Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security storage method based on identity authentication

A technology for secure storage and identity authentication, used in user identity/authority verification, electrical components, transmission systems, etc.

Inactive Publication Date: 2015-05-27
成都艺辰德迅科技有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data encryption is to make the same data encrypted by the user using the user's private key become different, while the de-redundancy technology uses the similarity of the data, so the de-redundancy problem of encrypted data needs to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security storage method based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0013] The invention first enables users to perform ownership verification based on a hash tree before data de-redundancy, which ensures that illegal users cannot obtain data ownership, and uses secondary encryption after the user compl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security storage method based on identity authentication. The method comprises the steps of using the self file by a file owner of a cloud platform through a mobile terminal; carrying out ownership authentication on other users before elimination of redundancy; after the user become a file owner, recording the user by the cloud platform, and enabling the file owner to take back the own file; enabling illegal users who do not own files to be unable to acquire user files and user private keys by using the cloud platform; and enabling the file owners to decide whether other users are the owners of the files or not, and eliminating redundancy of the files which are encrypted by the different user private keys through secondary encryption. After the method is used, the illegal users can not acquire the data ownership, and the users can freely select the private keys while redundancy of the encrypted data is eliminated.

Description

technical field [0001] The invention relates to cloud security, in particular to an identity authentication-based safe storage method. Background technique [0002] Cloud storage services can back up files in real time and synchronize and share files anytime, anywhere. But cloud storage also faces many challenges. User data security in cloud storage is a fundamental issue. Since the cloud storage provider is commercial in nature, the cloud storage server is not trusted, and it must be ensured that the cloud platform cannot obtain user data. The existing method is to encrypt the data before the user uploads it to the cloud platform, so that only the user can decrypt it. On the other hand, the rapid development of cloud storage leads to the rapid growth of storage space, and efficient storage is another problem in cloud storage. The de-redundancy technology adopted by most cloud storage providers is an effective way to reduce storage space and transmission bandwidth. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04L9/32
Inventor 王美婷
Owner 成都艺辰德迅科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products