CN102638568A - Cloud storage system and data management method thereof - Google Patents
Cloud storage system and data management method thereof Download PDFInfo
- Publication number
- CN102638568A CN102638568A CN2012100535515A CN201210053551A CN102638568A CN 102638568 A CN102638568 A CN 102638568A CN 2012100535515 A CN2012100535515 A CN 2012100535515A CN 201210053551 A CN201210053551 A CN 201210053551A CN 102638568 A CN102638568 A CN 102638568A
- Authority
- CN
- China
- Prior art keywords
- cloud storage
- file
- storage server
- client
- security terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a cloud storage system and a data management method thereof. The cloud storage system comprises a cloud storage server, a client side and a cloud storage safety terminal, wherein the cloud storage server is configured to store file data of multiple users; the client side is configured to be capable of operating client side software so as to establish connection with the cloud storage server; and the cloud storage safety terminal with a file encryption key is configured to be capable of establishing connection with the client side. The file data stored in the cloud storage server are the data encrypted with the file encryption key of the cloud storage safety terminal. According to the scheme, safety of the data is guaranteed by hardware certification of the cloud storage safety terminal.
Description
Technical field
The application relates to cloud storage system and data managing method thereof.
Background technology
This notion of cloud computing is once proposition, and the heat that has just obtained numerous manufacturers is held in both hands.Each big data of the world and information provider are all released cloud Related product and the solution of oneself one after another.Along with the rise of cloud computing, this notion of cloud storage also day by day becomes industrial hot spot.With respect to general memory module, all there is outstanding performance the aspects such as utilization ratio, reduction hardware expenditure and energy consumption cost that cloud is stored in IT department of power-assisted enterprise raising server.Yet the safety problem of cloud storage is a problem that receives much concern, and also good without comparison method guarantees safety of data at present.
Summary of the invention
The application is intended to solve the data security problem in the cloud storage system.
For this reason, according to the application's first aspect, proposed a kind of cloud storage system, having comprised: the cloud storage server is configured to store a plurality of users' file data; Client, thus be configured to and can connect with said cloud storage server by running client software; And cloud storage security terminal, have the file key, and be configured to and can connect with said client; Wherein, the file data that is stored in said cloud storage server be on the said cloud storage security terminal with the data after the said file secret key encryption at said cloud storage security terminal.
Second aspect according to the application; A kind of data managing method that is used for cloud storage system has been proposed; Thereby the cloud storage security terminal that said cloud storage system comprises cloud storage server, the client that can running client software connects with said cloud storage server of the file data that is used to store a plurality of users and has the file key and can connect with said client, said method comprises: said cloud storage security terminal and said client connect and connect through said client software and said cloud storage server; On said cloud storage security terminal, treating the file that is uploaded to said cloud storage server with said file key encrypts; File of encrypting and first request data package of said client are sent to said cloud storage server, and said first request data package indication will be carried out first operation to the file of said encryption; And said cloud storage server carries out said first operation according to said first request data package that receives to the file of the said encryption that receives.
The third aspect according to the application; A kind of data managing method that is used for cloud storage system has been proposed; Thereby the cloud storage security terminal that said cloud storage system comprises cloud storage server, the client that can running client software connects with said cloud storage server of the file data that is used to store a plurality of users and has the file key and can connect with said client; Wherein, The file data that is stored in said cloud storage server be on said cloud storage security terminal with the file of the said file secret key encryption at said cloud storage security terminal, said method comprises: said cloud storage security terminal and said client connect and connect through said client software and said cloud storage server; The request data package of said client is sent to said cloud storage server, the operation that the indication of described request packet will be carried out the file of said encryption; And said cloud storage server carries out said operation according to the request data package that receives to the file of the said encryption that receives.
Scheme according to the application; When the user will visit the data on the cloud storage server; Except verifying the user cipher when the logging on client software, also need be through the authentication at cloud storage security terminal, promptly; Need the file key at cloud storage security terminal could obtain file content and file is operated, thereby guaranteed to be stored in the safety of data on the cloud storage server.
