CN103581196A - Distributed file transparent encryption method and transparent decryption method - Google Patents

Distributed file transparent encryption method and transparent decryption method Download PDF

Info

Publication number
CN103581196A
CN103581196A CN201310566345.9A CN201310566345A CN103581196A CN 103581196 A CN103581196 A CN 103581196A CN 201310566345 A CN201310566345 A CN 201310566345A CN 103581196 A CN103581196 A CN 103581196A
Authority
CN
China
Prior art keywords
file
user
transparent
encryption key
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310566345.9A
Other languages
Chinese (zh)
Other versions
CN103581196B (en
Inventor
谈剑锋
孟飞
丁震宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Peoplenet Security Technology Co Ltd
Original Assignee
Shanghai Peoplenet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Peoplenet Security Technology Co Ltd filed Critical Shanghai Peoplenet Security Technology Co Ltd
Priority to CN201310566345.9A priority Critical patent/CN103581196B/en
Publication of CN103581196A publication Critical patent/CN103581196A/en
Application granted granted Critical
Publication of CN103581196B publication Critical patent/CN103581196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a distributed file transparent encryption method and transparent decryption method. The distributed file transparent encryption method is characterized in that a file encryption algorithm and a file encryption key are set at the server side, and a file encryption algorithm ID and a file encryption key ID are set at the client side. The distributed file transparent decryption method is based on a user access right, dynamic passwords are adopted to verify the user access right, and a distributed decryption framework of a client side server is adopted. According to the distributed file transparent encryption method and transparent decryption method, encryption and decryption information is set in a separated mode, even though confidential files are illegally copied, the confidential files cannot be decrypted, the access safety performance of the confidential files is improved, and meanwhile operation by a user on the confidential files is strictly controlled through use of the dynamic passwords.

Description

Distributed document transparent encryption method and transparent decryption method
Technical field
The present invention relates to file encryption field, relate in particular to a kind of distributed document transparent encryption method and transparent decryption method.
Background technology
Transparent file encryption system, can carry out the operation of encryption and decryption, automatically to prevent the leakage of classified papers and information to the file of certain type of appointment.So-called transparent, refer to that user is in operation file process, encryption and decryption process can not discovered by user, and whole encryption and decryption operating process completes automatically.Encrypting and deciphering system, according to the strategy setting in advance, comprises the file type, cryptographic algorithm, the encryption key that need protection, judges whether file needs to be encrypted and decryption oprerations, automatically completes the encryption and decryption of file.
Transparent file encryption technology runs on operating system kernel with the form of filter Driver on FSD, file is stored on hard disk with ciphertext form, when needs are read and write this encrypt file, encrypting and deciphering system carries out encryption and decryption in real time to file automatically, make system can be pellucidly under authorization conditions, with plaintext form, read and write this encrypt file.Once file has left its environment for use, cannot obtain decryption services and cannot access, like this, reached the object of file protect.
There is following problem in file transparent encrypting and deciphering system of the prior art: 1, classified papers is not carried out the control of access privilege, when user's access file, do not need accepting of authority, file will be deciphered automatically, what user saw is expressly, and can carry out any operation to file.Will bring like this problem, although be in same environment, user's identity is discrepant, sometimes may wish that some file is read-only to certain customers, but does not allow this part user to revise and delete these files; 2, the important informations such as key of classified papers being encrypted, normally with the form of file header, be attached to the head of the classified papers after encrypted, fail safe is not high enough, because the ciphertext of the important informations such as encryption key and classified papers is kept in same file, so, once known cryptographic algorithm, when classified papers are illegally copied, departed from transparent encryption system environments, encrypted classified papers are still and can be cracked.
Therefore, need a kind of new file transparent encryption method and file transparent decryption method, when guaranteeing the automatic encryption and decryption of classified papers, strengthen the control to user right, and improve the fail safe of file access, effectively suppress confidential information to outward leakage.
Summary of the invention
No user control of authority and the not high problem of fail safe for existing file transparent encryption method and file transparent decryption method, the invention provides a kind of new file transparent encryption method and file transparent decryption method, by dynamic password, control the access rights of user to classified papers, by the distributed storing of encryption and decryption information, improve the fail safe of system, thereby meet the demand of user's file transparent encrypting and deciphering system.
To achieve these goals, the invention provides a kind of distributed document transparent encryption method, described transparent encryption method comprises, file server a plurality of customer management informations that prestore, each customer management information comprises user name, user's group under user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID, file client sends the filename of file to be encrypted to file server, file server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire, the file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and are encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext, wherein, file client and file server carry out two-way communication by network communication interface, wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is ALTERA company
Alternatively, described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
To achieve these goals, the present invention also provides a kind of distributed document transparent decryption method, described transparent decryption method comprises, file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID; File client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify; File server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client; When file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server; File encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client; File client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews; Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, and the file header of classified papers comprises file encryption algorithm ID and file encryption key ID; Wherein, file client and file server carry out two-way communication by network communication interface; Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Alternatively, described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
Alternatively, after file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
The present invention is owing to having adopted technique scheme, thereby have the following advantages: distributed document transparent encryption method of the present invention and file transparent decryption method, adopt dynamic password to realize the effective control to access privilege, meet the multiple requirements for access of different user to classified papers, use distributed storage technology simultaneously, encryption key and classified papers ciphertext are separated, the important informations such as encryption key and cryptographic algorithm are stored in to server end, the ciphertext of classified papers is still stored in user environment, like this, even if classified papers are illegally copied, owing to having departed from transparent encryption system environments, cannot obtain encryption key and algorithm information from service end, file cannot be decrypted, thereby effectively prevented the leakage of confidential information.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of distributed document transparent encryption method of the present invention;
Fig. 2 is the flow chart of the transparent decryption method of a kind of distributed document of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.
First, please refer to Fig. 1, Fig. 1 is the flow chart of a kind of distributed document transparent encryption method of the present invention, and described transparent encryption method comprises the following steps:
Step 101: file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
Step 102: file client sends the filename of file to be encrypted to file server;
Step 103: file server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire;
Step 104: the file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and be encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext;
Wherein, file client and file server carry out two-way communication by network communication interface, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Wherein, described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks, and described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
In addition, transparent encryption technology is a kind of file ciphering technology of arising at the historic moment for enterprise's file security demand in recent years.So-called transparent, refer to user it is unknown.When user is when opening or edit specified file, system will be encrypted unencrypted file automatically, and the file of having encrypted is deciphered automatically.File is ciphertext on hard disk, is expressly in internal memory.Once leave environment for use, because cannot obtaining the service of deciphering automatically, application program cannot open, thus the effect of the protected file content of getting up.
In addition, FPGA(Field-Programmable Gate Array), i.e. field programmable gate array, he is the product further developing on the basis of the programming devices such as PAL, GAL, CPLD.He occurs as a kind of semi-custom circuit in application-specific integrated circuit (ASIC) (ASIC) field, has solved the deficiency of custom circuit, has overcome again the limited shortcoming of original programming device gate circuit number.FPGA is in general than ASIC(application-specific integrated circuit (ASIC)) speed slow, cannot complete complicated design, but power consumption is lower.But they also have a lot of advantages, such as finished product fast, can be modified mistake in correction program and more cheap cost.Manufacturer also may provide the cheap still poor FPGA of edit capability.Because these chips have poor can edit capability, so the exploitation of these designs is to complete on common FPGA, then design is transferred on a chip that is similar to ASIC.Another method is with CPLD(Complex Programmable Logic Device, CPLD).
In addition, Cloud Server is the important component part of cloud computing service, and being provides the service platform of integrated service ability towards all kinds of Internet users.Platform integration the large key element of traditional internet, applications three: calculating, storage, network, user oriented provides the Internet infrastructure service of publicization.Cloud Server service comprises two core products: 1, towards the Cloud Server rental service of SME users and high-end user; 2, towards big-and-middle-sized Internet user's elasticity, calculate platform service.Each clustered node of Cloud Server platform is deployed in the key data center of the Internet, and the Internet infrastructure services such as calculating, storage, online backup, trustship, bandwidth can be independently provided.
Then, continue with reference to figure 2, Fig. 2 is the flow chart of the transparent decryption method of a kind of distributed document of the present invention, and described transparent decryption method comprises the following steps:
Step 201: file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
Step 202: file client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify;
Step 203: file server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client;
Step 204: when file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server;
Step 205: file encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client;
Step 206: file client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews;
Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, the file header of classified papers comprises file encryption algorithm ID and file encryption key ID, file client and file server carry out two-way communication by network communication interface, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Wherein, described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks, and described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
Wherein, after file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
Those skilled in the art will recognize that; above-mentioned embodiment is exemplary; in order to make those skilled in the art can better understand this patent content; should not be understood as the restriction to this patent protection range; so long as disclose spiritual do any according to this patent, be equal to change or modify, all falling into this patent protection range.

Claims (7)

1. a distributed document transparent encryption method, is characterized in that, described transparent encryption method comprises:
File server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
File client sends the filename of file to be encrypted to file server;
File server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire;
The file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and are encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
2. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks.
3. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
4. the transparent decryption method of distributed document, is characterized in that, described transparent decryption method comprises:
File server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
File client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify;
File server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client;
When file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server;
File encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client;
File client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews;
Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, and the file header of classified papers comprises file encryption algorithm ID and file encryption key ID;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
5. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks.
6. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
7. the transparent decryption method of distributed document according to claim 4, is characterized in that:
After file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
CN201310566345.9A 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method Active CN103581196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310566345.9A CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310566345.9A CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Publications (2)

Publication Number Publication Date
CN103581196A true CN103581196A (en) 2014-02-12
CN103581196B CN103581196B (en) 2016-05-11

Family

ID=50052126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310566345.9A Active CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Country Status (1)

Country Link
CN (1) CN103581196B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104333452A (en) * 2014-10-26 2015-02-04 重庆智韬信息技术中心 Multi-account encryption method for file data
CN105095785A (en) * 2014-05-22 2015-11-25 中兴通讯股份有限公司 File access processing method, and file access method and device of distributed file system
CN105282171A (en) * 2015-11-06 2016-01-27 北京大学深圳研究生院 Safe and reliable distributed cloud storage method
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106326733A (en) * 2015-06-26 2017-01-11 中兴通讯股份有限公司 Method and apparatus for managing applications in mobile terminal
CN109886028A (en) * 2019-01-22 2019-06-14 杭州美创科技有限公司 The method of remotely enabled Oracle transparent encryption
CN109995735A (en) * 2017-12-31 2019-07-09 中国移动通信集团重庆有限公司 Downloading and application method, server, client, system, equipment and medium
CN110110550A (en) * 2019-04-19 2019-08-09 深圳华中科技大学研究院 It is a kind of support cloud storage can search for encryption method and system
CN110414192A (en) * 2019-06-14 2019-11-05 伊格拉斯控股有限公司 Keyholed back plate system and method applied to safe manufacturing
CN110635906A (en) * 2019-11-01 2019-12-31 大唐高鸿信安(浙江)信息科技有限公司 Key management method and device for distributed block storage system
CN111132150A (en) * 2019-12-31 2020-05-08 中科曙光国际信息产业有限公司 Method and device for protecting data, storage medium and electronic equipment
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
WO2020206953A1 (en) * 2019-04-09 2020-10-15 苏宁云计算有限公司 Data processing method and system
CN114417393A (en) * 2021-12-08 2022-04-29 马上消费金融股份有限公司 File encryption method, system, electronic equipment and computer readable storage medium
CN115150185A (en) * 2022-07-25 2022-10-04 杭州东方通信软件技术有限公司 Method and device for controlling user directory and authority based on multiple passwords

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
US20130024424A1 (en) * 2009-06-30 2013-01-24 Commvault Systems, Inc. Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103310169A (en) * 2013-04-28 2013-09-18 东莞宇龙通信科技有限公司 SD (Secure Digital) card data protection method and protection system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130024424A1 (en) * 2009-06-30 2013-01-24 Commvault Systems, Inc. Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
CN103310169A (en) * 2013-04-28 2013-09-18 东莞宇龙通信科技有限公司 SD (Secure Digital) card data protection method and protection system thereof
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095785A (en) * 2014-05-22 2015-11-25 中兴通讯股份有限公司 File access processing method, and file access method and device of distributed file system
CN104333452B (en) * 2014-10-26 2017-11-10 重庆智韬信息技术中心 A kind of method to the encryption of file data more accounts
CN104333452A (en) * 2014-10-26 2015-02-04 重庆智韬信息技术中心 Multi-account encryption method for file data
CN106302312B (en) * 2015-05-13 2019-09-17 阿里巴巴集团控股有限公司 Obtain the method and device of electronic document
CN106302312A (en) * 2015-05-13 2017-01-04 阿里巴巴集团控股有限公司 Obtain the method and device of e-file
CN106326733A (en) * 2015-06-26 2017-01-11 中兴通讯股份有限公司 Method and apparatus for managing applications in mobile terminal
CN105282171B (en) * 2015-11-06 2018-04-27 北京大学深圳研究生院 A kind of safe and reliable distributed cloud storage method
CN105282171A (en) * 2015-11-06 2016-01-27 北京大学深圳研究生院 Safe and reliable distributed cloud storage method
CN109995735A (en) * 2017-12-31 2019-07-09 中国移动通信集团重庆有限公司 Downloading and application method, server, client, system, equipment and medium
CN109886028A (en) * 2019-01-22 2019-06-14 杭州美创科技有限公司 The method of remotely enabled Oracle transparent encryption
WO2020206953A1 (en) * 2019-04-09 2020-10-15 苏宁云计算有限公司 Data processing method and system
CN110110550A (en) * 2019-04-19 2019-08-09 深圳华中科技大学研究院 It is a kind of support cloud storage can search for encryption method and system
CN110110550B (en) * 2019-04-19 2023-05-09 深圳华中科技大学研究院 Searchable encryption method and system supporting cloud storage
CN110414192A (en) * 2019-06-14 2019-11-05 伊格拉斯控股有限公司 Keyholed back plate system and method applied to safe manufacturing
CN110414192B (en) * 2019-06-14 2023-09-26 尚承科技股份有限公司 Control and management system and method applied to safety manufacture
CN110635906A (en) * 2019-11-01 2019-12-31 大唐高鸿信安(浙江)信息科技有限公司 Key management method and device for distributed block storage system
CN111143870B (en) * 2019-12-30 2022-05-13 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111143870A (en) * 2019-12-30 2020-05-12 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111132150A (en) * 2019-12-31 2020-05-08 中科曙光国际信息产业有限公司 Method and device for protecting data, storage medium and electronic equipment
CN114417393A (en) * 2021-12-08 2022-04-29 马上消费金融股份有限公司 File encryption method, system, electronic equipment and computer readable storage medium
CN115150185A (en) * 2022-07-25 2022-10-04 杭州东方通信软件技术有限公司 Method and device for controlling user directory and authority based on multiple passwords

Also Published As

Publication number Publication date
CN103581196B (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN103581196B (en) Distributed document transparent encryption method and transparent decryption method
CN101120352B (en) Method for protecting data stored in memory and device
CA2709944C (en) System and method for securing data
CN101819612B (en) Versatile content control with partitioning
US8966580B2 (en) System and method for copying protected data from one secured storage device to another via a third party
EP2267628B1 (en) Token passing technique for media playback devices
US9104618B2 (en) Managing access to an address range in a storage device
CN101120355B (en) System for creating control structure for versatile content control
KR101315076B1 (en) Method for redistributing dram protected content
US8572372B2 (en) Method for selectively enabling access to file systems of mobile terminals
EP1582950A2 (en) Digital rights management system and method
US20090276474A1 (en) Method for copying protected data from one secured storage device to another via a third party
US20200410136A1 (en) Stacked Encryption
CN104333545A (en) Method for encrypting cloud storage file data
KR20070087175A (en) Control structure for versatile content control and method using structure
WO2015154469A1 (en) Database operation method and device
US20220092193A1 (en) Encrypted file control
KR102005534B1 (en) Smart device based remote access control and multi factor authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant