Implementation method for encryption file sharing among multiple devices based on two pairs of asymmetric secret keys
An asymmetric key and symmetric key technology, applied in the field of encrypted file sharing between multiple devices
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0015] The present invention will be further described below in conjunction with embodiment:
[0016] The realization method of the encrypted file sharing between multiple devices based on two pairs of asymmetric keys, the method includes the following steps:
[0017] (1) On each USB encryption device, after the user's initialization operation, a pair of asymmetric keys are generated and stored in the internal non-volatile storage area, called "authentication key pair"; The private key cannot be exported, but the public key can be exported; when the file is encrypted, a random symmetric key is assigned to each file;
[0018] (2). When a user's first encryption device logs in to the encrypted cloud disk through the client for the first time, it will automatically become a trusted encryption device. At this time, another pair of asymmetric keys will be generated in the encryption device. Stored in the internal non-volatile storage area, it is called a "symmetric key protection ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More