CN104954325A - Safe office system and safe office method based on Internet-of-things - Google Patents

Safe office system and safe office method based on Internet-of-things Download PDF

Info

Publication number
CN104954325A
CN104954325A CN201410117398.7A CN201410117398A CN104954325A CN 104954325 A CN104954325 A CN 104954325A CN 201410117398 A CN201410117398 A CN 201410117398A CN 104954325 A CN104954325 A CN 104954325A
Authority
CN
China
Prior art keywords
file
module
user
server
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410117398.7A
Other languages
Chinese (zh)
Other versions
CN104954325B (en
Inventor
马浩周
杨磊
王志峰
任朝栋
陈兆飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HENAN SINO-TECH INTERNET OF THINGS Co Ltd
Original Assignee
HENAN SINO-TECH INTERNET OF THINGS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HENAN SINO-TECH INTERNET OF THINGS Co Ltd filed Critical HENAN SINO-TECH INTERNET OF THINGS Co Ltd
Priority to CN201410117398.7A priority Critical patent/CN104954325B/en
Publication of CN104954325A publication Critical patent/CN104954325A/en
Application granted granted Critical
Publication of CN104954325B publication Critical patent/CN104954325B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a safe office system based on Internet-of-things. The safe office system and the safe office method are characterized in that the safe office system comprises the components of a server end which comprises a user information storage module, a secret key generating and releasing module, a user-uploaded file processing module and a safe storage file module; a management end which comprises a user authority setting module and a secret key distribution module; and a client which comprises a secret key temporary safe storage module, a server secret key acquiring module, an electronic file label reading module and a paper file electronic label reading module. The safe office system and the safe office method based on the Internet-of-things improve the safety standard of the office system and effectively prevent an attack from Internet.

Description

A kind of safe office system based on Internet of Things and method
Technical field
The present invention relates to a kind of safe office system based on Internet of Things and method.
Background technology
Internet of Things is the important component part of generation information technology, and its English name is: " The Internet of things ".As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.Internet of Things by Intellisense, recognition technology and general fit calculation, be widely used in the fusion of network, be also therefore called as the third wave of after computer, the Internet world information industry development.Existing office system is faced with the threat of increasing network attack in today that network is generally employed, and except installing a part of firewall software, does not have better way to may be used for preventing the attack from the Internet.
Summary of the invention
The present invention, in order to solve the deficiencies in the prior art, provides a kind of safe office system based on Internet of Things and method, improves the safety standard of office system, prevents the attack from the Internet.
For solving the problems of the technologies described above, a kind of safe office system based on Internet of Things provided by the invention and method, adopt following technical scheme:
Based on a safe office system for Internet of Things, it is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
Based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
A kind of safe office system based on Internet of Things provided by the invention and method, improve the safety standard of office system, and effectively prevention is from the attack of the Internet.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of safe office system based on Internet of Things described in the embodiment of the present invention.
Fig. 2 is the step schematic diagram of a kind of safe office procedure based on Internet of Things described in the embodiment of the present invention.
Embodiment
The safe office system based on Internet of Things be supplied to the embodiment of the present invention below in conjunction with accompanying drawing and method are described in detail.
As shown in Figure 1, a kind of safe office system based on Internet of Things that the embodiment of the present invention provides, is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
Based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
A kind of safe office system based on Internet of Things provided by the invention and method, improve the safety standard of office system, and effectively prevention is from the attack of the Internet.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with the protection range of claim.

Claims (2)

1., based on a safe office system for Internet of Things, it is characterized in that, comprising:
Server end: comprise subscriber information storing module, secret generating and release module, process user upload file module, safe storage file module;
Management end: comprise user authority setting module, secret key distribution module;
Client: comprise the interim secure storage module of key, obtain server key module, read e-file label model, read paper document electronic module tag.
2., based on a safe office procedure for Internet of Things, it is characterized in that, comprise the steps:
S1: keeper carries out two-factor authentication mode by fingerprint key cooperation password and logs in management end, after authentication success, the success of management end connection server, the authority of the user on server and associated documents are arranged, the information arranged is sent to server end by the mode of the public key encryption using family instead, then server end is stored in user profile storage area the encryption policy file received, then in each corresponding client that server issues encryption policy file, client uses the private key of oneself to be decrypted after receiving encryption policy file, and strategy file is applied to own customers end,
S2: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, in this virtual secure interface, user carries out uploading of file, file is encrypted by the PKI using family instead and then sets different levels of confidentiality and upload, and the file after uploading is stored in the secure storage section of server end;
S3: user uses username and password to log in by client, client fictionalizes the safe individual character interface of a user, open and download file in this virtual secure interface, open file in virtual secure interface, first file arrives server and does authority relevant authentication, proves whether this user has permission and opens this file, if authority license, file will be mirrored onto local virtual secure interface, and opens this file by the private key of this user;
S4: server receives the file that client upload is come, store files into secure storage section, according to different rights and the level of confidentiality classification storage file of different user;
S5: when A and B uses file alternately between user, server is first with the encrypted private key file of A and then the public key encryption file using B, issue party B-subscriber, B will use file first to decipher with the private key of B oneself with the public key decryptions of A again, is mirrored in the virtual secure interface of B and shows.
CN201410117398.7A 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things Expired - Fee Related CN104954325B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410117398.7A CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410117398.7A CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Publications (2)

Publication Number Publication Date
CN104954325A true CN104954325A (en) 2015-09-30
CN104954325B CN104954325B (en) 2018-06-22

Family

ID=54168685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410117398.7A Expired - Fee Related CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Country Status (1)

Country Link
CN (1) CN104954325B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714433A (en) * 2021-03-23 2021-04-27 中国信息通信研究院 Machine-card binding method, computer storage medium and electronic device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070277240A1 (en) * 2006-05-24 2007-11-29 Durfee Glenn E Posture-based data protection
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
CN102148819A (en) * 2010-12-31 2011-08-10 无锡华御信息技术有限公司 Information leakage-prevention collaborative office security system and method
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
CN102761521A (en) * 2011-04-26 2012-10-31 上海格尔软件股份有限公司 Cloud security storage and sharing service platform
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070277240A1 (en) * 2006-05-24 2007-11-29 Durfee Glenn E Posture-based data protection
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
CN102148819A (en) * 2010-12-31 2011-08-10 无锡华御信息技术有限公司 Information leakage-prevention collaborative office security system and method
CN102761521A (en) * 2011-04-26 2012-10-31 上海格尔软件股份有限公司 Cloud security storage and sharing service platform
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714433A (en) * 2021-03-23 2021-04-27 中国信息通信研究院 Machine-card binding method, computer storage medium and electronic device
CN112714433B (en) * 2021-03-23 2021-06-18 中国信息通信研究院 Machine-card binding method, computer storage medium and electronic device

Also Published As

Publication number Publication date
CN104954325B (en) 2018-06-22

Similar Documents

Publication Publication Date Title
JP6941146B2 (en) Data security service
EP3451575B1 (en) Methods, systems and computer program product for providing encryption on a plurality of devices
RU2589861C2 (en) System and method of user data encryption
KR101888903B1 (en) Methods and apparatus for migrating keys
US9621524B2 (en) Cloud-based key management
US11943350B2 (en) Systems and methods for re-using cold storage keys
CN103546421B (en) Network work based on PKI technology exchange security system and its implementation
US20140281520A1 (en) Secure cloud data sharing
EP2466508A1 (en) Deduplicated and encrypted backups
CN100495421C (en) Authentication protection method based on USB device
CN101419686A (en) A kind of on-line contract signing system based on the internet
CN103236930A (en) Data encryption method and system
CN103929434A (en) File sharing method based on encryption and permission system
CN105072107A (en) System and method for enhancing data transmission and storage security
CN102685110A (en) Universal method and system for user registration authentication based on fingerprint characteristics
CN103973714B (en) Email account generation method and system
CN105656862A (en) Authentication method and device
CN103152425A (en) Safety management system for mobile device based on cloud technology
CN103440463A (en) Electronic file protection method based on label
CN103312690A (en) System and method for key management of cloud computing platform
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
TWI476629B (en) Data security and security systems and methods
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN102004873B (en) Method for restoring encrypted information in encryption card
US11463251B2 (en) Method for secure management of secrets in a hierarchical multi-tenant environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308

Applicant after: ZHENGZHOU IOT INDUSTRIAL TECHNOLOGY INNOVATION INSTITUTE CO., LTD.

Address before: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308

Applicant before: HENAN SINO-TECH INTERNET OF THINGS CO., LTD.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180622

Termination date: 20190327