CN102761559A - Private data-based network security sharing method and communication terminal - Google Patents

Private data-based network security sharing method and communication terminal Download PDF

Info

Publication number
CN102761559A
CN102761559A CN2012102719481A CN201210271948A CN102761559A CN 102761559 A CN102761559 A CN 102761559A CN 2012102719481 A CN2012102719481 A CN 2012102719481A CN 201210271948 A CN201210271948 A CN 201210271948A CN 102761559 A CN102761559 A CN 102761559A
Authority
CN
China
Prior art keywords
private data
virtual disk
communication terminal
disk files
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102719481A
Other languages
Chinese (zh)
Other versions
CN102761559B (en
Inventor
曾洪宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI SUNINFO TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI SUNINFO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI SUNINFO TECHNOLOGY Co Ltd filed Critical SHANGHAI SUNINFO TECHNOLOGY Co Ltd
Priority to CN201210271948.1A priority Critical patent/CN102761559B/en
Publication of CN102761559A publication Critical patent/CN102761559A/en
Application granted granted Critical
Publication of CN102761559B publication Critical patent/CN102761559B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention is suitable for the technical field of computer network safety, and provides a private data-based network security sharing method and a communication terminal. The private data-based network security sharing method comprises the following steps of: virtualizing a document to a virtual disk document; storing the virtual disk document to a server through a preset drive and a protocol; transmitting encrypted private data to the server through a network after the private data is automatically encrypted on the communication terminal, and then writing the encrypted private data into the virtual disk document; reading the encrypted private data from the virtual disk document of the server, and transmitting the encrypted private data to the communication terminal through a network, and then transmitting the decrypted private data to an application after automatically decrypted. Therefore, the invention realizes a private data network sharing three-dimensional protection system, ensures storage safety and network transmission safety of private data during network sharing, is convenient and easy, comprehensive and efficient, and realizes real-time synchronization of shared data.

Description

Network security based on private data is shared method and communication terminal
Technical field
The present invention relates to the computer network security technology field, be used for the fail safe protection of private data when network is shared, relate in particular to a kind of network security and share method and communication terminal based on private data.
Background technology
Along with computer and information technology especially rapid development of network technology, data message has become the most key resource of entire society, and enterprises and institutions need the data message of share and access more and more, and more and more important.Therefore, how to guarantee the information security of private data when network is shared, become the significant problem that needs to be resolved hurrily.At present,, mainly adopt following two kinds of methods in order to protect the safety of shared private data Network Based: the one, data are encrypted.Adopt AES that data are encrypted storage and transmission, make it be difficult to analyze decoding, realize maintaining secrecy and safety of private data.The 2nd, data are provided with access rights, control conducts interviews.To different users different access rights are set, and before its visit private data, its identity are carried out legitimate verification.Adopt the realization system of above-mentioned two kinds of methods to have a lot, can partly solve the data security problem basically, but also all exist not enough:
1) adopts encryption technology, the private data that is stored on the disk is encrypted, when through the access to netwoks private data, decipher.This method has guaranteed the storage security of private data, but not to private data the fail safe in Network Transmission handle, therefore, possibly appear at the leakage problem of private data in the network transmission process.
2) adopt encryption technology, the private data of Network Transmission is encrypted, thereby guarantee the fail safe of private data in network transmission process.This implementation method has guaranteed the fail safe of the Network Transmission of private data, but the fail safe of private data storage is not handled, and therefore, in case the disk unit of storage private data exposes, the leakage of private data is conspicuous.
3) adopt encryption technology, not only the private data that is stored on the disk unit is encrypted, and the private data in the Network Transmission is encrypted.Though this method can guarantee the storage security and the Network Transmission safety of private data, because being carried out too much encryption and decryption, data handle, systematic function is difficult to guarantee.
4) adopt access control, different access rights are set, can only visit the private data of oneself to guarantee each user to the private data of different user.Obviously, this implementation method can not guarantee the storage security and the Network Transmission safety of private data.
5) adopt encryption technology and access control; Not only encrypt the private data that is stored on the disk unit; And, to different user different access rights being set simultaneously the encryption of the private data in the Network Transmission, this method can solve the safe sharing problem of private data preferably.Yet, adopt the realization technology of this method more, kind is numerous and diverse, all the time a whole set of solution of neither one.
Can know that to sum up the network technology of sharing of existing private data obviously exists inconvenience and defective, so be necessary to improve on reality is used.
Summary of the invention
To above-mentioned defective; The object of the present invention is to provide a kind of network security to share method and communication terminal based on private data; It has realized the three-dimensional protection system that a kind of private data network is shared; Not only guaranteed storage security and the Network Transmission safety of private data when network is shared, and convenient easy-to-use, comprehensive high-efficiency, realized the synchronous in real time of shared data simultaneously.
To achieve these goals, the present invention provides a kind of network security based on private data to share method, is applied to communication terminal, and said method comprises that step has:
With file virtual be virtual disk files;
Driving and agreement through predetermined are stored in server with said virtual disk files;
After communication terminal is encrypted private data automatically, the said private data of encrypting is arrived said server through Network Transmission, the said private data that will encrypt again writes said virtual disk files;
The said private data of reading encrypted from the said virtual disk files of said server arrives said communication terminal with the said private data of encrypting through said Network Transmission, and the said private data that will encrypt again sends application program to after the deciphering automatically.
Share method according to network security of the present invention, said driving is that the file redirection device drives, and said agreement is the SMB agreement.
Share method according to network security of the present invention, also comprise:
Through authentication to the control that conducts interviews of said virtual disk files.
Share method according to network security of the present invention, saidly the conduct interviews step of control of said virtual disk files also comprised through authentication:
But through said authentication and combine the plug-in part technology of the inline HOOK of application programming interfaces and secondary development, said virtual disk files is carried out the fine granularity access control.
Share method according to network security of the present invention, said authentication is the two-factor authentication of USB Key.
The present invention also provides a kind of communication terminal, includes:
The virtual disk module is used for file virtual for virtual disk files;
The document storage module is used for through predetermined driving and agreement said virtual disk files being stored in server;
The data writing module is used for after communication terminal is encrypted private data automatically, the said private data of encrypting being arrived said server through Network Transmission, and the said private data that will encrypt again writes said virtual disk files;
Data read module; Be used for from the said private data of the said virtual disk files reading encrypted of said server; The said private data of encrypting is arrived said communication terminal through said Network Transmission, and the said private data that will encrypt again sends application program to after the deciphering automatically.
According to communication terminal of the present invention, said driving is that the file redirection device drives, and said agreement is the SMB agreement.
According to communication terminal of the present invention, also comprise:
Access control module is used for through authentication the control that conducts interviews of said virtual disk files.
According to communication terminal of the present invention, but said access control module also be used for through said authentication and combine the plug-in part technology of the inline HOOK of application programming interfaces and secondary development, said virtual disk files is carried out the fine granularity access control.
According to communication terminal of the present invention, said authentication is the two-factor authentication of USB Key.
The invention belongs to computer network security field, be used for the fail safe protection of private data when network is shared.The present invention earlier with certain file virtual be virtual disk files, through the driving and the agreement of being scheduled to virtual disk files is stored in server again; The ablation process of said private data is: after communication terminal is encrypted the private data that needs network and share automatically, with the private data of encrypting through Network Transmission to server and write virtual disk files; The process that reads of said private data is: the private data of reading encrypted from the virtual disk files of server; Arrive communication terminal through Network Transmission; Automatically send the private data of encrypting to application program after the deciphering again, application program can be carried out normal running to the private data after the deciphering.The present invention adopts transparent encipher-decipher method to private data; And combined with virtual disk, related protocol and Driving technique have realized the three-dimensional protection system that a kind of private data network is shared; It has not only guaranteed storage security and the Network Transmission safety of private data when network is shared, and convenient easy-to-use, comprehensive high-efficiency.In addition, because reading and writing of virtual disk files all is that the private data file that is directed against network carries out, thereby be easy to realize the synchronous in real time of private data.Preferably; The present invention also needs and will carry out authentication to the user of visit private data; But and the plug-in part technology of inline HOOK of combination API and secondary development; Can not only guarantee the legitimacy of the user identity of visit data, and realize the fine granularity control of user's operation file authority, thereby protect the safety of file better.
Description of drawings
Fig. 1 is the structural representation of communication terminal of the present invention.
Fig. 2 is the theory diagram of private data encryption and decryption of the present invention.
Fig. 3 is the flow chart that the present invention is based on the shared method of network security of private data.
Fig. 4 is the preferred flow charts that the present invention is based on the shared method of network security of private data.
Embodiment
In order to make the object of the invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with accompanying drawing and embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
Fig. 1 is the structural representation of communication terminal of the present invention; Communicate by letter between said communication terminal 100 and the server 200 and be connected; Said communication terminal 100 can be computer, mobile phone, PDA (Personal Digital Assistant; Personal digital assistant), panel computer etc., and said communication terminal 100 comprises virtual disk module 10, document storage module 20, data writing module 30 and data read module 40, wherein:
Virtual disk module 10 is used for certain file virtual for virtual disk files.
Document storage module 20 is used for through predetermined driving and agreement virtual disk files being stored in server 200.Preferably, said driving is LanmanRedirector (file redirection device) driving etc., and LanmanRedirector drives the particular location that is used for the file redirection of visit is belonged to file network.Said agreement is SMB (Server Message Block, a SMB agreement) agreement, and said SMB agreement is used for the transfer files content.
Data writing module 30 is used for after 100 pairs of private datas of communication terminal are encrypted automatically, the private data of encrypting being arrived server 200 through Network Transmission, again the private data of encrypting is write virtual disk files.Preferably, 256 high-intensity AES (Advanced Encryption Standard, Advanced Encryption Standard) AES is adopted in the encryption of private data.
Data read module 40; Be used for from the private data of the virtual disk files reading encrypted of server 200; The private data of encrypting is arrived communication terminal 100 through Network Transmission; Automatically send the private data of encrypting to application program after the deciphering again, said application program can be carried out normal running to the private data after the deciphering.
Virtual disk is a kind of virtual for the technology of disk file; Again through LanmanRedirector driving and SMB agreement etc.; Can leave virtual disk files on the server 200 in the network in, and combine encryption and decryption technology, can realize the transparent encryption and decryption of virtual disk files; Not only guarantee storage security and the Network Transmission safety of private data when network is shared, and implemented convenient easy-to-use, comprehensive high-efficiency.
The network of wanting system to solve private data is shared safety problem; Not only to guarantee the storage security and the Network Transmission safety of private data; And to carry out authentication (being access control) to the user who visits this private data, therefore, said communication terminal 100 preferably also comprises:
Access control module 50 is used for through authentication the virtual disk files control that conducts interviews.Said authentication is preferably USB Key authentication; Identity identifying technology based on USB Key; Be a kind of not only convenient but also safe identity identifying technology that grew up in recent years, adopt software and hardware to combine, solved the contradiction between fail safe and the ease for use well.Be more preferably; Said authentication is the two-factor authentication of USB Key; If the user is will be through the two-factor authentication based on USB Key; Not only to have the hardware (for example USB flash disk etc.) of USB Key but also need know the password (PIN value) of USB Key, thereby guarantee the legitimacy of user identity effectively.
Be more preferably; Access control module 50 also is used for through authentication and combines API (Application Programming Interface; Application programming interfaces) inline HOOK (hook) but and the plug-in part technology of secondary development, to realize that virtual disk files is carried out the fine granularity access control.Plug-in part technology based on inline HOOK of API and secondary development; Can realize the whole operation process of virtual disk files is monitored; Be the Life cycle monitoring of virtual disk files, comprise virtual disk files establishment, read, revise, deposit in addition, duplicate, print and deletion etc.This technology can not only guarantee the legitimacy of the user identity of visit data; And realized the fine granularity control of user's operation file authority, and such as: the user can only read file A, revised file B; Duplicate and mimeograph documents C etc., thus the safety of protected file better.
Present embodiment has adopted data encryption and identity identifying method; But the plug-in part technology of inline HOOK mechanism of combined with virtual disk, SMB agreement, API and secondary development, the three-dimensional safety system of realized that a cover is easy to manage, is easy to use, prevention and control fine size and private data Network Based efficiently being shared.
Virtual disk module 10 in the said communication terminal 100, document storage module 20, data writing module 30, data read module 40 and access control module 50 can be the software units that is built in communication terminal 100, hardware cell or software and hardware combining unit.Said server 200 is preferably file server.
Fig. 2 is the theory diagram of private data encryption and decryption of the present invention, wherein:
The process that private data writes virtual disk files is; Generate private data in the application programs such as the notepad of communication terminal 100, office software, graphics software; Said private data is encrypted carrying out data protection, the private data after will encrypting then through Network Transmission to server 200 and write virtual disk files.
The process that from virtual disk files, reads private data is; The private data of reading encrypted from the virtual disk files of server 200; To communication terminal 100, send the private data of encrypting application programs such as to notepad, office software, graphics software after the deciphering automatically through Network Transmission again.
Because the private data encrypted process was carried out before private data is transferred to network; And the process of private data deciphering is carried out after private data is transferred to communication terminal 100; Therefore in the process of whole Network Transmission, private data all is in encrypted state; Combine encryption and decryption to handle again, can protect storage security and the Network Transmission safety of private data when network is shared easily and efficiently.And the encryption and decryption process of whole private data need not user intervention, has realized the transparent encryption and decryption of virtual disk files, has strengthened user's experience.
Fig. 3 is the flow chart that the present invention is based on the shared method of network security of private data, and it can be realized through communication terminal as shown in Figure 1 100, comprise that step is following:
Step S301, with file virtual be virtual disk files.
Step S302 is stored in server 200 through predetermined driving and agreement with virtual disk files.Preferably, said driving is that LanmanRedirector drives; Said LanmanRedirector drives the particular location that is used for the file redirection of visit is belonged to file network.Said agreement is the SMB agreement, and said SMB agreement is used for the transfer files content.
Step S303, the write step of private data: after 100 pairs of private datas of communication terminal are encrypted automatically, the private data of encrypting is arrived server 200 through Network Transmission, again the private data of encrypting is write virtual disk files.Preferably, 256 high-intensity AES AESs are adopted in the encryption of private data.
Step S304; The read step of private data: the private data of reading encrypted from the virtual disk files of server 200; The private data of encrypting is arrived communication terminal 100 through Network Transmission; Automatically send the private data of encrypting to application program after the deciphering again, said application program can be carried out normal running to the private data after the deciphering.
Fig. 4 is the preferred flow charts that the present invention is based on the shared method of network security of private data, and it can be realized through communication terminal as shown in Figure 1 100, comprise that step is following:
Step S401, with file virtual be virtual disk files.
Step S402 is stored in server 200 through predetermined driving and agreement with virtual disk files.Preferably, said driving is that LanmanRedirector drives, and said agreement is server 200 block of information agreements.
Step S403, through authentication to the virtual disk files control that conducts interviews.Said authentication is preferably USB Key authentication; Identity identifying technology based on USB Key; Be a kind of not only convenient but also safe identity identifying technology that grew up in recent years, adopt software and hardware to combine, solved the contradiction between fail safe and the ease for use well.Be more preferably; Said authentication is the two-factor authentication of USB Key; If the user is will be through the two-factor authentication based on USB Key; Not only to have the hardware (for example USB flash disk etc.) of USB Key but also need know the password (PIN value) of USB Key, thereby guarantee the legitimacy of user identity effectively.Be more preferably, through authentication and combine the inline HOOK of API (hook) but and the plug-in part technology of secondary development, virtual disk files is carried out the fine granularity access control.Plug-in part technology based on inline HOOK of API and secondary development; Can realize the whole operation process of virtual disk files is monitored; Be the Life cycle monitoring of virtual disk files, comprise virtual disk files establishment, read, revise, deposit in addition, duplicate, print and deletion etc.This technology can not only guarantee the legitimacy of the user identity of visit data; And realized the fine granularity control of user's operation file authority, and such as: the user can only read file A, revised file B; Duplicate and mimeograph documents C etc., thus the safety of protected file better.
Step S404 after 100 pairs of private datas of communication terminal are encrypted automatically, arrives server 200 with the private data of encrypting through Network Transmission, again the private data of encrypting is write virtual disk files.
Step S405; The private data of reading encrypted from the virtual disk files of server 200; The private data of encrypting is arrived communication terminal 100 through Network Transmission; Automatically send the private data of encrypting to application program after the deciphering again, said application program can be carried out normal running to the private data after the deciphering.
In sum, the invention belongs to computer network security field, be used for the fail safe protection of private data when network is shared.The present invention earlier with certain file virtual be virtual disk files, through the driving and the agreement of being scheduled to virtual disk files is stored in server again; The ablation process of said private data is: after communication terminal is encrypted the private data that needs network and share automatically, with the private data of encrypting through Network Transmission to server and write virtual disk files; The process that reads of said private data is: the private data of reading encrypted from the virtual disk files of server; Arrive communication terminal through Network Transmission; Automatically send the private data of encrypting to application program after the deciphering again, application program can be carried out normal running to the private data after the deciphering.The present invention adopts transparent encipher-decipher method to private data; And combined with virtual disk, related protocol and Driving technique have realized the three-dimensional protection system that a kind of private data network is shared; It has not only guaranteed storage security and the Network Transmission safety of private data when network is shared, and convenient easy-to-use, comprehensive high-efficiency.In addition, because reading and writing of virtual disk files all is that the private data file that is directed against network carries out, thereby be easy to realize the synchronous in real time of private data.Preferably; The present invention also needs and will carry out authentication to the user of visit private data; But and the plug-in part technology of inline HOOK of combination API and secondary development; Can not only guarantee the legitimacy of the user identity of visit data, and realize the fine granularity control of user's operation file authority, thereby protect the safety of file better.
Certainly; The present invention also can have other various embodiments; Under the situation that does not deviate from spirit of the present invention and essence thereof; Those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection range of the appended claim of the present invention.

Claims (10)

1. the network security based on private data is shared method, it is characterized in that be applied to communication terminal, said method comprises that step has:
With file virtual be virtual disk files;
Driving and agreement through predetermined are stored in server with said virtual disk files;
After communication terminal is encrypted private data automatically, the said private data of encrypting is arrived said server through Network Transmission, the said private data that will encrypt again writes said virtual disk files;
The said private data of reading encrypted from the said virtual disk files of said server arrives said communication terminal with the said private data of encrypting through said Network Transmission, and the said private data that will encrypt again sends application program to after the deciphering automatically.
2. network security according to claim 1 is shared method, it is characterized in that, said driving is that the file redirection device drives, and said agreement is the SMB agreement.
3. network security according to claim 1 and 2 is shared method, it is characterized in that, also comprises:
Through authentication to the control that conducts interviews of said virtual disk files.
4. network security according to claim 3 is shared method, it is characterized in that, said through authentication to said virtual disk files conduct interviews control step also comprise:
But through said authentication and combine the plug-in part technology of the inline HOOK of application programming interfaces and secondary development, said virtual disk files is carried out the fine granularity access control.
5. network security according to claim 3 is shared method, it is characterized in that, said authentication is the two-factor authentication of USB Key.
6. a communication terminal is characterized in that, includes:
The virtual disk module is used for file virtual for virtual disk files;
The document storage module is used for through predetermined driving and agreement said virtual disk files being stored in server;
The data writing module is used for after communication terminal is encrypted private data automatically, the said private data of encrypting being arrived said server through Network Transmission, and the said private data that will encrypt again writes said virtual disk files;
Data read module; Be used for from the said private data of the said virtual disk files reading encrypted of said server; The said private data of encrypting is arrived said communication terminal through said Network Transmission, and the said private data that will encrypt again sends application program to after the deciphering automatically.
7. communication terminal according to claim 6 is characterized in that, said driving is that the file redirection device drives, and said agreement is the SMB agreement.
8. according to claim 6 or 7 described communication terminals, it is characterized in that, also comprise: access control module is used for through authentication the control that conducts interviews of said virtual disk files.
9. communication terminal according to claim 8; It is characterized in that; But said access control module also is used for through said authentication and combines the inline HOOK of application programming interfaces and the plug-in part technology of secondary development, and said virtual disk files is carried out the fine granularity access control.
10. communication terminal according to claim 8 is characterized in that, said authentication is the two-factor authentication of USB Key.
CN201210271948.1A 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal Active CN102761559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210271948.1A CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210271948.1A CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Publications (2)

Publication Number Publication Date
CN102761559A true CN102761559A (en) 2012-10-31
CN102761559B CN102761559B (en) 2016-02-17

Family

ID=47055880

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210271948.1A Active CN102761559B (en) 2012-08-02 2012-08-02 Network security based on private data shares method and communication terminal

Country Status (1)

Country Link
CN (1) CN102761559B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021319A (en) * 2013-12-03 2014-09-03 山东渔翁信息技术股份有限公司 Method and device for preventing read-write data from being copied
CN104615946A (en) * 2015-02-13 2015-05-13 成都卫士通信息安全技术有限公司 Virtual encrypted disk data protection system and method based on intelligent mobile terminals
CN107770139A (en) * 2016-08-23 2018-03-06 北京计算机技术及应用研究所 SAMBA identity identifying methods based on third party's USBKEY equipment
CN108229190A (en) * 2018-01-02 2018-06-29 北京亿赛通科技发展有限责任公司 Control method, device, program, storage medium and the electronic equipment of transparent encryption and decryption

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN102223359A (en) * 2010-07-29 2011-10-19 上海华御信息技术有限公司 Network hard disk backup file data safe system and method based on virtual disk
CN101923678A (en) * 2010-07-30 2010-12-22 武汉天喻信息产业股份有限公司 Data security protection method of enterprise management software

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104021319A (en) * 2013-12-03 2014-09-03 山东渔翁信息技术股份有限公司 Method and device for preventing read-write data from being copied
CN104615946A (en) * 2015-02-13 2015-05-13 成都卫士通信息安全技术有限公司 Virtual encrypted disk data protection system and method based on intelligent mobile terminals
CN107770139A (en) * 2016-08-23 2018-03-06 北京计算机技术及应用研究所 SAMBA identity identifying methods based on third party's USBKEY equipment
CN107770139B (en) * 2016-08-23 2020-05-19 北京计算机技术及应用研究所 SAMBA identity authentication method based on third-party USBKEY equipment
CN108229190A (en) * 2018-01-02 2018-06-29 北京亿赛通科技发展有限责任公司 Control method, device, program, storage medium and the electronic equipment of transparent encryption and decryption
CN108229190B (en) * 2018-01-02 2021-10-22 北京亿赛通科技发展有限责任公司 Transparent encryption and decryption control method, device, program, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN102761559B (en) 2016-02-17

Similar Documents

Publication Publication Date Title
CN108924147B (en) Communication terminal digital certificate issuing method, server and communication terminal
CN102638568A (en) Cloud storage system and data management method thereof
CN104769606A (en) System and method for providing a secure computational environment
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN104113839A (en) Mobile data safety protection system and method based on SDN
CN103973715B (en) Cloud computing security system and method
CN103618705A (en) Personal code managing tool and method under open cloud platform
WO2014051558A1 (en) Shared secret identification for secure communication
CN102025744A (en) Import and export system of virtual machine image in cloud computing
CN102693385A (en) Embedded terminal based on SD (secure digital) trusted computing module and implementation method thereof
CN103440463A (en) Electronic file protection method based on label
CN107196932A (en) Managing and control system in a kind of document sets based on virtualization
CN108491724A (en) A kind of hardware based computer interface encryption device and method
CN102761559B (en) Network security based on private data shares method and communication terminal
CN112507296A (en) User login verification method and system based on block chain
CN104104650A (en) Data file visit method and terminal equipment
CN106919348A (en) Distributed memory system and storage method that anti-violence is cracked
CN103873245B (en) Dummy machine system data ciphering method and equipment
CN102404107A (en) Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content
CN201917912U (en) Monitoring and management system of USB (Universal Serial Bus) storage device
CN104702407B (en) Digital signature device, system and digital signature method
Hu Study of file encryption and decryption system using security key
CN102360407A (en) Communication method for mobile phone and computer
CN103491530A (en) Intelligent PAD with information safety mechanism
CN104346556A (en) Hard disk security protection system based on wireless security certification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 201203, 18 building, 88 Darwin Road, Zhangjiang hi tech park, Shanghai, Pudong New Area, 1

Applicant after: The upper marine infotech share company limited of interrogating

Address before: 201203, 18 building, 88 Darwin Road, Zhangjiang hi tech park, Shanghai, Pudong New Area, 1

Applicant before: Shanghai Suninfo Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: SHANGHAI SUNINFO TECHNOLOGY LTD. TO: SHANGHAI SUNINFO TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant