CN104580062A - Safe shared document viewing method and device - Google Patents
Safe shared document viewing method and device Download PDFInfo
- Publication number
- CN104580062A CN104580062A CN201310468105.5A CN201310468105A CN104580062A CN 104580062 A CN104580062 A CN 104580062A CN 201310468105 A CN201310468105 A CN 201310468105A CN 104580062 A CN104580062 A CN 104580062A
- Authority
- CN
- China
- Prior art keywords
- user
- document
- privately owned
- viewed
- total
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a safe shared document viewing method and device, and relates to the field of communication. The method comprises the following steps: setting users co-owning a shared document viewing right; acquiring and saving private keys set respectively by the users co-owning the shared document viewing right; performing authentication processing on the users by using the private keys; and if all the users co-owning the shared document viewing right are authenticated successfully, issuing a shared document to all the users. Through adoption of the method and the device, a plurality of users co-owning the shared document viewing right can only view the document after totally passing real-time authentication in a mutual restriction way, so that the timeliness, security and integrity of the document are greatly enhanced.
Description
Technical field
The present invention relates to communication field, particularly a kind of safe and reliable total document viewing method based on the real-time authentication of multi-user and relevant apparatus.
Background technology
Along with the development of mobile Internet, the use category of mobile phone obtains great expansion.Development wherein in data/file encryption field is particularly rapid, and modal is encrypted transmission and the preservation of personal data/file, and Fig. 1 is the private data encryption flow figure that prior art provides, and as shown in Figure 1, concrete implementation step is as follows:
Step 101: user in server registration account, and arranges password;
Step 102: user's uploading data, and privately owned password is set;
Step 103: user initiates the request of downloading document, and inputs privately owned password;
Step 104: server carries out the authentication of privately owned password, if authentication is passed through, then performs step 105, otherwise, perform step 106;
Step 105: after authentication is passed through, carries out profile download;
Step 106: process ends.
Visible, user do not have privately owned password just cannot carry out the checking of data, edit or the operation such as deletion, and the safety for personal data provides great guarantee.
But, at some in particular cases, simple personal data encryption can not meet the demand of market diversification, some document/data belong to public all, and possess certain ageing restriction, need the relevant person of institute in designated time section, and just can carry out the checking of document/data after meeting certain agreed terms, edit or deletion action, the ownership of common maintain documents/data, and indispensable.If wherein any one subscription authentication failure, so document is not just by authentication, and other people cannot check/Edit Document data, and this just belongs to and controls document security based on multi-user; Or wherein any one user does not ask authentication within the designated time, so other owner can not check document, this guarantees the real-time of document.
At society, the legal consciousness of people is more and more stronger, many people own document ownership together, and document possesses ageing scene to get more and more, under the such as scene such as testament, commercial contract, require that at the appointed time whole document owner is jointly on the scene, just can carry out checking and editing of document.At present, also do not use digitizing technique to support under this scene, along with development of Mobile Internet technology development, a kind of powerful, safe, reliable, convenient and real-time system is needed to solve this problem, to ensure the safe storage of document, data integrity and reliable authentication, and reach the object of restriction mutually between data owner.
Summary of the invention
The object of the present invention is to provide a kind of safe total document viewing method and device, ageing, fail safe and the integrity issue of total document can be solved better.
According to an aspect of the present invention, provide a kind of safe total document viewing method, comprising:
The proprietorial user of total document to be viewed is owned in setting together;
Obtain and own the privately owned password that the proprietorial user of total document to be viewed arranges separately described in preserving together;
Utilize described privately owned password, authentication process is carried out to described user;
If described in own together the proprietorial whole use of total document to be viewed per family authentication success, then issue described total document to described whole user.
Preferably, described utilizes described privately owned password, and the step of described user being carried out to authentication process comprises:
Receive the privately owned password that user inputs for checking document;
The privately owned password that described privately owned password and described user are preserved in advance is compared;
If the privately owned password that described privately owned password and described user preserve in advance is consistent, then determine described subscription authentication success, otherwise, determine described subscription authentication failure.
Preferably, in Preset Time, if described in own together the proprietorial whole use of total document to be viewed per family authentication success, then issue described total document to described whole user.
Preferably, the described step issuing described total document to described whole user comprises:
Described total document to be viewed is directly issued to described whole user.
Preferably, the described step issuing described total document to described whole user comprises:
Described whole user is issued to by after described total file encryption to be viewed.
Preferably, the privately owned password owning the proprietorial user of total document to be viewed together is utilized, to described total file encryption to be viewed.
