Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of web security storage

A security storage and security analysis technology, applied in transmission systems, electrical components, etc., can solve problems such as source user analysis and restriction of files, random uploading of files, virus intrusion into storage systems, etc.

Active Publication Date: 2020-11-06
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are several problems in the current web storage. First, file location errors between users and systems are easy to occur; second, files are uploaded indiscriminately, which can easily lead to viruses invading the storage system; third, there is no analysis and analysis of the source users of the files. limit, it may happen that individual users intentionally sabotage storage operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of web security storage
  • A method of web security storage
  • A method of web security storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0028] A method for secure web storage in this embodiment includes a user module, a storage module, and a security analysis module, the user module is used to verify user identity and store user information, and the security analysis module is used to analyze and detect the storage process, so The above storage module is used to store files verified by user modules and security analysis modules, such as figure 1 and figure 2 As shown, including the process of implementing web security storage:

[0029] Step A: The user authenticates the identity to the user module before initiating a storage request, and obtains the user's dynamic token;

[0030] Step B: The user initiates a storage request, and the security analysis module obtains the user's domain name, dynamic token, the file to be stored and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a web secure storage method. According to the method, a user module, a storage module and a security analysis module are adopted. The method includes the following steps that:the identity of a user is verified through the user module before the user initiates a storage request, and the dynamic token of the user is obtained; the user initiates the storage request, and thesecurity analysis module obtains the domain name of the user, the dynamic token, a file to be stored, and a path where the file is required to be stored; the security analysis module analyzes and detects the obtained domain name of the user, the dynamic token, the file to be stored, and the path where the file is required to be stored so as to verify whether a storage requirement is met, and sendsthe file to the storage module if the storage requirement is met; the storage module receives the file to be stored and stores the file. According to the method of the invention, the identity of theuser and the source of the user are verified, so that the file upload path of the user can be limited, and therefore, the location error of the file can be prevented; and the behaviors of the user areanalyzed, and therefore, the user can be restricted from uploading files deliberately and intentionally destroying storage services, and stable storage services can be realized.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method for web security storage. Background technique [0002] At present, with the continuous development of communication technology, a series of value-added services have been continuously developed. The business development system provides a platform for business personnel to develop and release value-added services. The business development system may include a web server and a web client. During the business development process, the web storage function needs to be used. [0003] There are several problems in the current web storage. First, it is easy to cause file location errors between users and systems. Second, files are uploaded indiscriminately, which can easily cause viruses to invade the storage system. Third, there is no analysis and analysis of the source users of files. Limitations, individual users may intentionally destroy storage services. Contents of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0807H04L63/12H04L63/126H04L67/02H04L67/06
Inventor 何健辉林家伟叶梅霞
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD