Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File security method in limited area based on position information

A technology of location information and limited area, applied in the field of information security, can solve the problems of difficult expansion, no third party, fixed security area, etc.

Active Publication Date: 2013-11-20
NAT UNIV OF DEFENSE TECH
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The file encryption method based on visible light invented by Xing Zhibo of Beihang University and others in 2011 uses optical communication to encrypt files in a certain area, but this method has the disadvantages of fixed security area and difficult expansion
In 2003, Logan Scott abroad proposed an encryption method based on geographic location information. However, in this method, the two parties communicate directly and there is no third party to monitor. It is not suitable for high security applications such as confidential meetings that require monitoring of the communication process. occasion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security method in limited area based on position information
  • File security method in limited area based on position information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] Such as figure 1 as shown,

[0055] Construct a limited area file security system based on location information, which is composed of user host, security management host, and global positioning system. The user host is the endpoint of the communication network, which is connected to the global positioning system through wireless signals, and the user hosts are connected through the communication network (only one user host is drawn in the figure as an illustration, and there are multiple user hosts in the actual system); security management The host is the core of the entire network, and is connected to the user host and the global positioning system through wireless signals.

[0056] The global positioning system is the existing GPS positioning system, Beidou positioning system, or other positioning systems that can provide location information for user hosts.

[0057] The security management host is a computer used to manage user host communication, on which an oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file security method in a limited area based on position information, which aims at safe communication in a certain area. A file security system in the limited area based on the position information is established at first, wherein the file security system is composed of user hosts, a safety management host and a global positioning system, the safety management host is equipped with a file privilege management program, and each user host is provided with a position information module and a file privilege service program. The security method comprises that the safety management host generates a private key for the user host; a sending part encrypts a message, and a position private key is generated according to a safety area limited by the message; the safety management host determines data validity of a position private key of a receiving part to verify whether the receiving part is in the safety area; and the receiving part decrypts the message in the limited area. The file security method controls the private area via double authentication means including user password and geographical position, and is suitable for secret places as secret conferences and secret rooms.

Description

technical field [0001] The invention relates to a method for securing files in a limited area based on location information, and belongs to the technical field of information security. Background technique [0002] Currently, the State Secrets Law stipulates that top-secret documents can only be accessed at designated locations. Similarly, units related to national security and cutting-edge technology (especially national defense and military industry) also require employees to complete their work in a specified area, and they are not allowed to continue using work resources if they leave the specified physical location. In addition to the requirements of rules and regulations, it is technically necessary to achieve limited area access control, that is, files in the computer can only be accessed in specified areas such as secret rooms, offices, etc. Once the specified area is exceeded, the files in the computer cannot be accessed. Accessed by any user. [0003] The traditi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L9/06
Inventor 付邵静程力张鹏飞叶帅周文浩
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products