Private cloud encrypted data access method, terminal and memory medium

A technology for encrypting data and accessing methods, applied in the field of cloud computing, can solve the problems of high risk of leakage, cumbersome and troublesome backup data, and difficult management and control of public cloud storage data, so as to achieve the effect of ensuring the user experience.

Active Publication Date: 2017-11-03
NUBIA TECHNOLOGY CO LTD
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The main purpose of this application is to propose a private cloud encrypted data access method, terminal, and storage medium, aiming to solve the problems of difficult data management and control, high risk of leakage, and cumbersome manual backup of data in public cloud storage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private cloud encrypted data access method, terminal and memory medium
  • Private cloud encrypted data access method, terminal and memory medium
  • Private cloud encrypted data access method, terminal and memory medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0082] Such as image 3 As shown, it is the private cloud encrypted data access method provided in the first embodiment of the present application, and the method includes the following steps:

[0083] Step 310, obtaining a login request to the private cloud program;

[0084] Step 320, receiving the user name and password for logging into the private cloud program;

[0085] Step 330, judging whether the username and password are usernames and passwords of a public cloud account; if so, proceed to step 340;

[0086] Step 340, verify the user name and password, and enter step 350 when the verification is passed;

[0087] Step 350, when the user name and password are verified, encrypt and access the data in the private cloud account in the private cloud program.

[0088] Specifically, download the private cloud in the cloud service, and install it on the user's mobile terminal (such as a mobile phone) or a fixed terminal (such as a computer). After startup, the user name and ...

example 1

[0098] Example 1, the bytecode of a single file is 01101011, the bytecode of the sum of the user name and password is 10101000, and after XOR operation, the obtained bytecode is 11000011.

[0099] Further, such as Figure 5 As shown, the access to the data in the private cloud account in the private cloud program in step 330 includes:

[0100] Step 510, extracting the user name and password for logging into the private cloud program;

[0101] Step 520, judging whether the combined character string of the user name and password is the same as the encryption mask; if so, then enter step 530, if not, then the process ends;

[0102] Step 530, performing reverse XOR calculation on the files in the private cloud account;

[0103] Step 540, read the files in the private cloud account.

[0104] Specifically, after encrypting the data in the private cloud account, when logging in to the private cloud program again, first extract the user name and password when logging in to the priv...

no. 2 example

[0121] Such as Figure 7As shown, it is the private cloud encrypted data access method provided in the second embodiment of the present application. In the second embodiment, the private cloud encrypted data access method is a further improvement made on the basis of the first embodiment, the only difference is that the method also includes:

[0122] Step 710, synchronizing the data in the public cloud account to the private cloud account;

[0123] Step 720, saving the data in the public cloud account to a local database.

[0124] Specifically, when the user name and password are the user name and password of the public cloud account, the private cloud can start downloading the user's file in the public cloud. In this way, all the data of the user on the public cloud can be transferred to the private cloud, and the data in the private cloud can be stored in the local database of the terminal.

[0125] Optionally, after saving the data in the public cloud to the local databa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a private cloud encrypted data access method, a terminal and a memory medium. The method comprises the steps of obtaining a login request for a private cloud program; receiving a user name and a password for logging in the private cloud program; and when the user name and the password are the user name and password of a public cloud account and the user name and the password are verified successfully, encrypting and accessing data in a private cloud account of the private cloud program. According to the private cloud encrypted data access method, the terminal and the memory medium provided by the invention, a private cloud is automatically set up on the terminal, a file is rapidly encrypted through utilization of a pseudo encryption technology, and the rapid, secure and ensured use experience is provided for a user.

Description

technical field [0001] The present application relates to the technical field of cloud computing, in particular to a private cloud encrypted data access method, a terminal and a storage medium. Background technique [0002] With the development of smart terminal technologies such as mobile phones, people are increasingly dependent on mobile phones. Not only use the mobile phone to make calls and send messages, but also to play games, watch videos, take pictures, and do office work. However, the storage space of mobile phones is limited, and often not large. With the continuous improvement of mobile phone photography technology, photo and video files are also getting larger and larger. In order to release mobile phone space in time, users often use public cloud programs, such as cloud services provided by mobile phone manufacturers, or third-party cloud platforms, such as Baidu Cloud. For users who do not use the public cloud, they need to regularly copy files to their per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/60
CPCG06F21/602G06F2221/2107H04L63/0815H04L63/083H04L63/0876H04L63/10H04L67/1097
Inventor 倪秉炬
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products