CN104361284A - Third-party intrusion monitoring method for cloud storage data packet - Google Patents

Third-party intrusion monitoring method for cloud storage data packet Download PDF

Info

Publication number
CN104361284A
CN104361284A CN201410576221.3A CN201410576221A CN104361284A CN 104361284 A CN104361284 A CN 104361284A CN 201410576221 A CN201410576221 A CN 201410576221A CN 104361284 A CN104361284 A CN 104361284A
Authority
CN
China
Prior art keywords
cloud
monitoring
file
party
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410576221.3A
Other languages
Chinese (zh)
Other versions
CN104361284B (en
Inventor
任明和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Runxun Data Communication Co ltd
Shenzhen runxun Marketing Data Services Ltd.
Original Assignee
CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER filed Critical CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER
Priority to CN201410576221.3A priority Critical patent/CN104361284B/en
Publication of CN104361284A publication Critical patent/CN104361284A/en
Application granted granted Critical
Publication of CN104361284B publication Critical patent/CN104361284B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a third-party intrusion monitoring method for a cloud storage data packet. In the third-party intrusion monitoring method, by establishing a unified third-party security monitoring system for a cloud storage data packet file, an illegal behavior for intruding and stealing cloud storage data of a user is monitored and alarmed in real time, so that the user can conveniently and actively monitor the security of the cloud storage data file, distrust on cloud storage encryption of a cloud storage provider is overcome. In the third-party intrusion monitoring method, one account can achieve unified encrypting and/ or monitoring management on a plurality of cloud storage accounts, so that a complete set of dynamic authorization codes as well as technical specifications for security application of a third-party monitoring technology to the field of information cloud storage is established, and can be conveniently popularized by the user to security application in many fields; a security encrypting and monitoring technology with higher security, greater convenience and practicality and application in many fields is supplied to the user.

Description

Cloud is stored to third party's intrusion detection method of packet
Technical field
Third party's intrusion detection method cloud being stored to packet of the present invention; relate generally to computer information data security technology area; particularly utilize the combination of third party's Intrusion Detection Technique and dynamic code encryption technology and other safety management technologies, cloud store file data is realized to the active encryption protection of safety monitoring and user.
Background technology
The current manufacturer much with strength all develops cloud storage system for enterprises and individuals, but because user is stored into cloud storage system to by the privacy of oneself secret secretary file and worries, therefore still have a lot of enterprises and individuals to be reluctant to use cloud stores service.Can restriction user use the security of the reason of cloud stores service mainly cloud storage system be guaranteed, and in other words, whether the data that user is stored in high in the clouds can be revealed by high in the clouds or be stolen by malicious attacker.The security of current cloud storage system oneself is solely responsible for by cloud provider, and giving tacit consent to Liao Yun provider while user uses cloud stores service can ensure secure user data.This safety guarantee of acting on one's own takes the relieved use in family hardly, and this is the difficult problem that cloud storage industry must solve.
Based on the information security that cloud stores; how to allow the easy monitoring of user; grasp at any time and know the safe condition of the data file of oneself in cloud storage server; further; by active encryption technology; realize protecting the active encryption of oneself data file, this is popularization application cloud memory technology, abolishes the Key Strategy of user security vigilance.How realizing this Key Strategy technically, this is the problem that industry needs to solve.
Summary of the invention
Third party's intrusion detection method cloud being stored to packet of the present invention; for above-mentioned cloud storage encryption technology Problems existing; propose total solution; utilize the combination of third party's Intrusion Detection Technique and dynamic code encryption technology and other safety management technologies; user is allowed can initiatively to realize the monitoring of cloud storing data files and encryption safe protection; this, in the protection of some important core data file cloud, provides best technical protection.The method that cloud store file data is encrypted of the present invention, based on my three patents of invention formerly, the first, the root service system of personal identification, the patent No.: 2011102160995, it two is, the method of dynamic authorization code is set up in identity-based certification, the patent No.: 2014103040797, it three is set up the unified dynamic authorization code system of business entity's account, the patent No.: 2014103039893, on these three patent of invention technical foundation, store the application of message area at concrete computing machine cloud.
Third party's intrusion detection method cloud being stored to packet of the present invention; to the storage of file data cloud, infill monitoring protection application is being carried out for intrusion detection technology and dynamic code encryption technology; done brand-new technical design, its innovative technique realized is worth and comprises:
One, set up unified third party cloud and store monitoring and measuring application client, facilitate user independently, on one's own initiative data security monitoring is stored to the easy cloud that completes of described cloud storing data files, two, unified dynamic authorization code applications client is set up, facilitate user independently, complete dynamic authorization code encryption deciphering application to described cloud storing data files is easy on one's own initiative, and by storing monitoring and measuring application with third party cloud, realize infill monitoring integration protection cloud being stored to data, three, the third party's terminal by authorizing obtains dynamic authorization code, has stopped the possibility that dynamic authorization code key is stolen at the user terminal that file data stores, four, add the authorization identifying requirement to user terminal special parameter, ensure that cloud store that end steals information can not cracking, five, by an account, unified encryption and/or monitoring management are realized to multiple cloud storage accounts, facilitate the self-help application of user, six, construct the safety standard that cloud stores user's active encryption/or active monitoring, overcome the distrust to cloud storage provider encipherment protection, seven, establish dynamic authorization code and the third party monitoring technology of complete set, in the application technology specification of information cloud field of storage, user is facilitated to spread to multi-field safety applications, for user provides greater security, more convenient practicality, multi-field applicable safety encipher and monitoring technology.
Third party's intrusion detection method cloud being stored to packet of the present invention, builds a kind of third party stores packet file safety monitoring system to cloud exactly, realizes getting to assailing thieves the real-time monitoring alarming that privacy of user cloud stores the illegal act of data.
The technology realization flow of described third party's intrusion detection method, comprises the steps:
S1, in storage terminal loading third-party monitoring client, or third party monitoring client is set for networking self-activation state;
S2, startup monitoring button, the bullet window ejected is selected the cloud clicking needs monitoring store packet file and submits to;
S3, click confirming button, generation can be monitored and be stored packet file;
S4, will load the storage packet file of monitoring probe program, submit cloud storage server to;
S5, when have invasion store packet file time, instant alarming in third party monitoring client;
S6, user, by third party monitoring client, enter account background management system and read intrusion tracking statistics in detail.
Third party's intrusion detection method cloud being stored to packet of the present invention, described cloud stores the safety monitoring system of packet file, or carry out functional module with the dynamic authorization code encryption management system of same account and be combined, realize encryption monitoring integration cloud being stored to packet file.
The described techniqueflow realizing encryption monitoring integration, comprises the steps:
S7, in dynamic authorization code encryption administrative client configuration third party monitoring business function module;
S8, startup business button, on the bullet window ejected, selection click needs are monitored the cloud encrypted through dynamic authorization code and are stored the submission of packet file;
S9, click confirming button, generate the dynamic authorization code encryption that can monitor and store packet file;
S10, will load the encrypted stored data APMB package of monitoring probe program, submit cloud storage server to;
S11, when have invasion monitored store packet file time, at dynamic authorization code encryption administrative client instant alarming;
S12, user read to invade in detail by account background management system and follow the tracks of statistics.
Third party's intrusion detection method cloud being stored to packet of the present invention, described cloud stores the safety monitoring warning system of packet file, or carry out functional module with safety and the system management software and be combined, or configuration independent third party monitors business function module, realize integrated third party monitoring high in the clouds being stored to packet file.
Described technology realization flow, comprises the steps:
The business button of S13, startup third party monitoring business function module, on the bullet window ejected, the cloud that selecting to click needs to monitor stores packet file and submits to;
S14, click confirming button, generate the storage packet file that can monitor;
S15, will load the storage packet file of monitoring probe program, submit cloud storage server to;
S16, when have invasion monitored store packet file time, at safety and system management software client instant alarming;
S17, user read to invade in detail by account background management system and follow the tracks of statistics.
Third party's intrusion detection method cloud being stored to packet of the present invention, described generation can be monitored and be stored packet file, by monitoring function module, monitoring linked code probe program is loaded to data APMB package described in referring to, realize monitoring system stores end data APMB package online monitoring alarm and tracking and monitoring digital independent to cloud, and without the need to affixing one's name to monitoring modular to cloud storage server end.
Described packet file, comprises the packet file of single data file and the folder data APMB package of multiple data file composition.
Described cloud stores packet file, comprises cloud dish and Virtual Space storage service pattern, also comprises cloud calculation service memory module.
Further, described generation can be monitored and be stored packet file, or display loads monitoring probe mark.
Third party's intrusion detection method cloud being stored to packet of the present invention, described illegal invasion comprises the invasion of unauthorized account and the invasion of super account.
Described unauthorized account refers to by unauthorized other-end, initiates intrusion access cloud being stored to packet file, causes illegal reading copy authorized user cloud being stored to privacy confidential data APMB package.
Described super account refers to by cloud storage system keeper account, initiates the intrusion access of user data APMB package in storing cloud, causes illegal reading copy cloud being stored to privacy of user confidential data APMB package.
Third party's intrusion detection method cloud being stored to packet of the present invention, the dynamic authorization code of described same account, refer to and carry out after authorization identifying through authenticating user identification system, stochastic generation dynamic password password value in setting-up time periodic quantity, by reading this stochastic generation dynamic password password value at mandate mobile terminal, realize encrypting and decrypting management cloud being stored to packet file.
Further, by configuring into third party's intrusion detection module in dynamic authorization code encryption management system, thus realize the encryption monitoring integration with storing packet file under account to cloud.
Third party's intrusion detection method cloud being stored to packet of the present invention; described dynamic authorization code encryption; be not limited to be encrypted protection to the file data of single cloud storage server system; user as required can simultaneously to the file data encipherment protection of each different cloud storage server system; by completing after file data dynamic authorization code encryption at same user terminal; upload to each cloud storage server system respectively, realize the encipherment protection to all cloud storage server system file datas under a dynamic authorization code account.
Further; user as required can simultaneously to the file data encipherment protection of each different cloud storage server system; by completing after file data dynamic authorization code encryption at different user terminals; upload to each cloud storage server system respectively, realize the encipherment protection to all cloud storage server system file datas under a dynamic authorization code account.
Third party's intrusion detection method cloud being stored to packet of the present invention; described dynamic authorization code encryption; different according to the importance of file data; or to encrypted pagefile or file data; submit cloud storage server to after carrying out the encryption of packet and/or memory disc again, improved by multi-enciphering mode and the security of cloud store file data is protected.
Or further, different according to the respective importance of cloud store file data, be set to readable deciphering respectively, reproducible can the deciphering again of sectional drawing, the deciphering again of extraction can be downloaded.
Third party's intrusion detection method cloud being stored to packet of the present invention, described safety and the system management software, refer to existing Based PC terminal and mobile terminal, or other extraordinary Networks connect terminal, and the regarding safety management service system of configuration and application management service system, comprise common security guard, safe house keeper, antivirus software, sorts of systems arranges software, Miscellaneous Documents Software for producing.
Further, by entering third party's intrusion detection module in described safety and system management software system configuration, thus realize the integrated third party monitoring to high in the clouds storage and packet file.
Third party's intrusion detection method cloud being stored to packet of the present invention, described third party monitoring, be not limited in monitoring high in the clouds being stored to packet file, according to the needs of user to concrete packet file security control, can arrange the packet file on storage terminal and carry out Simultaneous Monitoring, when there being the monitoring on illegal invasion storage terminal to store packet file, instant alerts user.
Accompanying drawing explanation
Accompanying drawing is the present invention stores third party's intrusion detection method of packet Technical Architecture figure to cloud.
Embodiment
Below in conjunction with accompanying drawing, specific embodiments of the invention are described.Should be appreciated that embodiment described herein is only for instruction and explanation of the present invention, is not intended to limit the present invention.
The present embodiment 1, be how store monitoring system by third party cloud to store packet file to cloud and realize safety monitoring, its technology realization flow, comprises the steps:
S1, in storage terminal 101 loading third-party monitoring client 102, or third party monitoring client 02 is set for networking self-activation state;
S2, start monitoring button in third party monitoring client 102, the bullet window ejected being selected click needs the cloud of monitoring to store packet file 103 to submit to;
S3, click confirming button, generation can be monitored and be stored packet file 103;
S4, will load the storage packet file 103 of monitoring probe program, submit cloud storage server 104 to;
S5, when have invasion store packet file 103 time, instant alarming in third party monitoring client 102;
S6, user, by the account background management system of third party monitoring client 102, read to invade in detail and follow the tracks of statistics.
The present embodiment 1, be how store monitoring system by third party cloud to carry out functional module with the dynamic authorization code encryption management system of same account and be combined, the encryption monitoring realizing storing cloud packet file is integrated, and its technology realization flow, comprises the steps:
S7, configure third party monitoring business function module 102 at dynamic authorization code encryption administrative client 105;
S8, start business button in third party monitoring business function module 102, the bullet window ejected being selected click needs monitoring, and the cloud encrypted through dynamic authorization code administrative client 105 stores packet file 103 and submits to;
S9, click confirming button, generate the dynamic authorization code encryption that can monitor and store packet file 103;
S10, will load the encrypted stored data APMB package 103 of monitoring probe program, submit cloud storage server 104 to;
S11, when have invasion monitored store packet file 103 time, at dynamic authorization code encryption administrative client 105 instant alarming;
S12, user, at dynamic authorization code encryption administrative client 105, read to invade in detail by account background management system and follow the tracks of statistics.
In sum, third party's intrusion detection method cloud being stored to packet of the present invention, its innovative technique realized is worth and comprises: one, set up unified third party cloud and store monitoring and measuring application client, facilitate user independently, on one's own initiative data security monitoring is stored to the easy cloud that completes of described cloud storing data files, two, unified dynamic authorization code applications client is set up, facilitate user independently, complete dynamic authorization code encryption deciphering application to described cloud storing data files is easy on one's own initiative, and by storing monitoring and measuring application with third party cloud, realize infill monitoring integration protection cloud being stored to data, three, the third party's terminal by authorizing obtains dynamic authorization code, has stopped the possibility that dynamic authorization code key is stolen at the user terminal that file data stores, four, add the authorization identifying requirement to user terminal special parameter, ensure that cloud store that end steals information can not cracking, five, by an account, unified encryption and/or monitoring management are realized to multiple cloud storage accounts, facilitate the self-help application of user, six, construct the safety standard that cloud stores user's active encryption/or active monitoring, overcome the distrust to cloud storage provider encipherment protection, seven, establish dynamic authorization code and the third party monitoring technology of complete set, in the application technology specification of information cloud field of storage, user is facilitated to spread to multi-field safety applications, for user provides greater security, more convenient practicality, multi-field applicable safety encipher and monitoring technology.

Claims (10)

1. pair cloud stores third party's intrusion detection method of packet, is characterised in that to be exactly build a kind of third party stores packet file safety monitoring system to cloud, realizes getting to assailing thieves the real-time monitoring alarming that privacy of user cloud stores the illegal act of data;
Described technology realization flow, comprises the steps:
S1, in storage terminal loading third-party monitoring client, or third party monitoring client is set for networking self-activation state;
S2, startup monitoring button, the bullet window ejected is selected the cloud clicking needs monitoring store packet file and submits to;
S3, click confirming button, generation can be monitored and be stored packet file;
S4, will load the storage packet file of monitoring probe program, submit cloud storage server to;
S5, when have invasion store packet file time, instant alarming in third party monitoring client;
S6, user, by third party monitoring client, enter account background management system and read intrusion tracking statistics in detail.
2. according to claim 1 cloud is stored to third party's intrusion detection method of packet, be characterised in that described cloud stores the safety monitoring system of packet file, or carry out functional module with the dynamic authorization code encryption management system of same account and be combined, realize encryption monitoring integration cloud being stored to packet file;
The described techniqueflow realizing encryption monitoring integration, comprises the steps:
S7, in dynamic authorization code encryption administrative client configuration third party monitoring business function module;
S8, startup business button, on the bullet window ejected, selection click needs are monitored the cloud encrypted through dynamic authorization code and are stored the submission of packet file;
S9, click confirming button, generate the dynamic authorization code encryption that can monitor and store packet file;
S10, will load the encrypted stored data APMB package of monitoring probe program, submit cloud storage server to;
S11, when have invasion monitored store packet file time, at dynamic authorization code encryption administrative client instant alarming;
S12, user read to invade in detail by account background management system and follow the tracks of statistics.
3. according to claim 1 cloud is stored to third party's intrusion detection method of packet, be characterised in that described cloud stores the safety monitoring warning system of packet file, or carry out functional module with safety and the system management software and be combined, or configuration independent third party monitors business function module, realize integrated third party monitoring high in the clouds being stored to packet file;
Described technology realization flow, comprises the steps:
The business button of S13, startup third party monitoring business function module, on the bullet window ejected, the cloud that selecting to click needs to monitor stores packet file and submits to;
S14, click confirming button, generate the storage packet file that can monitor;
S15, will load the storage packet file of monitoring probe program, submit cloud storage server to;
S16, when have invasion monitored store packet file time, at safety and system management software client instant alarming;
S17, user read to invade in detail by account background management system and follow the tracks of statistics.
4. according to the third party's intrusion detection method described in claim 1/2/3, cloud being stored to packet, be characterised in that generation described in S3/ S9/ S14 can monitor storage packet file, by monitoring function module, monitoring linked code probe program is loaded to data APMB package described in referring to, realize monitoring system stores end data APMB package online monitoring alarm and tracking and monitoring digital independent to cloud, and without the need to affixing one's name to monitoring modular to cloud storage server end;
Described packet file, comprises the packet file of single data file and the folder data APMB package of multiple data file composition;
Described cloud stores packet file, comprises cloud dish and Virtual Space storage service pattern, also comprises cloud calculation service memory module;
Further, described generation can be monitored and be stored packet file, or display loads monitoring probe mark.
5., according to the third party's intrusion detection method described in claim 1/2/3, cloud being stored to packet, be characterised in that illegal invasion described in S5/ S11/ S16 comprises the invasion of unauthorized account and the invasion of super account;
Described unauthorized account refers to by unauthorized other-end, initiates intrusion access cloud being stored to packet file, causes illegal reading copy authorized user cloud being stored to privacy confidential data APMB package;
Described super account refers to by cloud storage system keeper account, initiates the intrusion access of user data APMB package in storing cloud, causes illegal reading copy cloud being stored to privacy of user confidential data APMB package.
6. according to claim 2 cloud is stored to third party's intrusion detection method of packet, be characterised in that the dynamic authorization code of described same account, refer to and carry out after authorization identifying through authenticating user identification system, stochastic generation dynamic password password value in setting-up time periodic quantity, by reading this stochastic generation dynamic password password value at mandate mobile terminal, realize encrypting and decrypting management cloud being stored to packet file;
Further, by configuring into third party's intrusion detection module in dynamic authorization code encryption management system, thus realize the encryption monitoring integration with storing packet file under account to cloud.
7. according to claim 6 cloud is stored to third party's intrusion detection method of packet, be characterised in that described dynamic authorization code encryption, be not limited to be encrypted protection to the file data of single cloud storage server system, user as required can simultaneously to the file data encipherment protection of each different cloud storage server system, by completing after file data dynamic authorization code encryption at same user terminal, upload to each cloud storage server system respectively, realize the encipherment protection to all cloud storage server system file datas under a dynamic authorization code account,
Further; user as required can simultaneously to the file data encipherment protection of each different cloud storage server system; by completing after file data dynamic authorization code encryption at different user terminals; upload to each cloud storage server system respectively, realize the encipherment protection to all cloud storage server system file datas under a dynamic authorization code account.
8. according to claim 6 cloud is stored to third party's intrusion detection method of packet, be characterised in that described dynamic authorization code encryption, different according to the importance of file data, or to encrypted pagefile or file data, submit cloud storage server to after carrying out the encryption of packet and/or memory disc again, improved by multi-enciphering mode and the security of cloud store file data is protected;
Or further, different according to the respective importance of cloud store file data, be set to readable deciphering respectively, reproducible can the deciphering again of sectional drawing, the deciphering again of extraction can be downloaded.
9. according to claim 3 cloud is stored to third party's intrusion detection method of packet, be characterised in that described safety and the system management software, refer to existing Based PC terminal and mobile terminal, or other extraordinary Networks connect terminal, and the regarding safety management service system of configuration and application management service system, comprise common security guard, safe house keeper, antivirus software, sorts of systems arranges software, Miscellaneous Documents Software for producing;
Further, by entering third party's intrusion detection module in described safety and system management software system configuration, thus realize the integrated third party monitoring to high in the clouds storage and packet file.
10. according to claim 1 cloud is stored to third party's intrusion detection method of packet, be characterised in that described third party monitoring, be not limited in monitoring high in the clouds being stored to packet file, according to the needs of user to concrete packet file security control, can arrange the packet file on storage terminal and carry out Simultaneous Monitoring, when there being the monitoring on illegal invasion storage terminal to store packet file, instant alerts user.
CN201410576221.3A 2014-10-26 2014-10-26 To third party's intrusion detection method of cloud storage packet Active CN104361284B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410576221.3A CN104361284B (en) 2014-10-26 2014-10-26 To third party's intrusion detection method of cloud storage packet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410576221.3A CN104361284B (en) 2014-10-26 2014-10-26 To third party's intrusion detection method of cloud storage packet

Publications (2)

Publication Number Publication Date
CN104361284A true CN104361284A (en) 2015-02-18
CN104361284B CN104361284B (en) 2018-02-13

Family

ID=52528543

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410576221.3A Active CN104361284B (en) 2014-10-26 2014-10-26 To third party's intrusion detection method of cloud storage packet

Country Status (1)

Country Link
CN (1) CN104361284B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982217A (en) * 2017-04-13 2017-07-25 西安莫贝克半导体科技有限公司 A kind of network security management mode of decentralization

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413143A (en) * 2011-12-01 2012-04-11 江苏华丽网络工程有限公司 Security audit system and method based on cloud computing
US20130254885A1 (en) * 2012-03-14 2013-09-26 Matthew G. DEVOST System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity
CN103700059A (en) * 2013-12-19 2014-04-02 南京信息工程大学 Cloud storage image data ownership verifying method based on multifunction digital watermark
CN103748551A (en) * 2011-08-17 2014-04-23 惠普发展公司,有限责任合伙企业 Tracing data block operations
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation
CN104104672A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for establishing dynamic authorization code based on identity authentication

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103748551A (en) * 2011-08-17 2014-04-23 惠普发展公司,有限责任合伙企业 Tracing data block operations
CN102413143A (en) * 2011-12-01 2012-04-11 江苏华丽网络工程有限公司 Security audit system and method based on cloud computing
US20130254885A1 (en) * 2012-03-14 2013-09-26 Matthew G. DEVOST System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity
CN103700059A (en) * 2013-12-19 2014-04-02 南京信息工程大学 Cloud storage image data ownership verifying method based on multifunction digital watermark
CN104065651A (en) * 2014-06-09 2014-09-24 上海交通大学 Information flow dependability guarantee mechanism for cloud computation
CN104104672A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for establishing dynamic authorization code based on identity authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982217A (en) * 2017-04-13 2017-07-25 西安莫贝克半导体科技有限公司 A kind of network security management mode of decentralization

Also Published As

Publication number Publication date
CN104361284B (en) 2018-02-13

Similar Documents

Publication Publication Date Title
US11070368B2 (en) System, method, and program for transmitting and receiving any type of secure digital data
Alqassem et al. A taxonomy of security and privacy requirements for the Internet of Things (IoT)
US8984611B2 (en) System, apparatus and method for securing electronic data independent of their location
KR101769282B1 (en) Data security service
US9317708B2 (en) Hardware trust anchors in SP-enabled processors
Abi Sen et al. A comparative study between security and privacy
GB2462442A (en) A remote server centrally controls access to data stored in a data container in an encrypted form
CN104333545A (en) Method for encrypting cloud storage file data
Teufl et al. Android encryption systems
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
US11677546B2 (en) Methods and systems of securely transferring data
CN104333544A (en) Encryption method for data file based on mobile terminal
Flores et al. Bring your own disclosure: analysing BYOD threats to corporate information
CN109818923A (en) A kind of attribute base cloud service access control method based on attribute ciphertext re-encryption
Kofahi et al. Identifying the top threats in cloud computing and its suggested solutions: a survey
CN104363093A (en) Method for encrypting file data by dynamic authorization code
CN103577763A (en) Mobile terminal device with data protection function and data protection method
CN104361284A (en) Third-party intrusion monitoring method for cloud storage data packet
Khan et al. A comparative study of trends in security in cloud computing
Tsai et al. A group file encryption method using dynamic system environment key
Maurya et al. Blockchain-powered solution to safeguard IoT devices against attacks
CN112769784A (en) Text processing method and device, computer readable storage medium and processor
Mishra et al. Design of a cloud-based security mechanism for Industry 4.0 communication
Sanaullah et al. Information Security Challenges in the Internet of Things (IoT) Ecosystem
Candra et al. Security analysis testing for secure instant messaging in android with study case: Telegram

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Li Li

Inventor after: Yang Shaobai

Inventor before: Ren Minghe

CB03 Change of inventor or designer information
TA01 Transfer of patent application right

Effective date of registration: 20180118

Address after: Baoan District Xin'an street Shenzhen city Guangdong province 518133 left three road (Shenzhen) Co., Ltd. Changfeng Electric Intelligence valley area and the 2 layer 1 layer ABC

Applicant after: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.

Applicant after: Shenzhen runxun Marketing Data Services Ltd.

Address before: 400039 Chongqing Jiulongpo District No. 186 stone path 2 buildings 21-1

Applicant before: CHONGQING ZHITAO INFORMATION TECHNOLOGY CENTER

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Third-party intrusion monitoring method for cloud storage data packet

Effective date of registration: 20181106

Granted publication date: 20180213

Pledgee: Shenzhen high tech investment and financing Company limited by guarantee

Pledgor: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.|Shenzhen runxun Marketing Data Services Ltd.

Registration number: 2018990001033

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20190823

Granted publication date: 20180213

Pledgee: Shenzhen high tech investment and financing Company limited by guarantee

Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.

Registration number: 2018990001033

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Third-party intrusion monitoring method for cloud storage data packet

Effective date of registration: 20190930

Granted publication date: 20180213

Pledgee: Shenzhen high tech investment and financing Company limited by guarantee

Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.

Registration number: Y2019990000305

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20210322

Granted publication date: 20180213

Pledgee: Shenzhen high tech investment and financing Company limited by guarantee

Pledgor: Shenzhen runxun Marketing Data Services Ltd.|SHENZHEN RUNXUN DATA COMMUNICATION Co.,Ltd.

Registration number: Y2019990000305

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Third party intrusion detection method for cloud storage packets

Effective date of registration: 20220624

Granted publication date: 20180213

Pledgee: China Co. truction Bank Corp Hefei Luyang branch

Pledgor: SHENZHEN RUNXUN DATA COMMUNICATION CO.,LTD.

Registration number: Y2022980008820

PE01 Entry into force of the registration of the contract for pledge of patent right