Description of drawings
Fig. 1 shows the framework schematic block diagram according to the application's cloud storage system;
Fig. 2 shows the indicative flowchart according to the data managing method of an execution mode of the application; And
Fig. 3 shows the indicative flowchart according to the data managing method of another execution mode of the application.
Embodiment
The application's technical scheme is described with reference to the application's illustrative embodiments below in conjunction with accompanying drawing.
Fig. 1 shows the framework schematic block diagram according to the application's cloud storage system.As shown in Figure 1, form by cloud storage security terminal 110, client 120 and cloud storage server 130 3 parts according to the application's cloud storage system 10.
Wired or wireless being connected can be set up with client 120 in cloud storage security terminal 110, for example can connect through wired modes such as USB, eSATA, PC/SC, perhaps connects through wireless modes such as WIFI, WIMAX.Cloud storage security terminal 110 has the file key, and the data that are mainly used in authentication and/or treat operation are carried out encryption and decryption and handled.Cloud storage security terminal 110 for example can be flash disk, portable hard drive, SD card, smart card or the mobile phone etc. of band identity authentication function.
According to the application, the file data that is stored in cloud storage server 130 is the data after the file secret key encryption that carries with it on the cloud storage security terminal 110.Here, the file key is produced by cloud storage security terminal at random, cannot read out.The key at each cloud storage security terminal is unique.Therefore, corresponding ciphertext could be deciphered in the cloud storage security terminal that only is useful on encrypt file.Like this; When the user will visit the data on the cloud storage server 130; Except needs checking user cipher logging on client software, also need pass through the authentication at cloud storage security terminal 110, and; Need the file key at cloud storage security terminal 110 to decipher and to obtain file content, thereby guaranteed to be stored in the safety of data on the cloud storage server being stored in file on the cloud storage server 130.Be appreciated that for; The similar software locks of user cipher; And the cloud storage security terminal that has the file key is a hardware lock, even have the people to steal user cipher or broken through file server, under the situation that does not have cloud storage security terminal; Also only can obtain ciphertext, thereby guarantee the fail safe of clear data by the file secret key encryption
According to an execution mode; Cloud storage security terminal 110, client 120 and cloud storage server 130 connect and through mutual authentication after, cloud storage server 130 generates session keys and is used to be connected with the client 120 at cloud storage security terminal 110 and the data communication between the cloud storage server 130.
For example; When the user hopes the data of cloud storage server 130 stored (are for example operated; Read, download, delete, revise, synchronous etc.) time; To represent that client 120 is sent to cloud storage server 130 after cloud storage server file data is carried out 130 requests request of operating packet is with session key; The request data package deciphering of cloud storage server 130 usefulness session keys to receiving, and corresponding file data is carried out corresponding data manipulation (for example, read, download, delete, revise, synchronous etc.) according to the content of the request data package after the deciphering.
To combine exemplary execution mode that the data managing method according to the application is described with reference to Fig. 2 and Fig. 3 below.
Fig. 2 shows the indicative flowchart according to the data managing method 20 of an execution mode of the application.As shown in the figure; At first set up cloud storage security terminal 110 at step S201, client 120 is connected with cloud storage server 130 threes', specifically be included in to connect between cloud storage security terminal 110 and the client 120 and between client 120 and cloud storage server 130, connect.As indicated above, the connection that being connected between cloud storage security terminal 110 and the client 120 for example can be through wired modes such as USB, eSATA, PC/SC, or the connection through wireless modes such as WIFI, WIMAX.Be connected the connection that for example can be through modes such as Ethernet, WIMAX between client 120 and the cloud storage server 130.For example; With flash disk (cloud storage security terminal) and the PC (client) of band identity authentication function as embodiment; PC can be connected with the cloud storage server through Ethernet, on flash disk, can store client software, after flash disk inserts PC; PC goes out to represent the disk drive of flash disk, connects to accomplish.
Then, at step S202, carry out the mutual authentication of cloud storage security terminal 110, client 120 and cloud storage server 130.For example, the mutual authentication between the three can comprise the mutual authentication at client and cloud storage security terminal; Client and cloud storage security terminal are as a whole and the mutual authentication between the cloud storage server; The cloud storage server is to the authentication at cloud storage security terminal.The authentication here can be adopted any appropriate authentication method of the prior art, does not therefore give unnecessary details at this.
As a kind of selection, between hardware device, the authentication, can also comprise the step of authenticating user identification, for example to the management of user PIN, comprise PIN verification, modification and establishment etc.On client software, carry out the method for authenticating user identification and also can use proper method of the prior art, also do not give unnecessary details at this.
Interconnect and each other after the authentication at cloud storage security terminal 110, client 120 and cloud storage server 130; Need file be uploaded under the situation of cloud storage server 130 through the client software selection the user; At step S203; Client software and cloud storage server 130 consulting session keys by operation on cloud storage security terminal 110, the client 120; Particularly, confirm to be used for and be connected with the session key of the data communication between the client 120 at cloud storage security terminal 110 by cloud storage server 130, and with session key Spoke-to-Client end 120 and/or the cloud storage security terminal 110 confirmed.
At step S204, on cloud storage security terminal 110, treat the file that is uploaded to cloud storage server 130 and encrypt with its file key that carries.At step S205, will encrypt the request data package that the file of this encryption is uploaded and stored indication with session key.Encryption with session key carries out can be carried out by cloud storage security terminal 110, also can be carried out by client 120.Then, at step S206, the file of encrypting and the request data package of encryption are sent to cloud storage server 130.Cloud storage server 130 is deciphered the enciphering request packet that receives with session key at step S207, and the encrypt file that receives is stored according to the request data package of deciphering at step S208.
As a kind of selection; At step S205; The request data package that can session key will upload and store the file of this encryption indication and encrypt file to be uploaded are encrypted jointly, and will be sent to cloud storage server 130 with the file after the session key at step S206.With session key the encrypt file that receives is deciphered with the request data package after obtaining deciphering with the file of file secret key encryption at step S207 by cloud storage server 130 then, and at step S208 according to the request data package of deciphering to storing with the file of file secret key encryption.
Like this; The file cipher text that has been kept at file on the cloud storage server 130 and is exactly by the file secret key encryption at cloud storage security terminal 110; Have only download through the cloud storage security terminal 110 fit end softwares of correspondence after, just can obtain plaintext document, guaranteed safety of files.
Above execution mode has been introduced the data managing method of file being uploaded storage according to the application.The application has also proposed in the cloud storage server, to have stored in the above described manner under the situation of the file of encrypting, to the encrypt file of storage read, download, delete, operation such as synchronous.
Describe the data managing method of the encrypt file that is stored in the cloud storage server being operated according to the application 30 with reference to Fig. 3 below, this encrypt file is the encryption that utilizes its file key that carries before file is uploaded, file to be carried out by cloud storage security terminal 110.In flow chart shown in Figure 3, step S301 to S303 is identical with step S201 to S203 shown in Figure 2, omits the description to it at this.At step S305, will carry out the request of operating packet to the file of this encryption with session key to indication and encrypt.The operational example here is as including but not limited to that encrypt file to storage reads, downloads, deletes, operation such as synchronous.Equally, can carry out by cloud storage security terminal 110, also can carry out by client 120 with the encryption that session key is carried out.Then, at step S306, the request data package of encrypting is sent to cloud storage server 130.Cloud storage server 130 is deciphered the enciphering request packet that receives with session key at step S307, and corresponding encrypt file is operated accordingly according to the request data package of deciphering at step S308.
Although in above-mentioned exemplary execution mode; Encrypt file that between client and cloud storage server, transmits and/or request data package are through session key; But encrypt file that between client and cloud storage server, transmits and/or request data package also can be without session key.In this case, the cloud storage server according to the request data package that receives to corresponding encrypt file for example upload, corresponding operation such as download.
Abovely combine concrete execution mode that the application is described with reference to accompanying drawing.Should be appreciated that above-mentioned execution mode only is exemplary, but not to the application's restriction.Those skilled in the art can carry out suitable distortion and modification to above-mentioned execution mode, and do not depart from the application's spirit and scope.
Claims (12)
1. cloud storage system comprises:
The cloud storage server is configured to store a plurality of users' file data;
Client, thus be configured to and can connect with said cloud storage server by running client software; And
Cloud storage security terminal has the file key, and is configured to and can connects with said client;
Wherein, the file data that is stored in said cloud storage server be on the said cloud storage security terminal with the data after the said file secret key encryption at said cloud storage security terminal.
2. the system of claim 1; Wherein, Said cloud storage security terminal and said client connects and through said client software and the mutual authentication of said cloud storage server after, said cloud storage server generates said client that session key is used for being connected with said cloud storage security terminal and the data communication between the said cloud storage server.
3. system as claimed in claim 2; Wherein, Represent that said client is sent to said cloud storage server after the request data package of said cloud storage server requests data manipulation is with said session key, said cloud storage server carries out data manipulation with the request data package deciphering that receives and according to the request data package after the deciphering to corresponding file data.
4. data managing method that is used for cloud storage system; Thereby the cloud storage security terminal that said cloud storage system comprises cloud storage server, the client that can running client software connects with said cloud storage server of the file data that is used to store a plurality of users and has the file key and can connect with said client, said method comprises:
Said cloud storage security terminal and said client connect and connect through said client software and said cloud storage server;
On said cloud storage security terminal, treating the file that is uploaded to said cloud storage server with said file key encrypts;
File of encrypting and first request data package of said client are sent to said cloud storage server, and said first request data package indication will be carried out first operation to the file of said encryption; And
Said cloud storage server carries out said first operation according to said first request data package that receives to the file of the said encryption that receives.
5. method as claimed in claim 4 further comprises:
After said cloud storage security terminal, said client and said cloud storage server connected, said cloud storage server generated and is used for said cloud storage security terminal and said client-side session key;
With said session key said first request data package is encrypted, wherein, first request data package that is sent to said cloud storage server is first request data package with said session key; And
Said cloud storage server is with the first request data package deciphering of said session key to the said encryption that receives, and according to first request data package of deciphering the file of said encryption carried out said first operation.
6. method as claimed in claim 4 further comprises:
After said cloud storage security terminal, said client and said cloud storage server connected, said cloud storage server generated and is used for said cloud storage security terminal and said client-side session key;
With said session key the file of said first request data package and said encryption is encrypted; And
Said cloud storage server is with the file decryption of said session key to receiving, and the file of first request data package that obtains according to deciphering said encryption that deciphering is obtained carries out said first operation.
7. method as claimed in claim 4 further comprises:
Second request data package of said client is sent to said cloud storage server, and said second request data package indication will be carried out second operation to the file of said encryption; And
Said cloud storage server carries out second operation according to said second request data package to the file of said encryption.
8. method as claimed in claim 4 further comprises:
After said cloud storage security terminal, said client and said cloud storage server connect, between said cloud storage security terminal, said client and said cloud storage server, carry out authentication.
9. method as claimed in claim 4, wherein, said first operation is a file of uploading or store said encryption.
10. method as claimed in claim 7, wherein, said second operation is the file of download, deletion or synchronous said encryption.
11. data managing method that is used for cloud storage system; Thereby the cloud storage security terminal that said cloud storage system comprises cloud storage server, the client that can running client software connects with said cloud storage server of the file data that is used to store a plurality of users and has the file key and can connect with said client; Wherein, The file data that is stored in said cloud storage server be on said cloud storage security terminal with the file of the said file secret key encryption at said cloud storage security terminal, said method comprises:
Said cloud storage security terminal and said client connect and connect through said client software and said cloud storage server;
The request data package of said client is sent to said cloud storage server, the operation that the indication of described request packet will be carried out the file of said encryption; And
Said cloud storage server carries out said operation according to the request data package that receives to the file of the said encryption that receives.
12. method as claimed in claim 11 further comprises:
After said cloud storage security terminal, said client and said cloud storage server connected, said cloud storage server generated and is used for said cloud storage security terminal and said client-side session key;
The described request packet is encrypted and the request data package of encrypting is sent to said cloud storage server with said session key; And
Said cloud storage server to the deciphering of the request data package of said encryption, and carries out said operation according to the request data package that obtains after the deciphering to the file of said encryption with said session key.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210053551.5A CN102638568B (en) | 2012-03-02 | 2012-03-02 | Cloud storage system and data managing method thereof |
HK12110827.4A HK1170090A1 (en) | 2012-03-02 | 2012-10-30 | Cloud storage systems and data management methods thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210053551.5A CN102638568B (en) | 2012-03-02 | 2012-03-02 | Cloud storage system and data managing method thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102638568A true CN102638568A (en) | 2012-08-15 |
CN102638568B CN102638568B (en) | 2015-12-16 |
Family
ID=46622809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210053551.5A Active CN102638568B (en) | 2012-03-02 | 2012-03-02 | Cloud storage system and data managing method thereof |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102638568B (en) |
HK (1) | HK1170090A1 (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984282A (en) * | 2012-12-20 | 2013-03-20 | 青岛海信传媒网络技术有限公司 | Method and device of intelligent terminal for acquiring media data of cloud storage file |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN103747008A (en) * | 2014-01-22 | 2014-04-23 | 李南南 | Internet storage device with encryption function and technology of internet storage device |
CN103916404A (en) * | 2014-04-23 | 2014-07-09 | 北京淦蓝润和信息技术有限公司 | Data management method and system |
CN103973440A (en) * | 2014-05-13 | 2014-08-06 | 东方斯泰克信息技术研究院(北京)有限公司 | File cloud security management method and system based on CPK |
CN104348832A (en) * | 2014-10-10 | 2015-02-11 | 叶春林 | Cloud base structure of mobile phone or computer |
WO2015027814A1 (en) * | 2013-08-27 | 2015-03-05 | 华为终端有限公司 | File sharing method and device |
CN105100186A (en) * | 2015-04-27 | 2015-11-25 | 深圳市美贝壳科技有限公司 | Rapid encryption and decryption method of family cloud photos |
CN105359159A (en) * | 2013-03-13 | 2016-02-24 | 詹普托媒体公司 | Encrypted network storage space |
CN105681365A (en) * | 2016-04-18 | 2016-06-15 | 北京小米移动软件有限公司 | File transmission method and device |
RU2589861C2 (en) * | 2014-06-20 | 2016-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of user data encryption |
CN105871892A (en) * | 2016-05-17 | 2016-08-17 | 北京联合大学 | File cloud storage security solution method and system |
CN106101153A (en) * | 2016-08-22 | 2016-11-09 | 安徽拓通信科技集团股份有限公司 | A kind of method of note cloud encrypting storing |
CN106778026A (en) * | 2017-01-05 | 2017-05-31 | 张传钊 | A kind of case history processes follow-up system |
CN106846604A (en) * | 2017-01-18 | 2017-06-13 | 北京云知科技有限公司 | A kind of reading/writing method, the apparatus and system of banknote characteristic information |
CN108287894A (en) * | 2018-01-19 | 2018-07-17 | 腾讯科技(深圳)有限公司 | Data processing method, device, computing device and storage medium |
CN108737335A (en) * | 2017-04-14 | 2018-11-02 | 广州小兵过河信息科技有限公司 | The method of meeting document process based on private clound |
CN109660604A (en) * | 2018-11-29 | 2019-04-19 | 上海碳蓝网络科技有限公司 | Data access method and equipment |
CN109981634A (en) * | 2019-03-20 | 2019-07-05 | 中共中央办公厅电子科技学院(北京电子科技学院) | A kind of cloud storage system based on cryptographic technique |
CN112134943A (en) * | 2020-09-21 | 2020-12-25 | 李波 | Internet of things cloud storage system and method |
CN114666354A (en) * | 2022-03-21 | 2022-06-24 | 北京涵鑫盛科技有限公司 | File storage management system of cloud storage system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1773994A (en) * | 2005-10-28 | 2006-05-17 | 广东省电信有限公司研究院 | Method for realizing data safety storing business |
CN102098317A (en) * | 2011-03-22 | 2011-06-15 | 浙江中控技术股份有限公司 | Data transmitting method and system applied to cloud system |
CN102271124A (en) * | 2010-06-01 | 2011-12-07 | 富士通株式会社 | Data processing equipment and data processing method |
CN102307236A (en) * | 2011-08-25 | 2012-01-04 | 浪潮电子信息产业股份有限公司 | Cloud-storage-structure-based remote storage management system |
-
2012
- 2012-03-02 CN CN201210053551.5A patent/CN102638568B/en active Active
- 2012-10-30 HK HK12110827.4A patent/HK1170090A1/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1773994A (en) * | 2005-10-28 | 2006-05-17 | 广东省电信有限公司研究院 | Method for realizing data safety storing business |
CN102271124A (en) * | 2010-06-01 | 2011-12-07 | 富士通株式会社 | Data processing equipment and data processing method |
CN102098317A (en) * | 2011-03-22 | 2011-06-15 | 浙江中控技术股份有限公司 | Data transmitting method and system applied to cloud system |
CN102307236A (en) * | 2011-08-25 | 2012-01-04 | 浪潮电子信息产业股份有限公司 | Cloud-storage-structure-based remote storage management system |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103051664B (en) * | 2012-08-14 | 2016-04-27 | 深圳市朗科科技股份有限公司 | A kind of file management method of cloud storage system, device and this cloud storage system |
CN103051664A (en) * | 2012-08-14 | 2013-04-17 | 深圳市朗科科技股份有限公司 | File management method and device for cloud storage system as well as cloud storage system |
CN102984282A (en) * | 2012-12-20 | 2013-03-20 | 青岛海信传媒网络技术有限公司 | Method and device of intelligent terminal for acquiring media data of cloud storage file |
CN102984282B (en) * | 2012-12-20 | 2015-08-05 | 青岛海信传媒网络技术有限公司 | Intelligent terminal obtains the method and apparatus of the media data of cloud storage file |
CN105359159A (en) * | 2013-03-13 | 2016-02-24 | 詹普托媒体公司 | Encrypted network storage space |
WO2015027814A1 (en) * | 2013-08-27 | 2015-03-05 | 华为终端有限公司 | File sharing method and device |
US9825924B2 (en) | 2013-08-27 | 2017-11-21 | Huawei Device (Dongguan) Co., Ltd. | File sharing method and apparatus |
CN103747008A (en) * | 2014-01-22 | 2014-04-23 | 李南南 | Internet storage device with encryption function and technology of internet storage device |
CN103916404A (en) * | 2014-04-23 | 2014-07-09 | 北京淦蓝润和信息技术有限公司 | Data management method and system |
CN103973440A (en) * | 2014-05-13 | 2014-08-06 | 东方斯泰克信息技术研究院(北京)有限公司 | File cloud security management method and system based on CPK |
RU2589861C2 (en) * | 2014-06-20 | 2016-07-10 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of user data encryption |
US9596221B2 (en) | 2014-06-20 | 2017-03-14 | AO Kaspersky Lab | Encryption of user data for storage in a cloud server |
CN104348832A (en) * | 2014-10-10 | 2015-02-11 | 叶春林 | Cloud base structure of mobile phone or computer |
CN105100186A (en) * | 2015-04-27 | 2015-11-25 | 深圳市美贝壳科技有限公司 | Rapid encryption and decryption method of family cloud photos |
CN105681365A (en) * | 2016-04-18 | 2016-06-15 | 北京小米移动软件有限公司 | File transmission method and device |
CN105681365B (en) * | 2016-04-18 | 2019-05-14 | 北京小米移动软件有限公司 | Method and apparatus for file transmission |
CN105871892A (en) * | 2016-05-17 | 2016-08-17 | 北京联合大学 | File cloud storage security solution method and system |
CN106101153A (en) * | 2016-08-22 | 2016-11-09 | 安徽拓通信科技集团股份有限公司 | A kind of method of note cloud encrypting storing |
CN106778026A (en) * | 2017-01-05 | 2017-05-31 | 张传钊 | A kind of case history processes follow-up system |
CN106846604A (en) * | 2017-01-18 | 2017-06-13 | 北京云知科技有限公司 | A kind of reading/writing method, the apparatus and system of banknote characteristic information |
CN106846604B (en) * | 2017-01-18 | 2020-01-17 | 北京云知科技有限公司 | Method, device and system for reading and writing banknote characteristic information |
CN108737335A (en) * | 2017-04-14 | 2018-11-02 | 广州小兵过河信息科技有限公司 | The method of meeting document process based on private clound |
CN108287894A (en) * | 2018-01-19 | 2018-07-17 | 腾讯科技(深圳)有限公司 | Data processing method, device, computing device and storage medium |
CN108287894B (en) * | 2018-01-19 | 2023-06-23 | 腾讯科技(深圳)有限公司 | Data processing method, device, computing equipment and storage medium |
CN109660604A (en) * | 2018-11-29 | 2019-04-19 | 上海碳蓝网络科技有限公司 | Data access method and equipment |
CN109981634A (en) * | 2019-03-20 | 2019-07-05 | 中共中央办公厅电子科技学院(北京电子科技学院) | A kind of cloud storage system based on cryptographic technique |
CN112134943A (en) * | 2020-09-21 | 2020-12-25 | 李波 | Internet of things cloud storage system and method |
CN112134943B (en) * | 2020-09-21 | 2023-08-22 | 李波 | Internet of things cloud storage system and method |
CN114666354A (en) * | 2022-03-21 | 2022-06-24 | 北京涵鑫盛科技有限公司 | File storage management system of cloud storage system |
CN114666354B (en) * | 2022-03-21 | 2022-12-27 | 北京涵鑫盛科技有限公司 | File storage management system of cloud storage system |
Also Published As
Publication number | Publication date |
---|---|
HK1170090A1 (en) | 2013-02-15 |
CN102638568B (en) | 2015-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102638568B (en) | Cloud storage system and data managing method thereof | |
US10142107B2 (en) | Token binding using trust module protected keys | |
CN105760764B (en) | Encryption and decryption method and device for embedded storage device file and terminal | |
US10423798B2 (en) | Mobile device authenticated print | |
CN104662870A (en) | Data security management system | |
CN109495251B (en) | Anti-quantum-computation intelligent home cloud storage method and system based on key fob | |
JP2015504222A (en) | Data protection method and system | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN101483654A (en) | Method and system for implementing authentication and data safe transmission | |
CN110868291B (en) | Data encryption transmission method, device, system and storage medium | |
CN103220295A (en) | Document encryption and decryption method, device and system | |
JP2016508699A (en) | Data security service | |
CN103516523A (en) | Data encryption system structure based on cloud storage | |
CN104333545A (en) | Method for encrypting cloud storage file data | |
CN102404337A (en) | Data encryption method and device | |
EP2902934B1 (en) | Portable Security Device, Method for Securing a Data Exchange and Computer Program Product | |
CN104333544A (en) | Encryption method for data file based on mobile terminal | |
CN103577769A (en) | File content safety management method and management system | |
CN104333452A (en) | Multi-account encryption method for file data | |
CN104426849A (en) | Method and system for realizing data security protection | |
US11290277B2 (en) | Data processing system | |
CN103164661A (en) | Device and method used for managing data in terminal | |
KR101680536B1 (en) | Method for Service Security of Mobile Business Data for Enterprise and System thereof | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1170090 Country of ref document: HK |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: GR Ref document number: 1170090 Country of ref document: HK |