Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information protection method for unconnected system

A technology of encryption system and manager, applied in key distribution, which can solve problems such as difficulty in ensuring system reliability

Inactive Publication Date: 2012-10-10
TSINGHUA TONGFANG CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) The controllability of disconnected systems makes it possible for only authorized systems to operate and use secret data
To solve the second problem, authorization technology can be used, that is, through the authorization and identity identification of related systems, it can obtain the legal operation right of secret data, but it is difficult to guarantee the reliability of system authorization when the systems are not connected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method for unconnected system
  • Information protection method for unconnected system
  • Information protection method for unconnected system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] see figure 1 , the device applying the method of the present invention is composed of an authorization management system A, a plurality of encryption systems B and a plurality of decryption systems C which are not connected to each other. Authorization management system A is composed of encryption authorization manager 1 and decryption authorization manager 2; encryption system B is composed of encryption authorization file manager 3, data encryption manager 4 and data release manager 5; decryption system C is managed by decryption authorization file Device 6, decryption key manager 7 and data decryption manager 8. Authorization management system A performs authorization management on encryption system B and decryption system C, encryption system B encrypts and publishes secret data, and decryption system C decrypts and utilizes secret data.

[0026] see figure 2 and image 3 , the steps of the information protection method of the present invention are:

[0027] 1)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information protection method for an unconnected system and relates to the information system field. The information protection method comprises the steps of: 1) system authorization, wherein encrypted authorization files are transmitted to an encryption authorization file manager by an encryption authorization manager; decrypted authorization files are transmitted to a decryption authorization file manager by a decryption authorization manager; decrypted key files are transmitted to the decryption authorization file manager by the decryption authorization manager; 2) information encryption and decryption treatment, wherein the plaintext of confidential data is encrypted by a data encryption manager; the ciphertext of confidential data is bound to the exequatur of an encryption system by a data distribution manager; the distribution file of confidential data is obtained by a decryption system; a decryption key manager analyzes the distribution file so as to obtain and decrypt the ciphertext of confidential data; a data decryption manager deciphers the ciphertext so as to obtain the plaintext of confidential data. The invention adopts dual-key asymmetric encryption technique to realize the safe transfer and illegal utilization of confidential data among unconnected systems, also guarantees the authorization safety and stability of the system.

Description

technical field [0001] The invention relates to the field of information systems, in particular to an information security protection method for disconnected systems. Background technique [0002] In the field of information, a disconnected system refers to a system without a signal or data channel directly used for information transmission and information feedback between systems. Information security protection technology for disconnected systems is a technology to ensure the safe transfer and legal use of secret data between disconnected systems. It is a challenging technology, and it needs to solve the following two problems: [0003] (1) The security protection of secret data, so that secret data can be safely transmitted, safely stored, and legally used; [0004] (2) The controllability of disconnected systems makes it possible for only authorized systems to operate and use secret data. [0005] In the prior art, encryption technology can be used to solve the first p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 陆驿石晶陆达
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products