Cloud data security access method and device

A technology for safe access and cloud data, applied in the field of network security, can solve the problem of low data security and achieve the effect of improving security

Inactive Publication Date: 2014-05-28
昆山中创软件工程有限责任公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, this application provides a method and device for secure access to cloud data to solve the problem that the encryption technology in the prior art realizes the encryption operation on the data itself, and anyone who obtains the key can realize the Access to data, resulting in technical issues of low data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security access method and device
  • Cloud data security access method and device
  • Cloud data security access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0052] see figure 1 , which shows a flow chart of Embodiment 1 of a secure access method for cloud data provided by the present application. This embodiment is applied to a cloud server, the cloud server is connected to a cloud database, and the cloud server or the cloud database At least one first access device type and the first data corresponding to each of the first access devices are stored in it, and this embodiment may include:

[0053] Step 101: Receive an access login requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud data security access method and device. The cloud data security access method and device are applied to a cloud server; the cloud server is connected with a cloud database; and at least a first access device type and first data which are corresponding to the first access device types respectively are stored in the cloud server or the cloud database. Compared with an access method in the prior art in which an encryption technique is simply adopted to encrypt user data themselves, according to the embodiment of the invention, the stored first data include physical sign data of people and / or environmental characteristic data, and therefore, the verification of the physical sign data of data accessors can be realized, and verified access login requests are transmitted to the cloud database, such that it can be ensured that a client that accesses the data in the cloud database is the real owner of the data, and therefore, the security of cloud data can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method and device for secure access to cloud data. Background technique [0002] Cloud data can be considered as user data stored in cloud storage servers, which is mainly data storage realized through cloud storage technology. Specifically, through technologies such as cluster application, network communication, or distributed file system, a large number of various types of storage devices in the network are assembled to work together, so as to jointly provide data storage and data access to users. Since the data is stored in the remote server, access to the data needs to be realized through the Internet. However, the openness of the Internet makes it possible for any computer device connected to the Internet to access the cloud data in the cloud storage server. Therefore, data security is an important evaluation factor for cloud storage technology. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 陈新叶鑫董永胜王兴
Owner 昆山中创软件工程有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products