Cloud safety storage method based on client public and private key encryption and decryption
A secure storage and client-side technology, applied in electrical components, transmission systems, digital data authentication, etc., can solve problems such as different server security, server maliciously obtaining data, and destroying user privacy and security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0030] Such as figure 1 Shown and described are the main components of the method. The method includes a client role, a server role, and a key data center role. The client role is mainly responsible for the encryption and decryption of objects, the server role is responsible for the storage of encrypted objects, and the key data center role is mainly responsible for the storage and control of permission records. This method mainly describes the six process steps of initializing objects that a user has permission to access, viewing objects, adding objects, deleting objects, modifying objects, and adding or deleting another user's sharing permissions. figure 1 The flow chart of the method describes the steps of viewing objects, adding objects, deleting objects, modifying objects, and adding or deleting another user's sharing permissions after the user logs in to initialize the process.
[0031] Such as figure 2 As shown in , it describes the process of initially loading and ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 