Cloud data security storage method and system

A technology for secure storage and cloud data, applied in digital transmission systems, transmission systems, secure communication devices, etc.

Active Publication Date: 2017-12-08
国家康复辅具研究中心
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A lot of data information involves personal privacy and security. Although merchants usually promise to ensure the security of user information, for individual users, the initiative

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud data security storage method and system
  • Cloud data security storage method and system
  • Cloud data security storage method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to facilitate the expression, first of all, make a unified description of the following technical data:

[0031]

[0032]

[0033] Such as figure 1 As shown, the key generation phase:

[0034] Step S1: User registration, input PIN code

[0035] When the user registers, set a specific user login password PIN code as the login password. The setting rule of the PIN code can be set according to the required computational complexity.

[0036] Step S2: The server encrypts the PIN code, generates SerPIN, and stores it as SerPIN

[0037] When saving the user information, the server saves the PIN code as a cipher text of the PIN code by means of encryption, and the server uses a hash algorithm to encrypt the PIN code. When saving the user information, only the hash value of the PIN code is recorded:

[0038] SerPIN=HASH(PIN||ID||TIME)

[0039] Among them, ID is the user ID, which is uniquely identifiable, and TIME is the registration time of the user, and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a novel cloud data security storage method and system, which can not only prevent the malicious disclosure of data information, but also provide a user with personal data security protection and prevent unauthorized access to personal data information by a server side or a service provider. In the invention, a symmetric key for encryption and decryption is generated jointly according to a password of identity authentication input by the user and verification information stored in the system to protect the data stored in the system. The password of identity authentication and personal data of the user are stored in the form of a cipher text in the cloud, and the personal privacy and information security are effectively protected.

Description

technical field [0001] The invention relates to a cloud data safe storage method and system. Background technique [0002] With the development of cloud service technology, more and more users choose to store their data on cloud servers, although the existing data isolation technologies of various private clouds, public clouds or hybrid clouds can isolate the data of different users However, as far as individual users are concerned, how to ensure their own data security and even personal privacy requires a complete security solution. A lot of data information involves personal privacy and security. Although merchants usually promise to ensure the security of user information, for individual users, the initiative to store and view information is on the server side. If personal information is browsed, downloaded, or even disclosed Personal control, therefore, there are certain hidden dangers. This application realizes the complete protection of personal data information thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3226H04L63/0435H04L63/08H04L67/1097
Inventor 陈伟潘国新陶春静苏宏伦康婷
Owner 国家康复辅具研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products