File cloud storage security solution method and system

A solution and cloud storage technology, applied in the field of file encryption storage, to achieve the effect of improving security and solving confidentiality problems

Inactive Publication Date: 2016-08-17
BEIJING UNION UNIVERSITY
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the technical problem that others use the authorized client to download and decrypt files, the present invention proposes a new scheme, which adopts the authentication method of password + fingerprint + dynamic password, and integrates these three authentication methods in the dongle, from It fundamentally solves the problem of others using authorized clients to download and decrypt files, greatly improving the security of encrypted files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File cloud storage security solution method and system
  • File cloud storage security solution method and system
  • File cloud storage security solution method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] The cloud storage method of the file includes reading the file to be encrypted, then encrypting the file, and finally uploading the encrypted file to the cloud server. When you log in to the system for the first time, you need to fill in your personal registration information and verify it with the information in the dongle. After the verification is passed, you can log in to the system. Open the encrypted file, use the authentication password to retrieve the key information in the dongle, and the authentication password includes at least one of a digital password, a dynamic password, and a fingerprint password. The file is encrypted with the key information, and the key version and file content are recorded in the key encoding. Log in to the cloud server, enter the login password and authenticate, upload the file to the cloud server, agree to extract the password and save it in the dongle.

[0055] figure 1 It is a file encryption flow chart of the cloud storage secu...

Embodiment 2

[0060] The cloud storage method of the file comprises downloading the encrypted file in the cloud server, and decompressing the file to obtain the original file. Open the cloud server, enter the login password and verify the login password, enter and verify the extraction password, and download the encrypted file. Log in to the encryption system and start the dongle for identity authentication, use the authentication password to retrieve the key information in the dongle, and the authentication password includes at least one of a digital password, a dynamic password, and a fingerprint password. Determine whether the current key information is applicable to the file, and if applicable, decrypt the file; if not, log in to the cloud server to download the used key information, and decrypt the file.

[0061] figure 2 It is a file decryption flow chart of the cloud storage security solution for files and the system of the present invention. Such as figure 2 As shown, step 200,...

Embodiment 3

[0067] image 3 It is a flow chart of the cloud storage security solution for files and the system update of the system of the present invention. Such as image 3 As shown, step 300, step 305 and step 310 are executed in sequence, the encryption software is opened and the dongle is activated for information authentication, and the authentication information includes user information and computer information. After the information authentication is passed, log in to the encryption system. Step 315, step 320 and step 325 are executed in sequence to start the system update program, download the update file from the software company website, and determine whether to update. If not, execute step 326 to cancel the update.

[0068] If it is determined to update, then execute steps 330 and 335 to start the dongle for authentication, input the 8-digit authentication password on the dongle, the dynamic authentication password and the user fingerprint authentication password sent to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a file cloud storage security solution method and system. The method is divided into two parts, namely encryption and decryption. The encryption method includes the steps that a computer is loaded with a softdog, a file encryption secret key in the softdog is obtained in an authentication mode, the secret key is utilized to conduct encryption on a file required to be encrypted, and the encrypted file is unloaded to a cloud server. The decryption method includes the steps that the cloud server is started, the encrypted file is downloaded, a local computer is loaded with the softdog, the file encryption secret key in the softdog is obtained in an authentication mode, the encrypted file is decrypted through the secret key, and the original file is obtained. By means of the file cloud storage security solution method and system, the file can be encrypted to the maximum degree and protected against losses.

Description

technical field [0001] The invention relates to the technical field of file encryption storage, in particular to a file cloud storage security solution method and system. Background technique [0002] File encryption is now widely used in cloud storage of files. How to better protect files from being illegally obtained and stolen by others has become a top priority in solving file encryption. [0003] The invention patent "Encrypted File Protection System and Its Protection Method" with the publication number CN105516056A discloses a file protection system and its protection method, which are used between client devices and servers. When the client device requests to download a file, the server encrypts the file according to the key corresponding to the client device after verifying that the client device has the download permission, and makes the client download it. When the client device intends to open the encrypted file, the information of the client device is transmitt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0815H04L63/083H04L67/06H04L67/10H04L67/1097
Inventor 金祎
Owner BEIJING UNION UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products