Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security transmission system and method with group decryption authority control

An information security and authority control technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of low encryption strength, shortened cracking time, and low encryption strength of encryption methods, so as to improve anti-quantum computing capabilities and ensure Strong implementation effect

Inactive Publication Date: 2019-11-19
上海安密信科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since group communication systems such as WeChat and email usually save copies of files and messages in the background server, they are easily stolen by others
However, the current common file encryption methods, such as password encryption and compression, data encryption software, etc., still have relatively large risks in the transmission of passwords; and malicious personnel can use password brute force cracking tools to crack encrypted passwords, resulting in information leakage; at the same time, some The file encryption tool is based on the public key system encryption algorithm. Once the quantum computer matures, its cracking time will be shortened dramatically
[0004] In addition to the low encryption strength of some encryption methods, the current common encryption tools usually do not support relatively complex group encryption and decryption management control functions (such as one-way decryption permission control, that is, administrators in the group can send files that can be decrypted by all members) , and the files sent by group members can only be decrypted by the administrator), group rights management and file encryption and decryption key distribution are relatively independent operations, which increases the risk of the system being cracked
[0005] To sum up, in terms of secure information transmission between group members, the group communication tools used have a high risk of information leakage; common encryption tools mainly use software, and the encryption strength is not high; group decryption rights management The control and encryption and decryption function modules are relatively separated, and the overall operating efficiency and security of the system are not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security transmission system and method with group decryption authority control
  • Information security transmission system and method with group decryption authority control
  • Information security transmission system and method with group decryption authority control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] Embodiment 1: In the embodiment of the present invention, the super administrator is the information security administrator of a multinational company, the group administrator is the marketing department manager of the company, and the group members are the marketing personnel of the marketing department; the marketing department manager needs to regularly Summarize the latest customer information of all marketing personnel, and regularly release market task assignments to all market personnel, and send documents such as bidding quotations to specific market personnel when necessary; market personnel have the need to report and receive relevant documents at home and abroad, And the network used is the public Internet, security cannot be guaranteed.

[0086] According to an information security transfer method with group decryption authority control described in the present invention, this embodiment includes the following steps:

[0087] Step 1: Security group UKEY init...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security transmission system and method with group decryption authority control. The information security transmission system comprises a security group key medium issuing module, a security group key medium management module, a security group key medium and a security group member module, wherein the security group key medium issuing module is a super administrator and is used for completing initial configuration of a root key and an identity key on a universal key medium conforming to GM / T 0016 intelligent password key password application interface specifications to generate a security group key medium; and the security group key medium management module is used for generating a group control key by a group administrator according to a group memberinformation interaction control requirement, injecting the group control key into a security group key medium, and distributing the security group key medium subjected to group management configuration to corresponding group users. According to the invention, the requirement of group users for realizing information encryption transmission across the public Internet can be met, and the group management mode is flexible and diverse, and the encryption strength is high, and the information security transmission system is safer and more reliable.

Description

technical field [0001] The invention relates to the field of encryption technology, in particular to an information security transfer method with group decryption authority control. Background technique [0002] With the development of network technology, people's network activities are becoming more and more frequent. The digitization and networking of society bring people convenient means of information communication, but also bring great challenges to the protection of personal privacy information in the process of transmission and storage, especially in one-to-one and one-to-many groups. In the process of group communication, there is a certain risk of information leakage. [0003] When using the current common group communication tools such as WeChat and mail groups for information security communication, file software encryption, instant calling, short message homonym replacement and other methods are generally used to improve the security of the privacy transmissio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0833H04L9/0852H04L9/088H04L9/0891
Inventor 王仲卿
Owner 上海安密信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products