Unlock instant, AI-driven research and patent intelligence for your innovation.

Implementation method for encryption file sharing among multiple devices based on two pairs of asymmetric secret keys

An asymmetric key and symmetric key technology, applied in the field of encrypted file sharing between multiple devices

Inactive Publication Date: 2014-03-26
安徽云盾信息技术有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Files encrypted on any client of a user need to be decrypted on other clients of the user; a trust relationship is established between encryption devices through the Internet; the main problem to be solved by this patent is: an encryption device After gaining trust, how can it be used to decrypt all files on the encrypted cloud disk of the user immediately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be further described below in conjunction with embodiment:

[0016] The realization method of the encrypted file sharing between multiple devices based on two pairs of asymmetric keys, the method includes the following steps:

[0017] (1) On each USB encryption device, after the user's initialization operation, a pair of asymmetric keys are generated and stored in the internal non-volatile storage area, called "authentication key pair"; The private key cannot be exported, but the public key can be exported; when the file is encrypted, a random symmetric key is assigned to each file;

[0018] (2). When a user's first encryption device logs in to the encrypted cloud disk through the client for the first time, it will automatically become a trusted encryption device. At this time, another pair of asymmetric keys will be generated in the encryption device. Stored in the internal non-volatile storage area, it is called a "symmetric key protection ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an implementation method for encryption file sharing among multiple devices based on two pairs of asymmetric secret keys. The method comprises the following steps: 1, on each USB encryption device, one pair of asymmetric secret keys is generated; 2, when a first encryption device of a user logs in an encryption cloud disc through a client for a first time, the first encryption device automatically changes to a trusted encryption device, and at the moment, the other pair of the asymmetric secret keys is generated in the encryption device and the other pair of the asymmetric secret keys is used to protect encrypt a symmetric secret key for encryption of all subsequent files; 3, the first trusted encryption device carries out trust recognition operation of a to-be-trusted encryption device; and 4, with use of the above same method, transmission of "symmetric key protection secret key pair" between any trusted encryption device and untrusted encryption device is completed. The beneficial effects of the invention are that: according to the invention, after the encryption device is trusted, the encryption device can be immediately used to decode all files of the user on the encryption cloud disk.

Description

technical field [0001] The invention relates to a method for realizing encrypted file sharing among multiple devices, in particular to a method for realizing trust establishment between mobile encrypted devices based on the Internet. Background technique [0002] In the implementation process of encrypted cloud disk, the user scenario and the problem to be solved are: a user has multiple clients (PC or mobile device), and each client is plugged with a hardware encryption device (USB or TF card interface form) ; Each encrypted device is in an uninitialized state when it is delivered to the user, and the user needs to complete its initialization. Files encrypted on any client of a user need to be decrypted on other clients of the user; a trust relationship is established between encryption devices through the Internet; the main problem to be solved by this patent is: an encryption device After gaining trust, how can it be used to decode all files on the encrypted cloud disk o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
Inventor 赵彬沈宁罗鸣陈波
Owner 安徽云盾信息技术有限公司