Safety method for accessing mobile phone terminal to visit cloud storage server

A cloud storage server and mobile terminal technology, applied in electrical components, transmission systems, etc., can solve the problem of unable to meet the security authentication and key negotiation requirements of mobile terminals and cloud servers, saving communication overhead, improving computing performance, guaranteeing safety effect

Active Publication Date: 2015-04-08
XIDIAN UNIV
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the existing security protocols cannot meet the security authentication and key negotiation requirements between the mobile terminal and the cloud server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety method for accessing mobile phone terminal to visit cloud storage server
  • Safety method for accessing mobile phone terminal to visit cloud storage server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0044] see figure 1 and figure 2 As shown, the security method for the mobile terminal to access the cloud storage server in the embodiment of the present invention comprises the following steps:

[0045] S1: When the MP (smart phone terminal) needs to access the CS (cloud storage server), the MP sends access request packet information to the CS. The request packet information includes MPID (identity information of MP) and N 1 (the first random number selected by the MP), go to step S2.

[0046] S2: CS returns the access response packet information to MP, and the access response packet information includes N 1 , N 2 (random number selected by CS), CHelp (ciphertext auxiliary information) of K (session key) selected by CS for communication with MP. CS uses K to derive IK (integrity verification key), and CS uses IK to MIC 1 (First Integ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety method for accessing a mobile phone terminal to visit a cloud storage server, and relates to the field of mobile phone information safety. The safety method comprises the following steps: 1) when MP needs to access CS, sending access request for grouping to SC by the MP; 2) sending access to the MP by the CS to respond to the grouping; 3) guiding out an encryption key and an integrity checking key by MP, verifying grouping effectiveness and sending operation request for grouping to the CS; 4) checking the grouping effectiveness by receiving a calculating and checking code through CS, and constructing operation responding to grouping and sending the operation to MP; 5) judging the correctness of a random number and calculating and checking the grouping effectiveness by the MP, wherein the data access operation is successfully after the random number is judged to be correct. In an authentication process, the authentication of the cloud server is not needed, so that the security authentication and key negotiation needs between the mobile phone terminal and the cloud server can be met, not only can the communication expense be saved, but also the calculating performances can be remarkably improved on the condition of guaranteeing the safety.

Description

technical field [0001] The invention relates to the field of mobile terminal information security, in particular to a security method for a mobile terminal to access a cloud storage server. Background technique [0002] With the development of wireless network technology and embedded technology, mobile smart phone terminals have become an indispensable part of people's daily life; with the development of network convergence technology and the increase of network bandwidth, mobile smart phone terminals have gradually grown into people's consumption digital The main tool for content, storage, and processing of daily data. Therefore, the digital content industry based on mobile smart phone terminals has a wide development space and application prospects. [0003] For user data stored on smartphone terminals, the following two problems are usually faced: [0004] (1) Limitations of storage capacity and processing power [0005] Although the smart phone terminal provides stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/10
Inventor 裴庆祺冷昊李红宁李子马立川王祥
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products