CN110532796A - File encryption management method, system and computer readable storage medium - Google Patents

File encryption management method, system and computer readable storage medium Download PDF

Info

Publication number
CN110532796A
CN110532796A CN201910666732.7A CN201910666732A CN110532796A CN 110532796 A CN110532796 A CN 110532796A CN 201910666732 A CN201910666732 A CN 201910666732A CN 110532796 A CN110532796 A CN 110532796A
Authority
CN
China
Prior art keywords
file
encryption
feature
enterprise
fisrt feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910666732.7A
Other languages
Chinese (zh)
Inventor
杨冉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910666732.7A priority Critical patent/CN110532796A/en
Priority to PCT/CN2019/121817 priority patent/WO2021012563A1/en
Publication of CN110532796A publication Critical patent/CN110532796A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The embodiment of the invention discloses a kind of file encryption management method, system and computer readable storage mediums.This method belongs to technical field of network security, this method comprises: user terminal adds feature tag in original document obtains file to be encrypted, file encryption server is encrypted file to be encrypted to obtain encryption file, and is sent to the user terminal;If receiving the open command to encryption file, the encryption file is encrypted file by user terminal, and sends file decryption request to the file encryption server;Whether corresponding with enterprise ID the feature tag feature tag that file encryption server judges that fisrt feature encryption file includes be identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.As a result, only when the feature tag feature tag corresponding with enterprise that encryption file includes is identical, file encryption server can be just decrypted encryption file, greatly improve the safety of encryption file.

Description

File encryption management method, system and computer readable storage medium
Technical field
The present invention relates to technical field of data security more particularly to a kind of file encryption management methods, system and computer Readable storage medium storing program for executing.
Background technique
With increasingly fierce, the importance of more and more Enterprise Consciousness to enterprise security of competition among enterprises.Enterprise security It is that enterprise is instigated to be in comprehensively reliably, by state of a control.
In order to achieve the purpose that enterprise security, enterprise has put into effect miscellaneous safety measure.Wherein, it is ensured that enterprise-essential The safety of file is pith therein.In the prior art, due to frequently resulting in enterprise-essential to the lack of standardization of file management File leakage, brings huge loss to enterprise.
Summary of the invention
The embodiment of the invention provides a kind of file encryption management method, system and computer readable storage mediums, it is intended to Solve the problems, such as that the prior art is unable to ensure enterprise-essential file security.
In a first aspect, the embodiment of the invention provides a kind of file encryption management methods comprising:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the One feature encryption file is sent to user terminal after being decrypted.
Second aspect, the embodiment of the invention also provides a kind of file encryption management system, file encryption management systems System includes user terminal and file encryption server, and the user terminal includes adding unit, the first transmission unit and the Two transmission units, the file encryption server include storage unit, the first encryption unit, the first judging unit and the first solution Close unit, in which:
The adding unit, for adding feature tag in original document to obtain file to be encrypted;
First transmission unit, for sending file encryption request to file encryption server, the file encryption is asked It asks comprising the file to be encrypted and enterprise ID;
The storage unit, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted Into feature tag-enterprise's ID mapping table of prebuild;
First encryption unit, for being encrypted to the file to be encrypted to obtain encryption file, and will be described Encryption file is sent to user terminal;
Second transmission unit, if for receiving the open command to the encryption file, by the encryption file File is encrypted as fisrt feature, and sends file decryption request to the file encryption server, the open command includes Fisrt feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID;
First judging unit, for judging that the fisrt feature is looked forward to according to the feature tag-enterprise's ID mapping table Whether industry ID matches with fisrt feature encryption file;
First decryption unit, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file, File encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
The third aspect, the embodiment of the invention also provides a kind of file encryption management systems, including user terminal and text Part encryption server, the user terminal and file encryption server include memory, processor and are stored in described deposit On reservoir and the computer program that can run on the processor, the processing of the user terminal and file encryption server Method as described in relation to the first aspect is realized when device executes corresponding computer program jointly.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage medium, the storage medium storage Have the first computer program and second computer program, first computer program and second computer program ought respectively by with The processor of family terminal and the processor of file encryption server can realize method as described in relation to the first aspect when executing.
