CN106357678A - Cloud encryption storage method for intelligent terminal and intelligent terminal - Google Patents

Cloud encryption storage method for intelligent terminal and intelligent terminal Download PDF

Info

Publication number
CN106357678A
CN106357678A CN201610924964.4A CN201610924964A CN106357678A CN 106357678 A CN106357678 A CN 106357678A CN 201610924964 A CN201610924964 A CN 201610924964A CN 106357678 A CN106357678 A CN 106357678A
Authority
CN
China
Prior art keywords
user
intelligent terminal
key
account information
cloud service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610924964.4A
Other languages
Chinese (zh)
Inventor
邹家须
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610924964.4A priority Critical patent/CN106357678A/en
Publication of CN106357678A publication Critical patent/CN106357678A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a cloud encryption storage method for an intelligent terminal. The method comprises the following steps: performing identity authentication on a user; after the authentication, if a backup instruction sent by the user is received, determining backup data selected by the user according to the backup instruction, and encrypting the backup data according to a key prestored in the intelligent terminal to obtain encrypted data; sending the encrypted data to a cloud server; if a restoring instruction sent by the user is received, receiving the encrypted data sent by the cloud server and decrypting the received encrypted data sent by the cloud server according to the key restored in the intelligent terminal. According to the invention, the condition that the key is stolen in a transmitting process is avoided, the risk that the backup data of the user is illegally stolen is reduced and the confidentiality is improved. The invention further discloses the intelligent terminal, including a security chip for encrypting and decrypting the backup data, wherein a key is presorted in the security chip. The intelligent terminal also has the above advantages, which are not repeated here.

Description

A kind of cloud encryption storage method of intelligent terminal and intelligent terminal
Technical field
The present invention relates to cloud storage technical field, the cloud encryption storage method of more particularly to a kind of intelligent terminal.This Bright further relate to a kind of intelligent terminal.
Background technology
In order to avoid the file data (video, audio frequency, picture, address list, note, document etc.) in intelligent terminal is lost, Sometimes may require that partial data is backed up and sent and store to high in the clouds.The upload procedure adopting at present is: file divides The encapsulation of class cloud server authentication file encryption compressing file data uploads;Downloading process is: high in the clouds clothes Business device authentication and mobile phone file compare recovery and download decompression deciphering.During this, to file encryption solution When close, key used is saved on cloud server, needs to obtain from cloud server after certification is passed through during use.
But, if key storage beyond the clouds server, in the transmitting procedure obtaining key from server end easily Monitored, lead to key stolen, and then lead to the Backup Data of user illegally to be stolen, confidentiality is poor.
Therefore, a kind of cloud encryption storage method of intelligent terminal of strong security and intelligent terminal how is provided to be this areas The problem that technical staff needs to solve at present.
Content of the invention
It is an object of the invention to provide a kind of cloud encryption storage method of intelligent terminal, it is to avoid in transmitting procedure, key is stolen Situation occur, reduce the risk illegally stolen of Backup Data of user, improve confidentiality;It is another object of the present invention to carrying For a kind of intelligent terminal.
For solving above-mentioned technical problem, the invention provides a kind of cloud encryption storage method of intelligent terminal, comprising:
Step s101: authentication operation is carried out to user;After the completion of certification, if receiving the backup instruction of user's transmission Then enter step s102;If receiving the recovery instruction of user's transmission, enter step s103;
Step s102: the Backup Data that user selectes is determined according to described backup instruction, according to pre- in described intelligent terminal The key first storing is encrypted to described Backup Data, obtains ciphertext data;By described ciphertext data is activation to described high in the clouds Server;
Step s103: receive the ciphertext data that described cloud server sends, prestore according in described intelligent terminal Described key ciphertext data that the described cloud server receiving is sent be decrypted.
Preferably, the described process that user is carried out with authentication operation particularly as follows:
Collection the identity information of identifying user, carry out identity information certification according to described identity information;
The cloud service account information that receive user sends;
Described cloud service account information is sent and carries out account information certification to described cloud server.
Preferably, the acquisition process of the key prestoring in described intelligent terminal particularly as follows:
After receiving the described cloud service account information of user's transmission first, generate according to described cloud service account information Described key, and by described key storage to described intelligent terminal.
Preferably, described identity information is biological attribute data.
Preferably, described biological attribute data is specially vocal print, fingerprint, any one in verbal instructions.
For solving above-mentioned technical problem, present invention also offers a kind of intelligent terminal, comprising:
Authentication module, for carrying out authentication operation to user, after the completion of certification, if receive the backup of user's transmission Instruction then sends to safety chip, if receiving the recovery instruction of user's transmission, sends to receiver module;
Described safety chip, for determining, according to described backup instruction, the Backup Data that user selectes, according to pre- in itself The key first storing is encrypted to described Backup Data, obtains ciphertext data;According to the described key prestoring in itself The ciphertext data that the described cloud server receiving is sent is decrypted;
Sending module, for by described ciphertext data is activation to described cloud server;
Described receiver module, for receiving the ciphertext data that described cloud server sends, and sends it to described peace Full chip.
Preferably, described authentication module specifically includes:
Account receiving unit, the cloud service account information sending for receive user;
Collecting unit, for gathering the identity information of simultaneously identifying user, carries out identity information according to described identity information and recognizes Card;;
Communication unit, carries out account information to described cloud server and recognizes for sending described cloud service account information Card.
Preferably, described authentication module is additionally operable to after receiving the described cloud service account information of user's transmission first, Send the key generation instruction carrying described cloud service account information to described safety chip;
Described safety chip is additionally operable to:
Receive after described key generates instruction and generate described key according to described cloud service account information, and will be described close Key stores in itself.
Preferably, described collecting unit is specifically for gathering the biological attribute data of identifying user.
Preferably, described collecting unit is specifically for gathering vocal print or fingerprint or the verbal instructions of identifying user.
The invention provides a kind of cloud encryption storage method of intelligent terminal, after authentication, to Backup Data It is encrypted using the key being pre-stored within intelligent terminal during deciphering, close without obtaining from cloud server Key.It can be seen that, key storage in intelligent terminal, and is not stored in cloud server, during encrypting and decrypting by the present invention Key do not need the localized transmissions beyond intelligent terminal, it is to avoid in transmitting procedure, the stolen situation of key occurs, and significantly subtracts The risk that the Backup Data of little user is illegally stolen, strong security.Present invention also offers a kind of intelligent terminal, it is provided with Safety chip is used for Backup Data is encrypted deciphering, and wherein, key is pre-stored within safety chip it is seen then that this intelligence Terminal also has the advantages that strong security.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to institute in prior art and embodiment Need use accompanying drawing be briefly described it should be apparent that, drawings in the following description be only the present invention some enforcement Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also obtain according to these accompanying drawings Obtain other accompanying drawings.
The flow chart that a kind of cloud of intelligent terminal that Fig. 1 provides for the present invention encrypts the process of storage method;
A kind of structural representation of intelligent terminal that Fig. 2 provides for the present invention.
Specific embodiment
The core of the present invention is that the cloud providing a kind of intelligent terminal encrypts storage method, it is to avoid in transmitting procedure, key is stolen Situation occur, reduce the risk illegally stolen of Backup Data of user, improve confidentiality;Another core of the present invention is to carry For a kind of intelligent terminal.
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment being obtained under the premise of not making creative work, broadly falls into the scope of protection of the invention.
The invention provides a kind of cloud encryption storage method of intelligent terminal, shown in Figure 1, Fig. 1 provides for the present invention A kind of intelligent terminal cloud encrypt storage method process flow chart;The method includes:
Step s101: authentication operation is carried out to user;After the completion of certification, if receiving the backup instruction of user's transmission Then enter step s102;If receiving the recovery instruction of user's transmission, enter step s103;
Step s102: the Backup Data that user selectes is determined according to backup instruction, according to prestore in intelligent terminal Key is encrypted to Backup Data, obtains ciphertext data;By ciphertext data is activation to cloud server;
Step s103: receive the ciphertext data that cloud server sends, according to the key pair prestoring in intelligent terminal The ciphertext data that the cloud server receiving sends is decrypted.
Wherein, user is carried out with the process of authentication operation particularly as follows:
Collection the identity information of identifying user, carry out identity information certification according to identity information;
The cloud service account information that receive user sends;
Cloud service account information is sent and carries out account information certification to cloud server.
Preferably, the acquisition process of the key prestoring in intelligent terminal particularly as follows:
After receiving the cloud service account information of user's transmission first, generate key according to cloud service account information, and By in key storage to intelligent terminal.
It is understood that the cloud service account of different users is different, the cloud service account of each User logs in oneself Carry out the encrypted transmission of Backup Data afterwards, in order to avoid obscuring occurs in the Backup Data between different user, therefore be encrypted solution Key when close should be corresponded with cloud service account, therefore can generate key according to cloud service account information.Certainly, may also be employed Other AESs generate key, but will ensure that generating key is corresponded with cloud service account.
And, after user newly changes intelligent terminal due to some reasons (for example original intelligent terminal's damage etc.), this intelligence Do not store the corresponding key of cloud service account in terminal, can make the ciphertext data in cloud server cannot be extensive in this case Multiple to intelligent terminal, so when need to regenerate the corresponding key of cloud service account and store to the intelligent terminal newly changing.
Simultaneously it should be noted that because key is corresponding with cloud service account, for avoiding disabled user to steal cloud service Corresponding cipher key content is learnt, generating, according to cloud service account, the key schedule being adopted during key needs to protect after account Close, can not be known algorithm, in different intelligent terminal, the key schedule of setting can be the same or different, when So, the present invention does not limit the particular content of key schedule.
Specifically, identity information is biological attribute data.Here biological attribute data is specially vocal print, fingerprint, voice Any one in password.It is understood that if being authenticated using pin mode, user needs to remember the close of oneself setting Digital content, is so easy to situation about forgetting Password occurs, therefore if adopting the data such as vocal print, fingerprint, voice, then can be big Reduce greatly situation about forgetting Password, reliability is high.Certainly, these are only several preferred versions, other kinds of life may also be employed Thing characteristic.
The invention provides a kind of cloud encryption storage method of intelligent terminal, after authentication, to Backup Data It is encrypted using the key being pre-stored within intelligent terminal during deciphering, close without obtaining from cloud server Key.It can be seen that, key storage in intelligent terminal, and is not stored in cloud server, during encrypting and decrypting by the present invention Key do not need the localized transmissions beyond intelligent terminal, it is to avoid in transmitting procedure, the stolen situation of key occurs, and significantly subtracts The risk that the Backup Data of little user is illegally stolen, strong security.
Present invention also offers a kind of intelligent terminal, shown in Figure 2, a kind of intelligent terminal that Fig. 2 provides for the present invention Structural representation.This intelligent terminal includes:
Authentication module 11, for carrying out authentication operation to user, after the completion of certification, if receive the standby of user's transmission Part instruction then sends to safety chip 12, if receiving the recovery instruction of user's transmission, sends to receiver module 14;
Safety chip 12, for determining, according to backup instruction, the Backup Data that user selectes, prestores according in itself Key Backup Data is encrypted, obtain ciphertext data;According to the key prestoring in itself to the high in the clouds receiving The ciphertext data that server sends is decrypted;
Sending module 13, for by ciphertext data is activation to cloud server;
Receiver module 14, for receiving the ciphertext data of cloud server transmission, and sends it to safety chip 12.
Wherein, authentication module 11 specifically includes:
Account receiving unit, the cloud service account information sending for receive user;
Collecting unit, for gathering the identity information of simultaneously identifying user, carries out identity information certification according to identity information;;
Communication unit, carries out account information certification for sending cloud service account information to cloud server.
Wherein, cloud service account information here refers to log in account information during Cloud Server, such as login mailbox, Phone number, user name etc., certainly, the present invention does not limit the particular content of cloud service account information.
Preferably, authentication module 11 is additionally operable to, after receiving the cloud service account information of user's transmission first, send out The key carrying cloud service account information is sent to generate instruction to safety chip 12;
Safety chip 12 is additionally operable to:
Receive after key generates instruction and generate key according to cloud service account information, and by key storage in itself.
It is understood that the cloud service account of different users is different, the cloud service account of each User logs in oneself Carry out the encrypted transmission of Backup Data afterwards, in order to avoid obscuring occurs in the Backup Data between different user, therefore be encrypted solution Key when close should be corresponded with cloud service account, therefore can generate key according to cloud service account information.Certainly, may also be employed Other AESs generate key, but will ensure that generating key is corresponded with cloud service account.
Wherein, collecting unit is specifically for gathering the biological attribute data of identifying user.
It is further known that, collecting unit is specifically for gathering vocal print or fingerprint or the verbal instructions of identifying user.Certainly, with Upper only several preferred versions, may also be employed other kinds of biological attribute data.
Preferably, it is additionally provided with calling module in intelligent terminal, for calling to above modules, this feelings Under condition, above modules independently can not trigger startup, but needs to be called by calling module to start and then enter Row is corresponding to be operated.Certainly, calling module can be also not provided with, the present invention is not construed as limiting to this.
The invention provides a kind of intelligent terminal, after authentication, in the mistake that Backup Data is encrypted with deciphering Using the key being pre-stored within safety chip in journey, obtain key without from cloud server.I.e. encrypting and decrypting During key do not need the localized transmissions beyond intelligent terminal, it is to avoid in transmitting procedure, the stolen situation of key occurs, Substantially reduce the risk that the Backup Data of user is illegally stolen, and, high in the clouds storage ciphertext data, intelligent terminal stores close Key, the two is retained separately, arbitrary be stolen in the case of all can ensure that privacy of user is not compromised, strong security.
It should be noted that in this manual, term " inclusion ", "comprising" or its any other variant are intended to Comprising of nonexcludability, wants so that including a series of process of key elements, method, article or equipment and not only including those Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element that limited by sentence "including a ..." it is not excluded that Also there is other identical element including in the process of described key element, method, article or equipment.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention. Multiple modifications to these embodiments will be apparent from for those skilled in the art, as defined herein General Principle can be realized without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention It is not intended to be limited to the embodiments shown herein, and be to fit to and principles disclosed herein and features of novelty phase one The scope the widest causing.

Claims (10)

1. a kind of cloud encryption storage method of intelligent terminal is it is characterised in that include:
Step s101: authentication operation is carried out to user;After the completion of certification, if receiving the backup instruction of user's transmission, enter Enter step s102;If receiving the recovery instruction of user's transmission, enter step s103;
Step s102: the Backup Data that user selectes is determined according to described backup instruction, deposits in advance according in described intelligent terminal The key of storage is encrypted to described Backup Data, obtains ciphertext data;By described ciphertext data is activation to described cloud service Device;
Step s103: receive the ciphertext data that described cloud server sends, according to the institute prestoring in described intelligent terminal State key the ciphertext data of the described cloud server transmission receiving is decrypted.
2. method according to claim 1 is it is characterised in that the described process that user is carried out with authentication operation is concrete For:
Collection the identity information of identifying user, carry out identity information certification according to described identity information;
The cloud service account information that receive user sends;
Described cloud service account information is sent and carries out account information certification to described cloud server.
3. method according to claim 2 is it is characterised in that the acquisition of the key prestoring in described intelligent terminal Journey particularly as follows:
After receiving the described cloud service account information of user's transmission first, generate described according to described cloud service account information Key, and by described key storage to described intelligent terminal.
4. method according to claim 2 is it is characterised in that described identity information is biological attribute data.
5. method according to claim 4 is it is characterised in that described biological attribute data is specially vocal print, fingerprint, voice Any one in password.
6. a kind of intelligent terminal is it is characterised in that include:
Authentication module, for carrying out authentication operation to user, after the completion of certification, if receive the backup instruction of user's transmission Then sending to safety chip, if receiving the recovery instruction of user's transmission, sending to receiver module;
Described safety chip, for determining, according to described backup instruction, the Backup Data that user selectes, deposits in advance according in itself The key of storage is encrypted to described Backup Data, obtains ciphertext data;According to the described key prestoring in itself docking The ciphertext data that the described cloud server receiving sends is decrypted;
Sending module, for by described ciphertext data is activation to described cloud server;
Described receiver module, for receiving the ciphertext data that described cloud server sends, and sends it to described safe core Piece.
7. intelligent terminal according to claim 6 is it is characterised in that described authentication module specifically includes:
Account receiving unit, the cloud service account information sending for receive user;
Collecting unit, for gathering the identity information of simultaneously identifying user, carries out identity information certification according to described identity information;;
Communication unit, carries out account information certification for sending described cloud service account information to described cloud server.
8. intelligent terminal according to claim 7 is it is characterised in that described authentication module is additionally operable to ought receive use first After the described cloud service account information that family sends, the key generation instruction that transmission carries described cloud service account information is extremely described Safety chip;
Described safety chip is additionally operable to:
Receive after described key generates instruction and generate described key according to described cloud service account information, and described key is deposited Store up in itself.
9. intelligent terminal according to claim 7 is it is characterised in that described collecting unit is specifically for gathering identifying user Biological attribute data.
10. intelligent terminal according to claim 9 is it is characterised in that described collecting unit is used specifically for collection identification The vocal print at family or fingerprint or verbal instructions.
CN201610924964.4A 2016-10-24 2016-10-24 Cloud encryption storage method for intelligent terminal and intelligent terminal Pending CN106357678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610924964.4A CN106357678A (en) 2016-10-24 2016-10-24 Cloud encryption storage method for intelligent terminal and intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610924964.4A CN106357678A (en) 2016-10-24 2016-10-24 Cloud encryption storage method for intelligent terminal and intelligent terminal

Publications (1)

Publication Number Publication Date
CN106357678A true CN106357678A (en) 2017-01-25

Family

ID=57864860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610924964.4A Pending CN106357678A (en) 2016-10-24 2016-10-24 Cloud encryption storage method for intelligent terminal and intelligent terminal

Country Status (1)

Country Link
CN (1) CN106357678A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214206A (en) * 2018-08-01 2019-01-15 武汉普利商用机器有限公司 cloud backup storage system and method
CN109858277A (en) * 2019-01-11 2019-06-07 广州大学 A kind of big data construction storage method and system based on data desensitization
CN111213203A (en) * 2017-10-20 2020-05-29 思睿逻辑国际半导体有限公司 Secure voice biometric authentication
CN112600886A (en) * 2020-12-04 2021-04-02 支付宝(杭州)信息技术有限公司 Privacy protection method, device and equipment with combination of end cloud and device
CN113360948A (en) * 2021-06-30 2021-09-07 令牌云(上海)科技有限公司 Method and device for protecting user secret data
CN117354059A (en) * 2023-12-04 2024-01-05 广州汇通国信科技有限公司 Data sharing method based on cloud edge end cooperation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN102915263A (en) * 2012-10-19 2013-02-06 北京小米科技有限责任公司 Data backup method, system and equipment
CN103685239A (en) * 2013-11-25 2014-03-26 上海斐讯数据通信技术有限公司 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices
CN104661201A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Method, device and system for short message backup, and mobile terminal
CN104660631A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Photo backup method, device and system and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638565A (en) * 2012-02-27 2012-08-15 无锡华赛信息技术有限公司 Mobile phone cloud encryption backup and recovery method based on cloud architecture
CN102915263A (en) * 2012-10-19 2013-02-06 北京小米科技有限责任公司 Data backup method, system and equipment
CN104661201A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Method, device and system for short message backup, and mobile terminal
CN104660631A (en) * 2013-11-19 2015-05-27 中国科学院深圳先进技术研究院 Photo backup method, device and system and mobile terminal
CN103685239A (en) * 2013-11-25 2014-03-26 上海斐讯数据通信技术有限公司 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN103763315A (en) * 2014-01-14 2014-04-30 北京航空航天大学 Credible data access control method applied to cloud storage of mobile devices

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111213203A (en) * 2017-10-20 2020-05-29 思睿逻辑国际半导体有限公司 Secure voice biometric authentication
CN111213203B (en) * 2017-10-20 2021-03-02 思睿逻辑国际半导体有限公司 Secure voice biometric authentication
CN109214206A (en) * 2018-08-01 2019-01-15 武汉普利商用机器有限公司 cloud backup storage system and method
CN109858277A (en) * 2019-01-11 2019-06-07 广州大学 A kind of big data construction storage method and system based on data desensitization
CN112600886A (en) * 2020-12-04 2021-04-02 支付宝(杭州)信息技术有限公司 Privacy protection method, device and equipment with combination of end cloud and device
CN113360948A (en) * 2021-06-30 2021-09-07 令牌云(上海)科技有限公司 Method and device for protecting user secret data
CN117354059A (en) * 2023-12-04 2024-01-05 广州汇通国信科技有限公司 Data sharing method based on cloud edge end cooperation
CN117354059B (en) * 2023-12-04 2024-03-29 广州汇通国信科技有限公司 Data sharing method based on cloud edge end cooperation

Similar Documents

Publication Publication Date Title
CN106656476B (en) Password protection method and device and computer readable storage medium
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
US8930700B2 (en) Remote device secure data file storage system and method
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
CN101958892B (en) Electronic data protection method, device and system based on face recognition
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN103067158A (en) Encryption and decryption method, terminal device, gateway device and key management system
CN102819702B (en) File encryption operation method and file encryption operational system
US9313185B1 (en) Systems and methods for authenticating devices
CN101621794A (en) Method for realizing safe authentication of wireless application service system
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
WO2016045464A1 (en) Decryption method and mobile terminal
CN103701586A (en) Method and device for acquiring secret key
CN104144174B (en) Protect method, user equipment and the server of privacy of user data
KR101358375B1 (en) Prevention security system and method for smishing
CN106101188B (en) A kind of data processing method of network cloud USB flash disk
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
US20040013269A1 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN105812218A (en) Method for realizing multi-VPN-protocol application access, middleware and mobile terminal
KR101680536B1 (en) Method for Service Security of Mobile Business Data for Enterprise and System thereof
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN103997730A (en) Method for decrypting, copying and pasting encrypted data
US20200220867A1 (en) Method for opening a secure session on a computer terminal
CN105743859B (en) A kind of method, apparatus and system of light application certification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125

RJ01 Rejection of invention patent application after publication