CN104866779A - Method and system for controlling life cycle and safe deletion of electronic file - Google Patents

Method and system for controlling life cycle and safe deletion of electronic file Download PDF

Info

Publication number
CN104866779A
CN104866779A CN201510160250.6A CN201510160250A CN104866779A CN 104866779 A CN104866779 A CN 104866779A CN 201510160250 A CN201510160250 A CN 201510160250A CN 104866779 A CN104866779 A CN 104866779A
Authority
CN
China
Prior art keywords
file
fso
life cycle
hash value
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510160250.6A
Other languages
Chinese (zh)
Other versions
CN104866779B (en
Inventor
熊金波
沈薇薇
姚志强
金彪
李素萍
张媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Normal University
Original Assignee
Fujian Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Normal University filed Critical Fujian Normal University
Priority to CN201510160250.6A priority Critical patent/CN104866779B/en
Publication of CN104866779A publication Critical patent/CN104866779A/en
Application granted granted Critical
Publication of CN104866779B publication Critical patent/CN104866779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention relates to the field of electronic file safety, particularly to a method and a system for controlling life cycle and safe deletion of an electronic file. To control the effective use time of the electronic file under the internet environment and ensure that the electronic file can be radically deleted and is free of the potential safety hazard of being restored by an adversary, a life cycle needs to be set for the electronic file, the content of the electronic file is further subjected to encryption treatment, an authorized user can only read the file in the life cycle of the electronic file, and when the life cycle of the electronic file is exceeded, the file can be automatically and safely erased, and no data restoration software can restore the initial data. The data encryption technology, the digital signature technology and the data wiping technology are combined to realize the method and the system for controlling the life cycle and the safe deletion of the electronic file.

Description

A kind of method and system controlling e-file life cycle and safety deleting
Technical field
The present invention relates to safety of electronic file field, be specifically related to a kind of method and system controlling e-file life cycle and safety deleting.
Background technology
Along with computer technology, the developing rapidly and extensively popularizing of Internet technology, e-file under internetwork environment is with advantages such as its mass memory, convenient process, fast transmission, the paper document that a large amount of replacement is traditional, non-support cable is more and more subject to people and praises highly.But the same with traditionally on paper file, once e-file departs from the management and control of file owners, blaze abroad with the form of its copy, its privacy and security are all on the hazard; Secondly, also there are two drawbacks: (1) is uncontrollable, and other people use time of e-file copy; (2) as " pure paper machine ", safety deleting cannot be carried out to e-file, and usage data recovery technology may carry out recovery recovery.
Delete problem for the data security under internetwork environment, existing achievement in research can be divided three classes solution:
1, by the mode of setting access control policy, change access control policy, make previously to may have access to condition and do not meet current access control policy, and then reach cannot the effect of visit data.Have researcher in existing cloud computing infrastructure, construct an overlapping cloud storage system FADE of safety, each file is provided with corresponding access strategy, only have when visitor meets the conditional request of access strategy could further access file.
2, by the life cycle of control key, allow key expires, and then make ciphertext not readable, reach with this effect that data security deletes.Typical Representative in this kind of scheme is Vanish system.First the private data of user uses symmetric key encryption, then the mode of privacy share is utilized symmetric key to be resolved into n part key components, being distributed to a large-scale distributed Hash subsequently shows in network (DHT), the characteristic utilizing DHT network node periodically automatically to upgrade automatically is deleted key components and is caused ciphertext intangibility, thus reaches the effect of data security deletion.But this kind of scheme cannot specify key lifetimes by user, even and if key lose, ciphertext still exists, as long as ciphertext is not by the safety deleting just potential safety hazard that is cracked of ciphertext.
3, adopt the mode of rewriting data or filling, safety deleting is carried out to local data, eliminate the potential safety hazard of having deleted data and being resumed, reach the effect of data security deletion with this.The standard erase algorithm DOD5220.22-M (C and E) that such as U.S. Department of Defense proposes, this standard recommendation uses 3 times 0,1 alternately to override scheme.But this kind of scheme but only considers separately the problem of data security deletion aspect, does not well solve the control problem of data life period.
Clearly, above scheme can control the requirement that e-file life cycle can realize again after date safety deleting under all cannot meeting internetwork environment.
Summary of the invention
Technical matters to be solved by this invention is: provide a kind of method and system controlling e-file life cycle and safety deleting, can control the requirement that e-file life cycle can realize again after date safety deleting.
In order to solve the problems of the technologies described above, the technical solution used in the present invention is:
Control a method for e-file life cycle and safety deleting, comprising: encapsulated phase conciliates encapsulated phase;
Described encapsulated phase comprises the following steps:
S100, stochastic generation public and private key pair, use the private key of described public and private key centering to carry out digital signature to described e-file and obtain signing messages;
S200, the signing messages of the life cycle information of described e-file preset, e-file and step S100 gained is packaged into FSO;
The described decapsulation stage comprises the following steps:
S300, step S200 gained FSO to be resolved, obtain the life cycle information of described e-file;
S400, obtain the current trustable network time;
Whether S500, the determining step S400 gained current trustable network time meets the life cycle information of FSO, if the current trustable network time meets the scope of the life cycle information of FSO, then enters step S600; If the current trustable network time early than the scope of the life cycle information of FSO, then stops the further parsing to FSO; If the current trustable network time is later than the scope of the life cycle information of FSO, then enter step S700;
S600, FSO resolved further obtain e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
S700, stop, to the further parsing of FSO, carrying out safety deleting to described FSO.
Another technical scheme that the present invention adopts is:
Control a system for e-file life cycle and safety deleting, comprising: key production module, signature blocks, package module, decapsulation module, the first acquisition module, judge module, authentication module, stopping modular and removing module;
Described key production module, for stochastic generation public and private key pair;
Described signature blocks, the private key of the public and private key centering generated for using key production module carries out digital signature to described e-file and obtains signing messages;
Described package module, for being packaged into FSO by the signing messages of the life cycle information of the described e-file preset, e-file and signature blocks gained;
Described decapsulation module, for resolving package module gained FSO, obtains the life cycle information of described e-file;
Described first acquisition module, for obtaining the current trustable network time;
Described judge module, for judging whether the first acquisition module gained current trustable network time met the life cycle information of FSO;
Described authentication module, if the scope meeting the life cycle information of FSO for the current trustable network time, resolves further FSO and obtains e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
Described stopping modular, if for the scope of current trustable network time early than the life cycle information of FSO, then stop the further parsing to FSO;
Described removing module, if the scope being later than the life cycle information of FSO for the current trustable network time, stops, to the further parsing of FSO, carrying out safety deleting to described FSO.
Beneficial effect of the present invention is: create a kind of method and system controlling e-file life cycle and safety deleting, it not only effectively can solve the life cycle management and control of e-file in communication process and the problem of safety deleting, and use suitable rivest, shamir, adelman to reduce system overhead, be applicable to large-scale promotion use, can be applied in actual production life process.
Accompanying drawing explanation
Fig. 1 is a kind of system model figure controlling the system of e-file life cycle and safety deleting of the specific embodiment of the invention;
Fig. 2 is a kind of flow chart of steps controlling the method for e-file life cycle and safety deleting of the specific embodiment of the invention;
Fig. 3 is a kind of structural representation controlling the system of e-file life cycle and safety deleting of the specific embodiment of the invention;
Label declaration:
10, key production module; 20, signature blocks; 30, package module; 40, decapsulation module; 50, the first acquisition module; 60, judge module; 70, authentication module; 80, stopping modular; 90, removing module; 100, file Owner; 110, FSO; 120, KMC; 130, Cloud Server; 140, social networks; 150, authorized user; 160, opponent.
Embodiment
The design of most critical of the present invention is: the life cycle of preset electronic file; and be combined and packaged into e-file self-destruction object FSO in conjunction with the relevant information such as signing messages and e-file of e-file; before authorized user access, judge that whether life cycle is expired subsequently; if expired; then delete; realize the determinacy that FSO is crossing after date to delete, protect security and the privacy of e-file.
By describing technology contents of the present invention in detail, realized object and effect, accompanying drawing is coordinated to be explained below in conjunction with embodiment.
Referring to Fig. 1, is a kind of system model figure controlling the system of e-file life cycle and safety deleting of the specific embodiment of the invention, specific as follows:
Control a system for e-file life cycle and safety deleting, comprising: file Owner 100, FSO110, KMC 120, Cloud Server 130, social networks 140, authorized user 150, opponent 160;
Described file Owner 100, the i.e. owner of e-file, undertaken e-file signing, encrypt, preset life cycle and by uploading to Cloud Server, social networks or directly sending to the methods such as authorized user to share after being packaged into FSO.
Described FSO 110; e-file self-destruction object (Electronic File Self-destructing Object; FSO); it is a kind of new data structure that the present invention designs; be packaged with the content file after the file header and encryption carrying life cycle information; effectively can resist opponent to attack, protection e-file personal secrets.
Described KMC 120, the generation that in responsible support rivest, shamir, adelman, public and private key is right and management.
Described Cloud Server 130 and social networks 140, for file Owner shared file provides a kind of approach.
Described authorized user 150, belongs to the customer group of the addressable e-file that file Owner specifies.
Described opponent 160, represents and may launch a offensive in Cloud Server, social networks, electronic file transmission process.
Please refer to Fig. 2, is a kind of flow chart of steps controlling the method for e-file life cycle and safety deleting of the specific embodiment of the invention, specific as follows:
Control a method for e-file life cycle and safety deleting, comprising: encapsulated phase conciliates encapsulated phase;
Described encapsulated phase comprises the following steps:
S100, stochastic generation public and private key pair, use the private key of described public and private key centering to carry out digital signature to described e-file and obtain signing messages;
Further, described public and private key is to being the PKI of file owner and private key.
Further, described digital signature encryption mode can adopt RSA, DSA or ECDSA algorithm etc.
Described digital signature encryption mode is specially: carry out to e-file the first hash value that Hash computing obtains described e-file, uses the private key of described public and private key centering to be encrypted the first hash value, obtains the signing messages of described e-file.
S200, the signing messages of the life cycle information of described e-file preset, e-file and step S100 gained is packaged into FSO;
Further, described step S200 also comprises: the FSO of encapsulation is sent to server by wireless network;
The described decapsulation stage comprises the following steps:
S300, step S200 gained FSO to be resolved, obtain the life cycle information of described e-file;
Further, described step S300 also comprises: the FSO that obtaining step S200 encapsulates.
S400, obtain the current trustable network time;
Whether S500, the determining step S400 gained current trustable network time meets the life cycle information of FSO, if the current trustable network time meets the scope of the life cycle information of FSO, then enters step S600; If the current trustable network time early than the scope of the life cycle information of FSO, then stops the further parsing to FSO; If the current trustable network time is later than the scope of the life cycle information of FSO, then enter step S700;
S600, FSO resolved further obtain e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
Further, described step S600 is specially: resolve further FSO and obtain e-file and signing messages; Use the PKI of described public and private key centering to be decrypted signing messages, obtain the first hash value of described e-file; Hash computing is carried out to gained e-file and obtains the second hash value, judge that whether the first hash value is identical with the second hash value, if the first hash value is identical with the second hash value, then gained e-file is truly complete, if the first hash value is not identical with the second hash value, then gained e-file forges.
S700, stop, to the further parsing of FSO, carrying out safety deleting to described FSO.
Further, described step S700 is specially: adopt data eraser to carry out safety deleting to FSO.
Further, described data eraser can use and repeatedly 0,1 replace overriding scheme, recommendation 3 times.
Referring to Fig. 3, is a kind of structural representation controlling the system of e-file life cycle and safety deleting of the specific embodiment of the invention, specific as follows:
Control a system for e-file life cycle and safety deleting, comprising: key production module 10, signature blocks 20, package module 30, decapsulation module 40, first acquisition module 50, judge module 60, authentication module 70, stopping modular 80 and removing module 90;
Described key production module 10, for stochastic generation public and private key pair;
Further, described public and private key is to being the PKI of file owner and private key.
Described signature blocks 20, the private key of the public and private key centering generated for using key production module carries out digital signature to described e-file and obtains signing messages;
Further, the digital signature encryption mode of described signature blocks is: first carry out to original e-document the hash value that Hash computing obtains this file, then use private key hash value is encrypted, obtain the signing messages that encrypt data is original e-document.
Further, the cipher mode of described signature blocks is asymmetric encryption, can adopt RSA, DSA or ECDSA algorithm etc.
Described package module 30, for being packaged into FSO by the signing messages of the life cycle information of the described e-file preset, e-file and signature blocks gained;
Described decapsulation module 40, for resolving package module gained FSO, obtains the life cycle information of described e-file;
Described first acquisition module 50, for obtaining the current trustable network time;
Described judge module 60, for judging whether the first acquisition module gained current trustable network time met the life cycle information of FSO;
Described authentication module 70, if the scope meeting the life cycle information of FSO for the current trustable network time, resolves further FSO and obtains e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
Further, the verification mode of described authentication module is: resolve further FSO and obtain e-file and signing messages; The PKI of described public and private key centering is used to be decrypted signing messages, obtain the first hash value of described e-file, Hash computing is carried out to gained e-file and obtains the second hash value, judge that whether the first hash value is identical with the second hash value, if the first hash value is identical with the second hash value, then gained e-file is truly complete, if the first hash value is not identical with the second hash value, then gained e-file forges.
Described stopping modular 80, if for the scope of current trustable network time early than the life cycle information of FSO, then stop the further parsing to FSO;
Described removing module 90, if the scope being later than the life cycle information of FSO for the current trustable network time, stops, to the further parsing of FSO, carrying out safety deleting to described FSO.
Further, startup data eraser is wiped FSO by described removing module, eliminates the potential safety hazard that it may be resumed after common deletion;
Further, described data eraser can use and repeatedly 0,1 replace overriding scheme, recommendation 3 times.
Further, this system also comprises sending module and the second acquisition module;
Described sending module, for being sent to server by the FSO of encapsulation by wireless network;
Described second acquisition module, for obtaining the FSO of encapsulation.
Embodiment one
A kind of method controlling e-file life cycle and safety deleting provided by the invention, the method specifically comprises the steps:
1, encapsulated phase
(1) public private key pair generation step
This step is performed by the key production module of KMC, generate respectively the first public and private key to the second public and private key pair; Described first public and private key is to for the signature of e-file and checking, and described second public and private key is to the encryption for described e-file;
Further, described first public and private key is to the public and private key pair for file Owner, and PKI is Okpub, and private key is Okpri; Described second public and private key is to the public and private key pair for authorized user, and PKI is Ukpub, and private key is Ukpri;
(3) file signature step
This step is performed by signature blocks, when file Owner will share e-file to other people, needs to carry out digital signature to this file, enables integrality and the authenticity of authorized user authenticating documents;
Further, specifically comprise file Owner and first carry out Hash computing to original e-document and obtain hash value H1, the private key Okpri then using the first public and private key right is encrypted to obtain the signing messages of described e-file to hash value H1.
(4) FSO generation step
This step is completed by package module, first the PKI Ukpub using the second public and private key right carries out asymmetric encryption to described e-file and obtains original cipher text, then preset the life cycle of described e-file, the signing messages that integrating step (3) generates is combined and packaged into FSO.
Further, described rivest, shamir, adelman can adopt RSA, DH or EIGamal algorithm etc.
Further, specifically also comprise FSO is uploaded onto the server by wireless network, social networks or directly send to authorized user;
2, the decapsulation stage
(5) FSO analyzing step
This step is completed by decapsulation module, and system is resolved FSO, obtains the life cycle information of FSO;
Further, specifically also comprise: the FSO that obtaining step (4) encapsulates.
(6) life cycle determining step
This step is performed by judge module, and first system obtains the current trustable network time, and contrasts with the life cycle information of FSO, if the current trustable network time is early than the life cycle of FSO, then system stops resolving FSO; If the current trustable network time is in the life cycle of FSO, then system enters step (10) and does further decapsulation to FSO; If current trusted time is more than the life cycle of FSO, then system enters the deletion stage.
(7) e-file obtaining step
This step is completed by decapsulation module, and system continues decapsulation to FSO, obtains the e-file after encryption and signing messages; And use the e-file of the second private key pair encryption to be decrypted acquisition e-file expressly.
(8) file verification step
This step is completed by authentication module, and authorized user uses the first PKI expressly to carry out signature verification to obtained original e-document;
Further, specifically comprise and first Hash computing is carried out to this file, obtain its hash value H1; Authorized user uses the PKI Okpub of file Owner to be decrypted step (7) gained signing messages, obtains the hash value H2 of the original e-document that file Owner provides; Then authorized user contrasts H1 value and H2 value, if two-value is equal, then illustrates that the original e-document that authorized user obtains is expressly truly complete, if two-value is unequal, then illustrates that the FSO that authorized user obtains forges.
3, the stage is deleted
(9) FSO safety deleting step
If the current trustable network time is more than the life cycle of FSO, then illustrate that FSO is out of date, system will call safety deleting module, start data eraser to wipe FSO, eliminate the potential safety hazard that it may be resumed after common deletion, wherein this data eraser uses and repeatedly 0,1 alternately overrides scheme, recommendation 3 times.
In sum, the present invention is in conjunction with data encryption technology, digital signature technology and data erase technology, a kind of method and system controlling e-file life cycle and safety deleting provided can the security of available protecting e-file and privacy, be specially: use the private key of file Owner to carry out signature to e-file and obtain e-file signing messages, then the PKI of use authority user is encrypted acquisition original cipher text to e-file, preset the life cycle of described e-file subsequently, by signing messages, original cipher text and life cycle information upload to Cloud Server after being packaged into FSO, social networks or directly send to authorized user to share, first authorized user judges whether the current trustable network time meets the Lifecycle requirements of FSO after obtaining FSO, if meet, can carry out access to content, if out of date, then carry out data erase, realize FSO at the safety deleting crossing after date, protect security and the privacy of e-file.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalents utilizing instructions of the present invention and accompanying drawing content to do, or be directly or indirectly used in relevant technical field, be all in like manner included in scope of patent protection of the present invention.

Claims (9)

1. control a method for e-file life cycle and safety deleting, it is characterized in that, comprising: encapsulated phase conciliates encapsulated phase;
Described encapsulated phase comprises the following steps:
S100, stochastic generation public and private key pair, use the private key of described public and private key centering to carry out digital signature to described e-file and obtain signing messages;
S200, the signing messages of the life cycle information of described e-file preset, e-file and step S100 gained is packaged into FSO;
The described decapsulation stage comprises the following steps:
S300, step S200 gained FSO to be resolved, obtain the life cycle information of described e-file;
S400, obtain the current trustable network time;
Whether S500, the determining step S400 gained current trustable network time meets the life cycle information of FSO, if the current trustable network time meets the scope of the life cycle information of FSO, then enters step S600; If the current trustable network time early than the scope of the life cycle information of FSO, then stops the further parsing to FSO; If the current trustable network time is later than the scope of the life cycle information of FSO, then enter step S700;
S600, FSO resolved further obtain e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
S700, stop, to the further parsing of FSO, carrying out safety deleting to described FSO.
2. the method for control e-file life cycle according to claim 1 and safety deleting, is characterized in that, the digital signature encryption mode of described step S100 is for adopting RSA, DSA or ECDSA algorithm; Described digital signature encryption mode is specially: carry out to e-file the first hash value that Hash computing obtains described e-file, uses the private key of described public and private key centering to be encrypted the first hash value, obtains the signing messages of described e-file.
3. the method for control e-file life cycle according to claim 2 and safety deleting, is characterized in that, described step S600 is specially: resolve further FSO and obtain e-file and signing messages; Use the PKI of described public and private key centering to be decrypted signing messages, obtain the first hash value of described e-file; Hash computing is carried out to gained e-file and obtains the second hash value, judge that whether the first hash value is identical with the second hash value, if the first hash value is identical with the second hash value, then gained e-file is truly complete, if the first hash value is not identical with the second hash value, then gained e-file forges.
4. the method for control e-file life cycle according to claim 1 and safety deleting, is characterized in that, described step S700 is specially: adopt data eraser to carry out safety deleting to FSO; Described data eraser is use at least one times 0,1 to replace overriding scheme, and wherein optimum access times are 3 times.
5. the method for control e-file life cycle according to claim 1 and safety deleting, is characterized in that, described step S200 also comprises: the FSO of encapsulation is sent to server by wireless network; Described step S300 also comprises: the FSO that obtaining step S200 encapsulates.
6. one kind controls the system of e-file life cycle and safety deleting, it is characterized in that, comprising: key production module, signature blocks, package module, decapsulation module, the first acquisition module, judge module, authentication module, stopping modular and removing module;
Described key production module, for stochastic generation public and private key pair;
Described signature blocks, the private key of the public and private key centering generated for using key production module carries out digital signature to described e-file and obtains signing messages;
Described package module, for being packaged into FSO by the signing messages of the life cycle information of the described e-file preset, e-file and signature blocks gained;
Described decapsulation module, for resolving package module gained FSO, obtains the life cycle information of described e-file;
Described first acquisition module, for obtaining the current trustable network time;
Described judge module, for judging whether the first acquisition module gained current trustable network time met the life cycle information of FSO;
Described authentication module, if the scope meeting the life cycle information of FSO for the current trustable network time, resolves further FSO and obtains e-file and signing messages; The PKI of described public and private key centering is used to carry out signature verification to gained e-file and signing messages;
Described stopping modular, if for the scope of current trustable network time early than the life cycle information of FSO, then stop the further parsing to FSO;
Described removing module, if the scope being later than the life cycle information of FSO for the current trustable network time, stops, to the further parsing of FSO, carrying out safety deleting to described FSO.
7. the system of control e-file life cycle according to claim 6 and safety deleting, is characterized in that, described signature blocks adopts RSA, DSA or ECDSA algorithm; The digital signature encryption mode of described signature blocks is specially: carry out to e-file the first hash value that Hash computing obtains described e-file, uses the private key of described public and private key centering to be encrypted the first hash value, obtains the signing messages of described e-file.
8. the system of control e-file life cycle according to claim 7 and safety deleting, is characterized in that, the verification mode of described authentication module is: resolve further FSO and obtain e-file and signing messages; The PKI of described public and private key centering is used to be decrypted signing messages, obtain the first hash value of described e-file, Hash computing is carried out to gained e-file and obtains the second hash value, judge that whether the first hash value is identical with the second hash value, if the first hash value is identical with the second hash value, then gained e-file is truly complete, if the first hash value is not identical with the second hash value, then gained e-file forges.
9. the system of control e-file life cycle according to claim 6 and safety deleting, is characterized in that, also comprises sending module and the second acquisition module;
Described sending module, for being sent to server by the FSO of encapsulation by wireless network;
Described second acquisition module, for obtaining the FSO of encapsulation.
CN201510160250.6A 2015-04-07 2015-04-07 It is a kind of to control e-file life cycle and the method and system of safety deleting Active CN104866779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510160250.6A CN104866779B (en) 2015-04-07 2015-04-07 It is a kind of to control e-file life cycle and the method and system of safety deleting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510160250.6A CN104866779B (en) 2015-04-07 2015-04-07 It is a kind of to control e-file life cycle and the method and system of safety deleting

Publications (2)

Publication Number Publication Date
CN104866779A true CN104866779A (en) 2015-08-26
CN104866779B CN104866779B (en) 2018-05-11

Family

ID=53912601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510160250.6A Active CN104866779B (en) 2015-04-07 2015-04-07 It is a kind of to control e-file life cycle and the method and system of safety deleting

Country Status (1)

Country Link
CN (1) CN104866779B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107644169A (en) * 2017-08-25 2018-01-30 成都亿睿科技有限公司 A kind of data guard method and data protection system
CN108804709A (en) * 2018-06-22 2018-11-13 新华三云计算技术有限公司 Shared-file system lock management message treatment method, device and server

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1427575A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 Electronic cipher formation and checking method
US20030126400A1 (en) * 2001-12-27 2003-07-03 Jacques Debiez Data integrity check method using cumulative hash function
CN1446015A (en) * 1996-09-05 2003-10-01 艾利森公司 Systme for preventing altering electronic memory
CN1505313A (en) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 Elliptic curve signature and signature verification method and apparatus
CN101053198A (en) * 2004-09-24 2007-10-10 同步加株式会社 Data communication method
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN103067363A (en) * 2012-12-20 2013-04-24 华中科技大学 Index conversion method for public data integrity checking

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1446015A (en) * 1996-09-05 2003-10-01 艾利森公司 Systme for preventing altering electronic memory
CN1427575A (en) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 Electronic cipher formation and checking method
US20030126400A1 (en) * 2001-12-27 2003-07-03 Jacques Debiez Data integrity check method using cumulative hash function
CN1505313A (en) * 2002-11-29 2004-06-16 海南信安数据系统有限公司 Elliptic curve signature and signature verification method and apparatus
CN101053198A (en) * 2004-09-24 2007-10-10 同步加株式会社 Data communication method
CN101594226A (en) * 2009-06-17 2009-12-02 中兴通讯股份有限公司 The data guard method and the system that are used for file transfer
CN103067363A (en) * 2012-12-20 2013-04-24 华中科技大学 Index conversion method for public data integrity checking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
沈薇薇 等: "面向移动终端的隐私数据安全存储及自毁方案", 《计算机应用》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107644169A (en) * 2017-08-25 2018-01-30 成都亿睿科技有限公司 A kind of data guard method and data protection system
CN108804709A (en) * 2018-06-22 2018-11-13 新华三云计算技术有限公司 Shared-file system lock management message treatment method, device and server

Also Published As

Publication number Publication date
CN104866779B (en) 2018-05-11

Similar Documents

Publication Publication Date Title
CN111209334B (en) Power terminal data security management method based on block chain
CN103427998B (en) The authentication of a kind of Internet data distribution and data ciphering method
CN109120639A (en) A kind of data cloud storage encryption method and system based on block chain
Moffat et al. A survey on ciphertext-policy attribute-based encryption (CP-ABE) approaches to data security on mobile devices and its application to IoT
US11210658B2 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN105072107A (en) System and method for enhancing data transmission and storage security
Pradeep et al. An efficient framework for sharing a file in a secure manner using asymmetric key distribution management in cloud environment
EP4150879A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN103326999A (en) File safety management system based on cloud service
CN107483383A (en) A kind of data processing method, terminal and background server
CN108134671A (en) A kind of transparent encryption system and its encipher-decipher method based on quantum true random number
CN114448727B (en) Information processing method and system based on industrial internet identification analysis system
CN109525388B (en) Combined encryption method and system with separated keys
CN116601912A (en) Post-secret provisioning service providing encryption security
CN103731423A (en) Safe method for repeated data deleting
CN104270377A (en) Safe and general document outgoing system and method
Agarkhed et al. An efficient auditing scheme for data storage security in cloud
CN114547698A (en) CORS service data storage system and method based on block chain
CN104866779A (en) Method and system for controlling life cycle and safe deletion of electronic file
CN110661621A (en) Mixed encryption and decryption method based on HMAC, AES and RSA
CN102761559B (en) Network security based on private data shares method and communication terminal
CN112187767A (en) Multi-party contract consensus system, method and medium based on block chain
CN110708155A (en) Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium
CN112906032B (en) File secure transmission method, system and medium based on CP-ABE and block chain
CN103532958A (en) Method for encrypting website resources

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant