Business secret file exchange method
A file and business secret technology, applied to electrical components, transmission systems, etc., can solve problems such as hacker cracking and interception, information leakage, and low file security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0015] The exchange method of business confidential documents, including:
[0016] Step 101, file upload, file upload includes randomly extracting business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;
[0017] Step 102, file downloading, file downloading includes using multi-factor authentication to verify the download identity, and connecting the client to the server through the application program to download the file;
[0018] Step 103, file transfer, file transfer includes encrypting the interaction information between the server and the client using encryption security policy.
[0019] Among them, the server adopts the SFTP server of the LINUX operating system, installs the digital certificate issued by the internationally recognized CA organization, and encrypts the digital certificate by more than 128-256 bits. Server and client exchange information...
Embodiment 2
[0027] The exchange method of business confidential documents, including:
[0028] Step 201, using multi-factor authentication to verify the upload identity;
[0029] Step 201, file upload, file upload includes random extraction of business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;
[0030] Step 203, file downloading, file downloading includes using multi-factor authentication to verify the downloading identity, and connecting the client to the server through the application program to download the file;
[0031] Step 204 , file transfer, the file transfer includes encrypting the interaction information between the server and the client using an encryption security policy.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com