Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security key device for secure cloud services, and system and method of providing security cloud services

A technology of dynamic password cards and cloud services, applied in transmission systems, computer security devices, instruments, etc., to prevent leakage and improve security.

Inactive Publication Date: 2015-05-13
SAFERZONE
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The present invention is proposed in order to solve the existing problems of this type. The purpose of the present invention is that the dynamic password card connected to the user terminal not only stores the encryption key, but also encrypts the file, thereby preventing the dynamic password from being leaked by hackers. Only when the dynamic password card is connected to the user terminal, the cloud file will be decrypted, and synchronization can be realized, therefore, the security is further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security key device for secure cloud services, and system and method of providing security cloud services
  • Security key device for secure cloud services, and system and method of providing security cloud services
  • Security key device for secure cloud services, and system and method of providing security cloud services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The description of the invention is merely an example for explaining the structure and function, and the scope of rights of the present invention should not be construed as being limited to the example described herein. That is, the embodiment can be changed variously and can have various forms, so it should be understood that the scope of rights of the present invention includes equivalents capable of realizing technical ideas. Moreover, the objects or effects proposed in the present invention do not mean that a specific embodiment must include all of the above objects or effects, or only include the above effects, and therefore, the scope of rights of the present invention cannot be limited thereto.

[0032] And, the meaning of the terms used in this application should be understood with reference to the following description.

[0033] Terms such as "first" and "second" are used to distinguish one constituent element from other constituent elements, and the scope of r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a security key device for cloud services. The security key device includes an interface unit that provides an interface with the user terminal, a storage unit that stores an encrypted user file, and an encryption / decryption conversion support controller that encrypts, when a file to be uploaded to a cloud server is received from the user terminal, the received file and stores the encrypted file in the storage unit to transmit the encrypted file to the user terminal, and stores, when an encrypted file downloaded from the cloud server is received from the user terminal, the received encrypted file in the storage unit and decrypts the encrypted file to transmit the decrypted file to the user terminal. Even when a cloud server is hacked, individual and company's important data cannot be opened, encryption / decryption is processed in a hardware encryption accelerator, and therefore it is possible to prevent leakage of an encryption key even when a personal PC is hacked, thereby significantly improving security compared to the related art.

Description

technical field [0001] The present invention relates to a dynamic password card for providing cloud services with enhanced security protection and a system and operation method using the same. The hardware dynamic password card detachably connected to the user terminal manages the encryption key, and the encryption engine is also in the The hardware embedded device decrypts the file and stores it in the cloud server, thereby strengthening the technology of security protection. Background technique [0002] Recently, cloud computing environments are widely used for efficient allocation of IT resources and secure storage of data. The concept of cloud computing was proposed by American computer scholar John McCarthy as early as 1960. Recently, with the rapid development of communication facilities, the requirements for effective distribution of computing environments are increasing, and the speed of development and development is also accelerating. [0003] In the cloud comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34H04L29/08
CPCG06F21/602G06F15/16G06F21/34H04L63/0428
Inventor 孙源将崔在植权昶薰
Owner SAFERZONE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products