Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

70 results about "Encrypted file system" patented technology

Encrypting File System The Encrypting File System ( EFS) on MicrosoftWindows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. ... EFS works by encrypting a file with a bulk symmetric key, also known as the File Encryption Key, or FEK. It uses a symmetric encryption algorithm because it takes less time to encrypt and decrypt large amounts of data than if an asymmetric key cipher is used.

File encryption system and file encryption method

The invention provides a file encryption system and a file encryption method. The file encryption system is carried on an operation system platform and comprises a database module, an encryption module and a related module, wherein the database module establishes a database file under each drive letter of a computer hard disk to store time of encrypting a file, a file name of the encrypted file, a file full path of the encrypted file and a file encryption grade; the related module is related to an operation system to monitor the operation to the file by a user, generates a corresponding instruction according to the operation to the file by the user and transmits the instruction to the encryption module; and the encryption module receives the instruction, operates the time of encrypting the file, the file name of the encrypted file, the file full path of the encrypted file and the file encryption grade, which are stored by the database file under the drive letter related to user operation, according to the instruction to mark the encryption grade of the file, and meanwhile, realizes the binding between encryption information and an electronic file, so that the encryption information of the electronic file is not lost in a transmission and copying process, and the safety and the controllability of the file are improved.
Owner:中国航天科工集团第二研究院七0六所

Blockchain information tracking method and system

The invention provides a blockchain information tracking method and system, and the method comprises the steps: employing an asymmetric encryption algorithm to generate a key pair, employing the key pair to encrypt an account, employing an electronic signature to carry out the signature processing of a file, and obtaining a first encrypted file; A P2P network is adopted for data transmission, a connection channel is established between a first node and a newly-added node through searching of a server, the newly-added node is made to conduct whole-network broadcasting through a flooding mechanism, and a public key of a key pair is published to the P2P network; Wherein the first encrypted file is stored in a stand-alone designated storage area, and the networking verifies the transmission request through a private key of a key pair; Enabling the first encrypted file to generate a timestamp and then encrypt the timestamp to obtain a second encrypted file, enabling the second encrypted file to generate a public chain, and enabling the public chain to comprise file process information; Verifying the data reading request through the private key of the key pair, reading the public chain after the data reading request passes the verification, and checking the downloaded file. Distributed storage of public key information records at a server side is realized, and the data security performance is ensured.
Owner:VISION MICROSYST SHANGHAI

Digital rights management method

The present invention discloses a kind of management method for digital rights, wherein, it comprises the following steps: Step S1: the original electronic file is encrypted on the server-side, and in the meantime, the flow code, the file unique identifier, the authorization locations and verification information is injected; Step S2: obtaining flow codes, file identifier, authorization locations and verification information from the encrypted file, and then conducting integrality verification thereon; step S3: After it is verified that there is no error, the related information is sent to the authorization server; S4: after receiving the injection information about the encrypted file, the authorization server conducting integrality verification firstly, then judging the type of encryption file according to the flow code, and generating an authorization file and sending the same according to the type; Step S5: a decryption tool obtaining the authorization file to conducting integrality verification on the authorization information, and then decrypting, parsing, using same under the right control. By means of the above method of the present invention, a user can self-define the file encryption intensity under the condition of no changing or very little changing of an encryption/decryption tool.
Owner:FUJIAN FOXIT SOFTWARE DEV LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products