Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for safely distributing and using data files

A technology for secure distribution and data files, applied to electrical components, transmission systems, etc., can solve problems such as low security and inability to solve information flow control

Active Publication Date: 2021-01-26
QINGDAO WEIZHIHUI INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main idea of ​​the existing attribute encryption scheme is: the authority in the system is represented by the attribute, the attribute authority authenticates the authority of the user attribute and distributes the corresponding key, and the resources in the system are encrypted by the attribute-based encryption algorithm and stored on the cloud server , the resource access policy can be formulated by the resource publisher according to the needs of the scheme. Anyone can access the encrypted resource at will, but only the visitors who meet the access policy can use the attribute encryption algorithm to decrypt the resource.
[0004] The existing attribute encryption schemes mainly solve the access control problem, but cannot solve the information flow control. For example, the existing attribute encryption schemes usually only use one attribute to encrypt information. When this attribute meets the data access control requirements , the user can obtain and view the data. This encryption method has relatively loose decryption conditions and low security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for safely distributing and using data files
  • A method for safely distributing and using data files
  • A method for safely distributing and using data files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] The purpose of the present invention is to provide a method for safely distributing and using data files, which divides user attributes into public attributes and private attributes, and realizes access control to data and control to information flow respectively. Use the user's department, role, identity, etc. as the user's public attributes; use the user's password, user device identification code, user's geographical location, operation time, etc. as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safely distributing and using data files. By dividing user attributes into public attributes and private attributes, data access control and information flow control are realized respectively. Specifically, user identities and roles are adopted. The user's public attributes, using the public attributes to realize the access control to the ciphertext, use the user's login password, device identification code, geographical location, time, etc. The transfer is controlled so that designated users can view data files only at designated devices, designated times, and designated locations, which improves the security of encrypted information access and viewing. In addition, the method provided by the present invention can realize anti-collusion attack, and prevent users or attribute organizations from colluding with obtained keys to obtain required keys, thereby endangering information security.

Description

technical field [0001] The invention relates to the technical fields of cloud computing, electronic documents and digital content distribution security, in particular to a method for secure distribution and use of data files. Background technique [0002] With the rapid development of cloud computing technology, more and more government departments and enterprises choose cloud environment for office work, and transmit a large amount of information and data to cloud servers. Data storage has become one of the most basic services of the Internet. An important challenge of data security in cloud computing environment is to share data and protect data security. In the multi-user environment of cloud storage, if confidential files are shared by multiple users, it will bring many difficult problems such as key storage, key update and maintenance to the file owner. [0003] In order to solve the security problem of user data, many encryption schemes and signature schemes have been...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0478H04L63/06H04L67/10
Inventor 刘培顺初晓璐赵长江吴乐云李振德颜士营
Owner QINGDAO WEIZHIHUI INFORMATION