Sensitive data secure sharing and self-destroying method for cloud storage system
A cloud storage system, sensitive data technology, applied in transmission systems, electrical components, etc., can solve the problem of suspicious SSDD solution security and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] The present invention will be further described below through specific embodiments in conjunction with the accompanying drawings. These embodiments are only used to illustrate the present invention, and are not intended to limit the protection scope of the present invention.
[0060] Such as figure 1 As shown, a method for safe sharing and self-destruction of sensitive data in a cloud storage system includes the following steps:
[0061] Step 1: Design cloud storage system security sharing and self-destruct system;
[0062] Such as figure 2 As shown, the system includes: data owner 1, which is the owner of sensitive data; cloud storage system manager 2, which is responsible for the safe sharing of sensitive data in the cloud storage system; cloud storage server 3, which is used to store the cloud storage system All sensitive data; time server 4, which is used for setting and verifying the use time of the sensitive data ciphertext, and, data user 5, which is the user ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com