Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File safe distribution method based on universal series bus (USB) flash disk

A technology for safe distribution and file, applied in the direction of digital data protection, digital data authentication, etc., can solve problems such as hindering the value of information, harming the due interests of information copyright owners and legitimate operators, security risks, etc., to strengthen protection and users. Authentication of identity, safe and reliable distribution and use, effect of enhancing reliability

Inactive Publication Date: 2013-05-08
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, digital information is easy to be copied, modified, and distributed. Especially with the development of P2P technology, there are a large number of piracy and infringement behaviors in the dissemination of digital content on the Internet. This behavior consumes potential user resources at a geometric progression rate. Direct damage to the due interests of information copyright owners and legal operators
As a result, many content providers are reluctant to publish valuable digital content on the Internet
The convenience and low cost of obtaining information through abnormal channels and illegal identities directly affects the price and market of information products, inhibiting and hindering the realization of information value
[0004] Traditional digital file protection usually uses some symmetric encryption algorithm to encrypt the file, and then inform the file receiver of the password in plain text. This method is relatively simple to operate, but there are also many security risks: First, when the password is leaked, we will not be able to guarantee the actual password. The person who viewed the file is the legitimate file recipient; secondly, if multiple legitimate file recipients use the same password, we cannot guarantee that the file is only used by one of them; finally, if the file is modified during transmission, Legitimate file recipients will not be able to decrypt and use the file normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File safe distribution method based on universal series bus (USB) flash disk
  • File safe distribution method based on universal series bus (USB) flash disk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] Example 1. After a registered user obtains an encrypted file in a special format, the process of using the client to open the file is as follows:

[0076] first part

[0077] 1) User management. Manage user information, only registered users can use Excel files normally.

[0078] 2) Data export. Re-encode the original Excel file with a special encoding method to generate a file in a custom format.

[0079] 3) File encryption. Use the password of the registered user as the key to encrypt the content of the Excel file to generate a ciphertext file. Perform MD5 hash on the content of the Excel file and encrypt the obtained MD5 value.

[0080] 4) Certified U disk production. Use the serial number of the U disk chip as the key to re-encrypt the user password of the registered user, and store the obtained ciphertext in the system sector of the U disk to make an authenticated U disk.

[0081] The steps are:

[0082] Step 1: User registration, each user defines the use...

Embodiment 2

[0126] Example 2. The procedure for a registered user to modify the personal password and update the authentication U disk is as follows:

[0127] first part

[0128] 1) User management. Manage user information, only registered users can use Excel files normally.

[0129] 2) Data export. Re-encode the original Excel file with a special encoding method to generate a file in a custom format.

[0130] 3) File encryption. Use the password of the registered user as the key to encrypt the content of the Excel file to generate a ciphertext file. Perform MD5 hash on the content of the Excel file and encrypt the obtained MD5 value.

[0131] 4) Certified U disk production. Use the serial number of the U disk chip as the key to re-encrypt the user password of the registered user, and store the obtained ciphertext in the system sector of the U disk to make an authenticated U disk.

[0132] The steps are:

[0133] Step 1: User registration, each user defines the user password Key1; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a file safe distribution method based on a universal series bus (USB) flash disk. Validity of a user identity is confirmed based on identity authentication based on a USB flash disk chip serial number, and the safe distribution and safe use of an Excel file is ensured by using methods of a custom specific code, message digest (MD) 5 validation, secondary encryption and the like. In the process of distribution and use of the Excel file, the file safe distribution method based on the USB flash disk enhances the protection to file contents and the authentication of the user identity, and enables the Excel file to be distributed and used safely and reliably. The USB flash disk chip serial number instead of a computer hard disk serial number is bound, and convenience is achieved as the USB flash disk is easy to carry and can be used in different computers by a user.

Description

technical field [0001] The invention belongs to an Excel file distribution method, in particular to a U disk-based file security distribution method, in particular to a safe and confidential Excel file distribution. Background technique [0002] With the rapid development of computer technology and Internet technology, the digitization of information has shown incomparable advantages in information storage, processing, analysis and mining. At the same time, more and more digital content such as electronic documents, music, movies, pictures, and software are traded and disseminated online, and the network and multimedia have gradually become an important way for people to obtain and enjoy rich content. [0003] However, digital information is easy to be copied, modified, and distributed. Especially with the development of P2P technology, there are a large number of piracy and infringement behaviors in the dissemination of digital content on the Internet. This behavior consume...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/34G06F21/62
Inventor 谷建华周兴社赵天海王云岚王川崔齐王涛李秀春
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products