Cloud data modification method

A data modification and cloud-based technology, applied in the information field, can solve the problems of user privacy data leakage, user privacy data threat, easy to be illegally modified by others, etc., to achieve the effect of reducing the amount of data modification and preventing illegal modification

Inactive Publication Date: 2016-07-27
CHENGDU BAOMIHUA INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the cloud storage space will be connected to the Internet, there is data confidentiality and security. Once the account of the cloud storage space is leaked, it will pose a threat to the user's private data
At present, the existing cloud storage space does not have strong protection for the user's account, so the user's private data has a risk of leakage and is easy to be illegally modified by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data modification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0011] see figure 1 , is a schematic flowchart of a method for modifying cloud data according to an embodiment of the present invention. The cloud data modification method of the present embodiment comprises:

[0012] S1: When receiving the data modification request sent by the client, generate a random number.

[0013] Wherein, optionally, the random number may be a number, a letter or a combination thereof. In this embodiment, the client is a mobile phone...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cloud data modification method, comprising: generating a random number when receiving a data modification request sent by a client; encrypting the random number with a private key to obtain authority verification data; sending the authority verification data to the client The terminal decrypts, so that the client uses the public key corresponding to the private key to decrypt the random number from the authority verification data, and uses the public key to encrypt the random number and new data to obtain the coverage data; receive the coverage data sent by the client; use The private key decrypts the random number and new data from the covered data; judges whether the random number has changed; if the random number has not changed, obtains the field names of all fields in the new data and the original data; compares the new data with the same fields in the original data The value corresponding to the name; if the value is different, the value corresponding to the same field name in the new data is written to the field corresponding to the same field name in the original data. The invention can prevent data from being modified illegally.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a cloud data modification method. Background technique [0002] Cloud storage space is used to provide users with online file storage, access, backup, sharing and other file management functions. Through the network disk, no matter where the user is, as long as they can connect to the Internet, they can manage the files stored in the cloud through the mobile terminal. [0003] However, since the cloud storage space will be connected to the Internet, there is data confidentiality and security. Once the account of the cloud storage space is leaked, it will pose a threat to the user's private data. At present, the existing cloud storage space does not have strong protection for the user's account, so the user's private data has a risk of leakage and is easily illegally modified by others. Contents of the invention [0004] The technical problem mainly solved by the present ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0442
Inventor 梁庆欢王健强王川林
Owner CHENGDU BAOMIHUA INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products