Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital file sharing and content security protection method matched with mobile terminal authentication

A digital file and content security technology, applied in the direction of digital data protection, digital data authentication, electronic digital data processing, etc., can solve the problems that the rights and interests of file owners cannot be guaranteed, damage the rights and interests of file owners, etc., and achieve the protection of rights and The effect of benefit and convenient dissemination

Pending Publication Date: 2021-10-08
大连九锁网络有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First, the paid file sharing platform cannot protect the full cycle of the file. Once the individual pays, the original text of the file will lose protection and can be spread at will; the rights and interests of the file owner cannot be guaranteed.
[0005] Second, the existing file encryption sharing technology allows visitors to access files without time limit, which also damages the rights and interests of file owners to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital file sharing and content security protection method matched with mobile terminal authentication
  • Digital file sharing and content security protection method matched with mobile terminal authentication
  • Digital file sharing and content security protection method matched with mobile terminal authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0051]It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a digital file sharing and content security protection method matched with mobile terminal authentication, and relates to the field of computer information security. The method comprises the following steps: obtaining ciphertext information of an encrypted file by first host decryption software; if the user identity ID of the first host is inconsistent with both the owner ID in the ciphertext information and the visitor ID in the ciphertext information, or both the user identity ID of the first host and the visitor ID in the ciphertext information are empty, initiating a decryption application for the encrypted file to the cloud, and performing identity authentication on the cloud through the first mobile terminal; receiving a decryption permission returned by the cloud after the first host passes the identity authentication; opening the encrypted file in the memory based on the decryption permission and controlling the access duration; and if the access duration exceeds the allowed access duration, automatically closing the shared encrypted file. The method is matched with mobile terminal authentication and access duration control, so that the file can be conveniently spread on the Internet, and the benefit of a file owner can be protected.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a digital file sharing and content security protection method coordinated with mobile terminal authentication. Background technique [0002] People also often share and use files between users through network transmission (such as email) or file replication in daily work. If these files involve private or secret information or have ownership, security protection measures are also required to ensure that the files are safe during sharing and use, and only authorized and permitted users can use them. [0003] The current file sharing technology mainly has the following two problems: [0004] First, paid file sharing platforms cannot protect the full cycle of files. Once an individual pays, the original text of the file will lose protection and can be spread at will; the rights and interests of file owners cannot be guaranteed. [0005] Second, the existing file encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/31G06Q20/32
CPCG06F21/602G06F21/6209G06F21/31G06Q20/3276G06F2221/2107
Inventor 聂奇彪王皓郭峰
Owner 大连九锁网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products