File encryption method based on two-dimension code scanning

A file encryption and two-dimensional code technology, which is applied in the field of file encryption, can solve problems such as easy theft and easy forgetting of passwords, and achieve the effects of improving security, improving reliability, and avoiding password leakage

Active Publication Date: 2014-03-26
SHANGHAI PEOPLENET SECURITY TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that the existing static password file encryption method is easy to forget and steal the password, the present invention provides a file encryption method based on two-dimensional code scanning, which transforms the original file encryption method and utilizes PC and mobile The information interaction between the mobile terminal and the authentication server realizes the access authorization to the secure file box that stores multiple files, during which the authorized user name is authenticated multiple times on the mobile terminal and the authentication server, which improves the reliability of electronic file encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption method based on two-dimension code scanning
  • File encryption method based on two-dimension code scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0015] First of all, please refer to FIG. 1. FIG. 1 is a method flow chart of a file encryption method based on two-dimensional code scanning in the present invention, and the file encryption method includes the following steps:

[0016] Step 101: install the safe file box on the PC side, and generate a two-dimensional code for encryption according to the user name, current time, random value and GUID on the PC side, place the two-dimensional code on the interface of the safe file box, The safe file box stores a plurality of files, and the user name is a preset user name that can access the safe file box;

[0017] Step 102: log in to the authentication server through the webpage at the PC end, fill in the registration information on the authentication server page and save it on the authentication server, the registration information includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file encryption method based on two-dimension code scanning. The file encryption method comprises the steps that a safe file box storing a plurality of files is installed on a PC, a two-dimension code for encryption of the safe file box is generated based on a user name, current time, a random value and the overall unique identification GUID of the PC, the user name and a user password are used as a log-on message and are stored on an authentication server, when a user name and a user password for logging onto an APP of a mobile terminal are identical to the user name and the user password of the log-on message respectively, a user is authorized to successfully log onto the APP of the mobile terminal, the APP of the mobile terminal scans the two-dimension code and sends the scanned two-dimension code to the authentication server, the authentication server analyzes the scanned two-dimension code to obtain the user name, and when the user name obtained through analysis is identical to the user name of the log-on message, the user is authorized to access the files stored in the safe file box. According to the file encryption method, the PC and the mobile terminal are coordinated, the user is authorized to access the files stored in the safe file box of the PC based on two-dimension code scanning, and therefore the password for file encryption is prevented from being forgotten or stolen.

Description

technical field [0001] The invention relates to the field of file encryption, in particular to a file encryption method based on two-dimensional code scanning. Background technique [0002] With the development of science and technology and the progress of society, electronic office has become the mainstream office mode. In electronic office, files are the main carrier of information, and people communicate and help each other through files. For some confidential documents, it is often expected that only a small number of authorized users can open and obtain information. The leakage of confidential document information will make the leakage faster and spread faster, thus bringing unnecessary losses to the electronic office units. [0003] In the prior art, no good file confidentiality technology is provided. A popular electronic file encryption method is to authorize users to set static password files or encrypt folders. However, in this way, authorized users tend to forget...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06K7/10
Inventor 谈剑锋张迪丁震宇
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products