CN106790145B - A kind of cloud Data Hosting system and cloud Data Hosting method - Google Patents

A kind of cloud Data Hosting system and cloud Data Hosting method Download PDF

Info

Publication number
CN106790145B
CN106790145B CN201611237063.4A CN201611237063A CN106790145B CN 106790145 B CN106790145 B CN 106790145B CN 201611237063 A CN201611237063 A CN 201611237063A CN 106790145 B CN106790145 B CN 106790145B
Authority
CN
China
Prior art keywords
data
fort
sent
cloud
providing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611237063.4A
Other languages
Chinese (zh)
Other versions
CN106790145A (en
Inventor
张苗磊
宋翔
邱模炯
叶理灯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Excellent Polytron Technologies Inc
Original Assignee
Excellent Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Excellent Polytron Technologies Inc filed Critical Excellent Polytron Technologies Inc
Priority to CN201611237063.4A priority Critical patent/CN106790145B/en
Publication of CN106790145A publication Critical patent/CN106790145A/en
Application granted granted Critical
Publication of CN106790145B publication Critical patent/CN106790145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of cloud Data Hosting system, including data providing, storage server and data fort;Wherein, data providing is configured to encrypt clear data, and ciphertext data are stored in storage server, sends data and uses instruction to storage server;Storage server is configured to that ciphertext data are sent in data fort using instruction according to data;Data providing is further configured to data processing method and decruption key being sent to data fort, to be decrypted to the ciphertext data and generate clear data, the clear data carries out corresponding data processing in the data fort according to the data processing method, and obtains data processed result.The invention also discloses a kind of cloud Data Hosting methods.

Description

A kind of cloud Data Hosting system and cloud Data Hosting method
Technical field
The invention belongs to cloud storage fields, and in particular, to a kind of cloud Data Hosting system and cloud Data Hosting side Method.
Background technique
Internet era falls over each other the focus developed and used for all trades and professions are become using big data as the commercial value of core. Big data be unable to do without cloud computing, and cloud computing provides the prolongable infrastructure device of elasticity for big data.Based on extension storage ability The considerations of with management cost is reduced, it is a very economical selection that big data, which is stored on cloud,.But for safe and secret Consider, it is still a challenge that Data Hosting preservation is carried out on cloud.
There are as below methods for traditional cloud data preservation:
1. the cloud storage service directly provided using cloud service manufacturer.This kind of service is directly by initial data with clear data Form storage beyond the clouds.Although the limitation of the not no resource capacity of this storage mode, and it is convenient for management.But since it is straight It connects clear data storage beyond the clouds, there are huge leaking data risks.
2. being stored using the cloud store-service provided with cloud service manufacturer by data encryption, and in the form of ciphertext data Beyond the clouds.Although this mode increases the safety of data but due to cannot directly operate to data, management is not square Just.
3. applying for virtual cloud host to cloud service manufacturer, store data in privately owned cloud host, it is only using virtual machine Vertical property provides opposite data access insulation blocking.Although this mode substantially increases the safety of data, but to capacity Restricted, management is inconvenient, and is highly detrimental to externally provide data service.
Fort machine or data fort are one under particular network environment, can Logistics networks and data not by outside The server invaded and destroyed with internal user.With the appearance of fort machine, the safety of data is improved to a certain extent. The existing data guard method using fort machine usually connects fort machine between clients and servers, by client-side System manager obtain server in data, and by server data store into fort machine, receiving client It when holding the access instruction sent, is accessed according to the permission of the target data of client access to data, as long as having to data The client having permission can access.This mode to a certain extent in the operability for increasing data, but due to Client with permission can access data, cause the unstable of data to a certain extent, to increase data Disclosure risk.Patent document CN104796432A provides a kind of data guard method and safe fort machine, and fort machine is connected On path between clients and servers, by setting the severity level of each data, setting fault is greater than to severity level The data of value establish accesses control list, to guarantee the safety of data.Although the method has the safety of data certain It improves, still, once client has corresponding permission, then the accessible clear data of the client can also be right easily Clear data is directly operated and is modified, so that the safety of clear data reduces.
Summary of the invention
The technical issues of in order to solve in the prior art, the present invention provides a kind of cloud Data Hosting systems, including number According to provider, storage server for storing data and internal data not corrupted data fort is protected;
Wherein, data providing is configured to encrypt clear data, forms ciphertext data, and ciphertext data are stored In storage server, and when needing using clear data, sends data and use instruction to storage server;
Storage server is configured to that ciphertext data are sent in data fort using instruction according to data, data providing It is further configured to data processing method and the decruption key that ciphertext data are decrypted being sent to data fort, data fort Base is configured to that decruption key is decrypted in data fort to ciphertext data and generates clear data, make clear data according to Data processing method carries out corresponding data processing in data fort, and obtains data processed result.
Data Hosting system in cloud of the present invention, data processing method are set by data providing.
Data Hosting system in cloud of the present invention, data processing method are set by data requirements side, and are needed by data The side of asking is sent to the data providing.
Data Hosting system in cloud of the present invention, data fort, which is configured to data processed result being sent to data, to be mentioned Supplier, data providing are configured to that data requirements side will be sent to from the received data processed result of data fort.
Data Hosting system in cloud of the present invention, data fort are configured to for data processed result to be sent to storage clothes Business device;Storage server is further configured to that data requirements side will be sent to from the received data processed result of data fort.
Data Hosting system in cloud of the present invention, data fort be further configured to send data processed result it Afterwards, data processed result and clear data in data fort are deleted.
The present invention also provides a kind of cloud Data Hosting methods, include the following steps:
Data providing encrypts clear data, forms ciphertext data, and ciphertext data are stored in cloud service provider Storage server on;
Data providing sends data according to data processing request and uses instruction to storage server;
Storage server according to data using instruction by ciphertext data from being sent in storage server in data fort;
Data processing method and the decruption key that ciphertext data are decrypted are sent to data fort by data providing, To which decruption key is decrypted to ciphertext data in data fort and generates clear data, clear data is according to data processing Mode carries out corresponding data processing in data fort, and obtains data processed result.
Data Hosting method in cloud of the present invention further comprises the steps of: data fort and is sent to data processed result Data providing, data providing will be sent to data requirements side from the received data processed result of data fort.
Data Hosting method in cloud of the present invention further comprises the steps of: data fort and is sent to data processed result Storage server, storage server will be sent to data requirements side from the received data processed result of data fort.
Data Hosting method in cloud of the present invention, after further comprising the steps of: data fort transmission data processed result, Delete data processed result and clear data in data fort.
Preferably, the data providing encrypts clear data using public key, and decruption key is to match with public key Private key.
Technical effect of the invention are as follows: by encrypting to clear data, encrypted ciphertext data are stored in cloud In the storage server of service provider, the risk of cloud service provider leakage clear data is reduced, ensures that the peace of clear data Entirely.
Meanwhile the treatment process of data is all placed in data fort, can only be obtained as third-party data requirements side Final data processed result.Original plaintext data are generated in data fort, are used, and in data fort after use In be deleted, the whole life cycle of clear data all carries out in data fort, do not pass through protection service boundary reach The external world, so that it is guaranteed that original clear data is not revealed to third party, to be number while externally providing data service Double shield is provided according to safety.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of Data Hosting system in cloud of the present invention;
Fig. 2 is the flow chart of Data Hosting method in cloud of the present invention;
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The description of specific distinct unless the context otherwise, although the step in the present invention is arranged with label, simultaneously It is not used in the precedence for limiting step, the order of step or the execution of certain step need other steps unless expressly stated Based on, otherwise the relative rank of step is adjustable.
The structural schematic diagram of Data Hosting system in cloud of the present invention is shown with reference to Fig. 1 and Fig. 2, Fig. 1, Fig. 2 shows The flow chart of the method for cloud Data Hosting is gone out to carry out using the cloud Data Hosting system.Wherein, of the present invention Cloud Data Hosting system includes data providing 1, storage server 2 and the data fort for protecting internal data not to be destroyed 3, wherein the quick transmission of data can be carried out between storage server 2 and data fort 3.
Data providing 1 is configured to encrypt clear data and formed ciphertext data, and ciphertext data are stored in In storage server, and when needing using clear data, sends data and use instruction to storage server 2.
Storage server 2 is configured to the data sent according to data providing 1 and ciphertext data is sent to number using instruction According in fort 3.
Data providing 1 is further configured to send out by data processing method and to the decruption key that ciphertext data are decrypted It send into data fort 3.
Data fort 3 is configured to that decruption key is decrypted in data fort 3 to ciphertext data and generates plaintext number According to, and so that clear data is carried out corresponding data processing in data fort 3 according to data processing method, and obtain data processing As a result.Wherein, the processing mode of data can be statistics, analysis, screening, verifying and/or the calculating etc. of data, and the present invention is to this It is not construed as limiting.In one embodiment of the invention, data processing method is a kind of data for fixation that data providing 1 is set Processing mode.In another embodiment of the present invention, data processing method is set by data requirements side, and by data requirements side It is sent to data providing 1.
Data fort 3 is further configured to for data processed result to be sent to data providing 1, and data providing 1 will count Data requirements side is sent to according to processing result.In a modification of the invention, data fort 3 is also configured as data Processing result is sent to storage server 2, and storage server 2 is configured to data processed result being sent to data requirements side.Tool Body, for example, storage server 2 is configurable to that extraction code is arranged to data processed result, and extraction code is sent to data Provider 1, and extraction code is sent to data requirements side by data providing 1, and data requirements root is according to extraction code from storage server 2 Obtain data processed result.In other examples of the invention, data requirements side can be taken by other verification modes from storage Data processed result is extracted in business device 2.According to the modification, when data processed result inconvenience is obtained by data providing, For example, data processed result can be sent to storage server 2 by data fort 3 when occupying larger memory space, need data The side of asking directly obtains data processed result from storage server 2.
Data fort 3 is further configured to after sending data processed result, is deleted at the data in data fort 3 Manage result and clear data.That is, clear data is generated in data fort, is used, and in data after use It is deleted in fort 3, the whole life cycle of clear data all carries out in data fort 3, so that it is guaranteed that original plaintext number According to will not reveal.
The present invention also provides a kind of cloud Data Hosting methods, include the following steps:
S101, data providing encrypt clear data, form ciphertext data, and ciphertext data are stored in cloud clothes It is engaged in the storage server of quotient.
Specifically, in the present embodiment, data providing is to initial data (the plaintext number that can carry out data processing According to) encrypted, and the ciphertext data after encryption are stored in the storage server of cloud service provider.In the present embodiment, Using public and private key enciphered method, clear data is encrypted using public key.In other embodiments of the invention, can also make With other encryption methods.By encrypting to original clear data, encrypted ciphertext data are stored in cloud service provider Storage server in, reduce cloud service provider leakage clear data risk, ensure that the safety of clear data.
S102, data providing send data and use instruction to storage server.
In one embodiment of the invention, data using instruction may include required processing data area, data kind The parameters such as class.
Ciphertext data are sent in data fort according to data using instruction by S103, storage server.
Data processing method and the decruption key that ciphertext data are decrypted are sent to data by S104, data providing Fort.The processing mode of data can be statistics, analysis, screening, verifying and/or the calculating etc. of data, and the present invention does not make this It limits.In one embodiment of the invention, data processing method is a kind of data processing of fixation of data providing setting Mode.In another embodiment of the present invention, data processing method is set by data requirements side, and is sent by data requirements side To data providing.
S105, decruption key are decrypted to ciphertext data in data fort and generate clear data, and clear data is pressed Corresponding data processing is carried out in data fort according to data processing method, and obtains data processed result.
In the present embodiment, decruption key is the private key with the public key pairing for encryption.So utilization is of the present invention Data Hosting method, clear data only generates and uses in data fort, and the boundary for not passing through data fort reaches outer Boundary ensure that the safety of data so that it is guaranteed that clear data will not be revealed.
Data processed result is sent to data providing by S106, data fort, and data providing is by data processed result It is sent to data requirements side.Specifically, data processed result is sent to data providing, then by data providing by data processing As a result it is sent to data requirements side, such data requirements side does not have to extract data by entering data fort, further ensure The safety of data.
In a modification of the invention, data processed result can also be sent to storage server by data fort, Data processed result is sent to data requirements side by storage server again.Specifically, for example, storage server can be to data Extraction code is arranged in processing result, and extraction code is sent to data providing, and extraction code is sent to data and needed by data providing The side of asking, data requirements root obtain data processed result from storage server according to extraction code.In other examples of the invention, deposit Data processed result can also be sent to data requirements side by other verification modes by storage server.According to the modification, When data processed result inconvenience is obtained by data providing, for example, can make data fort will when occupying larger memory space Data processed result is sent to storage server, and data requirements side is made directly to obtain data processed result from storage server.
S107 after data fort sends data processed result, deletes data processed result in data fort and bright Literary data.That is, clear data generates in data fort, use, and deleted in data fort after use It removes, the whole life cycle of clear data all carries out in data fort, so that it is guaranteed that original clear data will not be revealed.
Data Hosting method according to the present invention will be encrypted by encrypting to original clear data Ciphertext data are stored in the storage server of cloud service provider, the risk of cloud service provider leakage clear data are reduced, thus really The safety of clear data is protected.
Meanwhile the treatment process of data is all placed in data fort, and final number can only be obtained as data requirements side According to processing result.Original plaintext data are generated in data fort, are used, and are deleted in data fort after use It removes, the whole life cycle of clear data all carries out in data fort, and the boundary for not passing through data fort reaches the external world, from And ensure that original clear data will not be revealed, to provide while externally providing data service for data safety dual It ensures.
The principle of the present invention and its function is only illustrated in above-described embodiment, and is not intended to limit the present invention.It is any ripe The personnel for knowing this technology all without departing from the spirit and scope of the present invention, carry out modifications and changes to above-described embodiment.Cause This, those of ordinary skill in the art completed without departing from the spirit and technical ideas disclosed in the present invention all equivalent repair Decorations change, still within the scope of the claims of the present invention.

Claims (13)

1. a kind of cloud Data Hosting system, which is characterized in that including data providing, storage server for storing data With protect internal data not corrupted data fort;
Wherein, the data providing is configured to carry out clear data encryption and forms ciphertext data, and by the ciphertext data It is stored in the storage server, and when needing using the clear data, sends data and deposited using instruction to described Store up server;
The storage server is configured to that the ciphertext data are sent to the data fort using instruction according to the data In;
The data providing is further configured to data processing method and the decryption that the ciphertext data are decrypted is close Key is sent to the data fort;
The data fort is configured to that the decruption key is decrypted the ciphertext data simultaneously in the data fort The clear data is generated, and carries out the clear data in the data fort according to the data processing method accordingly Data processing, to obtain that the data processed result of data requirements side will be sent to.
2. Data Hosting system in cloud as described in claim 1, which is characterized in that the data processing method is by the data Provider's setting.
3. Data Hosting system in cloud as described in claim 1, which is characterized in that the data processing method is by data requirements Side's setting, and the data providing is sent to by the data requirements side.
4. Data Hosting system in cloud as described in claim 1, which is characterized in that
The data fort is further configured to the data processed result being sent to the data providing,
The data providing is further configured to that number will be sent to from the received data processed result of the data fort According to party in request.
5. Data Hosting system in cloud as described in claim 1, which is characterized in that
The data fort is further configured to the data processed result being sent to the storage server;
The storage server is further configured to that number will be sent to from the received data processed result of the data fort According to party in request.
6. Data Hosting system in cloud as described in claim 4 or 5, which is characterized in that the data fort further configures To delete the data processed result in the data fort and the plaintext after sending the data processed result Data.
7. a kind of cloud Data Hosting method, which is characterized in that include the following steps:
Data providing encrypts clear data, forms ciphertext data, and the ciphertext data are stored in storage service On device;
The data providing sends data and uses instruction to the storage server;
The ciphertext data are sent in data fort according to the data using instruction by the storage server;With
Data processing method and the decruption key that the ciphertext data are decrypted are sent to described by the data providing Data fort, so that the decruption key is decrypted the ciphertext data in the data fort and generates the plaintext Data, the clear data carry out corresponding data processing in the data fort according to the data processing method, with To the data processed result that will be sent to data requirements side.
8. Data Hosting method in cloud as claimed in claim 7, which is characterized in that the data processing method is by the data Provider's setting.
9. Data Hosting method in cloud as claimed in claim 7, which is characterized in that the data processing method is by data requirements Side's setting, and the data providing is sent to by the data requirements side.
10. Data Hosting method in cloud as claimed in claim 7, which is characterized in that further comprise the steps of:
The data processed result is sent to the data providing by the data fort;
The data providing will be sent to data requirements side from the received data processed result of the data fort.
11. Data Hosting method in cloud as claimed in claim 7, which is characterized in that further comprise the steps of:
The data processed result is sent to the storage server by the data fort;
The storage server will be sent to data requirements side from the received data processed result of the data fort.
12. Data Hosting method in cloud as described in claim 10 or 11, which is characterized in that further comprise the steps of:
After the data fort sends the data processed result, the data processing knot in the data fort is deleted Fruit and the clear data.
13. Data Hosting method in cloud as claimed in claim 7, which is characterized in that the data providing uses public key pair Clear data is encrypted, and the decruption key is the private key matched with the public key.
CN201611237063.4A 2016-12-28 2016-12-28 A kind of cloud Data Hosting system and cloud Data Hosting method Active CN106790145B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611237063.4A CN106790145B (en) 2016-12-28 2016-12-28 A kind of cloud Data Hosting system and cloud Data Hosting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611237063.4A CN106790145B (en) 2016-12-28 2016-12-28 A kind of cloud Data Hosting system and cloud Data Hosting method

Publications (2)

Publication Number Publication Date
CN106790145A CN106790145A (en) 2017-05-31
CN106790145B true CN106790145B (en) 2019-02-12

Family

ID=58924917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611237063.4A Active CN106790145B (en) 2016-12-28 2016-12-28 A kind of cloud Data Hosting system and cloud Data Hosting method

Country Status (1)

Country Link
CN (1) CN106790145B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107229864A (en) * 2017-06-26 2017-10-03 上海优刻得信息科技有限公司 Data processing method, device, system and storage medium
CN109660490A (en) * 2017-10-10 2019-04-19 优刻得科技股份有限公司 Data processing method, device, system and storage medium
CN108009811B (en) * 2017-11-30 2021-06-04 中国人民解放军国防科技大学 Inter-cloud computing environment value exchange-oriented cross-chain communication method
CN110035061A (en) * 2019-03-07 2019-07-19 北京华安普特网络科技有限公司 Trust server information processing method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103401871A (en) * 2013-08-05 2013-11-20 苏州大学 Method and system for sequencing ciphertexts orienting to homomorphic encryption
CN103457733A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data sharing method and system under cloud computing environment
WO2014159750A1 (en) * 2013-03-14 2014-10-02 Amazon Technologies, Inc. Providing devices as a service
CN104092672A (en) * 2014-06-26 2014-10-08 安徽云盾信息技术有限公司 Method for encrypting and decrypting information by means of ciphertext storage gateway
CN106209354A (en) * 2016-06-28 2016-12-07 电子科技大学 A kind of support attribute hide can verify that attribute base encrypt outsourcing scheme

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014159750A1 (en) * 2013-03-14 2014-10-02 Amazon Technologies, Inc. Providing devices as a service
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103401871A (en) * 2013-08-05 2013-11-20 苏州大学 Method and system for sequencing ciphertexts orienting to homomorphic encryption
CN103457733A (en) * 2013-08-15 2013-12-18 中电长城网际系统应用有限公司 Data sharing method and system under cloud computing environment
CN104092672A (en) * 2014-06-26 2014-10-08 安徽云盾信息技术有限公司 Method for encrypting and decrypting information by means of ciphertext storage gateway
CN106209354A (en) * 2016-06-28 2016-12-07 电子科技大学 A kind of support attribute hide can verify that attribute base encrypt outsourcing scheme

Also Published As

Publication number Publication date
CN106790145A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US10462114B2 (en) System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading
CN107959567B (en) Data storage method, data acquisition method, device and system
CN107113286B (en) Cross-device roaming content erase operation
KR102185350B1 (en) Network node and method for operating the network node
US9219722B2 (en) Unclonable ID based chip-to-chip communication
CN102685093B (en) A kind of identity authorization system based on mobile terminal and method
US9703965B1 (en) Secure containers for flexible credential protection in devices
Belguith et al. Enhancing data security in cloud computing using a lightweight cryptographic algorithm
CN106790145B (en) A kind of cloud Data Hosting system and cloud Data Hosting method
US20120254622A1 (en) Secure Access to Electronic Devices
CN109587101A (en) A kind of digital certificate management method, device and storage medium
CN109472130A (en) Linux cipher management method, middle control machine, readable storage medium storing program for executing
CN104468562A (en) Portable transparent data safety protection terminal oriented to mobile applications
Kumar et al. Data outsourcing: A threat to confidentiality, integrity, and availability
Athena et al. Survey on public key cryptography scheme for securing data in cloud computing
Nalinipriya et al. Extensive medical data storage with prominent symmetric algorithms on cloud-a protected framework
Thilakanathan et al. Secure multiparty data sharing in the cloud using hardware-based TPM devices
Junghanns et al. Engineering of secure multi-cloud storage
Gupta et al. Cloud computing: Security threats & control strategy using tri-mechanism
Ennajjar et al. Security in cloud computing approaches and solutions
CN106257858A (en) The data ciphering method of a kind of remote storage device, Apparatus and system
US11032708B2 (en) Securing public WLAN hotspot network access
CN105187379A (en) Multi-party distrust-based password split managing method
Anitha et al. Data storage lock algorithm with cryptographic techniques
CN111181831B (en) Communication data processing method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 200090 Room 201, 10 B, 619 Longchang Road, Yangpu District, Shanghai.

Applicant after: Excellent Polytron Technologies Inc

Address before: 200090 Shanghai city Yangpu District road 619 Longchang city concept 10 Building 7 block B block.

Applicant before: SHANGHAI UCLOUD INFORMATION TECHNOLOGY CO., LTD.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant