CN103581196B - Distributed document transparent encryption method and transparent decryption method - Google Patents

Distributed document transparent encryption method and transparent decryption method Download PDF

Info

Publication number
CN103581196B
CN103581196B CN201310566345.9A CN201310566345A CN103581196B CN 103581196 B CN103581196 B CN 103581196B CN 201310566345 A CN201310566345 A CN 201310566345A CN 103581196 B CN103581196 B CN 103581196B
Authority
CN
China
Prior art keywords
file
user
client
transparent
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310566345.9A
Other languages
Chinese (zh)
Other versions
CN103581196A (en
Inventor
谈剑锋
孟飞
丁震宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yidian Technology Co ltd
Original Assignee
Shanghai Peoplenet Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Peoplenet Security Technology Co Ltd filed Critical Shanghai Peoplenet Security Technology Co Ltd
Priority to CN201310566345.9A priority Critical patent/CN103581196B/en
Publication of CN103581196A publication Critical patent/CN103581196A/en
Application granted granted Critical
Publication of CN103581196B publication Critical patent/CN103581196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of distributed document transparent encryption method and transparent decryption method, file encryption algorithm, file encryption key are placed on server end by described distributed document transparent encryption method, file encryption algorithm ID and file encryption key ID are placed on client, described distributed transparent decryption method adopts verifying dynamic password access privilege based on access privilege, and adopts the Distributed Decryption of Word framework of client-server. The present invention is by encryption and decryption information is separated to placement, even if classified papers are illegally copied, also cannot be decrypted, and improve the security of classified papers access, meanwhile, the operation of user to classified papers strictly controlled in the use of dynamic password.

Description

Distributed document transparent encryption method and transparent decryption method
Technical field
The present invention relates to file encryption field, relate in particular to a kind of distributed document transparent encryption method andTransparent decryption method.
Background technology
Transparent file encryption system, can be automatically to the file of certain type that specifies carry out encrypt andThe operation of deciphering, to prevent the leakage of classified papers and information. So-called transparent, refer to that user is in operationIn file process, encryption and decryption process can not discovered by user, and whole encryption and decryption operating process completes automatically.Encrypting and deciphering system is according to the strategy that sets in advance, comprise the file type that needs protection, AES,Encryption key, judges whether file needs to be encrypted and decryption oprerations, automatically completes adding of fileClose and deciphering.
Transparent file encryption technology runs on operating system kernel with the form of filter Driver on FSD, fileBe stored on hard disk with ciphertext form, in the time that needs are read and write this encrypt file, encrypting and deciphering system is automatically rightFile carries out encryption and decryption in real time, make system can be pellucidly under authorization conditions, read with plaintext formWrite this encrypt file. Once file has left its environment for use, cannot obtain decryption services and cannotAccess, like this, has reached the object of file protect.
There is following problem in file transparent encrypting and deciphering system of the prior art: 1, not to classified papersCarry out the control of access privilege, in the time of user's access file, do not need accepting of authority, fileWill automatically decipher, what user saw is expressly, and can carry out any operation to file. Like thisWill bring a problem, although be in same environment, user's identity is discrepant,Sometimes may wish that some file is read-only to certain customers, but not allow this part user to repairChange and delete these files; The important informations such as the key of 2, classified papers being encrypted, normally with literary compositionThe form of part head is attached to the head of the classified papers after encrypted, and security is not high enough, due to encryptionThe ciphertext of the important informations such as key and classified papers is kept in same file, so, once knowAES, when classified papers are illegally copied, departed from transparent encryption system environments, encryptedClassified papers be still and can be cracked.
Therefore, need a kind of new file transparent encryption method and file transparent decryption method, ensureingWhen the automatic encryption and decryption of classified papers, strengthen control to user right, and improve file accessSecurity, effectively suppress confidential information to outward leakage.
Summary of the invention
For the no user control of authority of existing file transparent encryption method and file transparent decryption methodThe problem not high with security, the invention provides a kind of new file transparent encryption method and file saturatingBright decryption method, the access rights by dynamic password control user to classified papers, pass through encryption and decryptionThe distributed storing of information improves the security of system, thereby meets user's file transparent encryption and decryptionThe demand of system.
To achieve these goals, the invention provides a kind of distributed document transparent encryption method, instituteState transparent encryption method and comprise, file server multiple customer management informations that prestore, each user's pipeReason information comprises the affiliated user's group of user name, user's dynamic password and user, and user name and user are dynamicPassword is for the user of file client is verified, under user, user's group is for determining file visitorThe user's of family end access rights, file server multiple file control informations that also prestore, each literary compositionPart management information comprises filename, file encryption algorithm, file encryption key, file encryption algorithm IDWith file encryption key ID; File client sends the filename of file to be encrypted to file server;File server is inquired about in the multiple file control informations that prestore according to the filename receiving,Obtain corresponding file encryption algorithm, file encryption key, file encryption algorithm ID and the literary composition of filenamePart encryption key ID, returns to the file encryption algorithm, file encryption key, the file encryption that inquireAlgorithm ID and file encryption key ID; File client is according to the file encryption algorithm and the file that returnEncryption key is treated encrypt file and is encrypted, generating ciphertext, and by file encryption algorithm ID and literary compositionPart encryption key ID is kept in the file header of ciphertext; Wherein, file client and file serverCarry out two-way communication by network communication interface; Wherein, network communication interface transmitting-receiving RJ-45 interface latticeThe network signal of formula, RJ-11 form or USB interface form, network communication interface adopts on-the-spotProgrammable gate array FPGA chip, described fpga chip is ALTERA company EP2C5Q208C8N。
Alternatively, described file server is Cloud Server, and described multiple file control informations are distributedBe stored on multiple hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDAOr desktop computer.
To achieve these goals, the present invention also provides a kind of distributed document transparent decryption method,Described transparent decryption method comprises, file server multiple customer management informations that prestore, each userManagement information comprises the affiliated user's group of user name, user's dynamic password and user, and file server is also pre-Deposited multiple file control informations, each file control information comprise filename, file encryption algorithm,File encryption key, file encryption algorithm ID and file encryption key ID; File client is userWhen access encrypt file, request user inputs user name and user's dynamic password, by the use of user's inputName in an account book and user's dynamic password send to file server and verify; File server basis prestoresMultiple customer management informations are verified the user name receiving and user's dynamic password, if checkingPass through, organize and determine that user operates power according to user under the user in the customer management information authenticating toLimit, and definite user's operating right is returned to file client; When file client arrivesUser's operating right is read-only, read-write or while controlling completely, by the file in the file header of encrypt fileAES ID and file encryption key ID send to file server; File server is according to prestoringFile encryption corresponding to the file encryption algorithm ID that arrives of multiple file control information inquire-receives calculateMethod, file encryption key corresponding to file encryption key ID that inquire-receive arrives, and will inquireFile encryption algorithm and file encryption key turn back to file client; File client is according to receivingFile encryption algorithm and file encryption key encrypt file is decrypted, and according to the use receivingFamily operating right conducts interviews to the encrypt file after deciphering; Wherein, user's operating right comprises restrictionAccess, read-only, read-write or completely control, the file header of encrypt file comprises file encryption algorithm IDWith file encryption key ID; Wherein, file client and file server pass through network communication interfaceCarry out two-way communication; Wherein, network communication interface transmitting-receiving RJ-45 interface format, RJ-11 latticeThe network signal of formula or USB interface form, network communication interface adopts field programmable gate arrayFpga chip, described fpga chip is the EP2C5Q208C8N of ALTERA company.
Alternatively, described file server is Cloud Server, described multiple file control informations and described inMultiple customer management information distributed storage are on multiple hard disks.
Alternatively, described file client is notebook, smart mobile phone, personal digital assistant PDAOr desktop computer.
Alternatively, file server by definite user's operating right return to file client itAfter, when file client to user's operating right while being limiting access, forbid that user is to encryptingThe access of file, finishes the transparent deciphering to encrypt file.
The present invention is owing to having adopted technique scheme, thereby has the following advantages: distribution of the present inventionFormula file transparent encryption method and file transparent decryption method, adopt dynamic password to realize user accessedEffective control of authority, meets the multiple requirements for access of different user to classified papers, uses and divides simultaneouslyCloth formula memory technology, separates encryption key and classified papers ciphertext, to encryption key and encryptionThe important informations such as algorithm are stored in server end, and the ciphertext of classified papers is still stored in user environmentIn, like this, even if classified papers are illegally copied, owing to having departed from transparent encryption system environments, nothingMethod is obtained encryption key and algorithm information from service end, and file cannot be decrypted, thereby effectively anti-Stop the leakage of confidential information.
Brief description of the drawings
Fig. 1 is the flow chart of a kind of distributed document transparent encryption method of the present invention;
Fig. 2 is the flow chart of the transparent decryption method of a kind of distributed document of the present invention.
Detailed description of the invention
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.
First, please refer to Fig. 1, Fig. 1 is the stream of a kind of distributed document transparent encryption method of the present inventionCheng Tu, described transparent encryption method comprises the following steps:
Step 101: file server multiple customer management informations that prestore, each customer management informationComprise the affiliated user's group of user name, user's dynamic password and user, user name and user's dynamic password are usedIn the user of file client is verified, user group is for determining file client under userUser's access rights, file server multiple file control informations that also prestore, each file managementInformation comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and literary compositionPart encryption key ID;
Step 102: file client sends the filename of file to be encrypted to file server;
Step 103: multiple file management letters that file server is prestoring according to the filename receivingIn breath, inquire about, obtain corresponding file encryption algorithm, file encryption key, the file of filename and addClose algorithm ID and file encryption key ID, return to the file encryption algorithm, the file encryption that inquire closeKey, file encryption algorithm ID and file encryption key ID;
Step 104: file client is treated according to the file encryption algorithm and the file encryption key that returnEncrypt file is encrypted, generating ciphertext, and by file encryption algorithm ID and file encryption key IDBe kept in the file header of ciphertext;
Wherein, file client and file server carry out two-way communication, net by network communication interfaceThe network of network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USB interface formSignal, network communication interface adopts on-site programmable gate array FPGA chip, described fpga chipFor the EP2C5Q208C8N of ALTERA company.
Wherein, described file server is Cloud Server, distributed the depositing of described multiple file control informationsStorage is on multiple hard disks, and described file client is notebook, smart mobile phone, personal digital assistantPDA or desktop computer.
In addition, transparent encryption technology is the one of arising at the historic moment for enterprise's file security demand in recent yearsFile ciphering technology. So-called transparent, refer to user it is unknown. When user is openingOr editor is when specified file, system will be encrypted unencrypted file automatically, to the literary composition of having encryptedPart is deciphered automatically. File is ciphertext on hard disk, is expressly in internal memory. Once leave environment for use,Cannot open because application program cannot obtain the service of deciphering automatically, thereby get up in protected fileThe effect of holding.
In addition, FPGA (Field-ProgrammableGateArray), i.e. field-programmable gate arrayRow, he is the product further developing on the basis of the programming devices such as PAL, GAL, CPLD.He occurs as a kind of semi-custom circuit in special IC (ASIC) field, separatesThe determined deficiency of custom circuit, has overcome again the limited shortcoming of original programming device gate circuit number.FPGA is in general slow than the speed of ASIC (special IC), cannot complete complicatedDesign, but power consumption is lower. But they also have a lot of advantages, such as finished product fast, canTo be modified mistake in correction program and more cheap cost. It is cheap that manufacturer also may provideBut the FPGA that edit capability is poor. Because these chips have poor can edit capability, so thisThe exploitation of a little designs is to complete on common FPGA, then design is transferred to one and is similar toOn the chip of ASIC. Another method is with CPLD (ComplexProgrammableLogicDevice, CPLD).
In addition, Cloud Server is the important component part of cloud computing service, is to use towards all kinds of internetsFamily provides the service platform of integrated service ability. Platform integration traditional the Internet, applications threeLarge key element: calculating, storage, network, user oriented provides the Internet infrastructure of publicizationService. Cloud Server service comprises two core products: 1, towards SME users and high-end useThe Cloud Server rental service at family; 2, calculate platform service towards big-and-middle-sized Internet user's elasticity.Each clustered node of Cloud Server platform is deployed in the key data center of internet, can independently carryFor the Internet infrastructure services such as calculating, storage, online backup, trustship, bandwidth.
Then, continue with reference to figure 2, Fig. 2 is a kind of distributed document of the present invention transparent decryption methodFlow chart, described transparent decryption method comprises the following steps:
Step 201: file server multiple customer management informations that prestore, each customer management informationComprise the affiliated user's group of user name, user's dynamic password and user, file server has also prestored multipleFile control information, each file control information comprises that filename, file encryption algorithm, file addDecryption key, file encryption algorithm ID and file encryption key ID;
Step 202: file client is in the time that user accesses encrypt file, and request user inputs user nameWith user's dynamic password, user name and user's dynamic password of user's input are sent to file serverVerify;
Step 203: multiple customer management informations that file server basis prestores are to the user who receivesName and user's dynamic password are verified, if the verification passes, believe according to the user management authenticating toUnder user in breath, user organizes and determines user's operating right, and definite user's operating right is returnedGive file client;
Step 204: when file client to user's operating right be read-only, read-write or completelyWhen control, the file encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent outDeliver to file server;
Step 205: the literary composition that file server arrives according to the multiple file control information inquire-receives that prestoreThe file encryption algorithm that part AES ID is corresponding, the file encryption key ID correspondence that inquire-receive arrivesFile encryption key, and the file encryption algorithm and the file encryption key that inquire are turned back to fileClient;
Step 206: file client is according to the file encryption algorithm and the file encryption key pair that receiveEncrypt file is decrypted, and according to the user's operating right receiving, the encrypt file after deciphering is enteredRow access;
Wherein, user's operating right comprise limiting access, read-only, read-write or completely control, add ciphertextThe file header of part comprises file encryption algorithm ID and file encryption key ID, file client and literary compositionPart server carries out two-way communication by network communication interface, network communication interface transmitting-receiving RJ-45 interfaceThe network signal of form, RJ-11 form or USB interface form, network communication interface adopts existingField programmable gate array fpga chip, described fpga chip is ALTERA companyEP2C5Q208C8N。
Wherein, described file server is Cloud Server, described multiple file control informations and described manyIndividual customer management information distributed storage is on multiple hard disks, and described file client is notebook, intelligenceEnergy mobile phone, personal digital assistant PDA or desktop computer.
Wherein, after definite user's operating right is returned to file client by file server,When file client to user's operating right while being limiting access, forbid that user is to encrypt fileAccess, finish transparent deciphering to encrypt file.
One skilled in the art would recognize that above-mentioned detailed description of the invention is exemplary, isIn order to make those skilled in the art can better understand this patent content, should not be understood as to this speciallyProfit protection domain restriction, as long as disclose according to this patent spirit do any be equal to change orModify, all fall into this patent protection domain.

Claims (7)

1. a distributed document transparent encryption method, is characterized in that, described transparent encryption methodComprise:
File server multiple customer management informations that prestore, each customer management information comprises userUser's group under name, user's dynamic password and user, user name and user's dynamic password are used for literary compositionThe user of part client verifies, under user, user's group is for determining the user of file clientAccess rights, file server multiple file control informations that also prestore, each file management letterBreath comprises filename, file encryption algorithm, file encryption key, file encryption algorithm ID and literary compositionPart encryption key ID;
File client sends the filename of file to be encrypted to file server;
File server carries out in the multiple file control informations that prestore according to the filename receivingInquiry, obtains corresponding file encryption algorithm, file encryption key, the file encryption algorithm of filenameID and file encryption key ID, return the file encryption algorithm that inquires, file encryption key,File encryption algorithm ID and file encryption key ID;
File client is treated encrypt file according to the file encryption algorithm and the file encryption key that returnBe encrypted, generating ciphertext, and file encryption algorithm ID and file encryption key ID are kept atIn the file header of ciphertext;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USBThe network signal of interface format, network communication interface adopts on-site programmable gate array FPGA chip,Described fpga chip is the EP2C5Q208C8N of ALTERA company.
2. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file server is Cloud Server, and described multiple file control information distributed storage existOn multiple hard disks.
3. distributed document transparent encryption method according to claim 1, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desk-top meterCalculation machine.
4. the transparent decryption method of distributed document, is characterized in that, described transparent decryption methodComprise:
File server multiple customer management informations that prestore, each customer management information comprises userUser's group under name, user's dynamic password and user, file server multiple file pipes that also prestoredReason information, each file control information comprises that filename, file encryption algorithm, file encryption are closeKey, file encryption algorithm ID and file encryption key ID;
File client is in the time that user accesses encrypt file, and request user inputs user name and user is movingState password, the user name that user is inputted and user's dynamic password send to file server and testCard;
Multiple customer management informations that file server basis prestores are to the user name receiving and userDynamic password verifies, if the verification passes, and according in the customer management information authenticating toUnder user, user organizes and determines user's operating right, and definite user's operating right is returned to literary compositionPart client;
When file client to user's operating right be read-only, read-write or while controlling completely,File encryption algorithm ID in the file header of encrypt file and file encryption key ID are sent to literary compositionPart server;
The file encryption that file server arrives according to the multiple file control information inquire-receives that prestore is calculatedThe file encryption algorithm that method ID is corresponding, file corresponding to file encryption key ID that inquire-receive arrivesEncryption key, and the file encryption algorithm inquiring and file encryption key are turned back to file clientEnd;
The file encryption algorithm that file client basis receives and file encryption key are to encrypt fileBe decrypted, and according to the user's operating right receiving, the encrypt file after deciphering conducted interviews;
Wherein, user's operating right comprise limiting access, read-only, read-write or completely control, encryptThe file header of file comprises file encryption algorithm ID and file encryption key ID;
Wherein, file client and file server carry out two-way communication by network communication interface;
Wherein, network communication interface transmitting-receiving RJ-45 interface format, RJ-11 form or USBThe network signal of interface format, network communication interface adopts on-site programmable gate array FPGA chip,Described fpga chip is the EP2C5Q208C8N of ALTERA company.
5. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file server is Cloud Server, described multiple file control informations and described multiple useFamily management information distributed storage is on multiple hard disks.
6. the transparent decryption method of distributed document according to claim 4, is characterized in that:
Described file client is notebook, smart mobile phone, personal digital assistant PDA or desk-top meterCalculation machine.
7. the transparent decryption method of distributed document according to claim 4, is characterized in that:
After definite user's operating right is returned to file client by file server, work as literary compositionPart client to user's operating right while being limiting access, forbid that user is to encrypt fileAccess, finishes the transparent deciphering to encrypt file.
CN201310566345.9A 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method Active CN103581196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310566345.9A CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310566345.9A CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Publications (2)

Publication Number Publication Date
CN103581196A CN103581196A (en) 2014-02-12
CN103581196B true CN103581196B (en) 2016-05-11

Family

ID=50052126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310566345.9A Active CN103581196B (en) 2013-11-13 2013-11-13 Distributed document transparent encryption method and transparent decryption method

Country Status (1)

Country Link
CN (1) CN103581196B (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095785A (en) * 2014-05-22 2015-11-25 中兴通讯股份有限公司 File access processing method, and file access method and device of distributed file system
CN104333452B (en) * 2014-10-26 2017-11-10 重庆智韬信息技术中心 A kind of method to the encryption of file data more accounts
CN106302312B (en) * 2015-05-13 2019-09-17 阿里巴巴集团控股有限公司 Obtain the method and device of electronic document
CN106326733A (en) * 2015-06-26 2017-01-11 中兴通讯股份有限公司 Method and apparatus for managing applications in mobile terminal
CN105282171B (en) * 2015-11-06 2018-04-27 北京大学深圳研究生院 A kind of safe and reliable distributed cloud storage method
CN109995735A (en) * 2017-12-31 2019-07-09 中国移动通信集团重庆有限公司 Downloading and application method, server, client, system, equipment and medium
CN109886028B (en) * 2019-01-22 2020-08-25 杭州美创科技有限公司 Method for remotely enabling Oracle transparent encryption
CN110061983B (en) * 2019-04-09 2020-11-06 苏宁云计算有限公司 Data processing method and system
CN110110550B (en) * 2019-04-19 2023-05-09 深圳华中科技大学研究院 Searchable encryption method and system supporting cloud storage
CN110414192B (en) * 2019-06-14 2023-09-26 尚承科技股份有限公司 Control and management system and method applied to safety manufacture
CN110635906B (en) * 2019-11-01 2022-06-10 大唐高鸿信安(浙江)信息科技有限公司 Key management method and device for distributed block storage system
CN111143870B (en) * 2019-12-30 2022-05-13 兴唐通信科技有限公司 Distributed encryption storage device, system and encryption and decryption method
CN111132150A (en) * 2019-12-31 2020-05-08 中科曙光国际信息产业有限公司 Method and device for protecting data, storage medium and electronic equipment
CN114417393B (en) * 2021-12-08 2023-04-07 马上消费金融股份有限公司 File encryption method, system, electronic equipment and computer readable storage medium
CN115150185A (en) * 2022-07-25 2022-10-04 杭州东方通信软件技术有限公司 Method and device for controlling user directory and authority based on multiple passwords

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud
CN103310169A (en) * 2013-04-28 2013-09-18 东莞宇龙通信科技有限公司 SD (Secure Digital) card data protection method and protection system thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8407190B2 (en) * 2009-06-30 2013-03-26 Commvault Systems, Inc. Performing data storage operations with a cloud environment, including containerized deduplication, data pruning, and data transfer

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014133A (en) * 2010-11-26 2011-04-13 清华大学 Method for implementing safe storage system in cloud storage environment
CN103310169A (en) * 2013-04-28 2013-09-18 东莞宇龙通信科技有限公司 SD (Secure Digital) card data protection method and protection system thereof
CN103281377A (en) * 2013-05-31 2013-09-04 北京鹏宇成软件技术有限公司 Cryptograph data storage and searching method for cloud

Also Published As

Publication number Publication date
CN103581196A (en) 2014-02-12

Similar Documents

Publication Publication Date Title
CN103581196B (en) Distributed document transparent encryption method and transparent decryption method
CN109144961B (en) Authorization file sharing method and device
US7975312B2 (en) Token passing technique for media playback devices
RU2392659C2 (en) Flexible architecture for licensing in copyright control system
US8966580B2 (en) System and method for copying protected data from one secured storage device to another via a third party
CN101120352B (en) Method for protecting data stored in memory and device
KR101315076B1 (en) Method for redistributing dram protected content
US11290446B2 (en) Access to data stored in a cloud
JP5033916B2 (en) Digital copyright management method for compressed files
US8572372B2 (en) Method for selectively enabling access to file systems of mobile terminals
US20110185179A1 (en) System And Method For Digital Rights Management With A Lightweight Digital Watermarking Component
US20090276474A1 (en) Method for copying protected data from one secured storage device to another via a third party
US20200410136A1 (en) Stacked Encryption
CN107370595A (en) One kind is based on fine-grained ciphertext access control method
US10095848B2 (en) System, method and apparatus for securely distributing content
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
US11734394B2 (en) Distributed license encryption and distribution
US20220092193A1 (en) Encrypted file control
KR101952139B1 (en) A method for providing digital right management function in gateway server communicated with user terminal
US8296826B1 (en) Secure transfer of files
US8755521B2 (en) Security method and system for media playback devices
US9294447B2 (en) Access control
KR20180043679A (en) A method for providing digital right management function in cloud storage server communicated with gateway server
WO2013044311A1 (en) A system and method for distributing secured data
Wang et al. An In-Domain Protection and Management Scheme for DRM systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240513

Address after: Room 503, Building 3, No. 6, Xicheng Xi'an North Road, Xinluo District, Longyan City, Fujian Province, 364000

Patentee after: Xie Xinyong

Country or region after: China

Address before: 201821 211 rooms, No. 1411, Yecheng Road, Jiading District, Shanghai

Patentee before: SHANGHAI PEOPLENET SECURITY TECHNOLOGY Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240530

Address after: 310000, No. 197 Golf Road, Dongzhou Street, Fuyang District, Hangzhou City, Zhejiang Province (1st and 3rd floors of Building 4)

Patentee after: Zhejiang Yidian Technology Co.,Ltd.

Country or region after: China

Address before: Room 503, Building 3, No. 6, Xicheng Xi'an North Road, Xinluo District, Longyan City, Fujian Province, 364000

Patentee before: Xie Xinyong

Country or region before: China

TR01 Transfer of patent right