Method and system of file encipher share

A file and file sharing technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of insecure cost and inconvenient operation of file sharing methods, and achieve the effect of simple key management and cost reduction

Inactive Publication Date: 2006-09-13
CHINA NAT SOFTWARE & SERVICE
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the disadvantages of file sharing methods in the prior art, such as insecurity, high cost, and inconveni...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of file encipher share
  • Method and system of file encipher share
  • Method and system of file encipher share

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The content of the present invention is described in detail below through a simple server-client model, but this does not constitute a limitation to the present invention.

[0036] In this embodiment, the file encryption sharing system is composed of several file servers and computer terminals (clients), and all users are divided into three user groups. The file encryption process is in the file encryption server, and a file server can be randomly selected as the encryption file server, and the encryption monitoring service is installed on the file server. The file server holds global, group and user public keys. The decryption process is on the client, and the client host installs a decryption program. This can well ensure the rational use of computer resources.

[0037] Wherein, the structure of the file encryption server is as shown in Figure 4, which includes: folder monitoring module, folder sharing range setting module, public key acquisition module and encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a method and a system for realizing cipher share by implanting ciphered cryptographic keys in the document, in which, said system is composed of file servers and customer ends and the file server includes a file monitor module, a file share sphere designing module, a public key obtaining module and a ciphering module, the customer end includes: a file identifying module, a file de-ciphering module and a de-ciphering module, the ciphering process includes: designing different shared files based on the shared kinds, each owns its own ciphered public key, utilizing a symmetric algorithm to cipher the files first and implanting the cryptographic key of said file into the ciphertext, then utilizing one or many public keys to cipher the cryptographic keys of th file by an asymmetric algorithm to form a link and implanting the shared kind, public key numbers and the cryptographic link into the head of the text.

Description

technical field [0001] The invention relates to the technical field of information sharing and collaboration, in particular to a method for file encryption sharing, which is a method for implementing encryption sharing by managing public keys and embedding encryption keys in files. Background technique [0002] With the wide application of the network, information sharing is becoming more and more common. However, when people share information, some confidential information will be leaked intentionally or unintentionally, or obtained illegally by others. The main carrier of information is files, and protecting files protects most of the information. [0003] Encryption is a proven and widely used method of protecting files. At present, encrypted files mainly use symmetric encryption algorithm, and key management adopts CA certificate management system. For most enterprises, it is extremely common to share files on the internal LAN of the enterprise. However, in order to p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/28G06F21/00G06F21/62
Inventor 黄敏王勇
Owner CHINA NAT SOFTWARE & SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products