Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

72 results about "Cloud storage security" patented technology

Distributed storage oriented cloud storage security architecture and data access method thereof

The invention discloses a distributed storage oriented cloud storage security architecture and a data access method thereof. The distributed cloud storage oriented security architecture comprises a cloud storage server, a distributed storage manager, a wafer breaker and storage devices, wherein the distributed storage manager and the cloud storage server are respectively connected with a client-side; the distributed storage manager and the cloud storage server are connected by a fiber channel (FC) or a routing switch; the wafer breaker is imbedded in the distributed storage manager; the distributed storage manager is connected with the storage devices by the FC or Iscsi; and the storage devices are connected by a network attached storage (NAS) or a storage area network (SAN). The storage devices are located at different places and are redundant mutually, thus improving the fault-tolerant ability of the devices and the optimal storage use ratio; the wafer breaker is used for carrying out fragment on stored data, so that the data are fragmented into data fragments which can not be identified by other authentication systems, and the fragmented data have relative confidentiality and security in the process of network transmission and data storage; and the storage devices and the server are the devices with higher cost performance, thus reducing the cost.
Owner:XI'AN UNIVERSITY OF ARCHITECTURE AND TECHNOLOGY

Credible data access control method applied to cloud storage of mobile devices

The invention relates to a credible data access control method applied to cloud storage of mobile devices. The credible data access control method includes six steps including user registering, user login, secret key generation, data encryption uploading, data downloading and decryption in three stages. The first step is user registering, the second step is user login with an authentication process, the third step is encryption secret key generation, the fourth step is user data encryption uploading, the fifth step is secret key sharing among the multiple mobile devices, and the sixth step is data downloading and decryption. According to the credible data access control method, transmitting of a credible chain in the secret key exchanging process is guaranteed by a user through a mobile TPM chip, the length of a secret key is reduced through encryption based on a elliptic curve, it is guaranteed that the multiple mobile devices can safely share the secret key, compared with a traditional server terminal or client terminal data encryption method provided by a cloud storage service provider, the credible data access control method is safe, reliable, high in confidence degree and small in interaction data amount, and the good practical value and the wide application prospect are achieved in the technical field of cloud storage safety.
Owner:BEIHANG UNIV

OTP-based cloud storage data storing method, device and system

The invention belongs to the technical field of cloud storage security, and particularly relates to an OTP-based (one-time pad-based) cloud storage data storing method, an OTP-based cloud storage data storing device and an OTP-based cloud storage data storing system. The method comprises the following steps of: generating and storing a true random number of predetermined length and a random seed consisting of the true random number and with predetermined length according to a preset method; repeatedly acquiring data from the random seed, and cascading the data acquired each time into a true random data string not shorter than a plain text length; and generating a true random key not shorter than the plain text length according to the true random data string, encrypting the plain text and sending the encrypted plain text to a cloud storage data center. The invention also provides the OTP-based cloud storage data storing device and the OTP-based cloud storage data storing system. The method, the device and the system generate and store the true random key with enough number and without repeated use by using relatively small plain text storage space, effectively protect the security and the privacy of the cloud storage data and improve the confidentiality of the cloud storage data.
Owner:BEIJING Z & W TECH CONSULTING

Searchable encryption method based on wildcard character in cloud storage safety

The invention relates to a searchable encryption method based on wildcard character in cloud storage safety. The method comprises the following steps that: setting a document to be uploaded; extracting a keyword set; encrypting the keyword set; selecting a random number as a document encryption key, and encrypting the document encryption key; encrypting the document to be uploaded to obtain a ciphertext, and sending the ciphertext to a cloud computing platform; input a query keyword set, generating a query trapdoor, carrying out signature, and sending the signature to the cloud computing platform; verifying a query signature by the cloud computing platform, and executing a search algorithm by the cloud computing platform; transmitting a keyword index and the query trapdoor into a keyword matching protocol to obtain an encryption matching result; carrying out decryption to obtain a search result; according to the search result, returning a corresponding ciphertext by the cloud computing platform; and recovering the document encryption key, and recovering the document. By use of the method, the keyword search of at most two wildcard characters can be supported, the wildcard character can appear on any position of the keyword, and a plurality of random characters can be represented.
Owner:FUZHOU UNIV

Face image biological key generating method

ActiveCN103886235AChanging the network biometric authentication modeCharacter and pattern recognitionDigital data authenticationFeature vectorCloud storage security
The invention provides a face image biological key generating method. The face image biological key generating method includes steps of subjecting face images of users to characteristic space conversion, projecting the face images into a higher space, stabilizing facial feature information into an acceptable fluctuation range in the higher space, extracting digital sequences from stabilized feature vectors, and encoding in the digital sequences to generate a biological key. By adopting the face image biological key generating method, no face information of the users is required to be stored in mobile terminals and identification servers, and the face images of the users are also dispensed with transmission in the network. The users generate (user names and secret keys) pairs by acquiring the face images of their own and perform network identity authentication by various authentication methods derived from the (user names and secret keys) pairs. The private data of the users are subjected to direct encipherment protection by the method supporting the face biological secret key, and the method can be extended to application in the field of cloud storage safety. As long as key space of the face biological secret keys is larger enough, high safety can be guaranteed.
Owner:HANGZHOU DIANZI UNIV

Efficient searchable symmetric encryption method and system with forward and backward security

The invention discloses an efficient searchable symmetric encryption method and system with forward and backward security, and belongs to the field of cloud storage security, and the method comprisesthe steps: enabling a retrieval client to generate a ciphertext, and transmitting the ciphertext to a retrieval server, so as to store the ciphertext in a ciphertext database; wherein the generated ciphertext comprises a ciphertext index, a random bit string, ciphertext meta-information and an encrypted file identifier; wherein the ciphertext meta-information comprises an operator of the ciphertext, a ciphertext index and a retrieval trap door of the previous operation, and a to-be-deleted ciphertext index; when keyword retrieval is carried out, enabling the retrieval client to acquire a fileidentifier and an operator related to a keyword from the private state table to generate a ciphertext index and a retrieval trap door, and send the ciphertext index and the retrieval trap door to theretrieval server; and enabling the retrieval server to obtain all the ciphertext related to the keyword from the ciphertext database, delete the ciphertext needing to be deleted to obtain a result set, and send the result set to the retrieval client. The searchable ciphertext is efficiently retrieved, and meanwhile, the forward and backward security is ensured.
Owner:HUAZHONG UNIV OF SCI & TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products