Secure file management system and method capable of achieving read/write splitting

A technology that separates secure files from reading and writing. It is applied in the field of network information security. It can solve problems such as inability to resist files and inconvenience, and achieve the effect of clear functional responsibilities.

Inactive Publication Date: 2014-04-16
西安电子科技大学昆山创新研究院 +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The unauthorized access of the server to the file content is controlled by multiple servers sending part of the key to the user, but it cannot resist the joint decryption of the file owner's file by multiple servers;
[0010]

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure file management system and method capable of achieving read/write splitting
  • Secure file management system and method capable of achieving read/write splitting
  • Secure file management system and method capable of achieving read/write splitting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] 1. Reference figure 1 , the secure file management system supporting read-write separation of the present invention is composed of a trusted authority TA, a service provider, a file owner, a file approver, and a file reader;

[0055] The trusted authority TA has a system initialization module, a key management module and an identity information management module. The system initialization module is used to initialize the system, generate public parameters and master keys, and send the master keys to The key management module saves; the key management module uses the system master key to generate and distribute key pairs for the file owner and the file approver; the identity information management module processes the registration request, examines the identity information, and provides key management Modules and service providers provide information on file owners and file approvers;

[0056] The service provider is used to provide storage services, request processing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure file management system and method capable of achieving read/write splitting. The system and method are used for solving the problem of a traditional electronic file management system that the read privilege and write privilege of a file are not split. The system is composed of a credible authorized agency TA, a service provider, a file owner, a file approver and a file reader. The method comprises the steps of system initialization, identity registration, secret key distribution, encryption, service requesting, request response returning and file processing. According to the system and method, the file reading privilege of the file approver and the file reader is controlled by controlling the distribution of file reading secret keys, the file acquiring privilege of the file approver and the file reader is controlled by controlling the distribution of inquiring secret keys, the file writing privilege of the file approver is controlled by controlling the distribution of writing secret keys, and then file read/write privilege splitting is achieved.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a read and write authority control scheme for computer encrypted files, which can be used for authorized access and modification of encrypted files in information security systems and other environments. Background technique [0002] With the rapid development of network technology and information technology, many documents are stored and disseminated in electronic form. What follows is that more and more traditional work models are migrating to the Internet, which not only accelerates the pace of economic development, but also greatly changes people's work and lifestyle, and improves people's work efficiency and life. quality. [0003] While the digitization of documents brings convenience to people, it also brings risks and threats. Security issues such as unauthorized access to files and unauthorized modification of files have seriously hinde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6209G06F2221/2115G06F2221/2149
Inventor 朱辉李晖朱磊黄容黄橙李强
Owner 西安电子科技大学昆山创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products