Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Burn-after-reading method based on complete offline

A post-reading and offline technology, applied in the field of data security, can solve the problems of insufficient user-friendly operation experience and low security, and achieve the effect of good market prospects and high security.

Inactive Publication Date: 2016-02-03
XLY SALVATIONDATA TECHNOLOGY INC
View PDF11 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the deficiencies of the existing technologies, the present invention provides a completely off-line based instant-reading method, which can solve the problems of low security and unhumanized operation experience of the existing instant-on-reading technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Burn-after-reading method based on complete offline

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0031] In order to describe the method of the present invention in detail, it will be further elaborated in conjunction with the accompanying drawings: a completely offline-based method of burning after reading, including the following steps:

[0032] 1. The file sender selects the file to be sent;

[0033] 2. Set the reading password;

[0034] 3. Use the AES256 encryption standard to encrypt file data through functional algorithm operations such as byte replacement, row shift, column mixing, round key addition, key scheduling, reverse byte replacement, reverse row shift, and reverse column mixing. ;Write the read password verification information and decryption password information into the file header;

[0035] 4. Generate encrypted documents that w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a burn-after-reading method based on complete offline, belonging to the field of data security. The method comprises the following steps that S1 a file sending party selects a to-be-sent file; S2 a reading password is provided through an appointed reader; S3 file data is encrypted through the appointed reader, and reading password checking information and decryption password information are written into a file header; S4 an encrypted burn-after-reading document is generated; S5 the encrypted burn-after-reading document, a file terminator and the appointed reader are packaged to generate an executable burn-after-reading file; and S6 the file sending party transmits the executable burn-after-reading file and the reading password to a file receiving party. In comparison with the existing burn-after-reading technology, the method is higher in safety and more human-friendly, and can be widely applied to the customers with higher requirement for file confidentiality, such as war industry, enterprises and institutions, and has good market prospect.

Description

technical field [0001] The invention belongs to the field of data security, and in particular relates to a completely offline-based method of burning after reading. Background technique [0002] At present, there are many applications on the market that add the function of disappearing after reading. The common features are: [0003] 1. Based on network transmission or cloud storage, a basic network communication environment is required, and the demand for a secure network environment is high, and its confidentiality and security are threatened by many network attacks; [0004] 2. It is difficult to guarantee the thoroughness of burning after reading, especially the thoroughness of cloud storage file destruction; [0005] 3. Files are transferred in the form of storage media. During the transfer process, there is no means of protection against illegal operations such as media loss, theft, and unauthorized copying. [0006] Explanation of terms involved in the present inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06
CPCH04L63/0428H04L9/0625H04L63/0236
Inventor 梁效宁杨明甘元军
Owner XLY SALVATIONDATA TECHNOLOGY INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products