CN103532958A - Method for encrypting website resources - Google Patents

Method for encrypting website resources Download PDF

Info

Publication number
CN103532958A
CN103532958A CN201310492735.6A CN201310492735A CN103532958A CN 103532958 A CN103532958 A CN 103532958A CN 201310492735 A CN201310492735 A CN 201310492735A CN 103532958 A CN103532958 A CN 103532958A
Authority
CN
China
Prior art keywords
resource
algorithm
file
folder
encrypting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310492735.6A
Other languages
Chinese (zh)
Inventor
史高升
朱涛
赵西法
韩祥松
荣丽萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JINAN ZHENGHE TECHNOLOGY Co Ltd
Original Assignee
JINAN ZHENGHE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JINAN ZHENGHE TECHNOLOGY Co Ltd filed Critical JINAN ZHENGHE TECHNOLOGY Co Ltd
Priority to CN201310492735.6A priority Critical patent/CN103532958A/en
Publication of CN103532958A publication Critical patent/CN103532958A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method for encrypting website resources. The method comprises the following steps: S1, performing format conversion for two times on resource files: uniformly converting into PDF formats, and then converting into SWF files; S2, converting and encrypting the folder name of a resource folder with an encryption algorithm, saving the encrypted resource folder; S3, deleting an unencrypted resource folder, and uploading the encrypted resource folder from a current server to a resource server by calling Web service; S4, verifying the identity of a logged user; S5, providing a folder decryption key for a verified user; S6, remotely decrypting the folder by using the decryption key, resolving the real address of the resource folder; S7, downloading the resource files. According to the method, the original paths of encrypted files are hidden to prevent the website resources from being downloaded maliciously, so that the files are prevented from being accessed illegally, and the safety of website resources is ensured.

Description

A kind of method that site resource is encrypted
Technical field
The present invention relates to network security technology field, specifically a kind of method that site resource is encrypted.
Background technology
Carry out on the internet the commercial exchanges such as file transfer and Email and have many unsafe factors, particularly for some major companies and some classified papers in transmission over networks, this insecurity is that the Internet existence foundation---ICP/IP protocol is intrinsic, comprises some services based on TCP/IP.In order to guarantee safety, must be encrypted file.
The effect being encrypted on network is exactly to prevent that useful or privatization information is blocked and steals on network.A simple example is exactly the transmission of password, and computer cryptography is very important, and many security protection systems are based on password, and the leakage of password means the total collapse of its security system in some sense.While logining by network, the password of keying in is transferred to server with form expressly, and eavesdropping on network is one and is very easy to thing, so very possible hacker can steal user's password, if user is Root user or Administrator user, that consequence will be very serious.
Summary of the invention
For above-mentioned deficiency, the invention provides a kind of method that site resource is encrypted, it transforms by the path of depositing to file, not only can prevent that file is by unauthorized access, and guarantees the fail safe of site resource.
The present invention solves the technical scheme that its technical problem takes: a kind of method that site resource is encrypted, it is characterized in that, and comprise the following steps:
S1, carries out secondary format conversion to resource file, and first according to file type, unification converts PDF to, and then converts the PDF file after conversion to SWF file;
S2, carries out Folder Name by resource file folder by cryptographic algorithm and transforms encryption, and preserves the resource file folder after encrypting;
S3, deletes the resource file folder before encrypting, and the resource file folder after encrypting is uploaded to Resource Server by called Web service from current server;
S4, carries out authentication to login user;
S5, provides file decryption key to authentication of users;
S6, utilizes decryption key to carry out Remote Folder deciphering, parses real resource files folder address;
S7, carries out resource file download.
Preferably, in said method, described resource file comprises word file, Excel file and pdf document.
Further, in said method, described cryptographic algorithm comprises symmetric encipherment algorithm or rivest, shamir, adelman.
Preferably, in said method, described symmetric encipherment algorithm comprises DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm or IDEA algorithm.
Preferably, in said method, described rivest, shamir, adelman comprises RSA Algorithm, Elgamal algorithm, knapsack algorithm, Rabin algorithm, D-H algorithm or ECC algorithm.
The invention has the beneficial effects as follows: first the present invention carries out format conversion by site resource file, the unified SWF formatted file that is converted to, then by the path of depositing of resource file folder is transformed, make the resource file folder path after encrypting become a lot of mess codes without any practical significance, and be deployed on the specific resource server in local area network (LAN), even if having decoded the storage address of file, hacker also haves no right file to conduct interviews, so not only prevented that file is by unauthorized access, and guaranteed the fail safe of site resource.
Accompanying drawing explanation
Fig. 1 is method flow diagram of the present invention.
Embodiment
As shown in Figure 1, a kind of method that site resource is encrypted of the present invention, it comprises the following steps:
S1, carries out secondary format conversion to resource files such as word file, Excel file and pdf documents, and first according to file type, unification converts PDF to, and then converts the PDF file after conversion to SWF file.
S2, carries out Folder Name by resource file folder by symmetric encipherment algorithm or rivest, shamir, adelman and transforms encryption, and preserves the resource file folder after encrypting.
S3, deletes the resource file folder before encrypting, and the resource file folder after encrypting is uploaded to Resource Server by called Web service from current server.
S4, carries out download permission authentication to login user.
S5, provides file decryption key to authentication of users.
S6, utilizes decryption key to carry out Remote Folder deciphering, parses real resource files folder address.
S7, carries out resource file download.
In said method, described symmetric encipherment algorithm comprises DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm or IDEA algorithm; Described rivest, shamir, adelman comprises RSA Algorithm, Elgamal algorithm, knapsack algorithm, Rabin algorithm, D-H algorithm or ECC algorithm.
The present invention adopts the original path of depositing the concealed encrypted file of mode that path transforms of resource file folder is prevented to site resource is by malicious downloading, compares other existing resource file encryption modes, and it has the following advantages:
1) cipher mode of the present invention is a set of cipher mode of combining closely with operating system, its some important steps run on operating system bottom, but not the network system of external disclosure, because operating system itself has a series of control of authority scheme to file access authority, thereby the file on guarantee storage medium is all the time in the encryption stage.
2), for internal network, almost without any need for processing, just can access the file after encryption.
3), for external network, file path is all the unordered mess code after encrypting, and only has authenticated user just can be decrypted operation.
4) cipher mode is flexible, only need to configure several parameters and just can upload from file, and path is encrypted to transform and waited place to rewrite encryption rule.
5) carry out remote deployment and far call, even if outer network server is not had the user name password of file download permission cannot find true download path by attack yet, because unified plan is on remote file service device, even if find true download path also without download permission.
The above is the preferred embodiment of the present invention, for those skilled in the art, under the premise without departing from the principles of the invention, can also make some improvements and modifications, and these improvements and modifications are also regarded as protection scope of the present invention.

Claims (5)

1. method site resource being encrypted, is characterized in that, comprises the following steps:
S1, carries out secondary format conversion to resource file, and first according to file type, unification converts PDF to, and then converts the PDF file after conversion to SWF file;
S2, carries out Folder Name by resource file folder by cryptographic algorithm and transforms encryption, and preserves the resource file folder after encrypting;
S3, deletes the resource file folder before encrypting, and the resource file folder after encrypting is uploaded to Resource Server by called Web service from current server;
S4, carries out authentication to login user;
S5, provides file decryption key to authentication of users;
S6, utilizes decryption key to carry out Remote Folder deciphering, parses real resource files folder address;
S7, carries out resource file download.
2. a kind of method that site resource is encrypted according to claim 1, is characterized in that, described resource file comprises word file, Excel file and pdf document.
3. a kind of method that site resource is encrypted according to claim 1, is characterized in that, described cryptographic algorithm comprises symmetric encipherment algorithm or rivest, shamir, adelman.
4. a kind of method that site resource is encrypted according to claim 3, is characterized in that, described symmetric encipherment algorithm comprises DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm or IDEA algorithm.
5. a kind of method that site resource is encrypted according to claim 3, is characterized in that, described rivest, shamir, adelman comprises RSA Algorithm, Elgamal algorithm, knapsack algorithm, Rabin algorithm, D-H algorithm or ECC algorithm.
CN201310492735.6A 2013-10-21 2013-10-21 Method for encrypting website resources Pending CN103532958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310492735.6A CN103532958A (en) 2013-10-21 2013-10-21 Method for encrypting website resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310492735.6A CN103532958A (en) 2013-10-21 2013-10-21 Method for encrypting website resources

Publications (1)

Publication Number Publication Date
CN103532958A true CN103532958A (en) 2014-01-22

Family

ID=49934637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310492735.6A Pending CN103532958A (en) 2013-10-21 2013-10-21 Method for encrypting website resources

Country Status (1)

Country Link
CN (1) CN103532958A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107633178A (en) * 2017-09-29 2018-01-26 厦门天锐科技股份有限公司 A kind of file protecting system and method based on Android device
US10193875B2 (en) 2014-12-19 2019-01-29 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
CN112861177A (en) * 2021-02-05 2021-05-28 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017525A (en) * 2007-03-05 2007-08-15 北京邮电大学 Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
CN101127879A (en) * 2007-10-10 2008-02-20 张福泉 Stream media VoD system for intelligent access data
CN101662484A (en) * 2008-08-28 2010-03-03 中国科学院声学研究所 Method for uploading file of RFC1867 specification based HTTP protocol
CN101833625A (en) * 2010-05-11 2010-09-15 上海众烁信息科技有限公司 File and folder safety protection method based on dynamic password and system thereof
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
CN102867153A (en) * 2012-08-30 2013-01-09 腾讯科技(深圳)有限公司 Methods and devices for encrypting and decrypting video file and mobile terminal
CN102932463A (en) * 2012-11-07 2013-02-13 曙光信息产业股份有限公司 Method and system for uploading data
CN103312592A (en) * 2013-06-03 2013-09-18 济南政和科技有限公司 Method for sending information to instant messaging client end in batches on webpage

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017525A (en) * 2007-03-05 2007-08-15 北京邮电大学 Divulging secrets prevention system of USB storage device date based on certificate and transparent encryption technology
CN101127879A (en) * 2007-10-10 2008-02-20 张福泉 Stream media VoD system for intelligent access data
CN101662484A (en) * 2008-08-28 2010-03-03 中国科学院声学研究所 Method for uploading file of RFC1867 specification based HTTP protocol
CN101833625A (en) * 2010-05-11 2010-09-15 上海众烁信息科技有限公司 File and folder safety protection method based on dynamic password and system thereof
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN102685148A (en) * 2012-05-31 2012-09-19 清华大学 Method for realizing secure network backup system under cloud storage environment
CN102867153A (en) * 2012-08-30 2013-01-09 腾讯科技(深圳)有限公司 Methods and devices for encrypting and decrypting video file and mobile terminal
CN102932463A (en) * 2012-11-07 2013-02-13 曙光信息产业股份有限公司 Method and system for uploading data
CN103312592A (en) * 2013-06-03 2013-09-18 济南政和科技有限公司 Method for sending information to instant messaging client end in batches on webpage

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10193875B2 (en) 2014-12-19 2019-01-29 Xiaomi Inc. Method and apparatus for controlling access to surveillance video
CN107633178A (en) * 2017-09-29 2018-01-26 厦门天锐科技股份有限公司 A kind of file protecting system and method based on Android device
CN107633178B (en) * 2017-09-29 2020-12-04 厦门天锐科技股份有限公司 File protection system and method based on Android device
CN112861177A (en) * 2021-02-05 2021-05-28 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things
CN112861177B (en) * 2021-02-05 2021-11-19 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things

Similar Documents

Publication Publication Date Title
EP3090520B1 (en) System and method for securing machine-to-machine communications
US10341094B2 (en) Multiple encrypting method and system for encrypting a file and/or a protocol
EP2830282B1 (en) Storage method, system and apparatus
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
EP3035641A1 (en) Method for file upload to cloud storage system, download method and device
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
JP2016508643A (en) Data security service
Zhang et al. Towards secure data distribution systems in mobile cloud computing
CN101605137A (en) Safe distribution file system
Obert et al. Recommendations for trust and encryption in DER interoperability standards
CN105072107A (en) System and method for enhancing data transmission and storage security
JP2016508699A (en) Data security service
CN103929434A (en) File sharing method based on encryption and permission system
SE539602C2 (en) Generating a symmetric encryption key
Henze et al. A trust point-based security architecture for sensor data in the cloud
CN104065485A (en) Power grid dispatching mobile platform safety guaranteeing and controlling method
CN103731423A (en) Safe method for repeated data deleting
Bapat et al. Smart-lock security re-engineered using cryptography and steganography
Mirtalebi et al. Enhancing security of Web service against WSDL threats
CN103532958A (en) Method for encrypting website resources
CN106230840A (en) A kind of command identifying method of high security
Hussien et al. Scheme for ensuring data security on cloud data storage in a semi-trusted third party auditor
Patil et al. A Secure and Efficient Identity based Proxy Signcryption Scheme for Smart Grid Network.
Itani et al. Energy-efficient platform-as-a-service security provisioning in the cloud
Al-Attab et al. Hybrid data encryption technique for data security in cloud computing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140122