CN105635055A - Cloud data safety usage method - Google Patents

Cloud data safety usage method Download PDF

Info

Publication number
CN105635055A
CN105635055A CN201410601149.5A CN201410601149A CN105635055A CN 105635055 A CN105635055 A CN 105635055A CN 201410601149 A CN201410601149 A CN 201410601149A CN 105635055 A CN105635055 A CN 105635055A
Authority
CN
China
Prior art keywords
data
ekey
cloud
clouds
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410601149.5A
Other languages
Chinese (zh)
Inventor
蒋斐
项新生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Wei Dun Network Technology Co Ltd
Original Assignee
Jiangsu Wei Dun Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Wei Dun Network Technology Co Ltd filed Critical Jiangsu Wei Dun Network Technology Co Ltd
Priority to CN201410601149.5A priority Critical patent/CN105635055A/en
Publication of CN105635055A publication Critical patent/CN105635055A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a cloud data safety usage method. The method is characterized in that important data is stored in a cloud; when network connection exists, a user logs in the cloud through an account+password; an EKEY must be inserted, and, after authentication is passed through, the data can be checked and downloaded; the downloaded data is automatically encrypted, and can be normally and locally used; after the encrypted data is uploaded, a secret key is called when the encrypted data is opened, and usage of the cloud is not influenced; if the EKEY is not identified, or the authentication is not passed through, the data cannot be checked and downloaded; and, when the network connection does not exist, an EKEY off-line strategy is firstly read if the encrypted data is opened, and the opened data is limited by time, the frequency and the like. The cloud data safety usage method provided by the invention solves the information safety problem when cloud data interacts with local data, data safety can be effectively improved, and an influence cannot generated on user's usage.

