Application system data safety protection method and system combined with cloud storage

An application system and data security technology, applied in the field of data security, can solve the problems of not being universal and not convenient for rapid development and deployment, and achieve the effect of improving work efficiency and reducing transformation costs

Inactive Publication Date: 2017-07-07
北京明朝万达科技股份有限公司
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the Figure 1-3 The above scheme has been recognized by developers and users, but this scheme is limited by the version of the operating system of the application system server itself. According to the version of the operating system, different versions of the encryption and decryption SDK middleware are developed for the application system to call. Adaptability, not easy for rapid development and deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application system data safety protection method and system combined with cloud storage
  • Application system data safety protection method and system combined with cloud storage
  • Application system data safety protection method and system combined with cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The business system data download isolation of embodiment 1 is as follows: Figure 7shown. The system includes the situation where the terminal is used locally. After the file is encrypted and stored in the cloud storage disk through the data security server, the terminal downloads it from the cloud storage disk when it is used. When it is used locally, the terminal cannot directly communicate with the cloud storage disk without going through the data security server. interact. The data that needs to be saved by the application system server is encrypted by the data security server and stored in the cloud storage disk. When the terminal is in use, it can obtain the location of the cloud storage disk where the document is located by querying the database, download it from the cloud storage disk to the terminal isolation disk, and then the client on the terminal The program opens. Another hidden function of this example is that the path of the cloud storage disk and the...

Embodiment 2

[0037] Embodiment 2 is a standard usage scenario. The file is still used through the application system, but the file is saved and protected by the data security server, and the terminal identification is added. The business system data download isolation of embodiment 2 is as follows Figure 8 shown. In this embodiment, there are multiple application system servers and cloud storage disks, and a unified data security server performs file encryption, decryption, distribution and storage, and data access is realized through the browser where the terminal is located. The files are stored on the network disk through the security server. When the user downloads or uploads the file, the application system accesses the file from the network disk through the security server.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a data safety protection method and system combined with cloud storage. The system comprises an application system server, a data safety server and a cloud storage disk. When uploading a file, the application system server sends a file uploading request to the data safety server; and after receiving the file uploading request, the data safety server stores file data information of a file to be uploaded into a built-in database, then receives and encrypts the file, and finally stores the file into the cloud storage disk. When downloading a file, the application system server sends a file downloading request to the data safety server; and after receiving the file downloading request, the data safety server acquires file data information of a file to be downloaded from the built-in database, acquires the file to be downloaded, and sends the file to the application system server. By means of the solution of the present invention, an operating system of the application system server does not need to be adapted, the universality is achieved, and a user will be not restricted by an environment any longer.

Description

technical field [0001] The invention relates to the field of data security, in particular to a data security protection method and system combined with cloud storage. Background technique [0002] Today, the emphasis on information security has been pushed to an unprecedented height. The government, finance, and some secret-related companies pay more attention to data protection within the company. In this type of industry, confidential internal sensitive data is generally stored on the corresponding application system server, and employees need to download it from the application system server to the work computer for use. [0003] This way of use did not consider the security of the application system server itself at the beginning of its construction, but with the advancement of technology and the continuous use of the application system, more and more sensitive data on the application system server, the security of the application system itself Security is becoming mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08G06F21/62
CPCH04L67/1097G06F21/6218H04L67/06
Inventor 秦凯王志海张静彭涛王志华
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products