Method for improving data security under SaaS application

A security and user data technology, applied to the public key and key distribution of secure communication, can solve problems such as increasing burden and affecting operation speed, and achieve the effect of improving data security

Inactive Publication Date: 2011-06-15
上海华御信息技术有限公司
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the frequent encryption and decryption of the computer on the client side, it will inevitably increase the burden and affect the running speed
Moreover, the client needs to install encryption and decryption software, which is in contradiction with the software as a service itself.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving data security under SaaS application
  • Method for improving data security under SaaS application
  • Method for improving data security under SaaS application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The invention discloses a method for improving data security under a SaaS application, and the method includes the following steps:

[0033] When the user registers, a data encryption key is assigned to the user; the data encryption key is encrypted with the public key algorithm of the server, and the encrypted key is kept by the user;

[0034] When users use SaaS services, they use encrypted communication protocols to communicate;

[0035] The user's data is encrypted and decrypted using a symmetric encryption algorithm, and the data encryption key is only temporarily stored in the memory of the application server. The symmetric encryption algorithm is DES or AES, and the asymmetric algorithm is RSA or ECC algorithm.

[0036] Preferably, when encrypting user data, the document data generated by a designated application is selected for encryption and decryption. When a user opens or saves data, the application server that provides services to the user applies to the a...

Embodiment 2

[0040] By adopting transparent encryption and decryption technology in the data server, the user's data files are dynamically encrypted and decrypted, so that the data is always in an encrypted state in the data server, while it is in a clear text state at the user end. At the same time, encrypted communication is adopted, and the user The data key is kept by itself, and the data key is not stored in the application server, so as to ensure that the user's normal usage habits are not affected, and the security of user data in the server can be guaranteed. So that users don't have to worry about leaking their confidential information when using SaaS services, and promote the development of SaaS applications.

[0041] The specific implementation steps are as follows:

[0042] Install a transparent encryption and decryption program in the application server. Using a symmetric encryption algorithm, for the application process, it decrypts the data process read into the memory, and...

Embodiment 3

[0047] An encryption system is installed on the application server side, and the system adopts transparent encryption technology. The connection between the user and the server uses the HTTPS protocol to encrypt the communication. Transparent encryption uses a symmetric algorithm, which can be 3DES or AES, etc. The user data key is encrypted using an asymmetric algorithm, and the encrypted key can be saved in the extension field of the X509 certificate and stored in the user's certificate. The application program applies for a key from the authentication server to encrypt and decrypt user data. The normal use of the service by the user will not be affected in any way.

[0048] User registration steps are as follows:

[0049] 1. If figure 2 As shown in , the user applies to register a new user on the web page, and the authentication server judges whether registration is allowed. If registration is possible, a record is added to the database and a successful response is ret...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for improving data security under software-as-a-service (SaaS) application, which comprises the following steps of: allocating a data encryption key for a user during user registration; encrypting the data encryption key by using a public key of a server through a public key algorithm, and keeping the encrypted key by a user; when the user uses the SaaS service, communicating by adopting an encryption communication protocol; and encrypting and decrypting the user data by adopting a symmetrical encryption algorithm, wherein the data encryption key is only transiently saved in a memory of an application program server. In the method for improving the data security under the SaaS application, the encryption key is kept by the user, and due to the adoption of encryption communication, a server manager is prevented from illegally obtaining the key. The encryption and decryption processes are finished in the server, the client load cannot be increased, and any extra software is not needed to be installed. The document data of the user is in a cleartext form in the process of using the service, so operating habits of the user are not influenced.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to a method for improving data security, in particular to a method for improving data security under a SaaS application. Background technique [0002] SaaS (Software-as-a-service) means software as a service, and the Chinese name of SaaS is soft camp or software operation. SaaS is a software application model that provides software services based on the Internet. As an innovative software application model that began to emerge in the 21st century, SaaS is the latest trend in the development of software technology. The basic structure of SaaS is as follows: figure 1 shown. [0003] With the rapid development of cloud computing, the demand for SaaS applications will also increase rapidly. However, the security of user data in the server has caused many people to dare not use the services provided by SaaS service providers, and the development of SaaS applications has thus been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
Inventor 耿振民刘彬
Owner 上海华御信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products