A cloud security storage method based on client public and private key encryption and decryption
A secure storage and client-side technology, applied in electrical components, transmission systems, digital data authentication, etc., to solve problems such as attacks, leaks, and damage to user privacy and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0030] Such as figure 1 Shown and described are the main components of the method. The method includes client role, server role, and key data center role. The client role is mainly responsible for the encryption and decryption of objects, the server role is responsible for the storage of encrypted objects, and the key data center role is mainly responsible for the storage and control of permission records. This method mainly describes the six process steps of initializing objects that the user has permission to access, viewing objects, adding objects, deleting objects, modifying objects, and users adding or deleting another user's sharing permissions. figure 1 The flowchart describes the steps of this method when the user logs in for the initialization process, and can view objects, add objects, delete objects, modify objects, and add or delete another user’s sharing authority.
[0031] Such as figure 2 As shown, it describes the process of initializing and loading objects with ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


