Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

267 results about "Mobile cloud" patented technology

Method for safely sharing mobile cloud storage light-level data

The invention discloses a method for safely sharing mobile cloud storage light-level data. The method comprises the steps that an attribute set is registered in a credible third party by a data owner, the attribute set is assigned to a user by the data owner, the user is authorized by the credible third party through an attribute code mechanism according to the attribute set of the user, so that an attribute key is generated, when the data owner uses a mobile side to share a file, the file is firstly encrypted through a symmetric cryptography mechanism, a symmetric key is encrypted through a proxy encryption server by the utilization of an attribute key mechanism, a file ciphertext and a key ciphertext are sent to a cloud side, after the file ciphertext and the key ciphertext are read from the cloud side by the user, the attribute code mechanism is used by a proxy decryption server to decrypt the file, an authority limit alteration statement is sent to the credible third party and the cloud side by the data owner, and judgments are made by the credible third party and the cloud side, so that authority limits of the user are increased or deleted. According to the method for safely sharing the mobile cloud storage light-level data, the data can be safely shared on the mobile side on the conditions that electric quantity and computing power are limited.
Owner:HUAZHONG UNIV OF SCI & TECH

Multi-inter-domain asymmetric group key agreement protocol method in mobile cloud computing environment

The invention discloses a multi-inter-domain asymmetric group key agreement protocol method under the mobile cloud computing network environment. The method comprises the following steps: adopting a bilinear mapping technology and a blind secret key technology to realize a short signature mechanism between a domain secret key management center and a domain terminal; using a short signature technology to realize a multi-inter-domain group key agreement authentication mechanism of terminals distributed in different domains, and further realize asymmetric group key agreement of the terminals distributed in multiple domains. The protocol method disclosed by the invention has the anonymity and the authentication, supports dynamic group key updating of nodes, and realizes the security of forward confidentiality and backward confidentiality of the group keys; on the hypothesis of the Diffe-Hellman bilinear computing problem, the security of the protocol is proved; the computing and communication energy consumption of the protocol is low; the method is good in flexibility, security and practicability, and suitable for cross-domain group key agreement of the terminals distributed in the multiple domains under the mobile cloud computing network environment.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Android platform App risk assessment method based on mobile cloud computing and Android platform App risk assessment device based on mobile cloud computing

The invention discloses an Android platform App (Application) risk assessment method based on mobile cloud computing and an Android platform App risk assessment device based on the mobile cloud computing. The method comprises the following steps of: collecting all Apps in an Android market, and obtaining a permission list of each App; uploading data of the obtained permission list to the cloud; performing risk grade judgment according to the App privacy permission in the permission list and the set privacy permission risk mark in accordance with the obtained permission list of each App; and requesting data to the cloud according to the request of a mobile phone client, and sending the corresponding App risk grade judgment result obtained from the cloud and the privacy permission called by the App to a customer. The method and the device have the advantages that the permission characteristics of mass Apps are subjected to similar App population characteristic analysis; the dynamic minimum permission set of a certain population is defined; then, the malicious tendency of Android application software is detected by a similarity calculation method; a feasible and effective App assessment method is provided for a user; and the user privacy leakage risk is effectively reduced.
Owner:武汉市教云慧智信息技术有限公司

Dynamic authentication method of client side suitable for mobile cloud

The invention discloses a dynamic authentication method of a client side suitable for a mobile cloud. The method comprises the following steps: 1) conducting cluster analysis of historical location information of a user; 2) sending a cloud service request / requests to an authentication server through the client side by the user; 3) confirming a cluster A to which the current location information of the client side corresponds by the authentication server, if the ratio of the number of data points in the cluster A to a sum is less than a threshold value t, deciding that the current location information is an outlier and conducting authentication, if the authentication is passed, recording the current location information in a misinformation point collection and responding to the request, otherwise, refusing the request, and recording the current location information in an outlier collection; 4) if the sum of the recorded misinformation point collection and the recorded outlier collection is greater than a threshold value L, marking and combining the sum to be used as a training data of classification to obtain a classification model; and 5) as for subsequent cloud service requests of the user, utilizing the classification model to conduct classification for outliers to respond to the cloud service request. The method improves the data security and account security of the user.
Owner:PEKING UNIV

Task unloading and data caching method for hybrid mobile cloud/edge computing

The invention discloses a task unloading and data caching method for hybrid mobile cloud / edge computing, and belongs to the technical field of decision optimization and multi-user resource allocation.The method comprises the following steps: 1) calculating channel power gain; 2) uploading the calculation data to an AP, and calculating uplink and downlink transmission rates; 3) judging which partof the user of the user terminal layer, the MEC server of the edge layer or the cloud server in the cloud layer the task processing is completed, and calculating task processing time delay and energyconsumption which are completed according to corresponding conditions after judging; 4) obtaining a minimization optimization problem of the task processing process delay; 5) copying a local variableand storing the local variable in the MEC server; 6) using an alternating direction multiplier method to obtain an augmented Lagrangian function, and 7) performing iteratively updating to obtain a final expression form of the optimized objective function, and finding out the minimization of the task processing process delay. The method satisfies the energy consumption of the user, and minimizes the total user delay while constraining the storage and calculation capability of the AP.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Mobile cloud printing method and system

