File security sharing method and system

A file sharing and sharing system technology, applied in the field of network and information security, can solve problems such as potential safety hazards and achieve high security effects

Active Publication Date: 2017-06-16
CHINA TELECOM CORP LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the industry has proposed a method based on shared folders or server-based secure sharing, which can realize secure sharing of encrypted files, but the setting of secure sharing and encryption and decryption processing need to be completed on the server side, requiring system administrators or service providers. Participating in it, there are certain security risks in typical application environments such as cloud computing and multi-tenancy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security sharing method and system
  • File security sharing method and system
  • File security sharing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0031] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0032] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0033] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authoriz...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file security sharing method and system, and relates to the technical fields of network and information security. The method includes: the file receiver obtains a copy of the encrypted file, the encrypted file copy includes the original file encrypted by the symmetric key and the symmetric key encrypted by the public key of the file receiver; Decrypt the encrypted symmetric key to obtain the symmetric key; use the symmetric key to decrypt the encrypted original file to obtain the original file. The file security sharing method, system and terminal of the present disclosure do not require the server to perform file encryption, decryption and verification, and realize file-level point-to-point security sharing. Neither the server nor the service provider can obtain the decryption authority of the file, so the security Higher; at the same time, the data signature of the file sharing party is used to realize the credibility of the file source.

Description

technical field [0001] The invention relates to the technical field of network and information security, in particular to a file security sharing method and system. Background technique [0002] With the rapid development of Internet applications, the value of user data continues to increase. Users have put forward higher requirements for the security of services such as cloud storage. In this context, various encryption technologies, authentication and authorization, access control and other technologies are continuously applied to cloud storage services to ensure the security of user data information. [0003] How to maximize the safe sharing of data information on the basis of ensuring the security of user data information has become a major technical problem faced by information services such as cloud storage. [0004] At present, the industry has proposed a method based on shared folders or server-based secure sharing, which can realize secure sharing of encrypted file...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/08
Inventor 汪来富沈军金华敏冯明刘国荣罗志强
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products