CN110532796A - File encryption management method, system and computer readable storage medium - Google Patents
File encryption management method, system and computer readable storage medium Download PDFInfo
- Publication number
- CN110532796A CN110532796A CN201910666732.7A CN201910666732A CN110532796A CN 110532796 A CN110532796 A CN 110532796A CN 201910666732 A CN201910666732 A CN 201910666732A CN 110532796 A CN110532796 A CN 110532796A
- Authority
- CN
- China
- Prior art keywords
- file
- encryption
- feature
- enterprise
- fisrt feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The embodiment of the invention discloses a kind of file encryption management method, system and computer readable storage mediums.This method belongs to technical field of network security, this method comprises: user terminal adds feature tag in original document obtains file to be encrypted, file encryption server is encrypted file to be encrypted to obtain encryption file, and is sent to the user terminal;If receiving the open command to encryption file, the encryption file is encrypted file by user terminal, and sends file decryption request to the file encryption server;Whether corresponding with enterprise ID the feature tag feature tag that file encryption server judges that fisrt feature encryption file includes be identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.As a result, only when the feature tag feature tag corresponding with enterprise that encryption file includes is identical, file encryption server can be just decrypted encryption file, greatly improve the safety of encryption file.
Description
Technical field
The present invention relates to technical field of data security more particularly to a kind of file encryption management methods, system and computer
Readable storage medium storing program for executing.
Background technique
With increasingly fierce, the importance of more and more Enterprise Consciousness to enterprise security of competition among enterprises.Enterprise security
It is that enterprise is instigated to be in comprehensively reliably, by state of a control.
In order to achieve the purpose that enterprise security, enterprise has put into effect miscellaneous safety measure.Wherein, it is ensured that enterprise-essential
The safety of file is pith therein.In the prior art, due to frequently resulting in enterprise-essential to the lack of standardization of file management
File leakage, brings huge loss to enterprise.
Summary of the invention
The embodiment of the invention provides a kind of file encryption management method, system and computer readable storage mediums, it is intended to
Solve the problems, such as that the prior art is unable to ensure enterprise-essential file security.
In a first aspect, the embodiment of the invention provides a kind of file encryption management methods comprising:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added
Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID
In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file
It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature
Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID,
The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the
One feature encryption file is sent to user terminal after being decrypted.
Second aspect, the embodiment of the invention also provides a kind of file encryption management system, file encryption management systems
System includes user terminal and file encryption server, and the user terminal includes adding unit, the first transmission unit and the
Two transmission units, the file encryption server include storage unit, the first encryption unit, the first judging unit and the first solution
Close unit, in which:
The adding unit, for adding feature tag in original document to obtain file to be encrypted;
First transmission unit, for sending file encryption request to file encryption server, the file encryption is asked
It asks comprising the file to be encrypted and enterprise ID;
The storage unit, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted
Into feature tag-enterprise's ID mapping table of prebuild;
First encryption unit, for being encrypted to the file to be encrypted to obtain encryption file, and will be described
Encryption file is sent to user terminal;
Second transmission unit, if for receiving the open command to the encryption file, by the encryption file
File is encrypted as fisrt feature, and sends file decryption request to the file encryption server, the open command includes
Fisrt feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise
ID;
First judging unit, for judging that the fisrt feature is looked forward to according to the feature tag-enterprise's ID mapping table
Whether industry ID matches with fisrt feature encryption file;
First decryption unit, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file,
File encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
The third aspect, the embodiment of the invention also provides a kind of file encryption management systems, including user terminal and text
Part encryption server, the user terminal and file encryption server include memory, processor and are stored in described deposit
On reservoir and the computer program that can run on the processor, the processing of the user terminal and file encryption server
Method as described in relation to the first aspect is realized when device executes corresponding computer program jointly.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage medium, the storage medium storage
Have the first computer program and second computer program, first computer program and second computer program ought respectively by with
The processor of family terminal and the processor of file encryption server can realize method as described in relation to the first aspect when executing.
The embodiment of the invention provides a kind of file encryption management method, system and computer readable storage mediums.Wherein,
The described method includes: user terminal adds feature tag in original document to obtain file to be encrypted;User terminal is to file
Encryption server sends file encryption request, and the file encryption request includes the file to be encrypted and enterprise ID;File
The feature of prebuild is arrived in the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by encryption server
In label-enterprise's ID mapping table;File encryption server encrypts the file to be encrypted to obtain encryption file, and will
The encryption file is sent to user terminal;If receiving the open command to the encryption file, user terminal described will add
Ciphertext part encrypts file as fisrt feature, and sends file decryption request to the file encryption server, and the unlatching refers to
Enabling includes fisrt feature enterprise ID, and the file decryption request includes fisrt feature encryption file and the fisrt feature
Enterprise ID;Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with fisrt feature encryption file;If the fisrt feature enterprise ID is matched with fisrt feature encryption file, text
Part encryption server is sent to user terminal after fisrt feature encryption file is decrypted.The technology of the embodiment of the present invention
Scheme, user terminal add feature tag in original document and obtain file to be encrypted, and file encryption server is to text to be encrypted
Part is encrypted to obtain encryption file, and is sent to the user terminal;If receiving the open command to encryption file, use
The encryption file is encrypted file by family terminal, and sends file decryption to the file encryption server and ask
It asks;File encryption server judges the feature tag feature tag whether corresponding with enterprise ID that fisrt feature encryption file includes
It is identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.The spy for only including in encryption file as a result,
When sign label feature tag corresponding with enterprise is identical, file encryption server can be just decrypted encryption file, greatly
Improve the safety of encryption file.
