CN104954325A - Safe office system and safe office method based on Internet-of-things - Google Patents
Safe office system and safe office method based on Internet-of-things Download PDFInfo
- Publication number
- CN104954325A CN104954325A CN201410117398.7A CN201410117398A CN104954325A CN 104954325 A CN104954325 A CN 104954325A CN 201410117398 A CN201410117398 A CN 201410117398A CN 104954325 A CN104954325 A CN 104954325A
- Authority
- CN
- China
- Prior art keywords
- file
- module
- user
- server
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a safe office system based on Internet-of-things. The safe office system and the safe office method are characterized in that the safe office system comprises the components of a server end which comprises a user information storage module, a secret key generating and releasing module, a user-uploaded file processing module and a safe storage file module; a management end which comprises a user authority setting module and a secret key distribution module; and a client which comprises a secret key temporary safe storage module, a server secret key acquiring module, an electronic file label reading module and a paper file electronic label reading module. The safe office system and the safe office method based on the Internet-of-things improve the safety standard of the office system and effectively prevent an attack from Internet.
Description
Technical field
The present invention relates to a kind of safe office system based on Internet of Things and method.
Background technology
Internet of Things is the important component part of generation information technology, and its English name is: " The Internet of things ".As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.Internet of Things by Intellisense, recognition technology and general fit calculation, be widely used in the fusion of network, be also therefore called as the third wave of after computer, the Internet world information industry development.Existing office system is faced with the threat of increasing network attack in today that network is generally employed, and except installing a part of firewall software, does not have better way to may be used for preventing the attack from the Internet.
Summary of the invention
The present invention, in order to solve the deficiencies in the prior art, provides a kind of safe office system based on Internet of Things and method, improves the safety standard of office system, prevents the attack from the Internet.
For solving the problems of the technologies described above, a kind of safe office system based on Internet of Things provided by the invention and method, adopt following technical scheme:
Based on a safe office system for Internet of Things, it is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
Based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
A kind of safe office system based on Internet of Things provided by the invention and method, improve the safety standard of office system, and effectively prevention is from the attack of the Internet.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of safe office system based on Internet of Things described in the embodiment of the present invention.
Fig. 2 is the step schematic diagram of a kind of safe office procedure based on Internet of Things described in the embodiment of the present invention.
Embodiment
The safe office system based on Internet of Things be supplied to the embodiment of the present invention below in conjunction with accompanying drawing and method are described in detail.
As shown in Figure 1, a kind of safe office system based on Internet of Things that the embodiment of the present invention provides, is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
Based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
A kind of safe office system based on Internet of Things provided by the invention and method, improve the safety standard of office system, and effectively prevention is from the attack of the Internet.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.
Claims (2)
1., based on a safe office system for Internet of Things, it is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
2., based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410117398.7A CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410117398.7A CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104954325A true CN104954325A (en) | 2015-09-30 |
CN104954325B CN104954325B (en) | 2018-06-22 |
Family
ID=54168685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410117398.7A Expired - Fee Related CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104954325B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112714433A (en) * | 2021-03-23 | 2021-04-27 | 中国信息通信研究院 | Machine-card binding method, computer storage medium and electronic device |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070277240A1 (en) * | 2006-05-24 | 2007-11-29 | Durfee Glenn E | Posture-based data protection |
CN102036231A (en) * | 2010-09-07 | 2011-04-27 | 北京兵港科技发展有限公司 | Network architecture security system for Internet of Things and security method thereof |
CN201898525U (en) * | 2010-08-24 | 2011-07-13 | 北京兵港科技发展有限公司 | IOT (Internet of Things) network architecture with safety system |
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
CN102148819A (en) * | 2010-12-31 | 2011-08-10 | 无锡华御信息技术有限公司 | Information leakage-prevention collaborative office security system and method |
CN102215214A (en) * | 2010-07-29 | 2011-10-12 | 上海华御信息技术有限公司 | Selective-transparent-encryption/decryption-based file protection method and system |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
CN102761521A (en) * | 2011-04-26 | 2012-10-31 | 上海格尔软件股份有限公司 | Cloud security storage and sharing service platform |
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
CN103326849A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | Internet of Things secure transmission method |
-
2014
- 2014-03-27 CN CN201410117398.7A patent/CN104954325B/en not_active Expired - Fee Related
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070277240A1 (en) * | 2006-05-24 | 2007-11-29 | Durfee Glenn E | Posture-based data protection |
CN102215214A (en) * | 2010-07-29 | 2011-10-12 | 上海华御信息技术有限公司 | Selective-transparent-encryption/decryption-based file protection method and system |
CN201898525U (en) * | 2010-08-24 | 2011-07-13 | 北京兵港科技发展有限公司 | IOT (Internet of Things) network architecture with safety system |
CN102036231A (en) * | 2010-09-07 | 2011-04-27 | 北京兵港科技发展有限公司 | Network architecture security system for Internet of Things and security method thereof |
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
CN102148819A (en) * | 2010-12-31 | 2011-08-10 | 无锡华御信息技术有限公司 | Information leakage-prevention collaborative office security system and method |
CN102761521A (en) * | 2011-04-26 | 2012-10-31 | 上海格尔软件股份有限公司 | Cloud security storage and sharing service platform |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
CN103326849A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | Internet of Things secure transmission method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112714433A (en) * | 2021-03-23 | 2021-04-27 | 中国信息通信研究院 | Machine-card binding method, computer storage medium and electronic device |
CN112714433B (en) * | 2021-03-23 | 2021-06-18 | 中国信息通信研究院 | Machine-card binding method, computer storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN104954325B (en) | 2018-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6941146B2 (en) | Data security service | |
EP3451575B1 (en) | Methods, systems and computer program product for providing encryption on a plurality of devices | |
RU2589861C2 (en) | System and method of user data encryption | |
KR101888903B1 (en) | Methods and apparatus for migrating keys | |
US9621524B2 (en) | Cloud-based key management | |
US11943350B2 (en) | Systems and methods for re-using cold storage keys | |
CN103546421B (en) | Network work based on PKI technology exchange security system and its implementation | |
US20140281520A1 (en) | Secure cloud data sharing | |
EP2466508A1 (en) | Deduplicated and encrypted backups | |
CN100495421C (en) | Authentication protection method based on USB device | |
CN101419686A (en) | A kind of on-line contract signing system based on the internet | |
CN103236930A (en) | Data encryption method and system | |
CN103929434A (en) | File sharing method based on encryption and permission system | |
CN105072107A (en) | System and method for enhancing data transmission and storage security | |
CN102685110A (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
CN103973714B (en) | Email account generation method and system | |
CN105656862A (en) | Authentication method and device | |
CN103152425A (en) | Safety management system for mobile device based on cloud technology | |
CN103440463A (en) | Electronic file protection method based on label | |
CN103312690A (en) | System and method for key management of cloud computing platform | |
CN106357678A (en) | Cloud encryption storage method for intelligent terminal and intelligent terminal | |
TWI476629B (en) | Data security and security systems and methods | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System | |
CN102004873B (en) | Method for restoring encrypted information in encryption card | |
US11463251B2 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308 Applicant after: ZHENGZHOU IOT INDUSTRIAL TECHNOLOGY INNOVATION INSTITUTE CO., LTD. Address before: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308 Applicant before: HENAN SINO-TECH INTERNET OF THINGS CO., LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180622 Termination date: 20190327 |