Supercharge Your Innovation With Domain-Expert AI Agents!

File processing method and system

A processing method and file technology, applied in the field of communication, can solve the problems of poor data storage security, achieve the effect of confidentiality and integrity protection, and ensure security

Active Publication Date: 2017-11-14
ZTE CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a file processing method and system to at least solve the problem of poor data storage security in the cloud storage system in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File processing method and system
  • File processing method and system
  • File processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0044] figure 1 is a flowchart of a file processing method according to an embodiment of the present invention. Such as figure 1 As shown, the method may include the following processing steps:

[0045] Step S102: the first server receives the data file and the security metadata file to be stored from the client, wherein the security metadata file is created when the client encrypts the data file;

[0046] Step S104: the first server sends the security metadata file uploaded simultaneously with the data file of the successfully authenticated client user to the second server for storage.

[0047] In related technologies, the security of data stored by users in the cloud storage system is poor. us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a file processing method and system. In the above method, the first server receives the data file and the security metadata file to be stored from the client, wherein the security metadata file is the data file for the client. Created during the encryption process; the first server sends the security metadata file uploaded simultaneously with the data file of the successfully authenticated client user to the second server for storage. According to the technical solution provided by the present invention, end-to-end confidentiality and integrity protection can be provided for user data stored in cloud storage, and the security of access authority information during data sharing can be ensured.

Description

technical field [0001] The present invention relates to the communication field, in particular, to a file processing method and system. Background technique [0002] With the rapid development of cloud storage, more and more people or services choose to use the cloud storage environment to store their own data. Cloud storage users can upload their files to the cloud storage environment, provided by the cloud storage service. Provider management, and designate other users to have access to their files, so as to achieve file sharing. [0003] However, the cloud storage environment makes the data owner lose complete control over the data, which makes the data security face a series of threats, such as: using a large-scale botnet to carry out denial of service attacks (DoS), using the operating system There are various methods for exploiting vulnerabilities in application service protocols, malicious attacks, theft, and illegal use of user private information stored in the "clo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
Inventor 罗圣美舒继武陈小华
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More