CN103581196A - Distributed file transparent encryption method and transparent decryption method - Google Patents
Distributed file transparent encryption method and transparent decryption method Download PDFInfo
- Publication number
- CN103581196A CN103581196A CN201310566345.9A CN201310566345A CN103581196A CN 103581196 A CN103581196 A CN 103581196A CN 201310566345 A CN201310566345 A CN 201310566345A CN 103581196 A CN103581196 A CN 103581196A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- transparent
- encryption key
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a distributed file transparent encryption method and transparent decryption method. The distributed file transparent encryption method is characterized in that a file encryption algorithm and a file encryption key are set at the server side, and a file encryption algorithm ID and a file encryption key ID are set at the client side. The distributed file transparent decryption method is based on a user access right, dynamic passwords are adopted to verify the user access right, and a distributed decryption framework of a client side server is adopted. According to the distributed file transparent encryption method and transparent decryption method, encryption and decryption information is set in a separated mode, even though confidential files are illegally copied, the confidential files cannot be decrypted, the access safety performance of the confidential files is improved, and meanwhile operation by a user on the confidential files is strictly controlled through use of the dynamic passwords.
Description
Technical field
The present invention relates to file encryption field, relate in particular to a kind of distributed document transparent encryption method and transparent decryption method.
Background technology
Transparent file encryption system, can carry out the operation of encryption and decryption, automatically to prevent the leakage of classified papers and information to the file of certain type of appointment.So-called transparent, refer to that user is in operation file process, encryption and decryption process can not discovered by user, and whole encryption and decryption operating process completes automatically.Encrypting and deciphering system, according to the strategy setting in advance, comprises the file type, cryptographic algorithm, the encryption key that need protection, judges whether file needs to be encrypted and decryption oprerations, automatically completes the encryption and decryption of file.
Transparent file encryption technology runs on operating system kernel with the form of filter Driver on FSD, file is stored on hard disk with ciphertext form, when needs are read and write this encrypt file, encrypting and deciphering system carries out encryption and decryption in real time to file automatically, make system can be pellucidly under authorization conditions, with plaintext form, read and write this encrypt file.Once file has left its environment for use, cannot obtain decryption services and cannot access, like this, reached the object of file protect.
There is following problem in file transparent encrypting and deciphering system of the prior art: 1, classified papers is not carried out the control of access privilege, when user's access file, do not need accepting of authority, file will be deciphered automatically, what user saw is expressly, and can carry out any operation to file.Will bring like this problem, although be in same environment, user's identity is discrepant, sometimes may wish that some file is read-only to certain customers, but does not allow this part user to revise and delete these files; 2, the important informations such as key of classified papers being encrypted, normally with the form of file header, be attached to the head of the classified papers after encrypted, fail safe is not high enough, because the ciphertext of the important informations such as encryption key and classified papers is kept in same file, so, once known cryptographic algorithm, when classified papers are illegally copied, departed from transparent encryption system environments, encrypted classified papers are still and can be cracked.
Therefore, need a kind of new file transparent encryption method and file transparent decryption method, when guaranteeing the automatic encryption and decryption of classified papers, strengthen the control to user right, and improve the fail safe of file access, effectively suppress confidential information to outward leakage.
Summary of the invention
No user control of authority and the not high problem of fail safe for existing file transparent encryption method and file transparent decryption method, the invention provides a kind of new file transparent encryption method and file transparent decryption method, by dynamic password, control the access rights of user to classified papers, by the distributed storing of encryption and decryption information, improve the fail safe of system, thereby meet the demand of user's file transparent encrypting and deciphering system.
To achieve these goals, the invention provides a kind of distributed document transparent encryption method, described transparent encryption method comprises, file server a plurality of customer management informations that prestore, each customer management information comprises user name, user's group under user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID, file client sends the filename of file to be encrypted to file server, file server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire, the file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and are encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext, wherein, file client and file server carry out two-way communication by network communication interface, wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is ALTERA company
Alternatively, described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
To achieve these goals, the present invention also provides a kind of distributed document transparent decryption method, described transparent decryption method comprises, file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID; File client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify; File server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client; When file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server; File encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client; File client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews; Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, and the file header of classified papers comprises file encryption algorithm ID and file encryption key ID; Wherein, file client and file server carry out two-way communication by network communication interface; Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Alternatively, described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
Alternatively, after file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
The present invention is owing to having adopted technique scheme, thereby have the following advantages: distributed document transparent encryption method of the present invention and file transparent decryption method, adopt dynamic password to realize the effective control to access privilege, meet the multiple requirements for access of different user to classified papers, use distributed storage technology simultaneously, encryption key and classified papers ciphertext are separated, the important informations such as encryption key and cryptographic algorithm are stored in to server end, the ciphertext of classified papers is still stored in user environment, like this, even if classified papers are illegally copied, owing to having departed from transparent encryption system environments, cannot obtain encryption key and algorithm information from service end, file cannot be decrypted, thereby effectively prevented the leakage of confidential information.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of distributed document transparent encryption method of the present invention;
Fig. 2 is the flow chart of the transparent decryption method of a kind of distributed document of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.
First, please refer to Fig. 1, Fig. 1 is the flow chart of a kind of distributed document transparent encryption method of the present invention, and described transparent encryption method comprises the following steps:
Step 101: file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
Step 102: file client sends the filename of file to be encrypted to file server;
Step 103: file server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire;
Step 104: the file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and be encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext;
Wherein, file client and file server carry out two-way communication by network communication interface, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Wherein, described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks, and described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
In addition, transparent encryption technology is a kind of file ciphering technology of arising at the historic moment for enterprise's file security demand in recent years.So-called transparent, refer to user it is unknown.When user is when opening or edit specified file, system will be encrypted unencrypted file automatically, and the file of having encrypted is deciphered automatically.File is ciphertext on hard disk, is expressly in internal memory.Once leave environment for use, because cannot obtaining the service of deciphering automatically, application program cannot open, thus the effect of the protected file content of getting up.
In addition, FPGA(Field-Programmable Gate Array), i.e. field programmable gate array, he is the product further developing on the basis of the programming devices such as PAL, GAL, CPLD.He occurs as a kind of semi-custom circuit in application-specific integrated circuit (ASIC) (ASIC) field, has solved the deficiency of custom circuit, has overcome again the limited shortcoming of original programming device gate circuit number.FPGA is in general than ASIC(application-specific integrated circuit (ASIC)) speed slow, cannot complete complicated design, but power consumption is lower.But they also have a lot of advantages, such as finished product fast, can be modified mistake in correction program and more cheap cost.Manufacturer also may provide the cheap still poor FPGA of edit capability.Because these chips have poor can edit capability, so the exploitation of these designs is to complete on common FPGA, then design is transferred on a chip that is similar to ASIC.Another method is with CPLD(Complex Programmable Logic Device, CPLD).
In addition, Cloud Server is the important component part of cloud computing service, and being provides the service platform of integrated service ability towards all kinds of Internet users.Platform integration the large key element of traditional internet, applications three: calculating, storage, network, user oriented provides the Internet infrastructure service of publicization.Cloud Server service comprises two core products: 1, towards the Cloud Server rental service of SME users and high-end user; 2, towards big-and-middle-sized Internet user's elasticity, calculate platform service.Each clustered node of Cloud Server platform is deployed in the key data center of the Internet, and the Internet infrastructure services such as calculating, storage, online backup, trustship, bandwidth can be independently provided.
Then, continue with reference to figure 2, Fig. 2 is the flow chart of the transparent decryption method of a kind of distributed document of the present invention, and described transparent decryption method comprises the following steps:
Step 201: file server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
Step 202: file client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify;
Step 203: file server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client;
Step 204: when file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server;
Step 205: file encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client;
Step 206: file client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews;
Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, the file header of classified papers comprises file encryption algorithm ID and file encryption key ID, file client and file server carry out two-way communication by network communication interface, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
Wherein, described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks, and described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
Wherein, after file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
Those skilled in the art will recognize that; above-mentioned embodiment is exemplary; in order to make those skilled in the art can better understand this patent content; should not be understood as the restriction to this patent protection range; so long as disclose spiritual do any according to this patent, be equal to change or modify, all falling into this patent protection range.
Claims (7)
1. a distributed document transparent encryption method, is characterized in that, described transparent encryption method comprises:
File server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, user name and user's dynamic password are for verifying the user of file client, under user, user's group is for determining the user's of file client access rights, file server a plurality of file control informations that also prestore, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
File client sends the filename of file to be encrypted to file server;
File server is inquired about in a plurality of file control informations that prestore according to the filename receiving, obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID of filename, return to the file encryption algorithm, file encryption key, file encryption algorithm ID and the file encryption key ID that inquire;
The file encryption algorithm that file client basis is returned and file encryption key are treated encrypt file and are encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept in the file header of ciphertext;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
2. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file server is Cloud Server, and described a plurality of file control information distributed storage are on a plurality of hard disks.
3. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
4. the transparent decryption method of distributed document, is characterized in that, described transparent decryption method comprises:
File server a plurality of customer management informations that prestore, each customer management information comprises the affiliated user's group of user name, user's dynamic password and user, file server a plurality of file control informations that also prestored, each file control information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and file encryption key ID;
File client is when user accesses encrypt file, and request user inputs user name and user's dynamic password, and the user name that user is inputted and user's dynamic password send to file server and verify;
File server is verified the user name receiving and user's dynamic password according to a plurality of customer management informations that prestore, if the verification passes, according to user under the user in the customer management information authenticating to, organize and determine user's operating right, and definite user's operating right is returned to file client;
When file client to user's operating right be read-only, read-write or while controlling completely, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to file server;
File encryption algorithm corresponding to file encryption algorithm ID that file server arrives according to a plurality of file control information inquire-receives that prestore, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and the file encryption algorithm inquiring and file encryption key are turned back to file client;
File client is decrypted encrypt file according to the file encryption algorithm and the file encryption key that receive, and according to the user's operating right receiving, the encrypt file after deciphering is conducted interviews;
Wherein, user's operating right comprises limiting access, read-only, read-write or controls completely, and the file header of classified papers comprises file encryption algorithm ID and file encryption key ID;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, the network signal of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface form, network communication interface adopts on-site programmable gate array FPGA chip, and described fpga chip is the EP2C5Q208C8N of ALTERA company.
5. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file server is Cloud Server, and described a plurality of file control informations and described a plurality of customer management information distributed storage are on a plurality of hard disks.
6. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desktop computer.
7. the transparent decryption method of distributed document according to claim 4, is characterized in that:
After file server returns to file client by definite user's operating right, when file client to user's operating right while being limiting access, forbid the access of user to encrypt file, finish the transparent deciphering to encrypt file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310566345.9A CN103581196B (en) | 2013-11-13 | 2013-11-13 | Distributed document transparent encryption method and transparent decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310566345.9A CN103581196B (en) | 2013-11-13 | 2013-11-13 | Distributed document transparent encryption method and transparent decryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103581196A true CN103581196A (en) | 2014-02-12 |
CN103581196B CN103581196B (en) | 2016-05-11 |
Family
ID=50052126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310566345.9A Active CN103581196B (en) | 2013-11-13 | 2013-11-13 | Distributed document transparent encryption method and transparent decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103581196B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104333452A (en) * | 2014-10-26 | 2015-02-04 | 重庆智韬信息技术中心 | Multi-account encryption method for file data |
CN105095785A (en) * | 2014-05-22 | 2015-11-25 | 中兴通讯股份有限公司 | File access processing method, and file access method and device of distributed file system |
CN105282171A (en) * | 2015-11-06 | 2016-01-27 | 北京大学深圳研究生院 | Safe and reliable distributed cloud storage method |
CN106302312A (en) * | 2015-05-13 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Obtain the method and device of e-file |
CN106326733A (en) * | 2015-06-26 | 2017-01-11 | 中兴通讯股份有限公司 | Method and apparatus for managing applications in mobile terminal |
CN109886028A (en) * | 2019-01-22 | 2019-06-14 | 杭州美创科技有限公司 | The method of remotely enabled Oracle transparent encryption |
CN109995735A (en) * | 2017-12-31 | 2019-07-09 | 中国移动通信集团重庆有限公司 | Downloading and application method, server, client, system, equipment and medium |
CN110110550A (en) * | 2019-04-19 | 2019-08-09 | 深圳华中科技大学研究院 | It is a kind of support cloud storage can search for encryption method and system |
CN110414192A (en) * | 2019-06-14 | 2019-11-05 | 伊格拉斯控股有限公司 | Keyholed back plate system and method applied to safe manufacturing |
CN110635906A (en) * | 2019-11-01 | 2019-12-31 | 大唐高鸿信安(浙江)信息科技有限公司 | Key management method and device for distributed block storage system |
CN111132150A (en) * | 2019-12-31 | 2020-05-08 | 中科曙光国际信息产业有限公司 | Method and device for protecting data, storage medium and electronic equipment |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
WO2020206953A1 (en) * | 2019-04-09 | 2020-10-15 | 苏宁云计算有限公司 | Data processing method and system |
CN114417393A (en) * | 2021-12-08 | 2022-04-29 | 马上消费金融股份有限公司 | File encryption method, system, electronic equipment and computer readable storage medium |
CN115150185A (en) * | 2022-07-25 | 2022-10-04 | 杭州东方通信软件技术有限公司 | Method and device for controlling user directory and authority based on multiple passwords |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102014133A (en) * | 2010-11-26 | 2011-04-13 | 清华大学 | Method for implementing safe storage system in cloud storage environment |
US20130024424A1 (en) * | 2009-06-30 | 2013-01-24 | Commvault Systems, Inc. | Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
CN103310169A (en) * | 2013-04-28 | 2013-09-18 | 东莞宇龙通信科技有限公司 | SD (Secure Digital) card data protection method and protection system thereof |
-
2013
- 2013-11-13 CN CN201310566345.9A patent/CN103581196B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130024424A1 (en) * | 2009-06-30 | 2013-01-24 | Commvault Systems, Inc. | Data object store and server for a cloud storage environment, including data deduplication and data management across multiple cloud storage sites |
CN102014133A (en) * | 2010-11-26 | 2011-04-13 | 清华大学 | Method for implementing safe storage system in cloud storage environment |
CN103310169A (en) * | 2013-04-28 | 2013-09-18 | 东莞宇龙通信科技有限公司 | SD (Secure Digital) card data protection method and protection system thereof |
CN103281377A (en) * | 2013-05-31 | 2013-09-04 | 北京鹏宇成软件技术有限公司 | Cryptograph data storage and searching method for cloud |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095785A (en) * | 2014-05-22 | 2015-11-25 | 中兴通讯股份有限公司 | File access processing method, and file access method and device of distributed file system |
CN104333452B (en) * | 2014-10-26 | 2017-11-10 | 重庆智韬信息技术中心 | A kind of method to the encryption of file data more accounts |
CN104333452A (en) * | 2014-10-26 | 2015-02-04 | 重庆智韬信息技术中心 | Multi-account encryption method for file data |
CN106302312B (en) * | 2015-05-13 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Obtain the method and device of electronic document |
CN106302312A (en) * | 2015-05-13 | 2017-01-04 | 阿里巴巴集团控股有限公司 | Obtain the method and device of e-file |
CN106326733A (en) * | 2015-06-26 | 2017-01-11 | 中兴通讯股份有限公司 | Method and apparatus for managing applications in mobile terminal |
CN105282171B (en) * | 2015-11-06 | 2018-04-27 | 北京大学深圳研究生院 | A kind of safe and reliable distributed cloud storage method |
CN105282171A (en) * | 2015-11-06 | 2016-01-27 | 北京大学深圳研究生院 | Safe and reliable distributed cloud storage method |
CN109995735A (en) * | 2017-12-31 | 2019-07-09 | 中国移动通信集团重庆有限公司 | Downloading and application method, server, client, system, equipment and medium |
CN109886028A (en) * | 2019-01-22 | 2019-06-14 | 杭州美创科技有限公司 | The method of remotely enabled Oracle transparent encryption |
WO2020206953A1 (en) * | 2019-04-09 | 2020-10-15 | 苏宁云计算有限公司 | Data processing method and system |
CN110110550A (en) * | 2019-04-19 | 2019-08-09 | 深圳华中科技大学研究院 | It is a kind of support cloud storage can search for encryption method and system |
CN110110550B (en) * | 2019-04-19 | 2023-05-09 | 深圳华中科技大学研究院 | Searchable encryption method and system supporting cloud storage |
CN110414192A (en) * | 2019-06-14 | 2019-11-05 | 伊格拉斯控股有限公司 | Keyholed back plate system and method applied to safe manufacturing |
CN110414192B (en) * | 2019-06-14 | 2023-09-26 | 尚承科技股份有限公司 | Control and management system and method applied to safety manufacture |
CN110635906A (en) * | 2019-11-01 | 2019-12-31 | 大唐高鸿信安(浙江)信息科技有限公司 | Key management method and device for distributed block storage system |
CN111143870B (en) * | 2019-12-30 | 2022-05-13 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111143870A (en) * | 2019-12-30 | 2020-05-12 | 兴唐通信科技有限公司 | Distributed encryption storage device, system and encryption and decryption method |
CN111132150A (en) * | 2019-12-31 | 2020-05-08 | 中科曙光国际信息产业有限公司 | Method and device for protecting data, storage medium and electronic equipment |
CN114417393A (en) * | 2021-12-08 | 2022-04-29 | 马上消费金融股份有限公司 | File encryption method, system, electronic equipment and computer readable storage medium |
CN115150185A (en) * | 2022-07-25 | 2022-10-04 | 杭州东方通信软件技术有限公司 | Method and device for controlling user directory and authority based on multiple passwords |
Also Published As
Publication number | Publication date |
---|---|
CN103581196B (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103581196B (en) | Distributed document transparent encryption method and transparent decryption method | |
CN101120352B (en) | Method for protecting data stored in memory and device | |
CA2709944C (en) | System and method for securing data | |
CN101819612B (en) | Versatile content control with partitioning | |
US8966580B2 (en) | System and method for copying protected data from one secured storage device to another via a third party | |
EP2267628B1 (en) | Token passing technique for media playback devices | |
US9104618B2 (en) | Managing access to an address range in a storage device | |
CN101120355B (en) | System for creating control structure for versatile content control | |
KR101315076B1 (en) | Method for redistributing dram protected content | |
US8572372B2 (en) | Method for selectively enabling access to file systems of mobile terminals | |
EP1582950A2 (en) | Digital rights management system and method | |
US20090276474A1 (en) | Method for copying protected data from one secured storage device to another via a third party | |
US20200410136A1 (en) | Stacked Encryption | |
CN104333545A (en) | Method for encrypting cloud storage file data | |
KR20070087175A (en) | Control structure for versatile content control and method using structure | |
WO2015154469A1 (en) | Database operation method and device | |
US20220092193A1 (en) | Encrypted file control | |
KR102005534B1 (en) | Smart device based remote access control and multi factor authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |