Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

High-security terminal system based on cloud computing, and equipment and use method thereof

A terminal system and security technology, applied in the field of cloud computing, can solve problems such as single method, poor data encryption and decryption effect, and achieve the effect of avoiding malicious theft, high security, and high protection

Pending Publication Date: 2021-12-24
公晨
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, for end users, the security issue of cloud computing has always attracted much attention. Although cloud computing providers have certain security measures for data security, for end users, encryption and decryption of key data require a Encryption and decryption methods for self-use, need to encrypt information
However, the currently commonly used encryption and decryption methods are relatively conventional, and the method is single, so that the encryption and decryption of data are not effective.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security terminal system based on cloud computing, and equipment and use method thereof
  • High-security terminal system based on cloud computing, and equipment and use method thereof
  • High-security terminal system based on cloud computing, and equipment and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Such as figure 1 Shown:

[0031] A terminal system with high security based on cloud computing, including a control terminal module 1, a cloud computing server 2, a communication module 3, an encryption module 4 and a decryption module 5, and the control terminal module 1 is connected to the cloud computing server 2 through the communication module 3 The communication module 3 is used to upload data to the cloud computing server 2 or download data from the cloud computing server 2, and the communication module 3 includes one or more of a mobile communication module, a WIFI communication module or a Bluetooth communication module. The communication module 3 transmits bidirectionally.

[0032] The encryption module 4 and the decryption module 5 are respectively connected with the control terminal module 1, the encryption module 4 is used to encrypt the data to be uploaded, the decryption module 5 is used to decrypt the data downloaded from the cloud computing server 2, a...

Embodiment 2

[0034] Such as figure 2 Shown:

[0035] The structure of this embodiment is basically the same as that of Embodiment 1, the difference is that the control terminal module 1 of this embodiment is connected to the input and output interface 10 through the device communication module 9, and the control terminal module 1 can be connected to multiple equipment terminal 11. The control terminal module 1 is also connected with a comparison module 12, which is used for comparing the received password data with the pre-stored user password. The control terminal module 1 is also connected with a retrieval module 13, and the retrieval module 13 is used for retrieving data from the cloud computing server 2.

Embodiment 3

[0037] Such as image 3 Shown:

[0038] A terminal device with high security based on cloud computing, including a control terminal device 14, on which a control terminal module 1, a communication module 3, an encryption module 4 and a decryption module 5 are installed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a high-security terminal system based on cloud computing, and equipment and a use method thereof. The high-security terminal system comprises a control terminal module, the control terminal module is connected to a cloud computing server through a communication module, an encryption module and a decryption module are connected with the control terminal module, the encryption module is used for encrypting data needing to be uploaded, the decryption module is used for decrypting the data downloaded from the cloud computing server, a key selection module is arranged in the encryption module or the decryption module, the key selection module corresponds to a plurality of groups of corresponding encryption keys and decryption keys, and secret keys or decryption keys are selected through the key selection module. According to the invention, encryption and decryption are carried out through the corresponding keys, the encryption module and the decryption module select confidential keys or decryption keys through the key selection module, encryption or decryption is carried out by adopting the plurality of keys, and data information stored in the cloud computing server is encrypted, so that the risk that the information is maliciously stolen is avoided, and the safety is improved.

Description

technical field [0001] The invention relates to the technical field of cloud computing, and relates to a highly secure terminal system and equipment based on cloud computing and a method for using it. Background technique [0002] With the development of the Internet, social networks, e-commerce, digital cities and online videos have sprung up. These emerging technologies require the support of large storage and high-performance servers. Cloud computing distributes computing tasks on a resource pool composed of a large number of computers, enabling various applications to obtain computing resources, storage resources, network resources and various software services as needed. In recent years, cloud computing technology has gradually matured and attracted more and more attention. [0003] However, for end users, the security issue of cloud computing has always attracted much attention. Although cloud computing providers have certain security measures for data security, for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/03H04L9/14
CPCH04L63/0442H04W12/03H04L9/14
Inventor 公晨曹猛
Owner 公晨
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products