File sharing method based on encryption and permission system

A file sharing and secret sharing technology, applied in electrical components, transmission systems, etc., can solve problems such as difficulty in satisfying security and sharing, inability to guarantee security of secret files, loss of sharing, etc., and achieve a simple and effective access control method , easy to maintain, large and small effects

Inactive Publication Date: 2014-07-16
XIDIAN UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditionally, the sharing of secret files is placed in the shared folder within the enterprise, but when the files are downloaded to their computers by employees, the security of the secret files cannot be guaranteed
If you use encryption software to encrypt the downloaded file immediatel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File sharing method based on encryption and permission system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0031] like figure 1 Shown, the workflow of the present invention is:

[0032] Step 1: Create user information on the file sharing server and set the user's security level.

[0033] The user applies for registration, and then the administrator reviews the application user information. If the review is passed, the user's user name, login password and other information are entered, and a security level is set for the user according to the regulations of the unit.

[0034] Step 2, the user logs in to the file sharing client and performs identity verification.

[0035] The user enters the user name and password to log in, and the login information is sent to the server for verification, and then the server returns the verification result. If the verification is passed, the login is accepted; otherwise, the login is refused.

[0036] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file sharing method based on an encryption and permission system. The file sharing method comprises the implementation steps that (1) a server establishes user information and sets the security level of a user; (2) the user logs in and carries out authentication; (3) the user sets the security level of a secret shared file, carries out encryption through a random secret key, stores the unique authentication code, the security level and the encryption secret key of the encrypted secret shared file on the server, and sends the encrypted secret shared file to a network; (4) when the secret shared file is used, a client sends a decryption request including the unique authentication code of the secret shared file and the security level of the user, if the security level of the user is higher than or the same as the security level of the secret shared file, the client can receive a decryption secret key fed back by the server, the client decrypts the secret shared file through the decryption secret key, and opens the secret shared file, and if the security level of the user is lower than the security level of the secret shared file, rejection information is fed back. The file sharing method based on the encryption and permission system has the advantages of being high in safety, convenient to use and capable of being used for sharing of secret files inside a unit.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and in particular relates to a file sharing method, which can be used for safe use of confidential files within an organization. technical background [0002] With the development of information technology and the continuous enhancement of enterprise informatization, the security of internal information is becoming more and more serious. How to share internal secret files safely and systematically within the enterprise has become a problem that people must think about. Traditionally, the sharing of secret files is placed in shared folders within the enterprise, but when the files are downloaded to their own computers by employees, the security of secret files cannot be guaranteed. If the downloaded file is immediately encrypted with encryption software, although its security can be guaranteed, it will lose its shareability at the same time. The file can only be used by the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 张宁申建虎董庆宽傅晓彤宋研姬翔谭示崇李晖
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products