The embodiment of the invention provides a kind of file encryption management method, system and computer readable storage mediums.Wherein, The described method includes: user terminal adds feature tag in original document to obtain file to be encrypted;User terminal is to file Encryption server sends file encryption request, and the file encryption request includes the file to be encrypted and enterprise ID;File The feature of prebuild is arrived in the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by encryption server In label-enterprise's ID mapping table;File encryption server encrypts the file to be encrypted to obtain encryption file, and will The encryption file is sent to user terminal;If receiving the open command to the encryption file, user terminal described will add Ciphertext part encrypts file as fisrt feature, and sends file decryption request to the file encryption server, and the unlatching refers to Enabling includes fisrt feature enterprise ID, and the file decryption request includes fisrt feature encryption file and the fisrt feature Enterprise ID;Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with fisrt feature encryption file;If the fisrt feature enterprise ID is matched with fisrt feature encryption file, text Part encryption server is sent to user terminal after fisrt feature encryption file is decrypted.The technology of the embodiment of the present invention Scheme, user terminal add feature tag in original document and obtain file to be encrypted, and file encryption server is to text to be encrypted Part is encrypted to obtain encryption file, and is sent to the user terminal;If receiving the open command to encryption file, use The encryption file is encrypted file by family terminal, and sends file decryption to the file encryption server and ask It asks;File encryption server judges the feature tag feature tag whether corresponding with enterprise ID that fisrt feature encryption file includes It is identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.The spy for only including in encryption file as a result, When sign label feature tag corresponding with enterprise is identical, file encryption server can be just decrypted encryption file, greatly Improve the safety of encryption file.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of application scenarios schematic diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 3 is a kind of sub-process schematic diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 4 be another embodiment of the present invention provides file encryption management method flow diagram;
Fig. 5 is a kind of schematic block diagram of file encryption management system provided in an embodiment of the present invention;
Fig. 6 is a kind of the first encryption of file encryption server of file encryption management system provided in an embodiment of the present invention The schematic block diagram of unit;
Fig. 7 is a kind of the first judgement of file encryption server of file encryption management system provided in an embodiment of the present invention The schematic block diagram of unit;
Fig. 8 is a kind of the first decryption of file encryption server of file encryption management system provided in an embodiment of the present invention The schematic block diagram of unit;
Fig. 9 be another embodiment of the present invention provides a kind of file encryption management system schematic block diagram;And
Figure 10 is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
Fig. 1 and Fig. 2 are please referred to, Fig. 1 is a kind of application scenarios of file encryption management method provided in an embodiment of the present invention Schematic diagram.Fig. 2 is a kind of schematic flow chart of file encryption management method provided in an embodiment of the present invention.This document encryption pipe Reason method is applied in file encryption management system.This document management system includes user terminal 1 and file encryption server 2.User terminal 1 adds feature tag in original document to obtain file to be encrypted;User terminal 1 is to file encryption server 2 send file encryption request, and the file encryption request includes the file to be encrypted and enterprise ID;File encryption server Feature tag-enterprise of prebuild is arrived in 2 feature tags for including by the file to be encrypted and the corresponding storage of the enterprise ID In ID mapping table;File encryption server 2 encrypts the file to be encrypted to obtain encryption file, and by the encryption File is sent to user terminal 1;If receiving the open command to the encryption file, user terminal 1 is by the encryption file File is encrypted as fisrt feature, and sends file decryption request to the file encryption server 2, the open command includes Fisrt feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID;File encryption server 2 according to the feature tag-enterprise's ID mapping table judge the fisrt feature enterprise ID whether with institute State fisrt feature encryption file matching;If the fisrt feature enterprise ID is matched with fisrt feature encryption file, file adds Close server 2 is sent to user terminal 1 after fisrt feature encryption file is decrypted.
Fig. 2 is a kind of flow diagram of file encryption management method provided in an embodiment of the present invention.As shown, the party Method includes the following steps S1-S8.
S1, user terminal add feature tag in original document to obtain file to be encrypted.
In specific implementation, original document refers to the file of storage in the terminal, may particularly include word file, EXL file Vital document in equal enterprises.
User terminal adds feature tag in original document to obtain file to be encrypted.By feature tag can identify to Encrypt enterprise belonging to file.The feature tag of different enterprises is different, and the signature identification of the terminal in same enterprise is identical.
It should be noted that feature tag is specially an identification strings, which is used for the unique identification enterprise Industry.The identification strings can be set by the user, for example, in one embodiment, identification strings are " zxcv1230 ".
Specifically, can by tag control software (such as: Tag Tower) come for file add feature tag.
