Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe processing and accessing method of cloud resource

A technology for secure processing and access methods, applied in electrical components, transmission systems, etc., can solve the problems of easy leakage and low data security, and achieve the effect of improving security, ensuring that it is not stolen and leaking, and the steps are reasonable.

Inactive Publication Date: 2016-08-10
新昌县七星街道明盛模具厂
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to overcome the deficiencies of the above-mentioned prior art, and provide a method for secure processing and accessing cloud resources, which aims to solve the problem of low data security and easy leakage in the process of using cloud computing services in the prior art question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe processing and accessing method of cloud resource

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0033] refer to figure 1 , the embodiment of the present invention provides a method for secure processing and accessing cloud resources, which is based on an independent third-party mobile storage device and a hardware platform for interacting with users, the third-party mobile storage device includes a control chip and a memory , the program running on the control chip includes a control module and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe processing and accessing method of a cloud resource, wherein the safe processing and accessing method of the cloud resource is based on a standalone third-party mobile storage device and a hardware platform which is used for interacting with a user; the third-party mobile storage device includes a control chip and a memory; programs running in the control chip include a control module and a file system module; the memory consists of an encrypted storage area and an ordinary storage area; the control chip calls the file system module, through the control module, to access the encrypted storage area and the ordinary storage area of the memory; the ordinary storage area includes a terminal safety monitoring program; the encrypted storage area includes a device password, identity authentication information, an encryption secret key and an algorithm software carrier. By using the safe processing and accessing method of the cloud resource, which is provided by the invention, a whole operating environment is guaranteed to be safe and reliable; data stored in a cloud database is encrypted; an illegal user is prevented from directly obtaining plaintext data; the data of the user are guaranteed not to be stolen and leaked.

Description

【Technical field】 [0001] The invention relates to a method for protecting information security, in particular to a method for safely processing and accessing cloud resources. 【Background technique】 [0002] Cloud computing supports users to obtain application services at any location and using various terminals, and the requested resources come from the "cloud" rather than fixed tangible entities. Whether it is an enterprise or an individual user, there is a large amount of private data, such as corporate business confidential data, corporate customer information data, financial data, personal bank accounts and passwords, private photos, and so on. For users of cloud computing services, "cloud" is like a black box, because in the cloud environment, users do not know where their data is ultimately stored, whether the data transmission process is safe, or whether the cloud service provider has Special permissions to access user data. In other words, users cannot control the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0815H04L63/083H04L63/0861H04L63/0876H04L63/10H04L67/06H04L67/568
Inventor 姚友根
Owner 新昌县七星街道明盛模具厂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products