Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

216 results about "Cloud user" patented technology

Education cloud platform and implementation method thereof

The invention discloses an education cloud platform and an implementation method thereof. The education cloud platform comprises a cloud platform user layer, a cloud platform service logic layer and a cloud platform resource management layer. The cloud platform user layer orientates to a terminal user, is cloud equipment physically, provides a graphic user interface based on a browser for the user, responds to a user resource request of the client end, and displays the process interface and the result information of services to the user. The cloud platform service logic layer is used for establishing source service information, responding to the resource service request from the cloud platform user layer, conducting service logic operation on service request information, and integrating and managing the cloud platform resource management layer. The cloud platform resource management layer is used for conducting open description capable of being recognized by a computer on education resource information, conducting storing in a database table mode, completing the daily service management of an underlying resource pool and classifying and checking upload resources. According to the education cloud platform and the implementation method thereof, cloud service modules can be quickly selected according to the learning activity demand of the cloud user, a service process integration scheme is generated, and therefore the scheme is delivered to the cloud user in a cloud service mode.
Owner:SHANGHAI DIANJI UNIV

Data storage method based on identity in cloud computing and integrity verification method based on identity in cloud computing

The invention discloses a data storage method based on an identity in cloud computing and an integrity verification method based on the identity in cloud computing, and belongs to the technical field of network security. The data storage method comprises the steps that a cloud user generates a secret key application request carrying a public key generated based on the ID of the cloud user, and sends the secret key application request to a KGC server, and a corresponding private key is generated by the KGC server and sent back to the cloud user through a secure channel; the cloud user conducts block division on files to be uploaded, and generates data block labels of data blocks on the basis of the private key, corresponding file labels are generated by the data block labels, and the file labels and the files are uploaded to a cloud server. When the integrity of the files on the cloud server needs to be verified, integrity verification based on the identity is achieved based on zero-knowledge proof between a verification server and the cloud server. The data storage method based on the identity in cloud computing and the integrity verification method based on the identity in cloud computing are used for cloud storage and integrity verification of storage. When the data storage method and the integrity verification method are applied, management of certificates can be remarkably simplified, and the system complexity is reduced; meanwhile, when integrity verification is conducted, the effectiveness of the public key of the cloud user does not need to be verified, and the system complexity is simplified.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Effective and verifiable public key searching encryption method based on KP-ABE

The invention discloses an effective and verifiable public key searching encryption method based on the KP-ABE. According to the method, a creditable authority center, a data owner, a cloud server and a data user are included. The creditable authority center generates a certificate for all cloud users; the data owner outsources a data file and a keyword to the cloud server; the cloud server executes searching operation after providing a storage service and receiving a searching request sent by a user; the data user generates a searching password and sends the password to the cloud sever to search for a target file. According to an effective and verifiable public key searching encryption method based on the KP-ABE, a public and private key pair is generated for the data owner and the cloud server, when the ciphertext keyword and the searching command are sent, the public key pair of the cloud sever is used for encrypting the ciphertext keyword and the searching command firstly, the off-line conjecture aggressive behavior of an external attacker is effectively prevented, and the safety of information and data is improved. In addition, complexity is lowered, the calculation amount of the user is largely reduced, and the efficiency is largely improved.
Owner:XIDIAN UNIV

Cloud data public auditing method with duplication eliminating function

The invention discloses a cloud data public auditing method with a duplication eliminating function, and the cloud data public auditing method belongs to the technical field of network security. The cloud data public auditing method comprises the steps that: a CA server sets system parameters, and a user applies for a public-private key pair to the CA server after renting a storage space of a cloud server; a cloud user sends a hash value of a file to be stored to the cloud server at first when storing the file, the cloud server detects the hash value and sends challenge information to the cloud user for verifying ownership if the file is stored in the server, and the cloud server verifies whether the user really owns the data file according to responses; otherwise, the cloud user uploads the file and a label to the cloud server; in addition, an auditing server can verify integrity of data in the cloud server according to a user request. The cloud data public auditing method realizes data integrity verification by adopting a round of asymmetric key agreement algorithm, and realizes the zero knowledge privacy protection; moreover, the practical data duplication eliminating technology is introduced, thereby greatly improving the utilization rate of the cloud server.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Cloud storage data common auditing method possessing secret key leakage resistance characteristic

The invention belongs to the communication technology field and especially relates to a cloud storage data common auditing method possessing a secret key leakage resistance characteristic. The method mainly comprises the following steps of system initialization: blocking processing is performed on a data file so as to generate public and private key pairs of a cloud user and a cloud server; auditing identification generation: the cloud user sends the data file and a label, and a signature set of a data block to the cloud server; auditing challenge response: a third party auditor generates auditing challenge information and sends to the cloud server; the cloud server calculates combination information according to the auditing challenge information, gets signatures together and sends an auditing identification response information to the third party auditor; and the third party auditor verifies validity of the auditing identification response information. The method has advantages that a condition that digital signature forgery and auditing identification response information forgery caused by leakage of a user signature private key can be prevented; and a malicious cloud server is ensured not to generate the forged auditing identification response information to cheat a TPA and to pass through an auditing verification process.
Owner:SOUTHWEST PETROLEUM UNIV

