Mobile equipment secure data transmission method

A technology for mobile devices and secure data, applied in the field of network security, can solve problems such as inability to guarantee security, achieve the effect of avoiding theft and tampering, and improving information security

Active Publication Date: 2016-04-20
趣增信息科技(上海)有限公司
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When users use and manage cloud computing services, and interact with cloud computing services, they all use software interfaces or APIs provided by cloud computing service providers, and cloud computing services cannot guarantee the security of these APIs provided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile equipment secure data transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The following and accompanying appendices illustrating the principles of the invention Figure 1 A detailed description of one or more embodiments of the invention is provided together. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details.

[0011] One aspect of the present invention provides a mobile device secure data transmission method. figure 1 It is a flow chart of a mobile device secure data transmission method according to an embodiment of the present invention.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile equipment secure data transmission method. The method comprises the following steps: constructing a data storage management system based on a distributed file system; encrypting the stored data; and performing identity authentication and access control on a mobile equipment user. Through adoption of the mobile equipment secure data transmission method provided by the invention, the risks of stealing and tampering of user private information are avoided through file access control, and the information security in a cloud storage environment is enhanced.

Description

technical field [0001] The invention relates to network security, in particular to a mobile device security data transmission method. Background technique [0002] For users, cloud computing resources can be regarded as infinitely scalable, available on demand at any time, and a certain fee is paid on time. With the rapid development of cloud computing, well-known enterprises have launched their own representative cloud computing services, but they do not store all data files in the cloud. This is a concern about the security of the cloud computing environment. Therefore, the promotion of cloud computing application services must design and implement a safe and reliable cloud computing security strategy. In the cloud computing environment, from the user's point of view, relying on the cloud to store all personal information and data may increase the threat from malicious administrators. These malicious insiders can tamper with user data information without any risk. When...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/08H04L63/10H04L67/06H04L67/1097
Inventor 刘金明
Owner 趣增信息科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products