Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-leakage file security sharing method

An anti-leak, file technology, applied in the field of password applications, can solve the problems of reduced file transmission efficiency, difficulty in taking into account file security transmission speed, file sharing security, and inability to well reflect the immediacy of information sharing.

Active Publication Date: 2019-08-30
HANGZHOU DIANZI UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) It is difficult to take into account the security of file transfer speed and the security of file sharing
Most file encryption schemes require complex encryption and decryption behaviors, which greatly reduces the efficiency of file transmission and cannot well reflect the immediacy of information sharing
[0005] (2) Focus on the security of file transmission, but it is difficult to ensure that files will not be privately transmitted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leakage file security sharing method
  • Anti-leakage file security sharing method
  • Anti-leakage file security sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be further described below in conjunction with drawings and embodiments.

[0063] In order to distribute work to all components and ensure security, first determine that for each shared file, the implementation process involves four components: the file publisher, the encrypted file, the server and the file decryptor, such as figure 1 Shown: Among them, the file publisher is the person who wants to share the file; the encrypted file is the file currently being shared; the server side, that is, the central server, manages the file and the identity of all participants; the file decryption party, that is, the file acquirer, has Qualified people to access this file.

[0064] The file publisher only needs to upload the file to the server, and obtain the file decryption key returned by the server to distribute to qualified persons. Or delegate server-side distribution. It is worth noting that in the system, the identities of the file issuer and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage file security sharing method. According to the invention, the SM4 algorithm and the SM2 algorithm are used for respectively realizing file encryption and file key secure transmission. In terms of algorithm selection of encrypted files, symmetric encryption is more efficient, and therefore SM4 is selected as an encryption algorithm of a file body. And an SM2algorithm is selected to encrypt and transmit the encrypted key of the file. And meanwhile, file authority management after secret key distribution is realized. In addition, the abstract generated bythe SM3 algorithm and the SM2 signature are utilized to ensure that the file and the browsing record are not tampered. According to the method, the browsing record and the file are creatively fused together, file transmission and decryption are improved to a certain extent, and the generation of the file browsing record recognized by the components of the whole system is facilitated.

Description

technical field [0001] The invention relates to the technical field of password application, in particular to a leak-proof file security sharing method. [0002] technical background [0003] With the rapid development of Internet technology, network technology is becoming more and more popular, making many criminals on the Internet use technical means to modify or steal unencrypted or simply encrypted files, which seriously affects personal privacy, business operations, and social activities. influences. Especially in an enterprise environment, there is a very high demand for files to be readable but not transferable. However, under the existing software and system environment, the current file sharing scheme has the following problems. [0004] (1) It is difficult to balance the security of file transfer speed and file sharing security. Most file encryption schemes require complex encryption and decryption behaviors, which greatly reduces the efficiency of file transmiss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14H04L9/06H04L9/08H04L9/32H04L29/06
CPCH04L9/14H04L9/0618H04L9/0822H04L9/3247H04L63/0442H04L63/101
Inventor 张笑尘吕秋云陈中渊郑涵
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products