External data transmission method for cloud computing system

A technology for external data and transmission methods, applied in the information field, can solve problems such as inability to meet security requirements, and achieve the effects of increasing difficulty and cost, preventing illegal copying, and ensuring security

Inactive Publication Date: 2013-01-16
JIANGSU LEMAIDAO NETWORK TECH
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the expansion of cloud computing application fields, users have put forward higher and higher security requirements for cloud computing. At present, none of the existing methods mentioned above can meet higher security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External data transmission method for cloud computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The external data transmission method of the cloud computing system of the present invention is a USB device-based identity authentication and data encryption method with higher security.

[0020] An embodiment of this technical solution requires USB Key, a hardware device with a USB interface, whose shape is no different from that of a common U disk, but its internal structure is not so simple. The processor, random access memory RAM and the operating system solidified in the read-only memory can store the user's private key, use the built-in signature algorithm to realize the authentication of the user's identity, ensure the security of the data, and achieve the purpose of identifying the identity of the authorized person. The USB Key completes the encryption operation in the card, which ensures the security of the key and prevents the illegal copying of the key. At the same time, combined with the physical anti-tampering technology, it greatly increases the difficulty...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an external data transmission method for a cloud computing system. The method is based on identity authentication and data encryption of universal serial bus (USB) equipment. A method for checking the identity of a user logging into a server comprises the following steps of: encrypting a password and a time stamp by a private key, and finishing signature in a USBKey; sending signature information to a cloud server; decrypting the signature information by the cloud server through a user public key to obtain the password and the time stamp, and if the time stamp is overdue, indicating that checking fails; acquiring a password abstract by a hash function, and if the password abstract does not accord with user password information stored in a database, indicating that checking fails; and only when the time stamp is effective, and the password abstract is consistent, indicating that user checking succeeds, accepting the identity of the user by the system, and supplying service. By the technical scheme, the security of the cloud computing system can be effectively improved.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to an external data transmission method of a cloud computing system. Background technique [0002] Cloud computing is a computing model that conveniently obtains computing resources through the network according to user needs. These resources can come from a shared, configurable resource pool, and can be quickly obtained and released. It provides a new Internet business Service model, that is, users can rent the required services through the network in an on-demand and easy-to-expand manner. Cloud computing technology uses the transmission capacity of the high-speed Internet to transplant resources such as computing, storage, software, and services from distributed personal computers or servers to large-scale high-performance computers, personal computers, and virtual computers that are centrally managed on the Internet, so that users Use these resources like elect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 宗竞
Owner JIANGSU LEMAIDAO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products