Detailed description of the invention
Technical solution in order to illustrate the embodiments of the present invention more clearly, below will be to needed in embodiment description
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of application scenarios schematic diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 3 is a kind of sub-process schematic diagram of file encryption management method provided in an embodiment of the present invention;
Fig. 4 be another embodiment of the present invention provides file encryption management method flow diagram;
Fig. 5 is a kind of schematic block diagram of file encryption management system provided in an embodiment of the present invention;
Fig. 6 is a kind of the first encryption of file encryption server of file encryption management system provided in an embodiment of the present invention
The schematic block diagram of unit;
Fig. 7 is a kind of the first judgement of file encryption server of file encryption management system provided in an embodiment of the present invention
The schematic block diagram of unit;
Fig. 8 is a kind of the first decryption of file encryption server of file encryption management system provided in an embodiment of the present invention
The schematic block diagram of unit;
Fig. 9 be another embodiment of the present invention provides a kind of file encryption management system schematic block diagram;And
Figure 10 is a kind of schematic block diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
Fig. 1 and Fig. 2 are please referred to, Fig. 1 is a kind of application scenarios of file encryption management method provided in an embodiment of the present invention
Schematic diagram.Fig. 2 is a kind of schematic flow chart of file encryption management method provided in an embodiment of the present invention.This document encryption pipe
Reason method is applied in file encryption management system.This document management system includes user terminal 1 and file encryption server
2.User terminal 1 adds feature tag in original document to obtain file to be encrypted;User terminal 1 is to file encryption server
2 send file encryption request, and the file encryption request includes the file to be encrypted and enterprise ID;File encryption server
Feature tag-enterprise of prebuild is arrived in 2 feature tags for including by the file to be encrypted and the corresponding storage of the enterprise ID
In ID mapping table;File encryption server 2 encrypts the file to be encrypted to obtain encryption file, and by the encryption
File is sent to user terminal 1;If receiving the open command to the encryption file, user terminal 1 is by the encryption file
File is encrypted as fisrt feature, and sends file decryption request to the file encryption server 2, the open command includes
Fisrt feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise
ID;File encryption server 2 according to the feature tag-enterprise's ID mapping table judge the fisrt feature enterprise ID whether with institute
State fisrt feature encryption file matching;If the fisrt feature enterprise ID is matched with fisrt feature encryption file, file adds
Close server 2 is sent to user terminal 1 after fisrt feature encryption file is decrypted.
Fig. 2 is a kind of flow diagram of file encryption management method provided in an embodiment of the present invention.As shown, the party
Method includes the following steps S1-S8.
S1, user terminal add feature tag in original document to obtain file to be encrypted.
In specific implementation, original document refers to the file of storage in the terminal, may particularly include word file, EXL file
Vital document in equal enterprises.
User terminal adds feature tag in original document to obtain file to be encrypted.By feature tag can identify to
Encrypt enterprise belonging to file.The feature tag of different enterprises is different, and the signature identification of the terminal in same enterprise is identical.
It should be noted that feature tag is specially an identification strings, which is used for the unique identification enterprise
Industry.The identification strings can be set by the user, for example, in one embodiment, identification strings are " zxcv1230 ".
Specifically, can by tag control software (such as: Tag Tower) come for file add feature tag.
S2, user terminal send file encryption request to file encryption server, and the file encryption request is comprising described
File to be encrypted and enterprise ID.
In specific implementation, user terminal sends file encryption request to file encryption server, is encrypted and is taken with demand file
Business device encrypts file to be encrypted.Wherein, the file encryption request includes the file to be encrypted and enterprise ID.
Enterprise ID is the identity number of enterprise.File encryption server judges the file to be encrypted by enterprise ID
Affiliated enterprise.
S3, the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by file encryption server
Into feature tag-enterprise's ID mapping table of prebuild.
In specific implementation, feature tag and the enterprise ID that the file to be encrypted is included by file encryption server
Corresponding storage is into feature tag-enterprise's ID mapping table of prebuild.
The mapping that feature tag-enterprise's ID mapping table is used to record between the feature tag of enterprise and the enterprise ID of enterprise is closed
System.When needing that encryption file is decrypted, need to determine the feature mark of enterprise according to feature tag-enterprise's ID mapping table
Label.
S4, file encryption server encrypt the file to be encrypted to obtain encryption file, and by the encryption
File is sent to the user terminal.
In specific implementation, file encryption server is encrypted the file to be encrypted to obtain encryption file, and will
The encryption file is sent to the user terminal, and this completes the ciphering process to file to be encrypted.
In one embodiment, file encryption server encrypts the file to be encrypted by the public key of itself,
Thus the encryption file can only can be decrypted by the private key of file encryption server, improves the safety of encryption file
Property.
It should be noted that public key refers to that the key distributed by rivest, shamir, adelman, rivest, shamir, adelman exist
Two different keys are used when encryption and decryption, are referred to as public key and private key, pass through the data of public key encryption
There is private key that could decrypt, only has public key that could decrypt by the data of private key encryption.Private key is generated by random number algorithm, public key
It is generated according to private key, public key and private key pair distribution, wherein disclosed in public key spoon, private key is that individual holds and tightly protects.
S5, if receiving the open command to encryption file, user terminal is encrypted the encryption file as fisrt feature
File, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, institute
It states file decryption request and includes fisrt feature encryption file and the fisrt feature enterprise ID.
In specific implementation, if receiving the open command to encryption file of user's input, user terminal is by the encryption
File encrypts file as fisrt feature, and sends file decryption request, the file decryption to the file encryption server
Request includes fisrt feature encryption file and fisrt feature enterprise ID.
S6, file encryption server judge the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
Whether matched with fisrt feature encryption file.
In specific implementation, file encryption server judges that described first is special according to the feature tag-enterprise's ID mapping table
Whether sign enterprise ID matches with fisrt feature encryption file.Judge the feature tag institute of the fisrt feature encryption file
Whether corresponding enterprise ID identical as the fisrt feature enterprise ID, if they are the same, then the fisrt feature enterprise ID whether with institute
State fisrt feature encryption file matching;Otherwise the fisrt feature enterprise ID whether with fisrt feature encryption file not
Match.
Referring to Fig. 3, in one embodiment, above step S6 specifically includes following steps S61-S63.
S61, file encryption server obtain feature tag that fisrt feature encryption file includes as first object
Feature tag.
In specific implementation, file encryption server obtains first in the file decryption request for receiving user terminal transmission
The feature tag for the fisrt feature encryption file for taking the file decryption request to include is as target signature label.
Further, file encryption server includes according to the target signature label and file decryption request
Fisrt feature enterprise ID judge fisrt feature encryption file whether be the fisrt feature enterprise ID for enterprise text
Part.If fisrt feature encryption file be the fisrt feature enterprise ID for enterprise file, decrypt described the
One feature encryption file;Otherwise, the non-decrypting fisrt feature encrypts file.Only have enterprise itself that can decrypt certainly as a result,
The encryption file of body improves the safety of enterprise's encryption file.
S62, file encryption server judges whether the first object feature tag is identical as fixed reference feature label, described
Fixed reference feature label is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table.
In specific implementation, file encryption server judge the first object feature tag whether with fixed reference feature label phase
Together, the fixed reference feature label is spy corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table
Levy label.
If the first object feature tag is identical as fixed reference feature label, illustrate that fisrt feature decryption file is
The file of the corresponding enterprise of fisrt feature enterprise ID;Otherwise, illustrate that fisrt feature decryption file is not fisrt feature enterprise
The file of the corresponding enterprise of industry ID.
S63, if the first object feature tag is identical as the fixed reference feature label, file encryption server determines institute
Fisrt feature enterprise ID is stated to match with fisrt feature encryption file.
In specific implementation, if the first object feature tag is identical as the fixed reference feature label, file encryption clothes
Business device determines that the fisrt feature enterprise ID is matched with fisrt feature encryption file.
S64, if the first object feature tag and the fixed reference feature label be not identical, file encryption server determines
The fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In specific implementation, if the first object feature tag and the fixed reference feature label be not identical, file encryption
Server determines that the fisrt feature enterprise ID and fisrt feature encryption file are mismatched.
S7, if whether the fisrt feature enterprise ID matches with fisrt feature encryption file, file encryption server
User terminal is sent to after fisrt feature encryption file is decrypted.
In specific implementation, if the first object feature tag is identical as the fixed reference feature label, illustrate this first
Characteristic solution ciphertext part is the file of the corresponding enterprise of fisrt feature enterprise ID, and file encryption server is to described first as a result,
Feature encryption file is sent to the user terminal after being decrypted, so as to complete the decrypting process to encryption file.
In one embodiment, the private key that file encryption server accordingly passes through itself encrypts file to the fisrt feature
User terminal is sent to after being decrypted.
By applying the technical scheme of the present invention, user terminal adds feature tag in original document and obtains ciphertext to be added
Part, file encryption server encrypts file to be encrypted to obtain encryption file, and is sent to the user terminal;If connecing
The open command to encryption file is received, user terminal is using the encryption file as fisrt feature encryption file, and to the text
Part encryption server sends file decryption request;File encryption server judges the feature tag that fisrt feature encryption file includes
Whether feature tag corresponding with enterprise ID is identical, if so, decryption fisrt feature encryption file cocurrent gives user terminal.By
This, only when the feature tag feature tag corresponding with enterprise that encryption file includes is identical, the just meeting of file encryption server
Encryption file is decrypted, the safety of encryption file is greatly improved.
Fig. 4 be another embodiment of the present invention provides a kind of file encryption management method flow diagram.Such as Fig. 4 institute
Show, the file encryption management method of the present embodiment includes step S101-S112.Wherein step S101-S107 and above-described embodiment
In step S1-S7 it is similar, details are not described herein.The following detailed description of in the present embodiment increase step S108-S112.
S108, if whether the fisrt feature enterprise ID mismatches with fisrt feature encryption file, file encryption clothes
Business device sends the first miscue message to the user terminal.
In specific implementation, if whether the fisrt feature enterprise ID mismatches with fisrt feature encryption file, file
Encryption server sends the first miscue message to the user terminal.First miscue message for inform user this
One feature encryption file is not the file of the enterprise, file decryption failure.
S109, if receiving the outgoing instructions to encryption file, the user terminal is using the encryption file as second
Feature encryption file, and file outgoing request is sent to file encryption server, the outgoing instructions include targeted mails address
And second feature enterprise ID, the file outgoing request include second feature the encryption file, the second feature enterprise
ID and the targeted mails address.
In specific implementation, if receiving the outgoing instructions of user's input arrived to encryption file, the outgoing instructions include mesh
Mail address is marked, shows that user needs to send the target mailbox address for the encryption file.
The encryption file is encrypted file by the user terminal, and sends to file encryption server
File outgoing request.Wherein, the file outgoing request includes second feature the encryption file, the second feature enterprise ID
And the targeted mails address.
S110, file encryption server judge the second feature enterprise according to the feature tag-enterprise's ID mapping table
Whether ID matches with second feature encryption file.
In specific implementation, file encryption server judges that described second is special according to the feature tag-enterprise's ID mapping table
Whether sign enterprise ID matches with second feature encryption file.Judge the feature tag institute of the second feature encryption file
Whether corresponding enterprise ID identical as the second feature enterprise ID, if they are the same, then the second feature enterprise ID whether with institute
State second feature encryption file matching;Otherwise the second feature enterprise ID whether with second feature encryption file not
Match.
S111, if whether the second feature enterprise ID matches with second feature encryption file, file encryption service
Device obtains decryption file after second feature encryption file is decrypted, and sending to the targeted mails address includes institute
State the mail of decryption file.
In specific implementation, if whether the second feature enterprise ID matches with second feature encryption file, file
Encryption server obtains decryption file after second feature encryption file is decrypted, and sends out to the targeted mails address
Send the mail comprising the decryption file.
Thereby, it is possible to realize to issue other users for outer after file decryption.It can only solve in the above manner simultaneously
Close encryption file improves the safety of encryption file.
In one embodiment, the private key that file encryption server accordingly passes through itself is decrypted to the encryption file
After obtain decryption file.
S112, if the second target signature label and the fixed reference feature label be not identical, file encryption server to
The user terminal sends the second miscue message.
In specific implementation, if the second target signature label and the fixed reference feature label be not identical, file encryption
Server sends the second miscue message to the user terminal.Second miscue message is for informing user first spy
Sign encryption file is not the file of the enterprise, file decryption failure, while mail transmission failure.
Fig. 5 is a kind of schematic block diagram of file encryption management system 100 provided in an embodiment of the present invention.As shown in figure 5,
Corresponding to the above file encryption management method, the present invention also provides a kind of file encryption management systems 100.This document encryption handling
System 100 includes user terminal 90 and file encryption server 80.Specifically, referring to Fig. 5, the user terminal 90 includes
Adding unit 91, the first transmission unit 92 and the second transmission unit 93, the file encryption server 80 include storage unit
81, the first encryption unit 82, the first judging unit 83 and the first decryption unit 84.
Adding unit 91, for adding feature tag in original document to obtain file to be encrypted
First transmission unit 92, for sending file encryption request, the file encryption request to file encryption server
Include the file to be encrypted and enterprise ID.
Storage unit 81, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted are arrived
In the feature tag of prebuild-enterprise's ID mapping table.
First encryption unit 82 for being encrypted to the file to be encrypted to obtain encryption file, and described will add
Ciphertext part is sent to user terminal.
Second transmission unit 93, if making the encryption file for receiving the open command to the encryption file
File is encrypted for fisrt feature, and sends file decryption request to the file encryption server, the open command includes the
One feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID.
First judging unit 83, for judging the fisrt feature enterprise according to the feature tag-enterprise's ID mapping table
Whether ID matches with fisrt feature encryption file.
First decryption unit 84, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file, text
Part encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
In one embodiment, as shown in fig. 6, first encryption unit 82 includes the second encryption unit 820.
Second encryption unit 821 encrypts the file to be encrypted for the public key by itself described to obtain
Encrypt file.
In one embodiment, as shown in fig. 7, first judging unit 83 includes acquiring unit 831, second judgment unit
832, the first judging unit 833 and the second judging unit 834.
Acquiring unit 831, it is special as first object for obtaining the feature tag that the fisrt feature encryption file includes
Levy label.
Second judgment unit 832, for judging whether the first object feature tag is identical as fixed reference feature label, institute
Stating fixed reference feature label is feature mark corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table
Label.
First judging unit 833 determines if identical as the fixed reference feature label for the first object feature tag
The fisrt feature enterprise ID is matched with fisrt feature encryption file.
Second judging unit 834 is sentenced if not identical for the first object feature tag and the fixed reference feature label
The fixed fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, as shown in figure 8, first decryption unit 84 includes the second decryption unit 841.
Second decryption unit 841, for by the private key of file encryption server to the fisrt feature encrypt file into
User terminal is sent to after row decryption.
Fig. 9 be another embodiment of the present invention provides a kind of file encryption management system 100 schematic block diagram.Such as Fig. 9
Shown, the user terminal of the file encryption management system 100 of the present embodiment is that the 4th hair is increased on the basis of above-described embodiment
Send unit 94;The file encryption server of the file encryption management system 100 of the present embodiment is increased on the basis of above-described embodiment
Third transmission unit 85, third judging unit 86, third decryption unit 87 and the 5th transmission unit 88 are added.
Third transmission unit 85, if being mismatched for the fisrt feature enterprise ID and fisrt feature encryption file,
The first miscue message is sent to the user terminal.
4th transmission unit 94, if for receiving the outgoing instructions to encryption file, using the encryption file as the
Two feature encryption files, and file outgoing request is sent to file encryption server, the outgoing instructions include targeted mails
Location and second feature enterprise ID, the file outgoing request include the second feature encryption file, second feature enterprise
Industry ID and the targeted mails address.
Third judging unit 86, for judging the second feature enterprise according to the feature tag-enterprise's ID mapping table
Whether ID matches with second feature encryption file.
Third decryption unit 87 is right if matching for the second feature enterprise ID with second feature encryption file
The second feature encryption file obtains decryption file after being decrypted, and sending to the targeted mails address includes the solution
The mail of ciphertext part.
5th transmission unit 88, if being mismatched for the second feature enterprise ID and second feature encryption file,
The second miscue message is sent to the user terminal.
It should be noted that it is apparent to those skilled in the art that, above-mentioned file encryption management system
100 and each unit specific implementation process, can with reference to the corresponding description in preceding method embodiment, for convenience of description and
Succinctly, details are not described herein.
The embodiment of the present invention also proposes that a kind of file encryption management system, the file encryption management system include at least two
Platform computer equipment, including a file encryption server and an at least user terminal.Referring to Fig. 10, Figure 10 is this
Apply for a kind of schematic block diagram for computer equipment that embodiment provides.The computer equipment 500 can be above-mentioned file encryption
Server is also possible to the user terminal, and the terminal can be smart phone, tablet computer, laptop, desktop
Brain etc. has the electronic equipment of communication function.
Refering to fig. 10, which includes processor 502, memory and the net connected by system bus 501
Network interface 505, wherein memory may include non-volatile memory medium 503 and built-in storage 504.
The non-volatile memory medium 503 can storage program area 5031 and computer program 5032.The computer program
5032 are performed, and processor 502 may make to execute a kind of bidding documents management method.
The processor 502 is for providing calculating and control ability, to support the operation of entire computer equipment 500.
The built-in storage 504 provides environment for the operation of the computer program 5032 in non-volatile memory medium 503, should
When computer program 5032 is executed by processor 502, processor 502 may make to execute a kind of bidding documents management method.
The network interface 505 is used to carry out network communication with other equipment.It will be understood by those skilled in the art that in Figure 10
The structure shown, only the block diagram of part-structure relevant to application scheme, does not constitute and is applied to application scheme
The restriction of computer equipment 500 thereon, specific computer equipment 500 may include more more or fewer than as shown in the figure
Component perhaps combines certain components or with different component layouts.
Wherein, the processor 502 of the user terminal and file encryption server is stored in memory for running
Computer program 5032, to realize following steps:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added
Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID
In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file
It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature
Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID,
The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the
One feature encryption file is sent to user terminal after being decrypted.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server to described
When file to be encrypted is encrypted to obtain encryption Files step, it is implemented as follows step:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption text
Part.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server according to institute
It states feature tag-enterprise's ID mapping table and judges whether the fisrt feature enterprise ID encrypts file with the fisrt feature and match step
When rapid, it is implemented as follows step:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature
Label;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the reference
Feature tag is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines described the
One feature enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, described in the judgement of file encryption server
Fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, the processor 502 of file encryption server is realizing the file encryption server to described
When fisrt feature encryption file is sent to user terminal step after being decrypted, it is implemented as follows step:
File encryption server encrypts after file is decrypted the fisrt feature by the private key of oneself and is sent to use
Family terminal.
In one embodiment, the processor 502 of the user terminal and file encryption server is stored in for running
Computer program 5032 in reservoir, also realization following steps:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to described
User terminal sends the first miscue message;
If receiving the outgoing instructions to encryption file, the encryption file is encrypted text by user terminal
Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special
Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described
Targeted mails address;
Whether file encryption server judges the second feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with second feature encryption file;
If the second feature enterprise ID and the second feature encryption file match, file encryption server is to described the
Two feature encryption files obtain decryption file after being decrypted, and sending to the targeted mails address includes the decryption file
Mail;
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to described
User terminal sends the second miscue message.
It should be appreciated that in the embodiment of the present application, processor 502 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable GateArray, FPGA) or other programmable logic devices
Part, discrete gate or transistor logic, discrete hardware components etc..Wherein, general processor can be microprocessor or
The processor is also possible to any conventional processor etc..
Those of ordinary skill in the art will appreciate that be realize above-described embodiment method in all or part of the process,
It is that relevant hardware can be instructed to complete by computer program.The computer program can be stored in a storage medium,
The storage medium is computer readable storage medium.The computer program is held by least one processor in the computer system
Row, to realize the process step of the embodiment of the above method.
Therefore, the present invention also provides a kind of storage mediums.The storage medium can be computer readable storage medium.It is described
Storage medium is stored with the first computer program and second computer program, first computer program and second computer journey
Sequence can realize following steps when being executed respectively by the processor of the processor of user terminal and file encryption server:
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request is comprising described to be added
Ciphertext part and enterprise ID;
File encryption server arrives the feature tag that the file to be encrypted includes and the corresponding storage of the enterprise ID
In the feature tag of prebuild-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and by the encryption file
It is sent to user terminal;
If receiving the open command to the encryption file, user terminal adds using the encryption file as fisrt feature
Ciphertext part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID,
The file decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
Whether file encryption server judges the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with fisrt feature encryption file;
If the fisrt feature enterprise ID and the fisrt feature encryption file match, file encryption server is to described the
One feature encryption file is sent to user terminal after being decrypted.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program
When file encryption server encrypts the file to be encrypted to obtain encryption Files step, it is implemented as follows step:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption text
Part.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program
Whether file encryption server judges the fisrt feature enterprise ID with described according to the feature tag-enterprise's ID mapping table
When one feature encryption file matching step, it is implemented as follows step:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature
Label;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the reference
Feature tag is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines described the
One feature enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, described in the judgement of file encryption server
Fisrt feature enterprise ID and fisrt feature encryption file mismatch.
In one embodiment, the processor of file encryption server is realized described in the execution second computer program
When file encryption server is sent to user terminal step after fisrt feature encryption file is decrypted, specific implementation is such as
Lower step:
File encryption server encrypts after file is decrypted the fisrt feature by the private key of oneself and is sent to use
Family terminal.
In one embodiment, first computer program and second computer program ought be respectively by the processing of user terminal
The processor of device and file encryption server also realizes following steps when executing:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to described
User terminal sends the first miscue message;
If receiving the outgoing instructions to encryption file, the encryption file is encrypted text by user terminal
Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special
Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described
Targeted mails address;
Whether file encryption server judges the second feature enterprise ID according to the feature tag-enterprise's ID mapping table
It is matched with second feature encryption file;
If the second feature enterprise ID and the second feature encryption file match, file encryption server is to described the
Two feature encryption files obtain decryption file after being decrypted, and sending to the targeted mails address includes the decryption file
Mail;
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to described
User terminal sends the second miscue message.
The storage medium can be USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), magnetic disk
Or the various computer readable storage mediums that can store program code such as CD.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, each exemplary composition and step are generally described according to function in the above description.This
A little functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Specially
Industry technical staff can use different methods to achieve the described function each specific application, but this realization is not
It is considered as beyond the scope of this invention.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary.For example, the division of each unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation.Such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.This hair
Unit in bright embodiment device can be combined, divided and deleted according to actual needs.In addition, in each implementation of the present invention
Each functional unit in example can integrate in one processing unit, is also possible to each unit and physically exists alone, can also be with
It is that two or more units are integrated in one unit.
If the integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product,
It can store in one storage medium.Based on this understanding, technical solution of the present invention is substantially in other words to existing skill
The all or part of part or the technical solution that art contributes can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, terminal or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in some embodiment
Part, reference can be made to the related descriptions of other embodiments.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, the even these modifications and changes of the present invention range that belongs to the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in various equivalent modifications or replace
It changes, these modifications or substitutions should be covered by the protection scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection scope subject to.
Claims (10)
1. a kind of file encryption management method characterized by comprising
User terminal adds feature tag in original document to obtain file to be encrypted;
User terminal sends file encryption request to file encryption server, and the file encryption request includes the ciphertext to be added
Part and enterprise ID;
Pre- structure is arrived in the corresponding storage of the feature tag and the enterprise ID that the file to be encrypted is included by file encryption server
In the feature tag built-enterprise's ID mapping table;
File encryption server encrypts the file to be encrypted to obtain encryption file, and the encryption file is sent
To user terminal;
If receiving the open command to the encryption file, the encryption file is encrypted text by user terminal
Part, and file decryption request is sent to the file encryption server, the open command includes fisrt feature enterprise ID, described
File decryption request includes fisrt feature encryption file and the fisrt feature enterprise ID;
File encryption server according to the feature tag-enterprise's ID mapping table judge the fisrt feature enterprise ID whether with institute
State fisrt feature encryption file matching;
If the fisrt feature enterprise ID is matched with fisrt feature encryption file, file encryption server is special to described first
Sign encryption file is sent to user terminal after being decrypted.
2. the method according to claim 1, wherein the file encryption server to the file to be encrypted into
Row encryption is to obtain encryption file, comprising:
File encryption server encrypts the file to be encrypted by the public key of itself to obtain the encryption file.
3. the method according to claim 1, wherein the file encryption server is according to the feature tag-
Enterprise's ID mapping table judges whether the fisrt feature enterprise ID matches with fisrt feature encryption file, comprising:
File encryption server obtains feature tag that fisrt feature encryption file includes as first object feature tag;
File encryption server judges whether the first object feature tag is identical as fixed reference feature label, the fixed reference feature
Label is feature tag corresponding with the fisrt feature enterprise ID in the feature tag-enterprise's ID mapping table;
If the first object feature tag is identical as the fixed reference feature label, file encryption server determines that described first is special
Sign enterprise ID is matched with fisrt feature encryption file;
If the first object feature tag and the fixed reference feature label be not identical, file encryption server determines described first
Feature enterprise ID and fisrt feature encryption file mismatch.
4. according to the method described in claim 2, it is characterized in that, the file encryption server encrypts the fisrt feature
File is sent to user terminal after being decrypted, comprising:
File encryption server encrypts the fisrt feature by the private key of oneself and is sent to user's end after file is decrypted
End.
5. the method according to claim 1, wherein the method also includes:
If the fisrt feature enterprise ID and fisrt feature encryption file mismatch, file encryption server is to the user
Terminal sends the first miscue message.
6. the method according to claim 1, wherein the method also includes:
If receiving the outgoing instructions to the encryption file, the encryption file is encrypted text by user terminal
Part, and file outgoing request is sent to file encryption server, the outgoing instructions include that targeted mails address and second are special
Levy enterprise ID, the file outgoing request includes second feature encryption file, the second feature enterprise ID and described
Targeted mails address;
File encryption server according to the feature tag-enterprise's ID mapping table judge the second feature enterprise ID whether with institute
State second feature encryption file matching;
If the second feature enterprise ID is matched with second feature encryption file, file encryption server is special to described second
Sign encryption file obtains decryption file after being decrypted, and sends the postal comprising the decryption file to the targeted mails address
Part.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
If the second feature enterprise ID and second feature encryption file mismatch, file encryption server is to the user
Terminal sends the second miscue message.
8. a kind of file encryption management system, which is characterized in that the file encryption management system includes user terminal and text
Part encryption server, the user terminal include adding unit, the first transmission unit and the second transmission unit, and the file adds
Close server includes storage unit, the first encryption unit, the first judging unit and the first decryption unit, in which:
The adding unit, for adding feature tag in original document to obtain file to be encrypted;
First transmission unit, for sending file encryption request, the file encryption request packet to file encryption server
Containing the file to be encrypted and enterprise ID;
The storage unit, the corresponding storage of feature tag and the enterprise ID for including by the file to be encrypted is in advance
In the feature tag of building-enterprise's ID mapping table;
First encryption unit, for being encrypted to the file to be encrypted to obtain encryption file, and by the encryption
File is sent to user terminal;
Second transmission unit, if for receive to it is described encryption file open command, using the encryption file as
Fisrt feature encrypts file, and sends file decryption request to the file encryption server, and the open command includes first
Feature enterprise ID, the file decryption request include fisrt feature encryption file and the fisrt feature enterprise ID;
First judging unit, for judging the fisrt feature enterprise ID according to the feature tag-enterprise's ID mapping table
Whether matched with fisrt feature encryption file;
First decryption unit, if being matched for the fisrt feature enterprise ID with fisrt feature encryption file, file
Encryption server is sent to user terminal after fisrt feature encryption file is decrypted.
9. a kind of file encryption management system, which is characterized in that including user terminal and file encryption server, the user
Terminal and file encryption server include memory, processor and are stored on the memory and can be in the processor
The processor of the computer program of upper operation, the user terminal and file encryption server executes corresponding computer program
Shi Gongtong realizes such as method of any of claims 1-7.
10. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with the first computer program and
Two computer programs, first computer program and second computer program ought be respectively by the processor of user terminal and files
The processor of encryption server can be realized when executing such as method of any of claims 1-7.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910666732.7A CN110532796A (en) | 2019-07-23 | 2019-07-23 | File encryption management method, system and computer readable storage medium |
PCT/CN2019/121817 WO2021012563A1 (en) | 2019-07-23 | 2019-11-29 | File encryption management method and system, and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910666732.7A CN110532796A (en) | 2019-07-23 | 2019-07-23 | File encryption management method, system and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110532796A true CN110532796A (en) | 2019-12-03 |
Family
ID=68661882
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910666732.7A Pending CN110532796A (en) | 2019-07-23 | 2019-07-23 | File encryption management method, system and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110532796A (en) |
WO (1) | WO2021012563A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339543A (en) * | 2020-02-27 | 2020-06-26 | 深信服科技股份有限公司 | File processing method and device, equipment and storage medium |
CN112632588A (en) * | 2020-12-30 | 2021-04-09 | 中国农业银行股份有限公司 | Text encryption method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060230264A1 (en) * | 2005-04-07 | 2006-10-12 | International Business Machines Corporation | Backup restore in a corporate infrastructure |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
CN102142073A (en) * | 2010-12-27 | 2011-08-03 | 成都网安科技发展有限公司 | System for preventing and identifying disclosure of paper documents based on hidden watermarks |
CN103685138A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Method and system for authenticating application software of Android platform on mobile internet |
CN104917769A (en) * | 2015-06-11 | 2015-09-16 | 北京嘉和美康信息技术有限公司 | Electronic medical record signature method and device |
-
2019
- 2019-07-23 CN CN201910666732.7A patent/CN110532796A/en active Pending
- 2019-11-29 WO PCT/CN2019/121817 patent/WO2021012563A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060230264A1 (en) * | 2005-04-07 | 2006-10-12 | International Business Machines Corporation | Backup restore in a corporate infrastructure |
CN101702150A (en) * | 2009-12-02 | 2010-05-05 | 江西金格网络科技有限责任公司 | Method for protecting, verifying and repealing content of PDF document page |
CN102142073A (en) * | 2010-12-27 | 2011-08-03 | 成都网安科技发展有限公司 | System for preventing and identifying disclosure of paper documents based on hidden watermarks |
CN103685138A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Method and system for authenticating application software of Android platform on mobile internet |
CN104917769A (en) * | 2015-06-11 | 2015-09-16 | 北京嘉和美康信息技术有限公司 | Electronic medical record signature method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339543A (en) * | 2020-02-27 | 2020-06-26 | 深信服科技股份有限公司 | File processing method and device, equipment and storage medium |
CN111339543B (en) * | 2020-02-27 | 2023-07-14 | 深信服科技股份有限公司 | File processing method and device, equipment and storage medium |
CN112632588A (en) * | 2020-12-30 | 2021-04-09 | 中国农业银行股份有限公司 | Text encryption method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2021012563A1 (en) | 2021-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI701623B (en) | Logistics information transmission method, system and device based on blockchain | |
CN107786328A (en) | A kind of method, service node device and computer-readable medium for generating key | |
CN108154038B (en) | Data processing method and device | |
CN110086817B (en) | Reliable user service system and method | |
CN108900533A (en) | A kind of shared data method for secret protection, system, terminal and medium | |
EP2743842A1 (en) | Secure search processing system and secure search processing method | |
CN109067528A (en) | Crypto-operation, method, cryptographic service platform and the equipment for creating working key | |
CN112508722B (en) | Policy information verification method and device based on zero knowledge proof | |
El Bouchti et al. | Encryption as a service for data healthcare cloud security | |
CN108768963A (en) | The communication means and system of trusted application and safety element | |
CN108681676A (en) | Data managing method and device, system, electronic equipment, program and storage medium | |
EP2354996A1 (en) | Apparatus and method for remote processing while securing classified data | |
CN109347625A (en) | Crypto-operation, method, cryptographic service platform and the equipment for creating working key | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN108270739A (en) | A kind of method and device of managing encrypted information | |
CN106688220A (en) | Conditional access to services based on device claims | |
CN109697370A (en) | Database data encipher-decipher method, device, computer equipment and storage medium | |
CN108718323A (en) | A kind of identity identifying method and system | |
CN109492424A (en) | Data assets management method, data assets managing device and computer-readable medium | |
CN109660534A (en) | Safety certifying method, device, electronic equipment and storage medium based on more trade companies | |
CN110532796A (en) | File encryption management method, system and computer readable storage medium | |
US20210281555A1 (en) | Api key access authorization | |
CN104956393B (en) | It is communicated using user descriptors with the third party that social networking system user carries out | |
US11240243B2 (en) | Preventing statistical inference attacks on data that is shared among multiple stakeholders with disjoint access privileges | |
CN109872223B (en) | Virtual article transaction method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |