Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

File safe protection system and method thereof

A security protection and file technology, which is applied in the transmission system and key distribution, can solve the problems that it is difficult to prevent malicious attacks on terminal equipment, cannot effectively resist security threats, and cannot manage keys in a centralized manner, so as to facilitate security audits, avoid identity authentication and Session key negotiation process, the effect of ensuring file confidentiality

Active Publication Date: 2013-03-13
XIDIAN UNIV
View PDF5 Cites 84 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The traditional information security system focuses on defending against external network attacks. At present, many security threats come from inside the network. Due to the negligence and unreasonable behavior of internal personnel, security incidents are increasing. Key information security systems cannot effectively defend against internal security threats;
[0005] 2. Since the information system is composed of three layers: server, network, and terminal, the protection of the three levels in the traditional security system is gradually reduced. Therefore, the monitoring and protection measures for terminal equipment are often relatively simple, and it is difficult to prevent terminal equipment from being attacked. vicious assault;
[0006] 3. The traditional information security system mainly uses security access control technology to prevent possible network attacks. Since the transmitted data itself is not encrypted, the transmitted data may be stolen and cracked by attackers
In the traditional encryption system, the key is distributed and stored in each client terminal, the key cannot be managed centrally, the risk of key management increases and it is difficult to conduct security audits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File safe protection system and method thereof
  • File safe protection system and method thereof
  • File safe protection system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] refer to figure 1 , The file security protection system of the present invention includes: a unified authentication and management server, a certificate server CA, a key management server and a client terminal. The unified authentication and management server, the certificate server CA and the key management server are directly connected to each other to form the server side of the system. The unified authentication and management server is the intermediate node of the entire system. It is directly connected to the client terminal, and all of the client terminal Business requests are processed or forwarded through the unified authentication and management server, among which:

[0055] The unified authentication and management server is used to receive the service request of the client terminal, and communicate with the certificate server CA or the key management server according to the service request, and complete the processing of the following service requests:

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file safe protection system and a method, which mainly solves the problems of network illegal invasion, information stealing and tamping, impersonation and weak deny resistance in the conventional information system. The file safe protection system consists of a unified authentication and management server, a certificate server CA, a secret key management server and a client terminal; the unified authentication and management server is used as a middle node and is used for processing or transmitting a service request sent by the client terminal; the certificate server CA processes a certificate service request of the client terminal and provides basic support for identification; and the secret key management server processes the secrete key service requests of the client terminal and the certificate server CA, and is used for encrypting and decrypting a file for the client terminal and providing parameter support for a digital certificate signed by the certificate server CA. With the adoption of the file safe protection system and method provided by the invention, identification, confidentiality, integration and non-repudiation services can be provided; and the file can be safely protected in transmission, storage, sharing and access processes.

Description

technical field [0001] The invention belongs to the technical field of security, in particular relates to the protection of computer file security, which can be used for security protection of files in information security systems and other environments. Background technique [0002] With the rapid development of network technology and information technology, various network applications, such as: e-commerce, e-government, network office automation, etc. are also constantly improving. More and more traditional work models are migrating to the Internet. This not only accelerates the pace of economic development, but also greatly changes people's work and lifestyle, and improves people's work efficiency and quality of life. [0003] While informatization brings convenience to people, it also brings risks and threats. Security problems such as network illegal intrusion, information theft and tampering, identity forgery and denial have seriously hindered the development of net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 朱辉李晖王勇裴庆祺魏光辉曾栋康毓涛任海刘婷婷
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products