S2, user terminal send file encryption request to file encryption server, and the file encryption request is comprising described File to be encrypted and enterprise ID.
In specific implementation, user terminal sends file encryption request to file encryption server, is encrypted and is taken with demand file Business device encrypts file to be encrypted.Wherein, the file encryption request includes the file to be encrypted and enterprise ID.
Enterprise ID is the identity number of enterprise.File encryption server judges the file to be encrypted by enterprise ID Affiliated enterprise.
S3, the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by file encryption server Into feature tag-enterprise's ID mapping table of prebuild.
In specific implementation, feature tag and the enterprise ID that the file to be encrypted is included by file encryption server Corresponding storage is into feature tag-enterprise's ID mapping table of prebuild.
The mapping that feature tag-enterprise's ID mapping table is used to record between the feature tag of enterprise and the enterprise ID of enterprise is closed System.When needing that encryption file is decrypted, need to determine the feature mark of enterprise according to feature tag-enterprise's ID mapping table Label.
S4, file encryption server encrypt the file to be encrypted to obtain encryption file, and by the encryption File is sent to the user terminal.
In specific implementation, file encryption server is encrypted the file to be encrypted to obtain encryption file, and will The encryption file is sent to the user terminal, and this completes the ciphering process to file to be encrypted.
In one embodiment, file encryption server encrypts the file to be encrypted by the public key of itself, Thus the encryption file can only can be decrypted by the private key of file encryption server, improves the safety of encryption file Property.
It should be noted that public key refers to that the key distributed by rivest, shamir, adelman, rivest, shamir, adelman exist Two different keys are used when encryption and decryption, are referred to as public key and private key, pass through the data of public key encryption There is private key that could decrypt, only has public key that could decrypt by the data of private key encryption.Private key is generated by random number algorithm, public key It is generated according to private key, public key and private key pair distribution, wherein disclosed in public key spoon, private key is that individual holds and tightly protects.
S5, if receiving the open command to encryption file, user terminal is encrypted the encryption file as fisrt feature File, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, institute It states file decryption request and includes fisrt feature encryption file and the fisrt feature enterprise ID.
In specific implementation, if receiving the open command to encryption file of user's input, user terminal is by the encryption File encrypts file as fisrt feature, and sends file decryption request, the file decryption to the file encryption server Request includes fisrt feature encryption file and fisrt feature enterprise ID.
S6, file encryption server judge the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table Whether matched with fisrt feature encryption file.
In specific implementation, file encryption server judges that described first is special according to the feature tag-enterprise's ID mapping table Whether sign enterprise ID matches with fisrt feature encryption file.Judge the feature tag institute of the fisrt feature encryption file Whether corresponding enterprise ID identical as the fisrt feature enterprise ID, if they are the same, then the fisrt feature enterprise ID whether with institute State fisrt feature encryption file matching;Otherwise the fisrt feature enterprise ID whether with fisrt feature encryption file not Match.
Referring to Fig. 3, in one embodiment, above step S6 specifically includes following steps S61-S63.
S61, file encryption server obtain feature tag that fisrt feature encryption file includes as first object Feature tag.
In specific implementation, file encryption server obtains first in the file decryption request for receiving user terminal transmission The feature tag for the fisrt feature encryption file for taking the file decryption request to include is as target signature label.
Further, file encryption server includes according to the target signature label and file decryption request Fisrt feature enterprise ID judge fisrt feature encryption file whether be the fisrt feature enterprise ID for enterprise text Part.If fisrt feature encryption file be the fisrt feature enterprise ID for enterprise file, decrypt described the One feature encryption file;Otherwise, the non-decrypting fisrt feature encrypts file.Only have enterprise itself that can decrypt certainly as a result, The encryption file of body improves the safety of enterprise's encryption file.
S62, file encryption server judges whether the first object feature tag is identical as fixed reference feature label, described Fixed reference feature label is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table.
In specific implementation, file encryption server judge the first object feature tag whether with fixed reference feature label phase Together, the fixed reference feature label is spy corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table Levy label.
If the first object feature tag is identical as fixed reference feature label, illustrate that fisrt feature decryption file is The file of the corresponding enterprise of fisrt feature enterprise ID;Otherwise, illustrate that fisrt feature decryption file is not fisrt feature enterprise The file of the corresponding enterprise of industry ID.
S63, if the first object feature tag is identical as the fixed reference feature label, file encryption server determines institute Fisrt feature enterprise ID is stated to match with fisrt feature encryption file.
In specific implementation, if the first object feature tag is identical as the fixed reference feature label, file encryption clothes Business device determines that the fisrt feature enterprise ID is matched with fisrt feature encryption file.
S64, if the first object feature tag and the fixed reference feature label be not identical, file encryption server determines The fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In specific implementation, if the first object feature tag and the fixed reference feature label be not identical, file encryption Server determines that the fisrt feature enterprise ID and fisrt feature encryption file are mismatched.
S7, if whether the fisrt feature enterprise ID matches with fisrt feature encryption file, file encryption server User terminal is sent to after fisrt feature encryption file is decrypted.
In specific implementation, if the first object feature tag is identical as the fixed reference feature label, illustrate this first Characteristic solution ciphertext part is the file of the corresponding enterprise of fisrt feature enterprise ID, and file encryption server is to described first as a result, Feature encryption file is sent to the user terminal after being decrypted, so as to complete the decrypting process to encryption file.
In one embodiment, the private key that file encryption server accordingly passes through itself encrypts file to the fisrt feature User terminal is sent to after being decrypted.
By applying the technical scheme of the present invention, user terminal adds feature tag in original document and obtains ciphertext to be added Part, file encryption server encrypts file to be encrypted to obtain encryption file, and is sent to the user terminal;If connecing The open command to encryption file is received, user terminal is using the encryption file as fisrt feature encryption file, and to the text Part encryption server sends file decryption request;File encryption server judges the feature tag that fisrt feature encryption file includes Whether feature tag corresponding with enterprise ID is identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.By This, only when the feature tag feature tag corresponding with enterprise that encryption file includes is identical, the just meeting of file encryption server Encryption file is decrypted, the safety of encryption file is greatly improved.
Fig. 4 be another embodiment of the present invention provides a kind of file encryption management method flow diagram.Such as Fig. 4 institute Show, the file encryption management method of the present embodiment includes step S101-S112.Wherein step S101-S107 and above-described embodiment In step S1-S7 it is similar, details are not described herein.The following detailed description of in the present embodiment increase step S108-S112.
S108, if whether the fisrt feature enterprise ID mismatches with fisrt feature encryption file, file encryption clothes Business device sends the first miscue message to the user terminal.
In specific implementation, if whether the fisrt feature enterprise ID mismatches with fisrt feature encryption file, file Encryption server sends the first miscue message to the user terminal.First miscue message for inform user this One feature encryption file is not the file of the enterprise, file decryption failure.
S109, if receiving the outgoing instructions to encryption file, the user terminal is using the encryption file as second Feature encryption file, and file outgoing request is sent to file encryption server, the outgoing instructions include targeted mails address And second feature enterprise ID, the file outgoing request include second feature the encryption file, the second feature enterprise ID and the targeted mails address.
In specific implementation, if receiving the outgoing instructions of user's input arrived to encryption file, the outgoing instructions include mesh Mail address is marked, shows that user needs to send the target mailbox address for the encryption file.
The encryption file is encrypted file by the user terminal, and sends to file encryption server File outgoing request.Wherein, the file outgoing request includes second feature the encryption file, the second feature enterprise ID And the targeted mails address.
S110, file encryption server judge the second feature enterprise according to the feature tag-enterprise's ID mapping table Whether ID matches with second feature encryption file.
In specific implementation, file encryption server judges that described second is special according to the feature tag-enterprise's ID mapping table Whether sign enterprise ID matches with second feature encryption file.Judge the feature tag institute of the second feature encryption file Whether corresponding enterprise ID identical as the second feature enterprise ID, if they are the same, then the second feature enterprise ID whether with institute State second feature encryption file matching;Otherwise the second feature enterprise ID whether with second feature encryption file not Match.
S111, if whether the second feature enterprise ID matches with second feature encryption file, file encryption service Device obtains decryption file after second feature encryption file is decrypted, and sending to the targeted mails address includes institute State the mail of decryption file.
In specific implementation, if whether the second feature enterprise ID matches with second feature encryption file, file Encryption server obtains decryption file after second feature encryption file is decrypted, and sends out to the targeted mails address Send the mail comprising the decryption file.
Thereby, it is possible to realize to issue other users for outer after file decryption.It can only solve in the above manner simultaneously Close encryption file improves the safety of encryption file.
In one embodiment, the private key that file encryption server accordingly passes through itself is decrypted to the encryption file After obtain decryption file.
S112, if the second target signature label and the fixed reference feature label be not identical, file encryption server to The user terminal sends the second miscue message.
In specific implementation, if the second target signature label and the fixed reference feature label be not identical, file encryption Server sends the second miscue message to the user terminal.Second miscue message is for informing user first spy Sign encryption file is not the file of the enterprise, file decryption failure, while mail transmission failure.
Fig. 5 is a kind of schematic block diagram of file encryption management system 100 provided in an embodiment of the present invention.As shown in figure 5, Corresponding to the above file encryption management method, the present invention also provides a kind of file encryption management systems 100.This document encryption handling System 100 includes user terminal 90 and file encryption server 80.Specifically, referring to Fig. 5, the user terminal 90 includes Adding unit 91, the first transmission unit 92 and the second transmission unit 93, the file encryption server 80 include storage unit 81, the first encryption unit 82, the first judging unit 83 and the first decryption unit 84.
Adding unit 91, for adding feature tag in original document to obtain file to be encrypted
First transmission unit 92, for sending file encryption request, the file encryption request to file encryption server Include the file to be encrypted and enterprise ID.
Storage unit 81, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted are arrived In the feature tag of prebuild-enterprise's ID mapping table.
First encryption unit 82 for being encrypted to the file to be encrypted to obtain encryption file, and described will add Ciphertext part is sent to user terminal.
Second transmission unit 93, if making the encryption file for receiving the open command to the encryption file File is encrypted for fisrt feature, and sends file decryption request to the file encryption server, the open command includes the One feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID.
First judging unit 83, for judging the fisrt feature enterprise according to the feature tag-enterprise's ID mapping table Whether ID matches with fisrt feature encryption file.
First decryption unit 84, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file, text Part encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
In one embodiment, as shown in fig. 6, first encryption unit 82 includes the second encryption unit 820.
Second encryption unit 821 encrypts the file to be encrypted for the public key by itself described to obtain Encrypt file.
In one embodiment, as shown in fig. 7, first judging unit 83 includes acquiring unit 831, second judgment unit 832, the first judging unit 833 and the second judging unit 834.
Acquiring unit 831, it is special as first object for obtaining the feature tag that the fisrt feature encryption file includes Levy label.
Second judgment unit 832, for judging whether the first object feature tag is identical as fixed reference feature label, institute Stating fixed reference feature label is feature mark corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table Label.
First judging unit 833 determines if identical as the fixed reference feature label for the first object feature tag The fisrt feature enterprise ID is matched with fisrt feature encryption file.
Second judging unit 834 is sentenced if not identical for the first object feature tag and the fixed reference feature label The fixed fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, as shown in figure 8, first decryption unit 84 includes the second decryption unit 841.
Second decryption unit 841, for by the private key of file encryption server to the fisrt feature encrypt file into User terminal is sent to after row decryption.
Fig. 9 be another embodiment of the present invention provides a kind of file encryption management system 100 schematic block diagram.Such as Fig. 9 Shown, the user terminal of the file encryption management system 100 of the present embodiment is that the 4th hair is increased on the basis of above-described embodiment Send unit 94;The file encryption server of the file encryption management system 100 of the present embodiment is increased on the basis of above-described embodiment Third transmission unit 85, third judging unit 86, third decryption unit 87 and the 5th transmission unit 88 are added.
Third transmission unit 85, if being mismatched for the fisrt feature enterprise ID and fisrt feature encryption file, The first miscue message is sent to the user terminal.
4th transmission unit 94, if for receiving the outgoing instructions to encryption file, using the encryption file as the Two feature encryption files, and file outgoing request is sent to file encryption server, the outgoing instructions include targeted mails Location and second feature enterprise ID, the file outgoing request include the second feature encryption file, second feature enterprise Industry ID and the targeted mails address.
Third judging unit 86, for judging the second feature enterprise according to the feature tag-enterprise's ID mapping table Whether ID matches with second feature encryption file.
Third decryption unit 87 is right if matching for the second feature enterprise ID with second feature encryption file The second feature encryption file obtains decryption file after being decrypted, and sending to the targeted mails address includes the solution The mail of ciphertext part.
5th transmission unit 88, if being mismatched for the second feature enterprise ID and second feature encryption file, The second miscue message is sent to the user terminal.
It should be noted that it is apparent to those skilled in the art that, above-mentioned file encryption management system 100 and each unit specific implementation process, can with reference to the corresponding description in preceding method embodiment, for convenience of description and Succinctly, details are not described herein.
The embodiment of the present invention also proposes that a kind of file encryption management system, the file encryption management system include at least two Platform computer equipment, including a file encryption server and an at least user terminal.Referring to Fig. 10, Figure 10 is this Apply for a kind of schematic block diagram for computer equipment that embodiment provides.The computer equipment 500 can be above-mentioned file encryption Server is also possible to the user terminal, and the terminal can be smart phone, tablet computer, laptop, desktop Brain etc. has the electronic equipment of communication function.
Refering to fig. 10, which includes processor 502, memory and the net connected by system bus 501 Network interface 505, wherein memory may include non-volatile memory medium 503 and built-in storage 504.
The non-volatile memory medium 503 can storage program area 5031 and computer program 5032.The computer program 5032 are performed, and processor 502 may make to execute a kind of bidding documents management method.
The processor 502 is for providing calculating and control ability, to support the operation of entire computer equipment 500.
The built-in storage 504 provides environment for the operation of the computer program 5032 in non-volatile memory medium 503, should When computer program 5032 is executed by processor 502, processor 502 may make to execute a kind of bidding documents management method.
The network interface 505 is used to carry out network communication with other equipment.It will be understood by those skilled in the art that in Figure 10 The structure shown, only the block diagram of part-structure relevant to application scheme, does not constitute and is applied to application scheme The restriction of computer equipment 500 thereon, specific computer equipment 500 may include more more or fewer than as shown in the figure Component perhaps combines certain components or with different component layouts.
Wherein, the processor 502 of the user terminal and file encryption server is stored in memory for running Computer program 5032, to realize following steps:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the One feature encryption file is sent to user terminal after being decrypted.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server to described When file to be encrypted is encrypted to obtain encryption Files step, it is implemented as follows step:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption text Part.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server according to institute It states feature tag-enterprise's ID mapping table and judges whether the fisrt feature enterprise ID encrypts file with the fisrt feature and match step When rapid, it is implemented as follows step:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature Label;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the reference Feature tag is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines described the One feature enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, described in the judgement of file encryption server Fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server to described When fisrt feature encryption file is sent to user terminal step after being decrypted, it is implemented as follows step:
File encryption server encrypts after file is decrypted the fisrt feature by the private key of oneself and is sent to use Family terminal.
In one embodiment, the processor 502 of the user terminal and file encryption server is stored in for running Computer program 5032 in reservoir, also realization following steps:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to described User terminal sends the first miscue message;
If receiving the outgoing instructions to encryption file, the encryption file is encrypted text by user terminal Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described Targeted mails address;
Whether file encryption server judges the second feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with second feature encryption file;
If the second feature enterprise ID and the second feature encryption file match, file encryption server is to described the Two feature encryption files obtain decryption file after being decrypted, and sending to the targeted mails address includes the decryption file Mail;
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to described User terminal sends the second miscue message.
It should be appreciated that in the embodiment of the present application, processor 502 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or The processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process, It is that relevant hardware can be instructed to complete by computer program.The computer program can be stored in a storage medium, The storage medium is computer readable storage medium.The computer program is held by least one processor in the computer system Row, to realize the process step of the embodiment of the above method.
Therefore, the present invention also provides a kind of storage mediums.The storage medium can be computer readable storage medium.It is described Storage medium is stored with the first computer program and second computer program, first computer program and second computer journey Sequence can realize following steps when being executed respectively by the processor of the processor of user terminal and file encryption server:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the One feature encryption file is sent to user terminal after being decrypted.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program When file encryption server encrypts the file to be encrypted to obtain encryption Files step, it is implemented as follows step:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption text Part.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program Whether file encryption server judges the fisrt feature enterprise ID with described according to the feature tag-enterprise's ID mapping table When one feature encryption file matching step, it is implemented as follows step:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature Label;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the reference Feature tag is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines described the One feature enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, described in the judgement of file encryption server Fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program When file encryption server is sent to user terminal step after fisrt feature encryption file is decrypted, specific implementation is such as Lower step:
File encryption server encrypts after file is decrypted the fisrt feature by the private key of oneself and is sent to use Family terminal.
In one embodiment, first computer program and second computer program ought be respectively by the processing of user terminal The processor of device and file encryption server also realizes following steps when executing:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to described User terminal sends the first miscue message;
If receiving the outgoing instructions to encryption file, the encryption file is encrypted text by user terminal Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described Targeted mails address;
Whether file encryption server judges the second feature enterprise ID according to the feature tag-enterprise's ID mapping table It is matched with second feature encryption file;
If the second feature enterprise ID and the second feature encryption file match, file encryption server is to described the Two feature encryption files obtain decryption file after being decrypted, and sending to the targeted mails address includes the decryption file Mail;
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to described User terminal sends the second miscue message.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk Or the various computer readable storage mediums that can store program code such as CD.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not It is considered as beyond the scope of this invention.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary.For example, the division of each unit, only Only a kind of logical function partition, there may be another division manner in actual implementation.Such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.This hair Unit in bright embodiment device can be combined, divided and deleted according to actual needs.In addition, in each implementation of the present invention Each functional unit in example can integrate in one processing unit, is also possible to each unit and physically exists alone, can also be with It is that two or more units are integrated in one unit.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product, It can store in one storage medium.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, terminal or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in some embodiment Part, reference can be made to the related descriptions of other embodiments.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, the even these modifications and changes of the present invention range that belongs to the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of file encryption management method characterized by comprising
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request includes the ciphertext to be added Part and enterprise ID;
Pre- structure is arrived in the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by file encryption server In the feature tag built-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and the encryption file is sent To user terminal;
If receiving the open command to the encryption file, the encryption file is encrypted text by user terminal Part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, described File decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
File encryption server according to the feature tag-enterprise's ID mapping table judge the fisrt feature enterprise ID whether with institute State fisrt feature encryption file matching;
If the fisrt feature enterprise ID is matched with fisrt feature encryption file, file encryption server is special to described first Sign encryption file is sent to user terminal after being decrypted.
2. the method according to claim 1, wherein the file encryption server to the file to be encrypted into Row encryption is to obtain encryption file, comprising:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption file.
3. the method according to claim 1, wherein the file encryption server is according to the feature tag- Enterprise's ID mapping table judges whether the fisrt feature enterprise ID matches with fisrt feature encryption file, comprising:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature tag;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the fixed reference feature Label is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines that described first is special Sign enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, file encryption server determines described first Feature enterprise ID and fisrt feature encryption file mismatch.
4. according to the method described in claim 2, it is characterized in that, the file encryption server encrypts the fisrt feature File is sent to user terminal after being decrypted, comprising:
File encryption server encrypts the fisrt feature by the private key of oneself and is sent to user's end after file is decrypted End.
5. the method according to claim 1, wherein the method also includes:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to the user Terminal sends the first miscue message.
6. the method according to claim 1, wherein the method also includes:
If receiving the outgoing instructions to the encryption file, the encryption file is encrypted text by user terminal Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described Targeted mails address;
File encryption server according to the feature tag-enterprise's ID mapping table judge the second feature enterprise ID whether with institute State second feature encryption file matching;
If the second feature enterprise ID is matched with second feature encryption file, file encryption server is special to described second Sign encryption file obtains decryption file after being decrypted, and sends the postal comprising the decryption file to the targeted mails address Part.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to the user Terminal sends the second miscue message.
8. a kind of file encryption management system, which is characterized in that the file encryption management system includes user terminal and text Part encryption server, the user terminal include adding unit, the first transmission unit and the second transmission unit, and the file adds Close server includes storage unit, the first encryption unit, the first judging unit and the first decryption unit, in which:
The adding unit, for adding feature tag in original document to obtain file to be encrypted;
First transmission unit, for sending file encryption request, the file encryption request packet to file encryption server Containing the file to be encrypted and enterprise ID;
The storage unit, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted is in advance In the feature tag of building-enterprise's ID mapping table;
First encryption unit, for being encrypted to the file to be encrypted to obtain encryption file, and by the encryption File is sent to user terminal;
Second transmission unit, if for receive to it is described encryption file open command, using the encryption file as Fisrt feature encrypts file, and sends file decryption request to the file encryption server, and the open command includes first Feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID;
First judging unit, for judging the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table Whether matched with fisrt feature encryption file;
First decryption unit, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file, file Encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
9. a kind of file encryption management system, which is characterized in that including user terminal and file encryption server, the user Terminal and file encryption server include memory, processor and are stored on the memory and can be in the processor The processor of the computer program of upper operation, the user terminal and file encryption server executes corresponding computer program Shi Gongtong realizes such as method of any of claims 1-7.
10. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with the first computer program and Two computer programs, first computer program and second computer program ought be respectively by the processor of user terminal and files The processor of encryption server can be realized when executing such as method of any of claims 1-7.
CN201910666732.7A 2019-07-23 2019-07-23 File encryption management method, system and computer readable storage medium Pending CN110532796A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910666732.7A CN110532796A (en) 2019-07-23 2019-07-23 File encryption management method, system and computer readable storage medium
PCT/CN2019/121817 WO2021012563A1 (en) 2019-07-23 2019-11-29 File encryption management method and system, and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910666732.7A CN110532796A (en) 2019-07-23 2019-07-23 File encryption management method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110532796A true CN110532796A (en) 2019-12-03

Family

ID=68661882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910666732.7A Pending CN110532796A (en) 2019-07-23 2019-07-23 File encryption management method, system and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN110532796A (en)
WO (1) WO2021012563A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339543A (en) * 2020-02-27 2020-06-26 深信服科技股份有限公司 File processing method and device, equipment and storage medium
CN112632588A (en) * 2020-12-30 2021-04-09 中国农业银行股份有限公司 Text encryption method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230264A1 (en) * 2005-04-07 2006-10-12 International Business Machines Corporation Backup restore in a corporate infrastructure
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102142073A (en) * 2010-12-27 2011-08-03 成都网安科技发展有限公司 System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet
CN104917769A (en) * 2015-06-11 2015-09-16 北京嘉和美康信息技术有限公司 Electronic medical record signature method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060230264A1 (en) * 2005-04-07 2006-10-12 International Business Machines Corporation Backup restore in a corporate infrastructure
CN101702150A (en) * 2009-12-02 2010-05-05 江西金格网络科技有限责任公司 Method for protecting, verifying and repealing content of PDF document page
CN102142073A (en) * 2010-12-27 2011-08-03 成都网安科技发展有限公司 System for preventing and identifying disclosure of paper documents based on hidden watermarks
CN103685138A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Method and system for authenticating application software of Android platform on mobile internet
CN104917769A (en) * 2015-06-11 2015-09-16 北京嘉和美康信息技术有限公司 Electronic medical record signature method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339543A (en) * 2020-02-27 2020-06-26 深信服科技股份有限公司 File processing method and device, equipment and storage medium
CN111339543B (en) * 2020-02-27 2023-07-14 深信服科技股份有限公司 File processing method and device, equipment and storage medium
CN112632588A (en) * 2020-12-30 2021-04-09 中国农业银行股份有限公司 Text encryption method and device

Also Published As

Publication number Publication date
WO2021012563A1 (en) 2021-01-28

Similar Documents

Publication Publication Date Title
TWI701623B (en) Logistics information transmission method, system and device based on blockchain
CN107786328A (en) A kind of method, service node device and computer-readable medium for generating key
CN108154038B (en) Data processing method and device
CN110086817B (en) Reliable user service system and method
CN108900533A (en) A kind of shared data method for secret protection, system, terminal and medium
EP2743842A1 (en) Secure search processing system and secure search processing method
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN112508722B (en) Policy information verification method and device based on zero knowledge proof
El Bouchti et al. Encryption as a service for data healthcare cloud security
CN108768963A (en) The communication means and system of trusted application and safety element
CN108681676A (en) Data managing method and device, system, electronic equipment, program and storage medium
EP2354996A1 (en) Apparatus and method for remote processing while securing classified data
CN109347625A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN108270739A (en) A kind of method and device of managing encrypted information
CN106688220A (en) Conditional access to services based on device claims
CN109697370A (en) Database data encipher-decipher method, device, computer equipment and storage medium
CN108718323A (en) A kind of identity identifying method and system
CN109492424A (en) Data assets management method, data assets managing device and computer-readable medium
CN109660534A (en) Safety certifying method, device, electronic equipment and storage medium based on more trade companies
CN110532796A (en) File encryption management method, system and computer readable storage medium
US20210281555A1 (en) Api key access authorization
CN104956393B (en) It is communicated using user descriptors with the third party that social networking system user carries out
US11240243B2 (en) Preventing statistical inference attacks on data that is shared among multiple stakeholders with disjoint access privileges
CN109872223B (en) Virtual article transaction method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination