Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption system, encryption method and decryption method for local area network shared file

A technology for sharing files and encryption systems, which is applied to transmission systems, electrical components, and key distribution to achieve fast transmission, ensure authenticity, and improve efficiency.

Inactive Publication Date: 2011-05-25
博视联(苏州)信息科技有限公司
View PDF4 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a local area network shared file encryption system, which solves the security problems in the prior art that the local area network file sharing causes non-completely disclosed resources to be used by non-permitted users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system, encryption method and decryption method for local area network shared file
  • Encryption system, encryption method and decryption method for local area network shared file
  • Encryption system, encryption method and decryption method for local area network shared file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0042] Such as figure 1 with figure 2 As shown, the local area network shared file encryption system includes a key management module that reads, generates, and manages keys used to encrypt and decrypt files, and an encryption and decryption module that performs encryption and decryption operations according to user instructions. The system also includes identity authentication Module, the identity authentication module verifies the user's identity and determines the user's authority; the user identity authentication module performs encryption and decryption operations through the encryption and decryption module after the identity authentication is legal, and then accesses the shared files in the LAN.

[0043] A database is set in the identity authentication module, including a user table (user table) and a file table (file table). The user table stores all user names and user unique identifiers using the file encryption system, and stores all user names in the file table. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption system for a local area network shared file. The system comprises a secret key management module of a secret key to be used by reading, generating and managing an encryption file, and an encryption and decryption module for performing encryption and decryption according to a user command. The encryption system is characterized by also comprising an identity authentication module used for verifying the identity of a user and determining the authority of the user; and after the identity authentication module verifies that the identity of the user is legal, the encryption and decryption module performs encryption and decryption, and then the local area network shared file is accessed. The system limits the authority that different specified users read different files in shared resources, so that the information safety of resources in the local area network can be effectively guaranteed.

Description

technical field [0001] The invention belongs to the technical field of encryption, and in particular relates to a local area network shared file encryption system and an encryption and decryption method thereof. Background technique [0002] In the prior art, resource sharing is usually realized through file sharing in the local area network. This method not only facilitates the use of users, but also increases the information security of resources. For example, some company-specific files only need specific users. Sharing, and the existing files shared in the local area network are visible and accessible to all users in the local area network, which increases the problem of resource insecurity. [0003] Most of the PC file encryption systems in the existing LAN are encrypted at the application layer. Transparent file encryption technology is based on file system filter driver technology. When users install computer hardware, they often need to install their drivers, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 章登义王江科毛从武
Owner 博视联(苏州)信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products