Cloud computing resource scheduling method based on game theory

The invention discloses a cloud computing resource scheduling method based on game theory. The method is characterized by including the specific steps of step 1, receiving a user request, analyzing and judging whether available resources meet a demand, rejecting the request if the available resources do not meet the demand, and otherwise, entering the next step; step 2, issuing a receiving request confirmation message; step 3, establishing a cloud user resource scheduling game model with users as game participants or a cloud provider resource scheduling game model with available physical machines of a cloud data center as game participants, and forming an optimal resource allocation scheme; and step 4, completing a virtual unit creation process, and executing the task request of the user. According to the method, a theory method of the game theory is introduced, different optimization targets are customized for different cloud computing environments, the corresponding resource scheduling game models are established, the cloud user resource scheduling game model with the cloud users and cloud providers as the game participants is established, and problems of unfair resource allocation and an insufficient resource utilization ratio are solved by corresponding resource scheduling algorithms.
Owner:CHONGQING INST OF ENG

Secret key updating method for cloud storage and implementation method of cloud data auditing system

The invention discloses a secret key updating method for cloud storage and an implementation method of a cloud data auditing system, and belongs to the technical field of network security. The secret key updating method for cloud storage comprises the steps that when a cloud user needs to update a secret key, a CA server is requested to generate a new secret key, and a new file label and a new data block label are generated based on a file label and a data block label downloaded from a cloud server, the old secret key and the new secret key at present, are uploaded to the cloud server, and are used for replacing the corresponding old file label and the corresponding old data block label in the cloud server. Meanwhile, the invention further discloses the implementation method of the cloud data auditing system on the basis of zero-knowledge verification. When the cloud user needs to update the secret key, the corresponding file label and the corresponding data block label on the cloud server are updated based on the secret key updating method for cloud storage. The secret key updating method for cloud storage and the implementation method of the cloud data auditing system are used in a cloud network, the communication cost, caused by changing of the secret key, between the cloud server and the cloud user can be remarkably reduced, the calculation cost of the operation that the cloud user calculates the labels again is reduced, and the data privacy can be effectively protected in the auditing process.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Encryption machine key injection system based on cloud environment, method and device

The invention discloses an encryption machine key injection system based on the cloud environment, a key injection method for an encryption machine and a device, and a method and a device for realizing cloud-end trusteeship of the encryption machine. The system comprises at least one key injection subsystem and an encryption machine trusteeship subsystem arranged at a cloud end, wherein the at least one key injection subsystem and the encryption machine trusteeship subsystem are connected through respective quantum key distribution equipment, the quantum key distribution equipment is used for negotiating a shared key pair between key generation equipment and the encryption machine which are connected with the quantum key distribution equipment, the key generation equipment is used for generating a root key component of virtual encryption equipment and employing the negotiated shared keys to carry out encryption transmission to the encryption machine on which the virtual encryption equipment is borne, the encryption machine is used for synthesizing a root key of the virtual encryption equipment according to received root key components, and the root key is further stored. Through the system, remote safe injection of the root key of the encryption machine is realized, a cloud user is not necessary to manually insert a card, and the key injection operation process is simplified.
Owner:ALIBABA GRP HLDG LTD

Cloud private line system and service issuing and opening method thereof

ActiveCN111106991AEnable secure accessSimplify the architecture processNetworks interconnectionCloud userTerminal equipment
The embodiment of the invention provides a cloud private line system and a service issuing and opening method thereof. The cloud private line system comprises a client, a government and enterprise private network, a government and enterprise cloud and an SDN controller. The client is deployed with a plurality of customer premise equipment CPE, the government enterprise private network is deployedwith a plurality of government enterprise CEs and a cloud user edge router Cloud CE, and the government enterprise cloud is deployed with a cloud gateway; the CPE is in butt joint with the governmentand enterprise CE, and the Cloud CE is in butt joint with the cloud gateway; and the SDN controller is used for controlling the client and the government and enterprise private network and establishing a Vxlan tunnel taking the CPE and the Cloud CE as end points so as to realize a cloud private line between the client and the government and enterprise cloud. According to the system and the methodprovided by the embodiment of the invention, safe access between the cloud on the local site and the sites is realized, the configuration process is simplified, the cost and equipment resources are saved, the problem of complex opening configuration is solved, and the opening process is simplified.
Owner:CHINA MOBILE GROUP ZHEJIANG

Application cloud safety certification method based on third-party service

The invention provides an application cloud safety certification method based on a third-party service. The application cloud safety certification method based on the third-party service specifically comprises the steps that (1) a cloud user submits service demand information to a signature certification service cloud; (2) the signature certification service cloud receives the service demand information of the cloud user, and verifies validity of a certificate of the cloud user according to a third-party catalogue certification service cloud, carries out sign and issue on a ciphertext user login token and a digital envelope through an application portal catalogue service cloud, carries out certification service sign on the ciphertext user login token signed and issued through the application portal catalogue service cloud and the digital envelope signed and issued through the application portal catalogue service cloud, and sends the ciphertext user login token and the digital envelope back to the cloud user; (3) the cloud user carries out user sign on the obtained ciphertext user login token, the digital envelope and the certification service sign information, and submits the ciphertext user login token, the digital envelope and the certification service sign information to an application service to demand for the corresponding service; (4) the application service provides the corresponding service for the cloud user after being verified. Compared with the prior art, the application cloud safety certification method based on the third-party service ensures authenticity and non-repudiation of information sources, and improves safety of the process of information transmission.
Owner:INSPUR QILU SOFTWARE IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products