File safe sharing method, system and terminal

A file sharing and file technology, applied in the field of network and information security, can solve problems such as potential safety hazards and achieve high security effects

Active Publication Date: 2014-01-15
CHINA TELECOM CORP LTD
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the industry has proposed a method based on shared folders or server-based secure sharing, which can realize secure sharing of encrypted files, but the setting of secure sharing and encryption and decryption proce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File safe sharing method, system and terminal
  • File safe sharing method, system and terminal
  • File safe sharing method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0031] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0032] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0033] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authoriz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file safe sharing method, system and terminal, and relates to the technical field of networks and information safety. The file safe method comprises the steps that a file receiving side obtains an encrypted file copy, the encrypted file copy comprises an original file encrypted by a symmetrical secret key and the symmetrical secret key encrypted by a public key of the file receiving side; a private key of the file receiving side is used for decrypting the encrypted symmetrical secret key and the symmetrical secret key is obtained; the symmetrical secret key is used for decrypting the encrypted original file and an original file is obtained. According to the file safe sharing method, system and terminal, a server does not need to execute the encryption, decryption and verification of the file, point-to-point safe sharing of the file level is achieved, the server side and a service provider cannot obtain the decryption authentication of the file, and therefore safety is higher; in addition, a digital signature using the file sharing method achieves the credibility of the source of the file.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a file security sharing method, system, file receiver terminal and file sender terminal. Background technique [0002] With the rapid development of Internet applications, the value of user data continues to increase. Users have put forward higher requirements for the security of services such as cloud storage. In this context, various encryption technologies, authentication and authorization, access control and other technologies are continuously applied to cloud storage services to ensure the security of user data information. [0003] How to maximize the safe sharing of data information on the basis of ensuring the security of user data information has become a major technical problem faced by information services such as cloud storage. [0004] At present, the industry has proposed a method based on shared folders or server-based secure sharing, whic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/08
Inventor 汪来富沈军金华敏冯明刘国荣罗志强
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products