Description

A kind of method that cloud data safe uses
Technical field
The present invention relates to a kind of method that cloud data safe uses.
Background technology
The Internet, cloud computing, big data have become as three main trend that future network develops, and Situation on Information Security is also increasingly severeer. Internet firm is proposed the cloud storage instrument of oneself one after another, and various jumbo cloud disk is arisen at the historic moment, and has carried out great convenience to our data tape, but the safety of data has much room for improvement. As long as account number, password are stolen, it is easy to obtain private data message, and locally downloading data are easier to be stolen.
Summary of the invention
The present invention is to solve the deficiencies in the prior art, it is provided that a kind of method that cloud data safe uses, solution high in the clouds data and local data information security issue time mutual, it is possible to effectively improve Information Security, and the use of user is not produced impact.
For solving above-mentioned technical problem, the method that a kind of cloud data safe provided by the invention uses, adopt the following technical scheme that
A kind of method that cloud data safe uses, it is characterised in that comprise the steps:
S1: user inputs user name, password, inserts EKEY and first logs into high in the clouds, and cloud database can record EKEY serial number, binds with user name, password, and downloads key in EKEY;
S2:EKEY hardware includes EKEY serial number (having unique encodings mode), encryption section (encryption library, key, off-line counting module), memory area (storage data), reserved area (Function Extension);
S3: space, high in the clouds comprises shared storage area and private memory area, accesses shared storage area without EKEY certification, accesses private memory area and needs EKEY certification;
S4: user downloads data need to first pass through EKEY certification, the encryption library in EKEY is called in certification after passing through, it is ensured that locally downloading data are in encrypted state, and this encryption technology adopts transparent encryption technology, and adds ciphertext data and can normally use in this locality;
S5: open data in this locality, can judge whether data encrypt, expressly directly opens, and ciphertext first scans EKEY information, and whether checking EKEY is effective, calls key in EKEY and open data after being verified, and authentication failed calls off-line strategy;
S6: when None-identified EKEY or certification do not pass through, opens and adds ciphertext data and can read the off-line effect duration of EKEY, and trigger automatic counting function, limits the use natural law of data, number of times.
Specifically, the local ciphertext data that adds uploads to high in the clouds and is still in encrypted state, opens high in the clouds and adds ciphertext data and have two ways, and a kind of needs are cached to the key calling in EKEY in this locality and open, and one directly invokes high in the clouds key and opens.
Specifically, described EKEY includes headspace, memory space and encryption section.
The method that a kind of cloud data safe provided by the invention uses, solution high in the clouds data and local data information security issue time mutual, it is possible to effectively improve Information Security, and the use of user is not produced impact.
Accompanying drawing explanation
Fig. 1 is the step schematic diagram of the method that a kind of cloud data safe described in the embodiment of the present invention uses.
Fig. 2 is that in the method that a kind of cloud data safe described in the embodiment of the present invention is practical, EKEY comprises information schematic diagram.
Detailed description of the invention
The method that the cloud data safe embodiment of the present invention being supplied to below in conjunction with accompanying drawing uses is described in detail.
As shown in Figure 1, 2, the method that a kind of cloud data safe that the embodiment of the present invention provides uses, it is characterised in that comprise the steps:
S1: user inputs user name, password, inserts EKEY and first logs into high in the clouds, and cloud database can record EKEY serial number, binds with user name, password, and downloads key in EKEY;
S2:EKEY hardware includes EKEY serial number (having unique encodings mode), encryption section (encryption library, key, off-line counting module), memory area (storage data), reserved area (Function Extension);
S3: space, high in the clouds comprises shared storage area and private memory area, accesses shared storage area without EKEY certification, accesses private memory area and needs EKEY certification;
S4: user downloads data need to first pass through EKEY certification, the encryption library in EKEY is called in certification after passing through, it is ensured that locally downloading data are in encrypted state, and this encryption technology adopts transparent encryption technology, and adds ciphertext data and can normally use in this locality;
S5: open data in this locality, can judge whether data encrypt, expressly directly opens, and ciphertext first scans EKEY information, and whether checking EKEY is effective, calls key in EKEY and open data after being verified, and authentication failed calls off-line strategy;
S6: when None-identified EKEY or certification do not pass through, opens and adds ciphertext data and can read the off-line effect duration of EKEY, and trigger automatic counting function, limits the use natural law of data, number of times.
Specifically, the local ciphertext data that adds uploads to high in the clouds and is still in encrypted state, opens high in the clouds and adds ciphertext data and have two ways, and a kind of needs are cached to the key calling in EKEY in this locality and open, and one directly invokes high in the clouds key and opens.
Specifically, described EKEY includes headspace, memory space and encryption section.
Embodiment:
1, user have registered a cloud disk, stores and has collected substantial amounts of data message, when logging in cloud disk, inputs user name, password can log in. As long as at web page horse hanging, it is possible to obtain account number, password easily, steal private data.
2, logging in now cloud disk and need certification EKEY, this EKEY is by cloud disk provider or company's unified payment, and cloud server captures EKEY serial number, is stored in cloud database, then issues the key mated with user name in EKEY;
3, when needs download data from high in the clouds, first authenticating whether EKEY mates, certification, by downloading data, is downloaded data and can be triggered the encryption library in EKEY, the data that encryption is downloaded automatically;
4, user opens the data of encryption, first can trigger EKEY and high in the clouds certification, after certification is passed through, calls the key in EKEY and opens and add ciphertext data, certification not by or None-identified EKEY information then cannot open and add ciphertext data;
5, when user is not connected to network, open and add ciphertext data EKEY and with high in the clouds certification, can cannot automatically read the off-line effect duration in EKEY, call key and open and add ciphertext data, and self-clocking.
Local cipher files passe, to high in the clouds personal air, is first debugged key, just can normally be opened when opening.
The method that a kind of cloud data safe provided by the invention uses, solution high in the clouds data and local data information security issue time mutual, it is possible to effectively improve Information Security, and the use of user is not produced impact.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention. Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.

Claims (3)

1. the method that a cloud data safe uses, it is characterised in that comprise the steps:
S1: user inputs user name, password, inserts EKEY and first logs into high in the clouds, and cloud database can record EKEY serial number, binds with user name, password, and downloads key in EKEY;
S2:EKEY hardware includes EKEY serial number (having unique encodings mode), encryption section (encryption library, key, off-line counting module), memory area (storage data), reserved area (Function Extension);
S3: space, high in the clouds comprises shared storage area and private memory area, accesses shared storage area without EKEY certification, accesses private memory area and needs EKEY certification;
S4: user downloads data need to first pass through EKEY certification, the encryption library in EKEY is called in certification after passing through, it is ensured that locally downloading data are in encrypted state, and this encryption technology adopts transparent encryption technology, and adds ciphertext data and can normally use in this locality;
S5: open data in this locality, can judge whether data encrypt, expressly directly opens, and ciphertext first scans EKEY information, and whether checking EKEY is effective, calls key in EKEY and open data after being verified, and authentication failed calls off-line strategy;
S6: when None-identified EKEY or certification do not pass through, opens and adds ciphertext data and can read the off-line effect duration of EKEY, and trigger automatic counting function, limits the use natural law of data, number of times.
2. the method that cloud data safe according to claim 1 uses, it is characterized in that, the local ciphertext data that adds uploads to high in the clouds and is still in encrypted state, open high in the clouds to add ciphertext data and have two ways, a kind of needs are cached to the key calling in EKEY in this locality and open, and one directly invokes high in the clouds key and opens.
3. the method that cloud data safe according to claim 1 uses, it is characterised in that described EKEY includes headspace, memory space and encryption section.
CN201410601149.5A 2014-11-01 2014-11-01 Cloud data safety usage method Pending CN105635055A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410601149.5A CN105635055A (en) 2014-11-01 2014-11-01 Cloud data safety usage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410601149.5A CN105635055A (en) 2014-11-01 2014-11-01 Cloud data safety usage method

Publications (1)

Publication Number Publication Date
CN105635055A true CN105635055A (en) 2016-06-01

Family

ID=56049561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410601149.5A Pending CN105635055A (en) 2014-11-01 2014-11-01 Cloud data safety usage method

Country Status (1)

Country Link
CN (1) CN105635055A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN102291391A (en) * 2011-07-21 2011-12-21 西安百盛信息技术有限公司 Safe transmission method for data in cloud service platform
CN102629926A (en) * 2012-04-06 2012-08-08 上海凯卓信息科技有限公司 Encrypting cloud storage method based on intelligent mobile terminal
CN103559456A (en) * 2013-10-24 2014-02-05 广东明创软件科技有限公司 Data protecting method and terminal based on time
CN103916404A (en) * 2014-04-23 2014-07-09 北京淦蓝润和信息技术有限公司 Data management method and system
CN103973699A (en) * 2014-05-20 2014-08-06 中国联合网络通信集团有限公司 Data encryption and decryption methods and devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773994A (en) * 2005-10-28 2006-05-17 广东省电信有限公司研究院 Method for realizing data safety storing business
CN102291391A (en) * 2011-07-21 2011-12-21 西安百盛信息技术有限公司 Safe transmission method for data in cloud service platform
CN102629926A (en) * 2012-04-06 2012-08-08 上海凯卓信息科技有限公司 Encrypting cloud storage method based on intelligent mobile terminal
CN103559456A (en) * 2013-10-24 2014-02-05 广东明创软件科技有限公司 Data protecting method and terminal based on time
CN103916404A (en) * 2014-04-23 2014-07-09 北京淦蓝润和信息技术有限公司 Data management method and system
CN103973699A (en) * 2014-05-20 2014-08-06 中国联合网络通信集团有限公司 Data encryption and decryption methods and devices

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
CN103731475B (en) A kind of data protection system
CN104333580B (en) A kind of account management system and its method based on cloud service
US20180232266A1 (en) Kernel program including relational database, and method and apparatus for executing said program
CN103095847B (en) Cloud storage safety-ensuring method and system thereof
CN104123506B (en) Data access method, device, data encryption, storage and access method, device
CN104852925A (en) Method for leakproof, secure storage and backup of data of mobile smart terminal
CN104123769B (en) The unblanking of a kind of safety intelligent lock, close lock control method
CN104468664A (en) Method and device for uploading files to cloud storage system, and method and device for downloading files from cloud storage system
CN103825741B (en) The solution of certificate of the injection with signature in a kind of encryption device production process
CN102567233A (en) Data protection method of USB storage device based on magnetic disc virtual technology
CN105740725A (en) File protection method and system
CN103516523A (en) Data encryption system structure based on cloud storage
CN107609410A (en) Android system data guard method, terminal device and storage medium based on HOOK
CN102622547A (en) Key based server data reading method
CN103780584A (en) Cloud computing-based identity authentication fusion method
CN109076054A (en) System and method for managing the encryption key of single-sign-on application program
CN103577769A (en) File content safety management method and management system
CN102495990A (en) Software protection method based on microchip
CN111046405A (en) Data processing method, device, equipment and storage medium
CN103501292B (en) Method and system for achieving data safety protection by using standby mobile phone
CN102426637B (en) A kind of embedded database cryptographic storage method
US10311240B1 (en) Remote storage security
CN109474431A (en) Client certificate method and computer readable storage medium
CN104463510A (en) Finance management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160601

WD01 Invention patent application deemed withdrawn after publication