CN102843356A - Controllable exchange method for symmetric key-encrypted file - Google Patents

Controllable exchange method for symmetric key-encrypted file Download PDF

Info

Publication number
CN102843356A
CN102843356A CN2012102390671A CN201210239067A CN102843356A CN 102843356 A CN102843356 A CN 102843356A CN 2012102390671 A CN2012102390671 A CN 2012102390671A CN 201210239067 A CN201210239067 A CN 201210239067A CN 102843356 A CN102843356 A CN 102843356A
Authority
CN
China
Prior art keywords
file
server
transmission
send
examining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012102390671A
Other languages
Chinese (zh)
Other versions
CN102843356B (en
Inventor
吕少铭
徐伯星
王伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Purple Liton Technology Development Co Ltd
Original Assignee
Shenzhen Purple Liton Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Purple Liton Technology Development Co Ltd filed Critical Shenzhen Purple Liton Technology Development Co Ltd
Priority to CN201210239067.1A priority Critical patent/CN102843356B/en
Publication of CN102843356A publication Critical patent/CN102843356A/en
Application granted granted Critical
Publication of CN102843356B publication Critical patent/CN102843356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a controllable exchange method for a symmetric key-encrypted file. The controllable exchange method comprises the following steps of: A) establishing user information at a file encryption server, wherein the information comprises private keys of all users, and the server comprises a file encryption and decryption unit, a file transceiving unit and a message transceiving unit; B) using the server to send a sending request sent by a client to a related examination and approval end for examination and approval according to the sending request sent by the client; C) using the examination and approval end to judge whether the sending request is agreed or not after examination and approval information is received, and automatically sending the examination and approval result back to the server; and D) using the server to judge whether sending is performed or not according to the examination and approval result after the examination and approval result is received. According to the controllable exchange method for the symmetric key-encrypted file, disclosed by the invention, the whole transmission can be ensured in an encrypted safety domain, the divulgence in file transmission can be prevented, and safety, controllability and convenience in exchange of the symmetric key-encrypted file can be realized.

Description

A kind of controlled switching method of symmetric key encryption file
Technical field
The present invention relates to the computer file ciphering field, relate in particular to a kind ofly be specially adapted to enterprises and institutions' internal file encipherment protection, and transmission and the exchange of encrypt file under controllable condition.
Background technology
Along with the continuous development of IT application in enterprises and E-Government, increasing application system is used in people's the routine work and life.Various important informations have all adopted electronic form to store, and computer documents is exactly a most important information carrier.Lot of data all can be gathered, handles, exports and stored to each application system, so these units are faced with multiple challenge in file management side.In order to guarantee safety, confidential document is encrypted in a large number is stored in the computer, but the file after encrypting is because the privatization meeting of key causes encrypt file aspect sharing, to bring inconvenience.
Existing AES is divided into two types: symmetric key encryption algorithm and asymmetric-key encryption algorithm.Symmetric key algorithm adopts identical key that data are carried out encryption and decryption, is widely used in the encryption of local file because of its advantages of simplicity and high efficiency characteristic.Because the use of symmetric key has limited the propagation of key, so the file that adopts symmetric key algorithm to encrypt can not directly be shared between computer; Asymmetric key algorithm adopts key that (PKI and private key) come encrypt and decrypt documents, because of the opening of its PKI makes that the exchange of encrypt file is very convenient.For example the party A-subscriber will issue the party B-subscriber to file, only need encrypt with party B-subscriber's PKI, and the file after the encryption has only with party B-subscriber's private key and could decipher.The party A-subscriber also can encrypt (signature) to file with the private key of oneself simultaneously, and the party B-subscriber verifies the signature of file with party A-subscriber's PKI.If but local file also adopt asymmetric key algorithm to carry out encrypting and decrypting can be too loaded down with trivial details and complicated, such encryption system efficient can be not high yet.
In sum, symmetric key algorithm is fit to the encryption of local storage, and asymmetric key algorithm is applicable to the data encryption in the exchange.
Summary of the invention
The object of the present invention is to provide a kind of switching method of convenient, safe symmetric key encryption algorithm file, solve controlled the exchangeing problem of using the symmetric encipherment algorithm encrypt file between computer and the computer.The present invention adopts the controlled switching method of symmetric key algorithm encrypt file, is to improve the controlled mutual and outer new technology of sending of controllable pair of enterprises and institutions' internal file safety under the new situation.
For realizing above-mentioned purpose, the present invention adopts following technical scheme:
A kind of controlled switching method of symmetric key encryption file comprises the steps:
A) set up user profile at the file encryption server, these information comprise whole users' private cipher key; Described server include file encryption/decryption element, transmitting/receiving file unit, information receiving and transmitting unit;
B) server is according to the transmission request of transmitting terminal transmission, and the transmission request that server sends transmitting terminal sends to the relevant end of examining and examines;
C) examine to terminate to and judge whether behind the approval information to agree, and will examine the result and beam back server automatically;
D) after server is received approval information, judge whether to send according to examining the result.
Further: the result that examines described step D) comprises agreement transmission and refusal transmission, agrees that wherein transmission comprises inner transmission of agreement local area network (LAN) and/or the outside transmission of wide area network.
Further: if the person of examining agrees to send and to be that LAN is inner send, will be with the transmission file process of sender's secret key encryption then, and send it to receiving terminal then with the reception file of recipient's secret key encryption by the key conversion; If the person of examining agrees to send and be outside the transmission, then use transmitting terminal secret key decryption file, send expressly to outer net; If not, then transmission is examined refuse information to transmitting terminal.
Further: said server one by one or the transmission request that transmitting terminal is sent in batches send to the relevant end of examining and examine, examine end and will examine the result and beam back server one by one or in batches automatically; Server sends to a plurality of recipients with a file, perhaps once sends a plurality of files and gives the recipient.
Further: said server sends approval information and to examining end and transmission file and the message concrete grammar to receiving terminal is:
I. server at first with the transmitting terminal file with examining end key replacement, together send to encrypt file and information and examine end, the approver can determine whether ratify through self secret key decryption file viewing files content.
II. server sends to the file of receiving terminal, if inner transmission will use the receiving terminal key to replace, then encrypt file and notification message is sent together.If outside the transmission then uses transmitting terminal secret key decryption file to send cleartext information.
The controlled switching method of symmetric key encryption file of the present invention; Key is transmitting terminal or examines end file that receive or intermediate transport all is ciphertext, all depends on the exchange files server, has guaranteed in the whole security domain that is transmitted in an encryption; Prevented divulging a secret of file transfer; Solved the safety of symmetric key encryption exchange files, controlled, convenience.
Description of drawings
Fig. 1 is the controlled switching system structural representation of symmetric key encryption file of the present invention.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment the present invention is explained further details.
Shown in Figure 1 is the controlled switching system of a symmetrical secret key encryption file; Comprise client, server, file exchange program, sensitive document, transmitting-receiving instrument, examine end, receiving terminal etc.; Can and examine end and wait the composition local area network (LAN) plurality of client end and receiving terminal and server; Also can client and receiving terminal be passed through the Internet UNICOM, form a wide area network.Its workflow is:
User side (comprising sender, recipient and the person of examining) at first server registration with obtain individual's (symmetry) key, and use the local sensitive document of this secret key encryption.
2. transmitting terminal uses the transmission instrument will use the local sensitive information of personal key encryption to send to receiving terminal (like ⑴ among the figure).
3. server will be the file with the person's of examining secret key encryption with the file conversion that the sender encrypts through the interchange key technology, and transmit and examine solicited message to examining end (like ⑵ among the figure).
4. examine end and can open file with own key and check, and judge whether to agree that transmitting terminal sends to receiving terminal (like ⑶ among the figure) with this document.
5. examine after the result send information to server, server is according to examining the further processing encrypted file of result.
6., then use recipient's key change key, and encrypt file and message are together sent to receiving terminal if the person of examining agrees to send and sends like ⑷ among the figure for inner; If agree to send and be outside the transmission, then use the transmitting terminal secret key decryption, send expressly to outer net (like ⑹ in scheming); Refusal then sends refuse information to transmitting terminal (like ⑸ among the figure).
Server can be one by one or the transmission request that transmitting terminal is sent in batches send to the relevant end of examining and examine, examine end and will examine the result and beam back server one by one or in batches automatically; Server sends to a plurality of recipients with a file, perhaps once sends a plurality of files and gives the recipient.
Server sends approval information:
I. server at first with the transmitting terminal file with examining end key replacement, together send to encrypt file and information and examine end, the approver can determine whether ratify through self secret key decryption file viewing files content.
II. server sends to the file of receiving terminal, if inner transmission will use the receiving terminal key to replace, then encrypt file and notification message is sent together.If outside the transmission then uses transmitting terminal secret key decryption file to send cleartext information.
More than the controlled switching method of a kind of symmetric key encryption file that invention is provided carried out concrete elaboration, and combine specific embodiment explain, but the above most preferred embodiment of introducing of just inventing can not limit practical range of the present invention with this.Those skilled in the art are done according to the present invention in the present technique field slight change or improvement all should belong to the scope that patent of the present invention contains.

Claims (5)

1. the controlled switching method of a symmetric key encryption file comprises the steps:
A) set up user profile at the file encryption server, these information comprise whole users' private cipher key; Described server include file encryption/decryption element, transmitting/receiving file unit, information receiving and transmitting unit;
B) server is according to the transmission request of client transmission, and the transmission request that server sends client sends to the relevant end of examining and examines;
C) examine to terminate to and judge whether behind the approval information to agree, and will examine the result and beam back server automatically;
D) after server is received approval information, judge whether to send according to examining the result.
2. the controlled switching method of symmetric key encryption file as claimed in claim 1; It is characterized in that: the result that examines described step D) comprises agreement transmission and refusal transmission, agrees that wherein transmission comprises inner transmission of agreement local area network (LAN) and/or the outside transmission of wide area network.
3. the controlled switching method of symmetric key encryption file as claimed in claim 2; It is characterized in that: if the person of examining agrees to send and to be that LAN is inner send; To be with the transmission file process of sender's secret key encryption then, send it to receiving terminal then with the reception file of recipient's secret key encryption by the key conversion; If the person of examining agrees to send and be outside the transmission, then use sender's secret key decryption file, send expressly to outer net; If not, then transmission is examined refuse information to transmitting terminal.
4. the controlled switching method of symmetric key encryption file as claimed in claim 3; It is characterized in that: said server one by one or the transmission request that client is sent in batches send to the relevant end of examining and examine, examine end and will examine the result and beam back server one by one or in batches automatically; Server sends to a plurality of recipients with a file, perhaps once sends a plurality of files and gives the recipient.
5. the controlled switching method of symmetric key encryption file as claimed in claim 4 is characterized in that: said server sends approval information and to examining end and transmission file and the message concrete grammar to receiving terminal is:
I. server at first with the transmitting terminal file with examining end key replacement, together send to encrypt file and information and examine end, the approver can determine whether ratify through self secret key decryption file viewing files content.
II. server sends to the file of receiving terminal, if inner transmission will use the receiving terminal key to replace, then encrypt file and notification message is sent together.If outside the transmission then uses transmitting terminal secret key decryption file to send cleartext information.
CN201210239067.1A 2012-07-11 2012-07-11 Controllable exchange method for symmetric key-encrypted file Active CN102843356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210239067.1A CN102843356B (en) 2012-07-11 2012-07-11 Controllable exchange method for symmetric key-encrypted file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210239067.1A CN102843356B (en) 2012-07-11 2012-07-11 Controllable exchange method for symmetric key-encrypted file

Publications (2)

Publication Number Publication Date
CN102843356A true CN102843356A (en) 2012-12-26
CN102843356B CN102843356B (en) 2015-05-13

Family

ID=47370417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210239067.1A Active CN102843356B (en) 2012-07-11 2012-07-11 Controllable exchange method for symmetric key-encrypted file

Country Status (1)

Country Link
CN (1) CN102843356B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254332A (en) * 2016-07-29 2016-12-21 北京北信源软件股份有限公司 Method, device and the server of a kind of safety desktop stream compression
WO2018068643A1 (en) * 2016-10-12 2018-04-19 阿里巴巴集团控股有限公司 File transmission method and apparatus
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device
CN110399745A (en) * 2019-08-16 2019-11-01 微位(深圳)网络科技有限公司 The management method and device, storage medium and computer equipment of key

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422034A (en) * 2002-12-17 2003-06-04 胡祥义 Utilization of symmetrical cipher for network digital signature
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN101141244A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Network encrypted data virus detection and elimination system, proxy server and method
CN101609490A (en) * 2009-07-08 2009-12-23 北京大学 Digital content protection method and system based on mobile memory medium
CN101674304A (en) * 2009-10-15 2010-03-17 浙江师范大学 Network identity authentication system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422034A (en) * 2002-12-17 2003-06-04 胡祥义 Utilization of symmetrical cipher for network digital signature
CN1889426A (en) * 2005-06-30 2007-01-03 联想(北京)有限公司 Method and system for realizing network safety storaging and accessing
CN101141244A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Network encrypted data virus detection and elimination system, proxy server and method
CN101609490A (en) * 2009-07-08 2009-12-23 北京大学 Digital content protection method and system based on mobile memory medium
CN101674304A (en) * 2009-10-15 2010-03-17 浙江师范大学 Network identity authentication system and method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254332A (en) * 2016-07-29 2016-12-21 北京北信源软件股份有限公司 Method, device and the server of a kind of safety desktop stream compression
WO2018068643A1 (en) * 2016-10-12 2018-04-19 阿里巴巴集团控股有限公司 File transmission method and apparatus
CN107948123A (en) * 2016-10-12 2018-04-20 阿里巴巴集团控股有限公司 Document transmission method and device
CN107948123B (en) * 2016-10-12 2021-01-12 钉钉控股(开曼)有限公司 File transmission method and device
US11375001B2 (en) 2016-10-12 2022-06-28 Alibaba Group Holding Limited File transmission method and apparatus
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device
CN110365662B (en) * 2019-06-28 2022-05-17 北京思源理想控股集团有限公司 Business approval method and device
CN110399745A (en) * 2019-08-16 2019-11-01 微位(深圳)网络科技有限公司 The management method and device, storage medium and computer equipment of key

Also Published As

Publication number Publication date
CN102843356B (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN105743646B (en) A kind of Identity based encryption method and system
CN104253694B (en) A kind of time slot scrambling for network data transmission
CN114513327B (en) Block chain-based Internet of things private data rapid sharing method
US20130339726A1 (en) File server apparatus and file server system
CN102333093A (en) Data encryption transmission method and system
CN104821874A (en) Method employing quantum secret key for IOT (Internet of Things) data encryption transmission
CN208986966U (en) A kind of ciphering terminal and corresponding data transmission system
CN101150533B (en) A secure system and method for multi-point mail push
CN105072107A (en) System and method for enhancing data transmission and storage security
CN103338437A (en) Encryption method and system of mobile instant message
CN112055022A (en) High-efficiency and high-security network file transmission double encryption method
CN104270242A (en) Encryption and decryption device used for network data encryption transmission
CN204180095U (en) A kind of ciphering and deciphering device for network data encryption transmission
CN102055685A (en) Method for encrypting webmail information
CN102843356B (en) Controllable exchange method for symmetric key-encrypted file
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN101984626B (en) Method and system for safely exchanging files
CN102611681A (en) Enterprise and public institution information leakage preventing method based on cloud architecture
Sumathi et al. Using Artificial Intelligence (AI) and Internet of Things (IoT) for Improving Network Security by Hybrid Cryptography Approach
Zhu Research of hybrid cipher algorithm application to hydraulic information transmission
CN104301102B (en) Widget communication means, apparatus and system
CN111541603B (en) Independent intelligent safety mail terminal and encryption method
CN104618355B (en) A kind of safety storage and the method for transmission data
CN103780380A (en) Asymmetric mail security encryption realization method
Pry et al. Energy consumption cost analysis of mobile data encryption and decryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant