Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, user terminal, server and system

A user terminal and data encryption technology, which is applied in the computer field, can solve problems such as user insensitivity, lower acceptance of virtual desktops, uncertain data encryption, etc., and achieve the effect of improving security

Active Publication Date: 2018-02-13
SANGFOR TECH INC
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One of the problems is the risk of leakage caused by centralized storage of user data on the server. Although there are some encryption schemes that can store user data encrypted on the server, users generally have some doubts. First, although the data is encrypted, However, the user has no perception and cannot determine whether the data is really encrypted. Second, even if the data is really encrypted, the secret key is still stored in the server disk. There is a risk of the administrator obtaining the user's confidential data, which will reduce some Acceptance of virtual desktops by users, especially those with confidential data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, user terminal, server and system
  • Data encryption method, user terminal, server and system
  • Data encryption method, user terminal, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the technical solutions and beneficial effects of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0036] The present invention is applied to the VDI system, and the schematic diagram of the virtual desktop infrastructure is as follows figure 1 As shown, including server and user terminal. Among them, the server is also the host machine, which is a physical server running virtualization software, and a virtual machine runs on the virtualization software. It should be noted that the server can be an independent server or a server cluster composed of multiple servers. . The user terminal can be a fat terminal, a thin terminal, or a zero terminal, such as a smart phone, a tablet computer, a desk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data encryption method, a user terminal, a server and a system, and aims to enhance the security of data storage. The method is applied to a virtual desktopinfrastructure (VDI); the VDI comprises a user terminal and a server; and a virtual machine runs on the server. The method in the embodiment of the invention comprises the following steps that: the server receives a login request of the user terminal; the server verifies the login request, and launches the virtual machine; and the virtual machine of the server acquires a key from the user terminal, and encrypts or decrypts a data file which is mounted on the virtual machine. Through adoption of the data encryption method, the user terminal, the server and the system, encryption and decryptionof a virtual desktop personal disk can be controlled through a key on the terminal, and the key used for encrypting and decrypting the data file does not exist in the server, so that an administratorcan be prevented from letting out a secret by taking away a disk storing data and keys, and the security of data storage is enhanced.

Description

technical field [0001] The present invention relates to the computer field, in particular to a data encryption method, user terminal, server and system. Background technique [0002] Virtual Desktop Infrastructure (VDI) is an enterprise-level technology that realizes remote dynamic access of desktop systems and unified hosting of data centers. It does not configure a desktop PC running Windows for each user, but runs several Windows virtual machines on the server in the data center, and each user connects to their virtual machines in a one-to-one manner, and the user's Desktops are virtualized, and users access their desktops as if they were accessing traditional locally installed desktops. [0003] With the development of servers and networks, the application of desktop virtualization technology is becoming more and more extensive. However, in the process of popularization, virtualization technology also brings some new problems. One of the problems is the risk of leakage...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F9/455
CPCG06F9/455H04L63/0428H04L63/0815H04L67/06
Inventor 林海长
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products