Authorized file share method and device

A technology for authorizing files and file sharing, applied in the information field, can solve problems such as hidden dangers of cloud storage data security, and achieve the effect of ensuring data ownership and protecting data security

Active Publication Date: 2019-01-04
JUZIX TECH SHENZHEN CO LTD
View PDF7 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, cloud stor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorized file share method and device
  • Authorized file share method and device
  • Authorized file share method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0025] The blockchain derived from the underlying technology of Bitcoin is a chained data structure formed by sequentially connecting data blocks in chronological order, and it is cryptographically guaranteed to be tamper-proof and unforgeable, and realizes decentralized Distributed accounting. Smart contracts running on the blockchain can disseminate, verify or execute contracts in an informationized manner, allowing trusted transactions without a third party, and these transactions are traceable and irreversible.

[0026] Based on the above characteristics of the b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authorized file sharing method and a device. The method comprises the following steps: generating a re-encryption key according to the file sharing request and the private key of the file owner, wherein the file sharing request includes a file requester public key and file identification information; sending the re-encryption key and the file identification information tothe smart contract on the block chain, so that the intelligent contract uses the file identification information to query the correspondence between the pre-established file identification information and the cipher text of the file information encrypted by the file owner's public key, obtaining the ciphertext of the file information encrypted by the public key of the file owner, and performing proxy re-encryption on the ciphertext of the file information by using the re-encryption key; the re-encrypted ciphertext being decrypted using the private key of the file requester. The plaintext of the decrypted file information is used for obtaining the file corresponding to the file identification information. The invention can protect data security and ensure data ownership by using block chain and proxy re-encryption.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to an authorized file sharing method and device. Background technique [0002] Cloud storage is a new concept extended and developed from the concept of cloud computing. It refers to the collection and collaboration of a large number of different types of storage devices in the network through application software through functions such as cluster applications, network technology, or distributed file systems. Work together to provide external data storage and business access systems. Cloud storage services offer a number of rather enticing advantages. It can be paid on a per-use basis, with no capital expenditure, and users do not need to purchase additional equipment even if storage needs increase in the future. Storage capacity can be adjusted dynamically and you only pay for what you actually use. [0003] However, cloud storage has data security risks. When the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/172G06F16/182G06F21/60H04L9/08H04L29/06
CPCG06F21/602H04L9/0861H04L63/0478
Inventor 谢翔李升林沈敏文孙立林毛颖
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products