[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN102098295A - Method for improving data security under SaaS application - Google Patents

Method for improving data security under SaaS application Download PDF

Info

Publication number
CN102098295A
CN102098295A CN2010106100861A CN201010610086A CN102098295A CN 102098295 A CN102098295 A CN 102098295A CN 2010106100861 A CN2010106100861 A CN 2010106100861A CN 201010610086 A CN201010610086 A CN 201010610086A CN 102098295 A CN102098295 A CN 102098295A
Authority
CN
China
Prior art keywords
user
data
key
server
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010106100861A
Other languages
Chinese (zh)
Inventor
耿振民
刘彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical SHANGHAI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN2010106100861A priority Critical patent/CN102098295A/en
Publication of CN102098295A publication Critical patent/CN102098295A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for improving data security under software-as-a-service (SaaS) application, which comprises the following steps of: allocating a data encryption key for a user during user registration; encrypting the data encryption key by using a public key of a server through a public key algorithm, and keeping the encrypted key by a user; when the user uses the SaaS service, communicating by adopting an encryption communication protocol; and encrypting and decrypting the user data by adopting a symmetrical encryption algorithm, wherein the data encryption key is only transiently saved in a memory of an application program server. In the method for improving the data security under the SaaS application, the encryption key is kept by the user, and due to the adoption of encryption communication, a server manager is prevented from illegally obtaining the key. The encryption and decryption processes are finished in the server, the client load cannot be increased, and any extra software is not needed to be installed. The document data of the user is in a cleartext form in the process of using the service, so operating habits of the user are not influenced.

Description

SaaS uses the method that improves Information Security down
Technical field
The invention belongs to the data security technical field, relate to a kind of method that improves Information Security, relate in particular to a kind of SaaS and use the method that improves Information Security down.
Background technology
The meaning of SaaS (Software-as-a-service) is that software is promptly served, and the Chinese of SaaS is soft battalion or software operation.SaaS is based on the software application pattern that the Internet provides software service.As a kind of software application pattern of the innovation that begins to rise in 21 century, SaaS is the recent tendency of software development in science and technology.The basic structure of SaaS as shown in Figure 1.
Along with the fast development of cloud computing, the SaaS application demand also can increase fast, however the safety problem of user data in server, the service that causes many people dare not use SaaS service provider to provide, therefore the SaaS application and development is obstructed.
Because for the third-party SaaS of user service provider is fly-by-night, particularly the user worries that the confidential information of oneself can serviced management person checks illegally or leak that effectively solution to this problem is with ciphering user data.
Up-to-date data ciphering method is to adopt at server to preserve the user's data key, brings in encryption and decryption by the client.Because key is kept in the server, the keeper that key is easy to serviced device obtains.The computer of user side will certainly increase burden because will carry out frequent encrypting and decrypting, influences the speed of service.Moreover client also need be installed encryption and decryption software piece, and the i.e. service of this and software itself is contradictory.
Summary of the invention
Technical problem to be solved by this invention is: provide a kind of SaaS to use the method that improves Information Security down, neither influence user's normal use habit, can guarantee the safety of user data in server again.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
A kind of SaaS uses the method that improves Information Security down, and described method comprises the steps:
When the user registers, for the user distributes a data encryption key; PKI with server is encrypted this data encryption key with public key algorithm, and the key after will encrypting is transferred to user's keeping;
The user adopts the coded communication protocol communication when using the SaaS service;
Adopt symmetric encipherment algorithm that user's data is carried out encrypting and decrypting, only of short duration preservation in the internal memory in application program clothes device of data encryption key.
As a preferred embodiment of the present invention, described symmetric encipherment algorithm is DES or AES, and its asymmetric arithmetic is RSA or ECC algorithm.
As a preferred embodiment of the present invention, to ciphering user data the time, select the document data of the application program generation of appointment to carry out encryption and decryption.
As a preferred embodiment of the present invention, the user is when opening or preserve data, the data encrypted encryption key of the apps server of service to certificate server application user keeping is provided for the user, and certificate server is again to user applies ciphered data encryption key.
As a preferred embodiment of the present invention, certificate server obtains data encryption key with the private key deciphering of oneself, uses the public key encryption data encryption key of apps server again, hands to apps server again.
As a preferred embodiment of the present invention, apps server obtains data encryption key with own private key deciphering, is used for the encryption and decryption user data.
As a preferred embodiment of the present invention, use coded communication, data can not intercepted and not captured in communication process, data are expressly to show at user side, validated user can normally use the data of oneself, the disabled user promptly enables to obtain the user and has data in the server, and these data also are through what encrypt, can not divulge a secret.
A kind of SaaS uses the method that improves Information Security down, and described method comprises the steps:
Transparent encryption and decryption program is installed in apps server; Adopt symmetric encipherment algorithm,,, read the protecting data encryption of internal memory its data process deciphering of reading in internal memory at program process;
Adopt coded communication between user and the server, when the user registers, give the user, and certificate server is transferred to user oneself keeping again with the public key encryption key of oneself by key of certificate server Random assignment;
After the user logins the web server, open or decipher and enciphered data by the apps server application at the application program place of calling and the encryption key that obtains the user when preserving document; Only of short duration preservation in internal memory of key.
As a preferred embodiment of the present invention, only allow the process operation of safety, the clear data of protection in internal memory can illegally do not read.
Beneficial effect of the present invention is: the SaaS that the present invention proposes uses the method that improves Information Security down, and the data that the user needs protection exist in the data server with the form of encrypting all the time.Encryption key comes keeping by the user, adopts coded communication, avoids server administrators illegally to obtain key.The encryption and decryption process is all finished in server, can not increase the burden of client, need not additionally to install any software.The document data that the user beats when using service is the plaintext form, does not therefore influence user's operating habit.This method is particularly suitable for the not strong portable terminal of operational capability.
Description of drawings
Fig. 1 is the basic structure schematic diagram of SaaS.
Fig. 2 is the user registration course schematic diagram.
Fig. 3 is the process of user login schematic diagram.
Fig. 4 is a transparent encryption and decryption process request for data key flow chart in the apps server.
Fig. 5 is the transparent encryption and decryption flow chart of document.
Fig. 6 is transparent encryption and decryption principle schematic.
Embodiment
Describe the preferred embodiments of the present invention in detail below in conjunction with accompanying drawing.
Embodiment one
The present invention has disclosed a kind of SaaS and has used the method that improves Information Security down, and described method comprises the steps:
When the user registers, for the user distributes a data encryption key; PKI with server is encrypted this data encryption key with public key algorithm, and the key after will encrypting is transferred to user's keeping;
The user adopts the coded communication protocol communication when using the SaaS service;
Adopt symmetric encipherment algorithm that user's data is carried out encrypting and decrypting, only of short duration preservation in the internal memory in application program clothes device of data encryption key.Described symmetric encipherment algorithm is DES or AES, and its asymmetric arithmetic is RSA or ECC algorithm.
Preferably, to ciphering user data the time, select the document data of the application program generation of appointment to carry out encryption and decryption.The user provides the data encrypted encryption key of the apps server of service to certificate server application user keeping for the user when opening or preserve data, certificate server is again to user applies ciphered data encryption key.
Certificate server obtains data encryption key with the private key deciphering of oneself, uses the public key encryption data encryption key of apps server again, hands to apps server again.Perhaps, apps server obtains data encryption key with own private key deciphering, is used for the encryption and decryption user data.
Because use coded communication, data can not intercepted and not captured in communication process, data are expressly to show at user side, so validated user can normally use the data of oneself, the disabled user promptly enables to obtain the user and has data in the server, and these data also are through what encrypt, can not divulge a secret.
Embodiment two
By in data server, adopting transparent encryption and decryption technology, the user's data document is carried out dynamic encryption and decryption, make data in data server, be in encrypted state all the time, then be in expressly state at user side, adopt simultaneously and encrypt communication, and come the keeping data key, do not preserve data key in the application server by user oneself, thereby guarantee neither to influence user's normal use habit, can guarantee the safety of user data in server again.Make the user not worry using the SaaS service can leak the confidential information of oneself, promote the SaaS application and development.
The specific implementation step is as follows:
Transparent encryption and decryption program is installed in apps server.Adopt symmetric encipherment algorithm,,, read the protecting data encryption of internal memory its data process deciphering of reading in internal memory at program process.Transparent encryption is separated principle shown in figure six.
Adopt coded communication between user and the server, when the user registers, give the user, and certificate server is transferred to user oneself keeping again with the public key encryption key of oneself by key of certificate server Random assignment.
After the user logins the web server, open or decipher and enciphered data by the apps server application at the application program place of calling and the encryption key that obtains the user when preserving document.Only of short duration preservation in internal memory of key.
Further, only allow the process operation of safety, the clear data of protection in internal memory can illegally do not read.
Embodiment three
At the apps server end encryption system is installed, system adopts the transparent encryption technology.The user is connected the coded communication of employing HTTPS agreement with server.Transparent encryption adopts symmetry algorithm, can be 3DES or AES etc.Adopt asymmetric arithmetic encrypt user data key, the extended field of available X509 certificate is preserved this key of encrypting, and leaves in user's the certificate.Application program is to certificate server application key, in order to the encryption and decryption user data.The user normally uses service, is not affected.
User's registration step is as follows:
1, as shown in Figure 2, the user is at the web page, the new user that applies for the registration of, and certificate server judges whether to allow registration, if can register then in database, add record, and the response that returns success;
2, meanwhile give data key of user's Random assignment, be used for transparent encryption and decryption, this key is left in the extended field of X509 certificate after with its public key encryption by certificate server, and user's download is also preserved this certificate.
The logging in system by user step is as follows:
Use browser in web page login system, as shown in Figure 3.
The user uses the application program service step as follows:
(1) user is by authentication back login system
(2) user uses application program service, as shown in Figure 5, document opened, preserve, imported, during operation such as derivation, transparent encryption and decryption process can be carried out corresponding encryption and decryption operation;
(3) when carrying out the encryption and decryption operation, need obtain user data key earlier, obtain the user data key process as shown in Figure 4.
In sum, the SaaS that the present invention proposes uses the method that improves Information Security down, and the data that the user needs protection exist in the data server with the form of encrypting all the time.Encryption key comes keeping by the user, adopts coded communication, avoids server administrators illegally to obtain key.The encryption and decryption process is all finished in server, can not increase the burden of client, need not additionally to install any software.The document data that the user beats when using service is the plaintext form, does not therefore influence user's operating habit.This method is particularly suitable for the not strong portable terminal of operational capability.
Here description of the invention and application is illustrative, is not to want with scope restriction of the present invention in the above-described embodiments.Here the distortion of disclosed embodiment and change are possible, and the various parts of the replacement of embodiment and equivalence are known for those those of ordinary skill in the art.Those skilled in the art are noted that under the situation that does not break away from spirit of the present invention or substantive characteristics, and the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts.Under the situation that does not break away from the scope of the invention and spirit, can carry out other distortion and change here to disclosed embodiment.

Claims (9)

1. a SaaS uses the method that improves Information Security down, it is characterized in that described method comprises the steps:
When the user registers, for the user distributes a data encryption key; PKI with server is encrypted this data encryption key with public key algorithm, and the key after will encrypting is transferred to user's keeping;
The user adopts the coded communication protocol communication when using the SaaS service;
Adopt symmetric encipherment algorithm that user's data is carried out encrypting and decrypting, only of short duration preservation in the internal memory in application program clothes device of data encryption key.
2. SaaS according to claim 1 uses the method that improves Information Security down, it is characterized in that:
Described symmetric encipherment algorithm is DES or AES, and its asymmetric arithmetic is RSA or ECC algorithm.
3. SaaS according to claim 1 uses the method that improves Information Security down, it is characterized in that:
To ciphering user data the time, select the document data of the application program generation of appointment to carry out encryption and decryption.
4. use the method that improves Information Security down according to the described SaaS of one of claim 1 to 3, it is characterized in that:
The user provides the data encrypted encryption key of the apps server of service to certificate server application user keeping for the user when opening or preserve data, certificate server is again to user applies ciphered data encryption key.
5. SaaS according to claim 4 uses the method that improves Information Security down, it is characterized in that:
Certificate server obtains data encryption key with the private key deciphering of oneself, uses the public key encryption data encryption key of apps server again, hands to apps server again.
6. SaaS according to claim 5 uses the method that improves Information Security down, it is characterized in that:
Apps server obtains data encryption key with own private key deciphering, is used for the encryption and decryption user data.
7. SaaS according to claim 6 uses the method that improves Information Security down, it is characterized in that:
Use coded communication, data can not intercepted and not captured in communication process, and data are expressly to show at user side, validated user can normally use the data of oneself, the disabled user promptly enables to obtain the user and has data in the server, and these data also are through what encrypt, can not divulge a secret.
8. a SaaS uses the method that improves Information Security down, it is characterized in that described method comprises the steps:
Transparent encryption and decryption program is installed in apps server; Adopt symmetric encipherment algorithm,,, read the protecting data encryption of internal memory its data process deciphering of reading in internal memory at program process;
Adopt coded communication between user and the server, when the user registers, give the user, and certificate server is transferred to user oneself keeping again with the public key encryption key of oneself by key of certificate server Random assignment;
After the user logins the web server, open or decipher and enciphered data by the apps server application at the application program place of calling and the encryption key that obtains the user when preserving document; Only of short duration preservation in internal memory of key.
9. SaaS according to claim 8 uses the method that improves Information Security down, it is characterized in that: only allow the process operation of safety, the clear data of protection in internal memory can illegally do not read.
CN2010106100861A 2010-12-28 2010-12-28 Method for improving data security under SaaS application Pending CN102098295A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010106100861A CN102098295A (en) 2010-12-28 2010-12-28 Method for improving data security under SaaS application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010106100861A CN102098295A (en) 2010-12-28 2010-12-28 Method for improving data security under SaaS application

Publications (1)

Publication Number Publication Date
CN102098295A true CN102098295A (en) 2011-06-15

Family

ID=44131159

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010106100861A Pending CN102098295A (en) 2010-12-28 2010-12-28 Method for improving data security under SaaS application

Country Status (1)

Country Link
CN (1) CN102098295A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036853A (en) * 2011-09-30 2013-04-10 中国移动通信集团公司 Business data transmission method and device and business processing method and device
CN103152346A (en) * 2013-03-12 2013-06-12 中国联合网络通信集团有限公司 Privacy protection method, server and system of massive users
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103685239A (en) * 2013-11-25 2014-03-26 上海斐讯数据通信技术有限公司 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN103746993A (en) * 2014-01-07 2014-04-23 南京大学 Cloud storage data encryption method with client-controlled decryption private key and server-performed encryption and decryption
CN105791954A (en) * 2014-12-23 2016-07-20 深圳Tcl新技术有限公司 Digital television terminal conditional access method and system and terminal
CN105915547A (en) * 2016-06-15 2016-08-31 迅鳐成都科技有限公司 Method for realizing control and leakage prevention of data out of service system
CN107220883A (en) * 2017-06-01 2017-09-29 智象互联(厦门)科技有限公司 A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device
CN108092957A (en) * 2017-12-01 2018-05-29 天脉聚源(北京)科技有限公司 The method and device that message is encrypted
CN108683671A (en) * 2018-05-21 2018-10-19 浙江长投云联信息科技有限公司 A kind of SaaS management system
CN109558743A (en) * 2018-11-27 2019-04-02 广州供电局有限公司 Data guard method, device, computer equipment and the storage medium of mobile terminal
CN110826077A (en) * 2018-08-10 2020-02-21 姚庆梅 Technical architecture scheme for protecting SaaS (software as a service) user data security
CN114338173A (en) * 2021-12-29 2022-04-12 渔翁信息技术股份有限公司 Account registration method, system, equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510888A (en) * 2009-03-19 2009-08-19 阿里巴巴集团控股有限公司 Method, device and system for improving data security for SaaS application
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN101808089A (en) * 2010-03-05 2010-08-18 中国人民解放军国防科学技术大学 Secret data transmission protection method based on isomorphism of asymmetrical encryption algorithm
CN101924739A (en) * 2009-06-10 2010-12-22 北京环球聚浪网络科技有限公司 Method for encrypting, storing and retrieving software certificate and private key

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510888A (en) * 2009-03-19 2009-08-19 阿里巴巴集团控股有限公司 Method, device and system for improving data security for SaaS application
CN101924739A (en) * 2009-06-10 2010-12-22 北京环球聚浪网络科技有限公司 Method for encrypting, storing and retrieving software certificate and private key
CN101771699A (en) * 2010-01-06 2010-07-07 华南理工大学 Method and system for improving SaaS application security
CN101808089A (en) * 2010-03-05 2010-08-18 中国人民解放军国防科学技术大学 Secret data transmission protection method based on isomorphism of asymmetrical encryption algorithm

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036853A (en) * 2011-09-30 2013-04-10 中国移动通信集团公司 Business data transmission method and device and business processing method and device
CN103516516B (en) * 2012-06-28 2017-06-16 中国电信股份有限公司 file security sharing method, system
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103152346A (en) * 2013-03-12 2013-06-12 中国联合网络通信集团有限公司 Privacy protection method, server and system of massive users
CN103152346B (en) * 2013-03-12 2016-01-06 中国联合网络通信集团有限公司 The method for secret protection of mass users, server and system
CN103685239A (en) * 2013-11-25 2014-03-26 上海斐讯数据通信技术有限公司 Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN103746993A (en) * 2014-01-07 2014-04-23 南京大学 Cloud storage data encryption method with client-controlled decryption private key and server-performed encryption and decryption
CN105791954A (en) * 2014-12-23 2016-07-20 深圳Tcl新技术有限公司 Digital television terminal conditional access method and system and terminal
CN105791954B (en) * 2014-12-23 2019-02-01 深圳Tcl新技术有限公司 Digital TV terminal condition receiving method, terminal and system
CN105915547A (en) * 2016-06-15 2016-08-31 迅鳐成都科技有限公司 Method for realizing control and leakage prevention of data out of service system
CN107220883A (en) * 2017-06-01 2017-09-29 智象互联(厦门)科技有限公司 A kind of SAAS motion of defect modes electric business cloud platform system, method of commerce and device
CN108092957A (en) * 2017-12-01 2018-05-29 天脉聚源(北京)科技有限公司 The method and device that message is encrypted
CN108683671A (en) * 2018-05-21 2018-10-19 浙江长投云联信息科技有限公司 A kind of SaaS management system
CN110826077A (en) * 2018-08-10 2020-02-21 姚庆梅 Technical architecture scheme for protecting SaaS (software as a service) user data security
CN109558743A (en) * 2018-11-27 2019-04-02 广州供电局有限公司 Data guard method, device, computer equipment and the storage medium of mobile terminal
CN114338173A (en) * 2021-12-29 2022-04-12 渔翁信息技术股份有限公司 Account registration method, system, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN102098295A (en) Method for improving data security under SaaS application
Jiang et al. A privacy enhanced authentication scheme for telecare medical information systems
CN102655508B (en) Method for protecting privacy data of users in cloud environment
EP2830282B1 (en) Storage method, system and apparatus
WO2017097041A1 (en) Data transmission method and device
CN102571329B (en) Password key management
RU2016104765A (en) PROCESSING PROTECTED REMOTE PAYMENT TRANSACTIONS
CN104270242B (en) A kind of ciphering and deciphering device for network data encryption transmission
CN104253694A (en) Encrypting method for network data transmission
CN108494811A (en) data transmission security authentication method and device
CN110889696A (en) Storage method, device, equipment and medium for alliance block chain secret key based on SGX technology
TW201926943A (en) Data transmission method and system
TW202141309A (en) Blockchain data authorization access method and device
CN107908574A (en) The method for security protection of solid-state disk data storage
CN103559453A (en) Hardware encryption protection method and system for cellphone data
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
US20240232441A1 (en) Executing entity-Specific Cryptographic Code in a Cryptographic
CN108900301A (en) The certification of restful interface security and message mixed encryption method based on .NET MVC
CN108040048A (en) A kind of mobile client end subscriber dynamic secret key encryption communication method based on http protocol
JP2016019233A (en) Communication system, communication device, key managing device and communication method
CN116346318A (en) Data sharing method, sharing device, processor and system thereof
CN107911221A (en) The key management method of solid-state disk data safety storage
CN202495964U (en) Identity authentication system based on mobile terminal
CN106790100B (en) Data storage and access control method based on asymmetric cryptographic algorithm
KR20090024482A (en) Key management system for using content and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110615