According to a further aspect in the invention, provide a kind of safe total document viewing device, comprising:
User arranges module, owns the proprietorial user of total document to be viewed together for arranging;
Password acquisition module, for obtaining and owning the privately owned password that the proprietorial user of total document to be viewed arranges separately described in preserving together;
Subscription authentication module, for utilizing described privately owned password, carries out authentication process to described user;
Document issues module, for when described in own together the proprietorial whole use of total document to be viewed per family authentication success time, issue described total document to described whole user.
Preferably, described subscription authentication module comprises:
Receive submodule, for receiving the privately owned password that user inputs for checking document;
Comparison sub-module, compares for the privately owned password described privately owned password and described user preserved in advance;
Authentication submodule, for when the privately owned password that described privately owned password and described user preserve in advance is consistent, determines described subscription authentication success, otherwise, determine described subscription authentication failure.
Preferably, described document issues module and comprises:
Sending submodule, maybe the to be viewed total document of encryption being issued to described whole user for described total document to be viewed being directly issued to described whole user.
Preferably, described document issues module and also comprises:
Encryption submodule, for owning the privately owned password of the proprietorial user of total document to be viewed described in utilizing together, to described total file encryption to be viewed.
Compared with prior art, beneficial effect of the present invention is:
The present invention can meet multi-user when owning total document ownership together, mutually restricts between the owner, needs all authentication in real time just can check total data by rear, greatly improves ageing, fail safe and the integrality of total document.
Accompanying drawing explanation
Fig. 1 is the private data encryption flow figure that prior art provides;
Fig. 2 is multi-user's Initialize installation flow chart that the embodiment of the present invention provides;
Fig. 3 is that the multi-user that the embodiment of the present invention provides has data real time inspection flow chart;
Fig. 4 is the total document viewing device block diagram of the safety that the embodiment of the present invention provides.
Embodiment
Below in conjunction with accompanying drawing to a preferred embodiment of the present invention will be described in detail, should be appreciated that following illustrated preferred embodiment is only for instruction and explanation of the present invention, is not intended to limit the present invention.
The multiple users owning total document to be viewed in the present invention together can arrange respective privately owned password (this privately owned password is managed voluntarily by user, follow-uply revises, and carries out authentication during for checking total document) respectively, and authentication is carried out in access in real time.Fig. 2 is multi-user's Initialize installation flow chart that the embodiment of the present invention provides, and as shown in Figure 2, concrete implementation step is as follows:
Step 201: the total document/data/data uploading need to be keep secret to server.
Step 202: jointly all users that this total document/data/data is set.
Step 203: jointly all users of this total document/data/data described arrange respective privately owned password, and are saved to server.
Step 204: be provided with.
Fig. 3 is multi-user's enciphered data real time inspection flow chart that the embodiment of the present invention provides, and as shown in Figure 3, concrete implementation step is as follows:
Step 301: user inputs its privately owned password, initiates the request checking total document/data/data.
Step 302: server carries out authentication process, if authentication success, is then set to access state by this user, and performs step 303, otherwise, perform step 306.
Step 303: judge other user whether authentication success, be in real-time access state, if other owning described total document/data/data together are with authentication success per family, then perform step 304, otherwise, perform step 305.
Step 304: if all use access server per family detected, described total document is directly issued to each client having the proprietorial user of this total document, user directly can check described total file; Or will be issued to each client having the proprietorial user of this total document after described total file encryption, user carries out the checking of total document by the document interpreter of its client, edits.
Step 305: if own the user having failed authentication in other users of described total document/data/data together, namely the user of not access is in real time had, then enter wait state, judge whether the stand-by period (i.e. stand-by period) of arranging terminates, if arrived the stand-by period of agreement, other user has not all entered access state, then perform step 306, otherwise, within the stand-by period, regularly detect other user whether access in real time.
Step 306: after user operation completes, exits application, terminates.
The present embodiment comprises mobile phone applications client and the server of user, when user initiates to check the operation of total document, real-time authentication is carried out to the whole users owning described document together, when the real-time of satisfied agreement is (as: simultaneously or in the extremely short stand-by period, such as, in 2 minutes, all use of jointly gathering around described total data accesses per family), and after the equal authentication of privately owned password of each user is passed through, just checking of total document can be carried out, edit operation, when wherein any one user do not access or privately owned code error time, checking/editing of total data can not be carried out.
Fig. 4 is the total document viewing device block diagram of the safety that the embodiment of the present invention provides, as shown in Figure 4, comprise user arrange module, for obtain the privately owned password of user password acquisition module, for utilize user described in described privately owned codon pair carry out authentication process subscription authentication module, for when described in own together the proprietorial whole use of total document to be viewed per family authentication success time issue document from described total document to described whole user issue module, above-mentioned module is all arranged on the server.Wherein, described subscription authentication module comprises reception submodule, comparison sub-module and authentication submodule; Described document issues module and comprises transmission submodule and encryption submodule.
Described user arranges module installation and owns the proprietorial user of total document to be viewed together.Described password acquisition module obtains and owns the privately owned password that the proprietorial user of total document to be viewed arranges separately described in preserving together.When user needs to check document and inputs privately owned password, receive the privately owned password that submodule receives user's input, the privately owned password that described privately owned password and described user are preserved in advance compares by comparison sub-module, authentication submodule is when the privately owned password judging that described privately owned password and described user preserve in advance is consistent, determine described subscription authentication success, otherwise, determine described subscription authentication failure.In Preset Time, if described in own together the proprietorial whole use of total document to be viewed per family authentication success, then described total document to be viewed is directly issued to described whole user and maybe the to be viewed total document of encryption is issued to described whole user by transmission submodule, or after total file encryption to be viewed described in the privately owned codon pair owning the proprietorial user of total document to be viewed together described in encryption submodule utilizes, by transmission submodule, the to be viewed total document of described encryption is issued to described whole user.
If adopt cipher mode to issue total document, can as the present embodiment, the privately owned codon pair utilizing user to arrange separately has document and encrypts respectively, and other various encryption method existing also can be adopted to be encrypted total document.
In sum, the present invention has following technique effect:
The invention solves the problem that is safe, complete and authentication in real time of data when multi-user owns total data ownership together, reach the effect conditioned each other between user, could jointly check when meeting the agreed terms that the designated time is accessed in real time, respective privately owned code authentication passes through, Edit Document.
Although above to invention has been detailed description, the present invention is not limited thereto, those skilled in the art of the present technique can carry out various amendment according to principle of the present invention.Therefore, all amendments done according to the principle of the invention, all should be understood to fall into protection scope of the present invention.
Claims (10)
1. a total document viewing method for safety, is characterized in that, comprising:
The proprietorial user of total document to be viewed is owned in setting together;
Obtain and own the privately owned password that the proprietorial user of total document to be viewed arranges separately described in preserving together;
Utilize described privately owned password, authentication process is carried out to described user;
If described in own together the proprietorial whole use of total document to be viewed per family authentication success, then issue described total document to described whole user.
2. method according to claim 1, is characterized in that, described utilizes described privately owned password, and the step of described user being carried out to authentication process comprises:
Receive the privately owned password that user inputs for checking document;
The privately owned password that described privately owned password and described user are preserved in advance is compared;
If the privately owned password that described privately owned password and described user preserve in advance is consistent, then determine described subscription authentication success, otherwise, determine described subscription authentication failure.
3. method according to claim 2, is characterized in that, in Preset Time, if described in own together the proprietorial whole use of total document to be viewed per family authentication success, then issue described total document to described whole user.
4. the method according to claim 1-3 any one, is characterized in that, the described step issuing described total document to described whole user comprises:
Described total document to be viewed is directly issued to described whole user.
5. method according to claim 3, is characterized in that, the described step issuing described total document to described whole user comprises:
Described whole user is issued to by after described total file encryption to be viewed.
6. method according to claim 5, is characterized in that, utilizes the privately owned password owning the proprietorial user of total document to be viewed together, to described total file encryption to be viewed.
7. a total document viewing device for safety, is characterized in that, comprising:
User arranges module, owns the proprietorial user of total document to be viewed together for arranging;
Password acquisition module, for obtaining and owning the privately owned password that the proprietorial user of total document to be viewed arranges separately described in preserving together;
Subscription authentication module, for utilizing described privately owned password, carries out authentication process to described user;
Document issues module, for when described in own together the proprietorial whole use of total document to be viewed per family authentication success time, issue described total document to described whole user.
8. device according to claim 6, is characterized in that, described subscription authentication module comprises:
Receive submodule, for receiving the privately owned password that user inputs for checking document;
Comparison sub-module, compares for the privately owned password described privately owned password and described user preserved in advance;
Authentication submodule, for when the privately owned password that described privately owned password and described user preserve in advance is consistent, determines described subscription authentication success, otherwise, determine described subscription authentication failure.
9. device according to claim 8, is characterized in that, described document issues module and comprises:
Sending submodule, maybe the to be viewed total document of encryption being issued to described whole user for described total document to be viewed being directly issued to described whole user.
10. device according to claim 9, is characterized in that, described document issues module and also comprises:
Encryption submodule, for owning the privately owned password of the proprietorial user of total document to be viewed described in utilizing together, to described total file encryption to be viewed.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310468105.5A CN104580062A (en) | 2013-10-09 | 2013-10-09 | Safe shared document viewing method and device |
PCT/CN2014/071273 WO2014134986A1 (en) | 2013-10-09 | 2014-01-23 | Method and device for secure viewing of shared file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310468105.5A CN104580062A (en) | 2013-10-09 | 2013-10-09 | Safe shared document viewing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104580062A true CN104580062A (en) | 2015-04-29 |
Family
ID=51490613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310468105.5A Withdrawn CN104580062A (en) | 2013-10-09 | 2013-10-09 | Safe shared document viewing method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104580062A (en) |
WO (1) | WO2014134986A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464499A (en) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | Electronic warehouse receipt tracing method and device, computer equipment and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339557A (en) * | 2020-02-20 | 2020-06-26 | 北京字节跳动网络技术有限公司 | Online document display method, device, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101706933A (en) * | 2009-12-01 | 2010-05-12 | 中国建设银行股份有限公司 | Method and background system for realizing joint account service operation |
CN101764800A (en) * | 2009-12-02 | 2010-06-30 | 深圳市融创天下科技发展有限公司 | Method for dynamic password multi-terminal combined authentication |
CN101872436A (en) * | 2009-04-22 | 2010-10-27 | 上海幻维数码创意科技有限公司 | Multi-user synchronous fingerprint authentication method |
CN102810141A (en) * | 2011-06-01 | 2012-12-05 | 哈尔滨市和协岛数码科技有限公司 | Software lease authorization method based on attribute encryption |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7136489B1 (en) * | 2002-09-12 | 2006-11-14 | Novell, Inc. | Method and system for enhancing network security using a multilateral authorization mechanism |
CN101997684B (en) * | 2009-08-10 | 2013-01-23 | 北京多思科技发展有限公司 | Authorization authentication method, device and system |
-
2013
- 2013-10-09 CN CN201310468105.5A patent/CN104580062A/en not_active Withdrawn
-
2014
- 2014-01-23 WO PCT/CN2014/071273 patent/WO2014134986A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101872436A (en) * | 2009-04-22 | 2010-10-27 | 上海幻维数码创意科技有限公司 | Multi-user synchronous fingerprint authentication method |
CN101706933A (en) * | 2009-12-01 | 2010-05-12 | 中国建设银行股份有限公司 | Method and background system for realizing joint account service operation |
CN101764800A (en) * | 2009-12-02 | 2010-06-30 | 深圳市融创天下科技发展有限公司 | Method for dynamic password multi-terminal combined authentication |
CN102810141A (en) * | 2011-06-01 | 2012-12-05 | 哈尔滨市和协岛数码科技有限公司 | Software lease authorization method based on attribute encryption |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111464499A (en) * | 2020-03-06 | 2020-07-28 | 深圳壹账通智能科技有限公司 | Electronic warehouse receipt tracing method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2014134986A1 (en) | 2014-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105262717A (en) | Network service security management method and device | |
CN103973736A (en) | Data sharing method and device | |
CN105074713A (en) | Systems and methods for identifying a secure application when connecting to a network | |
CN104917766A (en) | Security authentication method for two-dimension code | |
CN105764051B (en) | Authentication method, authentication device, mobile device and server | |
CN104717224B (en) | A kind of login method and device | |
CN104144163A (en) | Identity verification method, device and system | |
CN106101054A (en) | The single-point logging method of a kind of multisystem and centralized management system | |
CN103929742A (en) | Method for mobile terminal to share web camera through WiFi and intelligent control device | |
CN104253689A (en) | User identity module card generated dynamic password authentication method and system based on QR (quick response) code | |
CN104065623A (en) | Information processing method, trust server and cloud server | |
CN105357224A (en) | Intelligent household gateway register, remove method and system | |
CN104244373B (en) | A kind of method that wireless terminal adds wireless network | |
CN105978861A (en) | Method and device for acquiring equipment monitoring information | |
CN106101140B (en) | A kind of method and server of authentification of message | |
CN103379119A (en) | Network multi-authentication system or network multi-authentication method | |
CN105743860A (en) | Method and device for converting characters | |
CN103179564B (en) | Based on the network application login method of mobile terminal authentication | |
CN105306200A (en) | Method and device for encrypting network account password | |
CN104580062A (en) | Safe shared document viewing method and device | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN109309568A (en) | A kind of fingerprint authorization method and system | |
CN106790135B (en) | Data encryption method and system based on cloud and communication equipment | |
CN105678143A (en) | Methods and devices for setting and acquiring electronic business card | |
Bo et al. | Usable security mechanisms in smart building |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20150429 |