 成都卫士通信息产业股份有限公司 | Beidou satellite navigation data transmission method and system |
CN111698263B (en) * | 2020-06-24 | 2023-04-07 | 成都卫士通信息产业股份有限公司 | Beidou satellite navigation data transmission method and system |
CN112039902A (en) * | 2020-09-02 | 2020-12-04 | 全球能源互联网研究院有限公司 | Data encryption method and device |
CN112269837A (en) * | 2020-11-17 | 2021-01-26 | 珠海大横琴科技发展有限公司 | Data processing method and device |
CN112511549A (en) * | 2020-12-03 | 2021-03-16 | 珠海格力电器股份有限公司 | Data transmission method, device, equipment and computer readable storage medium |
CN114036480A (en) * | 2022-01-07 | 2022-02-11 | 北京悦游信息技术有限公司 | Security access control method and system for private application and readable storage medium |
CN114036480B (en) * | 2022-01-07 | 2022-04-12 | 北京悦游信息技术有限公司 | Security access control method and system for private application and readable storage medium |
CN114422265A (en) * | 2022-02-28 | 2022-04-29 | 海信集团控股股份有限公司 | Data access method and server |
CN114422265B (en) * | 2022-02-28 | 2024-05-03 | 海信集团控股股份有限公司 | Data access method and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106027552A (en) | Method and system for accessing cloud storage data by user | |
CN110417750B (en) | Block chain technology-based file reading and storing method, terminal device and storage medium | |
JP6475208B2 (en) | Account management for multiple network sites | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
CN103701611B (en) | Method for accessing and uploading data in data storage system | |
CN103067399B (en) | Wireless transmitter/receiver unit | |
JP5852265B2 (en) | COMPUTER DEVICE, COMPUTER PROGRAM, AND ACCESS Permission Judgment Method | |
CN103763355B (en) | Cloud data uploading and access control method | |
CN104718526A (en) | Secure mobile framework | |
CA2843292A1 (en) | Mobile security fob | |
CN110445840B (en) | File storage and reading method based on block chain technology | |
JP2015511356A5 (en) | ||
CN102469080A (en) | Method for pass user to realize safety login application client and system thereof | |
CN101689989A (en) | creating and validating cryptographically secured documents | |
CN109446259B (en) | Data processing method and device, processor and storage medium | |
Kikitamara et al. | Digital identity management on blockchain for open model energy system | |
Kwon et al. | A secure and efficient audit mechanism for dynamic shared data in cloud storage | |
Othman et al. | A protocol for decentralized biometric-based self-sovereign identity ecosystem | |
Ferdous et al. | Portable personal identity provider in mobile phones | |
Adlam et al. | Applying blockchain technology to security-related aspects of electronic healthcare record infrastructure | |
Shafqat et al. | Identity matrix: architecture framework for trusted cloud computing through cloud intellect | |
JP2007060581A (en) | Information management system and method | |
Othman et al. | The Horcrux Protocol: A Distributed Mobile Biometric Self-sovereign Identity Protocol | |
TWI640928B (en) | System for generating and decrypting two-dimensional codes and method thereof | |
Bolourforoush et al. | Security challenges of digital transformation in smart cities: Case of banking sector |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161012 |