Cloud data security storage and management method

A technology for safe storage and cloud data, applied in the field of cloud data safe storage and management, it can solve problems such as user property, privacy and security threats, and achieve the effect of retaining data sharing advantages and services, improving security performance, and improving security.

Inactive Publication Date: 2013-10-23
广东中商港科技有限公司
View PDF6 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the current cloud applications, once the user name and password are stolen, the user data stored in the cloud network sy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security storage and management method
  • Cloud data security storage and management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the objectives, technical solutions, and advantages of the present invention clearer and more comprehensible, the present invention will be further described in detail below with reference to the accompanying drawings and preferred embodiments. However, it should be noted that many details listed in the specification are only for the purpose of enabling readers to have a thorough understanding of one or more aspects of the present invention, and the technical solutions of the present invention can be implemented even without these specific details.

[0029] The "cloud network system" used in this application is a system composed of software that realizes network storage of user data and applies cloud computing technology and the hardware on which the software runs, such as servers. It can have multiple definitions and is not limited to hardware, firmware, combination of software and hardware, software or software in execution, but has the same feature that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data security storage and management method. An exclusive client has been subjected to multiple protection. The method comprises the following quintuple security protection: MAC (Media Access Control) address verification, local verification of a user name, secondary verification of the user name and a password in a cloud network system, display of only file abstracts and shortcut icons of cloud data in a local file folder, and encryption and decryption using the ID (Identity) of the exclusive client per se. The problem that personal data on the cloud network system is extremely vulnerable to threat due to theft of the user name and the password existing in the conventional cloud data storage and application is effectively solved.

Description

Technical field [0001] The invention relates to the technical field of cloud computing and cloud storage, in particular to a method for safe storage and management of cloud data. Background technique [0002] Users can obtain cloud storage files (or cloud files) by installing and running cloud applications (also called cloud applications or cloud storage applications) on smart terminals. Smart terminals that install cloud applications may include smart devices such as smart phones, smart TVs, tablet computers, and palmtop computers. [0003] With the emergence of more and more data clouds, the protection of personal privacy becomes more and more important. Data security issues are the Achilles heel of cloud computing and cloud storage applications and promotion. As more and more personal privacy files are saved to servers or databases on the network, once the user's username and password are leaked, personal privacy becomes naked. [0004] At present, various cloud applications ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 洪树雄
Owner 广东中商港科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products