Cloud storage method and system
A cloud storage system and cloud storage technology, applied in the field of cloud storage, can solve problems such as keys being easily cracked, cloud storage data security issues, eavesdropping, etc., and achieve the effect of ensuring data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Please refer to the attached figure 1 , is a schematic flowchart of a cloud storage method disclosed in Embodiment 1 of the present invention. The method is applied to the terminal side of the cloud storage system, and the terminal side includes a cloud storage client, a key management terminal, and a quantum encryption Key distribution (Quantum Key Distribution, QKD) system, the cloud storage client can be a mobile phone, computer or other dedicated cloud storage client, etc., the cloud storage client is connected to a key management terminal, the key management terminal Connect a QKD system. At this time, the key management terminal and the QKD system are independent of each other. It should be noted that the key management terminal can also be integrated in the QKD system. For this, this implementation example without any restrictions. The method specifically includes the following steps:
[0051] S101: The QKD system on the terminal side and at least one QKD syste...
Embodiment 2
[0060] Please refer to the attached figure 2 , is a schematic flowchart of a cloud storage method disclosed in Embodiment 2 of the present invention, the method is applied to the terminal side of the cloud storage system, and the terminal side includes a cloud storage client, a key management terminal and a QKD system , the cloud storage client can be a mobile phone, computer or other dedicated cloud storage client, etc., the cloud storage client is connected to a key management terminal, and the key management terminal is connected to a QKD system. At this time, the The key management terminal and the QKD system are independent of each other. It should be noted that the key management terminal may also be integrated in the QKD system, which is not limited in this embodiment. The method specifically includes the following steps:
[0061] S201: The QKD system on the terminal side and at least one QKD system on the cloud server side generate at least one quantum key through a ...
Embodiment 3
[0071] Please refer to the attached image 3 , is a schematic flowchart of a cloud storage method disclosed in Embodiment 3 of the present invention, the method is applied to the terminal side of the cloud storage system, and the terminal side includes a cloud storage client, a key management terminal and a QKD system , the cloud storage client can be a mobile phone, computer or other dedicated cloud storage client, etc., the cloud storage client is connected to a key management terminal, and the key management terminal is connected to a QKD system. At this time, the The key management terminal and the QKD system are independent of each other. It should be noted that the key management terminal may also be integrated in the QKD system, which is not limited in this embodiment. The method specifically includes the following steps:
[0072] S301: The QKD system on the terminal side and at least one QKD system on the cloud server side generate at least one quantum key through a q...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com