InactiveCN106951198AMake the most of your printing capabilitiesFull supervision of printingDigital output to print unitsMobile cloudComputer terminal
The invention discloses a mobile cloud printing method and system and belongs to the field of cloud printing. The system comprises a mobile terminal, a printing terminal and a cloud terminal, wherein the printing terminal registers a printer connected with the printing terminal at the cloud terminal, and a cloud printer recognition two-dimensional code is obtained and pasted to the body of the printer; during printing, the mobile terminal uploads printing parameters and a document to the cloud terminal, the two-dimensional code on the body of the selected printer is scanned, and ID of the selected printer is acquired and uploaded to the cloud terminal; the cloud terminal makes a printing task after receiving the ID of the printer, and the printing task is added into a task queue of the printer, wherein the printing task contains the printing parameters and the document; and the printing terminal makes a real-time request to the cloud terminal to acquire the task queue of the printer connected with the printing terminal, and the printer is driven to complete the printing task. Meanwhile, the mobile cloud printing method is also realized through the technical scheme. According to the technical scheme, the printer is selected by scanning the two-dimensional code, and therefore a user can complete printing and taking immediately after arrival; printing of the document is monitored in the whole process, so that the privacy security of printed files is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Multi-authority ciphertext-policy attribute-based encryption method

The invention discloses a multi-authority ciphertext-policy attribute-based encryption method. The method includes following steps: step 1, performing system initialization and establishing a plurality of authorities; step 2, before each starting of a mobile terminal device, executing pre-encryption treatment, and generating an intermediate ciphertext; step 3, in a process of uploading the intermediate ciphertext to a cloud storage server, encrypting the intermediate ciphertext by employing an access policy defined by a linear secret sharing mechanism, and outsourcing the intermediate ciphertext to the cloud storage server; and step 4, generating a private key for an encryption file according to global identifiers of users and an attribute set of the users by each authority. According to the method, aiming at the mobile cloud storage environment, on the premise of guaranteeing the data security, a lot of pairing operations are pre-processed in advance by employing the encryption pre-processing technology so that the calculation cost of online encryption is minimum; and by employing the secret key transformation technology and decryption outsourcing, a lot of pairing operations are outsourced to the cloud storage server so that the decryption calculation cost of the mobile terminal is reduced.
Owner:ANHUI UNIVERSITY

Outsourcing encryption and decryption CP-ABE method capable of achieving user revocation

InactiveCN107359986AFunction increasePerfect rights management functionKey distribution for secure communicationPlaintextMobile cloud
The invention discloses an outsourcing encryption and decryption CP-ABE method capable of achieving user revocation, and relates to the technical field of data encryption and decryption in a mobile cloud environment. The method further achieves the outsourcing encryption operation on the basis of conventional outsourcing attribute encryption, and reduces the encryption calculation cost of a local client. The method achieves the access control of fine granularity of a file on a cloud server, simplifies the secret key management operation for a user, and achieves the revocation of the access authority of an unauthorized user. When the user is revoked, a legal user does not need to update a secret key, and alleviates the burden of an authorization mechanism. The local user just needs to carry out the simple XOR operation to update a cryptograph. The security proof indicates that the method provided by the invention has the non-adaptive selection plaintext safety under a common dual linear group model. The performance analysis indicates that the method reduces the encryption calculation cost of mobile equipment more effectively, can achieve the revocation of an illegal user efficiently, and achieves the control of the access authority of the user effectively.
Owner:JINAN UNIVERSITY

Task allocation method based on particle swarm and simulated annealing optimization in mobile cloud

The invention provides a task allocation method based on a particle swarm and simulated annealing optimization in mobile cloud. Multiple mobile nodes are involved in the allocation method. The mobilenodes form a self-organized network in a wireless mode and share computing resources under the condition that no basic network facilities are available. The task allocation method comprises the four stages that (1) a task uninstalling request is initiated, wherein when a complicated computing task exists on a main node and the main node does not have sufficient computing resources for processing the task, the main node sends the task uninstalling request to slave nodes; (2) a cost function is established, wherein the main node generates a task uninstalling cost function according to remainingcomputing resource information of the slave nodes and relevant information needed for processing the complicated computing task; (3) an optimization problem is solved, wherein a task allocation algorithm based on the particle swarm and simulated annealing optimization is executed, and a task allocation result is obtained; and (4) the task is allocated, wherein the main node allocates the computingtask to all the slave nodes according to the optimization result.
Owner:SOUTHEAST UNIV

OTP and user behavior-based certification and authorization method in mobile cloud computing environment

InactiveCN105099690ASolve the problem of not being able to resist decimal attacksEnsure credibleUser identity/authority verificationMobile cloudClient-side
The present invention discloses an OTP and user behavior-based certification and authorization method in a mobile cloud computing environment. The method is characterized in that various intelligent mobile terminals available for users are enabled to be accessed to the cloud service via a wireless network in the mobile cloud computing environment and the bidirectional identity authentication between a client and a server is realized through improving the one-time password (OTP) technology. In this way, the safety and the reliability of the identity authentication process are improved. Meanwhile, according to the specific behavior habits of a user accessed to the cloud service, the features of historical behavior data of the user are analyzed and extracted based on the data mining technology. In this way, a knowledge database of the normal behavior patterns of the user is formed. When the user behaves abnormally or suspiciously, the identity of the user is authenticated again. Only when the user passes the identity authentication process, the corresponding service is authorized for the user. Therefore, the illegal operation of others is avoided, and the information security of the user is fully ensured.
Owner:JIANGSU BOZHI SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products