Method for realizing secure network backup system under cloud storage environment
An implementation method and cloud storage technology, applied in the transmission system, electrical components, etc., can solve the problems of destroying data security and reducing system efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0104] Step 1: System initialization.
[0105] The client computer, hereinafter referred to as the client, is equipped with a data encryption and decryption module, a data integrity verification module, a local monitoring module, a folder sharing module and a protocol communication module;
[0106] The server is equipped with: identity verification module, storage control module, access control module, version control module and directory metadata management module, among which:
[0107] The directory metadata management module is used to query and update directory metadata, including: directory type, owner username, absolute path, access control list, number of authorized users, and key generation way, wherein the access control list includes: user names and corresponding key ciphertexts, the key ciphertexts are encrypted using the corresponding user's public key, and the corresponding user can use their own private key to decrypt;
[0108] The cloud storage server is here...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com