Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File secure sharing method and system based on group key

A technology of group key and key ciphertext, applied in the field of communication, can solve the problems of insufficient autonomous control capability, difficulty in key and shared group management, etc.

Active Publication Date: 2015-09-16
CHINA TELECOM CORP LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Aiming at the problems of insufficient user self-control ability and difficulty in key and shared group management in existing secure storage schemes, it is proposed to use group key to encrypt file key on the basis of traditional file encryption, and group administrators to classify The method of managing the distribution and updating of group keys can realize flexible, user-controllable, and easy-to-manage encrypted file security sharing on the basis of satisfying the storage security of user data files, and reduce the leakage of user files during the sharing process risks of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File secure sharing method and system based on group key
  • File secure sharing method and system based on group key
  • File secure sharing method and system based on group key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0063] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0064] At the same time, it should be understood that, for the convenience of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file secure sharing method and system based on a group key. When a first user terminal shares an original file, the original file is encrypted by use of a work key so as to generate an encryption file, the work key is encrypted by use of the group key so as to generate key cryptograph, and the encryption file and the key cryptograph are uploaded to a shared storage server; a second user terminal downloads a specific encryption file, a key cryptograph associated with the specific encryption file, and a group identification from the shared storage server; and the second user terminal, when determining that the downloaded group identification is the group identification of a group where the second user terminal is located, decrypts the key cryptograph by use of the group key and decrypts the encryption file by use of the work key so as to obtain the original file. According to the invention, the work key is encrypted by use of the group key, the encryption file can be securely and flexibly shared with user controllability and easy key management, and the risk that a user file is leaked in a sharing process is reduced.

Description

technical field [0001] The invention relates to the communication field, in particular to a group key-based file security sharing method and system. Background technique [0002] With the rapid development of Internet applications, the value of user data continues to increase, and users have put forward higher requirements for the security of information services such as cloud storage. How to improve the security of user data and at the same time realize the safe sharing of data has become the current cloud storage The main technical problems faced by services such as . Currently, the main file sharing technical solutions or systems in the industry have the following problems: [0003] 1. A sharing scheme combining clear text with authorized access, [0004] Low security since files are stored in plaintext; [0005] 2. Ciphertext sharing scheme: [0006] 1) Server-side encryption and decryption, there is a risk of server-side key leakage and insufficient user control capa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 刘国荣沈军金华敏冯明汪来富刘东鑫
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products