File management system based on encryption and authentication mechanism

A file management system and technology for encrypting files, which is applied in the field of file management systems based on encryption and authentication mechanisms to achieve the effect of improving security

Pending Publication Date: 2021-09-03
赵飞
0 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the prior art, the present invention provides a file management system based on encryptio...
View more

Abstract

The invention relates to the technical field of file security management, and discloses a file management system based on an encryption and authentication mechanism. The system comprises a file encryption and authentication management application program installed and operated on an operating system of a computer terminal, the file encryption authentication management application program comprises a user registration module, a user verification module and a file encryption module; before the file is stored, the file encryption module encrypts the file to obtain an encrypted file, and the encrypted file is stored on a hard disk of the computer terminal; before the encrypted file is accessed, the user verification module verifies the access authority of the file operation user, after the access authority of the file operation user is successfully verified, the encrypted file is decrypted on the file encryption module, and only the decryption operation of the encrypted file is successful, the file operation user is allowed to access the decrypted file. According to the invention, the technical problem of how to improve the file management security on the computer is solved.

Application Domain

Digital data protectionDigital data authentication

Technology Topic

Document securityEncryption +7

Examples

  • Experimental program(1)

Example Embodiment

[0034] Next, the technical scheme in the embodiment of the present invention will be described in conjunction with the embodiment of the present invention, which is apparent from the embodiments of the present invention, and not all of the embodiments of the invention, not all of the embodiments of the invention. Based on the embodiments of the present invention, there are all other embodiments obtained without making creative labor without making creative labor premises.
[0035] A file management system based on encryption and authentication mechanisms, including: file encryption authentication management applications on the operating system of computer terminal PCTFEAMS, including user registration modules, user authentication modules, files Encryption module, the user registration module separates the data interaction between the user verification module, the file encryption module;
[0036] Among them, the user registration module is used for file operation users FOUI (i = 1, 2, ..., n) for legal user registration to obtain authority of legal management files Fi (i = 1, 2, ..., n);
[0037] The user verification module is used to verify the legal permissions of the file operation user FOUI requesting the manipulation of the file FIF;
[0038] The file encryption module is used for file operation user FOUI to decrypt file Fi;
[0039] Based on the file encryption certification management method for the above file encryption certification management application, the following steps:
[0040] Step 1, the file operation user FOUI is registered on the user registration module to obtain the key required for legal management file FI permission;
[0041] Step 2, when the file operation user FOUI requests the operation of the save file FI, the file encryption module encrypts the file Fi before the file Fi is saved, and the encrypted file CFI is saved, and the encrypted file CFI is saved in the computer. Terminal PCTFEAMS hard disk;
[0042] Step 3. When the file operation user FOUI requests the operation of accessing the encrypted file CFI to the computer terminal PCTFEAMS, the user verification module verifies the access rights of the file operation user FOUI before the encrypted file CFI is accessed.
[0043] After the file operation user FOUI is successfully verified, continue to perform the next step;
[0044] Step 4, the file operation user FOUI decrypts the encryption file CFI on the file encryption module, only the file operation user FOUI is allowed to access the decrypted file Fi 'is allowed only if the decryption operation of the encrypted file CFI is successful.
[0045] Further, the file operation user FOUI's specific execution steps of user registration on the user registration module include:
[0046] Step S1, the file operation user FOUI inputs its identity information IDFOUI to the user registration module;
[0047] Step S2, the user registration module is in binary domain F 2 m Selected an elliptical curve E p (a, b), in this elliptic curve E p (a, b) randomly select a little bit as the base point, then the elliptic curve E p (a, b), the base point J to the file operation user foui;
[0048] Step S3, the file operation user foui selects a binary domain F 2 m The key α is generated in binary domain F 2 m The public key β is applied, and the β = (α) j is established, then the public key β is transmitted to the user registration module;
[0049] Further, the specific execution steps of the file encryption module on the file FI include:
[0050] Step S1, the file encryption module compresses the file Fi to obtain compression encoded data DFI;
[0051] Step S2, encode the data DFI to E p Little MFI on (a, b);
[0052] Step S3, the file operation user foui selects a binary domain F 2 m The random number Δi is established by MFI = (ΔI) J;
[0053] Step S3, calculate the encrypted file CFI = MFI + (ΔI) (β);
[0054] Further, the specific execution steps of the user verification module to verify the access rights of the file operation user FOUI include:
[0055] Step S1, the file operation user foui randomly selects a binary domain F 2 m The value j, calculate H = (j) J, and h in the elliptic curve E p (a, b), then the h-to-user verify the module transmission;
[0056] Step S2, the user verification module automatically generates in binary domain F 2 m The random number H, then transfer the random number h to the file operation user FOUI transmission;
[0057] Step S3, the file operation user foui calculates L = J + (H) (α) and transmits L to the user verification module;
[0058] Step S4, the user verification module verifies whether the equation (L) J = H + (h) (β) is established, if it is established, the file operation user FOUI's access is successful;
[0059] Further, file operation User FOUI's specific implementation steps for decrypt operations on encrypted file CFI on file encryption modules include:
[0060] Step S1, according to the key α of the user FOUI according to the file, by solving the equation CFI = (1 + α) (ΔI) J, Δi;
[0061] Step S2, according to ΔI, by solving equation CFI = MFI + (ΔI) (β), the MFI is obtained;
[0062] Step S3, according to the encoding relationship between the MFI, and the data DFI and the MFI, the data DFI is obtained;
[0063] Step S4, the decompression process is performed for the data DFI to obtain file fi '.
[0064] While the embodiments of the invention have been shown and described, these examples may be made to make a variety of changes, modifications, and replacement without departing from the principles and spirit of the present invention, without departing from the spirit and spirit of the present invention. And variations, the scope of the invention is defined by the appended claims and their equivalents.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Malicious website prompt method and router

ActiveCN104125209Aimprove security
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Credible virtual machine platform

InactiveCN101957900AImprove stability and attack resistanceimprove security
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Intelligent door lock identity authentication method and system, readable storage medium and mobile terminal

ActiveCN109712278APrevent Identity Leakageimprove security
Owner:深圳市小石安防科技有限公司

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products