Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data encryption authenticity verification method and system based on exchange server

A technology for data encryption and verification methods, applied in the field of data encryption authenticity verification based on Exchangeserver, can solve the problem that the test method does not have universality and generalizability, does not consider the diversity and compatibility of existing network application scenarios, and cannot. Ensure that the functions are actually available and other issues, to achieve the effect of highlighting the substantive features, verifying the conclusion is true and reliable, and easy to operate

Active Publication Date: 2021-09-17
ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the current storage system data encryption technology field, the verification methods for encryption authenticity require special supporting tools or extremely complicated operation steps, and the test methods do not have universality and scalability.
Moreover, the existing verification methods for encryption authenticity do not take into account the diversity and compatibility of live network application scenarios, and cannot ensure that the functions are truly usable in the live network application environment and meet the needs of customers on the live network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption authenticity verification method and system based on exchange server
  • A data encryption authenticity verification method and system based on exchange server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Specific embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0029] Such as figure 1 Shown a kind of data encryption authenticity verification method based on Exchange server, comprises the following steps:

[0030] Step 1: Install the Exchange server on the target host, and set the installation directory on the non-encrypted disk of the target host;

[0031] Step 2: Create separate mailbox databases for multiple encrypted target disks, and create multiple user mailboxes in each mailbox database;

[0032] Step 3: Create separate mailbox databases for multiple non-encrypted target disks, and create multiple user mailboxes in each mailbox database;

[0033] Step 4: Use the above email accounts to send multiple emails to each other;

[0034] Step 5: Record the original mailbox data on the encrypted target disk. The original mailbox data includes mailbox database information, mailbox account information and mail d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption authenticity verification method and system based on an Exchange server. By installing an Exchange server on a target host and using the mail service function of the Exchange server, mailbox databases are respectively created on encrypted target disks and non-encrypted target disks. And create multiple user mailboxes in each mailbox database, and then send emails to each other through the mailbox accounts, and compare the application status of the Exchange server function before and after encryption with the mailbox database data to realize the authenticity verification of data encryption. The invention is based on an Exchange server, does not need special supporting tools, is simple to operate, and has a verification method widely applicable to various target hosts. The entire verification process can be carried out in the live network application environment, and the verification conclusion is true and reliable, meeting the needs of customers in the live network.

Description

technical field [0001] The invention relates to the technical field of storage system data encryption, and more specifically relates to an Exchange server-based data encryption authenticity verification method and system. Background technique [0002] With the advent of the era of big data, data has become the most important wealth of enterprises, institutions and individuals. Data centralization has become the general trend, and more and more enterprises choose to build their own (cloud) storage systems, or directly migrate data to the cloud. Such a result, while bringing convenience, also brings hidden dangers to data security. [0003] Therefore, in order to improve the security of key data, it is usually necessary to encrypt relevant data, and then store the obtained ciphertext on the storage platform. The so-called data encryption (Data Encryption) technology refers to converting a piece of information (or plain text, plain text) into meaningless cipher text (cipher t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58
CPCH04L63/0428H04L63/06H04L63/123H04L51/56
Inventor 李顺歌庄甲平张超凡徐艳秋
Owner ZHENGZHOU YUNHAI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products