CN104954325B - A kind of safe office procedure based on Internet of Things - Google Patents

A kind of safe office procedure based on Internet of Things Download PDF

Info

Publication number
CN104954325B
CN104954325B CN201410117398.7A CN201410117398A CN104954325B CN 104954325 B CN104954325 B CN 104954325B CN 201410117398 A CN201410117398 A CN 201410117398A CN 104954325 B CN104954325 B CN 104954325B
Authority
CN
China
Prior art keywords
file
user
module
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410117398.7A
Other languages
Chinese (zh)
Other versions
CN104954325A (en
Inventor
马浩周
杨磊
王志峰
任朝栋
陈兆飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Iot Industrial Technology Innovation Institute Co Ltd
Original Assignee
Zhengzhou Iot Industrial Technology Innovation Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Iot Industrial Technology Innovation Institute Co Ltd filed Critical Zhengzhou Iot Industrial Technology Innovation Institute Co Ltd
Priority to CN201410117398.7A priority Critical patent/CN104954325B/en
Publication of CN104954325A publication Critical patent/CN104954325A/en
Application granted granted Critical
Publication of CN104954325B publication Critical patent/CN104954325B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of safe office systems based on Internet of Things, which is characterized in that including:Server end:File module, secure storage file module are uploaded including subscriber information storing module, key generation and release module, processing user;Management end:Including user authority setting module, secret key distribution module;Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label model, reading paper document electronic module tag.A kind of safe office system and method based on Internet of Things provided by the invention improve the safety standard of office system, effectively prevent the attack from internet.

Description

A kind of safe office procedure based on Internet of Things
Technical field
The present invention relates to a kind of safe office systems and method based on Internet of Things.
Background technology
Internet of Things is the important component of generation information technology, and English name is:“The Internet of things”.As its name suggests, Internet of Things is exactly the internet that object object is connected.Internet of Things by Intellisense, identification technology with it is pervasive It calculates, be widely used in the fusion of network, be also therefore referred to as what the world information industry after computer, internet developed Third wave.Existing office system is faced with the prestige of more and more network attacks in today that network is generally applied The side of body other than installing a part of firewall software, can be used for preventing the attack from internet without better method.
Invention content
The present invention provides a kind of safe office system and method based on Internet of Things to solve the deficiencies in the prior art, The safety standard of office system is improved, prevents the attack from internet.
In order to solve the above technical problems, a kind of safe office system and method based on Internet of Things provided by the invention, are adopted With following technical solution:
A kind of safe office system based on Internet of Things, which is characterized in that including:
Server end:Including subscriber information storing module, key generation and release module, the upper transmitting file mould of processing user Block, secure storage file module;
Management end:Including user authority setting module, secret key distribution module;
Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label mould Block reads paper document electronic module tag.
A kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success, The success of management end Connection Service device, is configured the permission and associated documents of the user on server, and the information of setting is with changing The mode of the public key encryption of user is sent to server end, and then the encryption policy file received is stored in use by server end Family information storage area, in each corresponding client that then server issues encryption policy file, client receive plus It is decrypted after close strategy file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user Interface, in the virtual secure interface, user carries out the upload of file, and file is encrypted and then sets by using the public key at family instead Fixed different level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user Interface is opened and is downloaded file in the virtual secure interface, file opened in virtual secure interface, file arrives service first Device does permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto Local virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to difference The different rights of user and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses B with the private key encryption file of A first Public key encryption file, issue party B-subscriber, B will use file first have to be decrypted with the private key of B oneself again with the public key decryptions of A, mirror It is shown in picture to the virtual secure interface of B.
A kind of safe office system and method based on Internet of Things provided by the invention improve the safety post of office system Standard effectively prevents the attack from internet.
Description of the drawings
Fig. 1 is a kind of structure diagram of safe office system based on Internet of Things described in the embodiment of the present invention.
Fig. 2 is a kind of step schematic diagram of safe office procedure based on Internet of Things described in the embodiment of the present invention.
Specific embodiment
The safe office system based on Internet of Things and method being supplied to below in conjunction with the accompanying drawings to the embodiment of the present invention carry out Detailed description.
As shown in Figure 1, a kind of safe office system based on Internet of Things provided in an embodiment of the present invention, which is characterized in that Including:
Server end:Including subscriber information storing module, key generation and release module, the upper transmitting file mould of processing user Block, secure storage file module;
Management end:Including user authority setting module, secret key distribution module;
Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label mould Block reads paper document electronic module tag.
A kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success, The success of management end Connection Service device, is configured the permission and associated documents of the user on server, and the information of setting is with changing The mode of the public key encryption of user is sent to server end, and then the encryption policy file received is stored in use by server end Family information storage area, in each corresponding client that then server issues encryption policy file, client receive plus It is decrypted after close strategy file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user Interface, in the virtual secure interface, user carries out the upload of file, and file is encrypted and then sets by using the public key at family instead Fixed different level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user Interface is opened and is downloaded file in the virtual secure interface, file opened in virtual secure interface, file arrives service first Device does permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto Local virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to difference The different rights of user and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses B with the private key encryption file of A first Public key encryption file, issue party B-subscriber, B will use file first have to be decrypted with the private key of B oneself again with the public key decryptions of A, mirror It is shown in picture to the virtual secure interface of B.
A kind of safe office system and method based on Internet of Things provided by the invention improve the safety post of office system Standard effectively prevents the attack from internet.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.

Claims (1)

1. a kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success, management The success of Connection Service device is held, the permission and associated documents of the user on server are configured, the information of setting is with the user The mode of public key encryption be sent to server end, then the encryption policy file received is stored in user's letter by server end Storage region is ceased, then server is issued to encryption policy file in each corresponding client, and client receives encryption plan Slightly it is decrypted after file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character interface of a user, In the virtual secure interface, user carries out the upload of file, and file is encrypted by the public key of the user and then set not Same level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character interface of a user, File is opened and downloaded in the virtual secure interface, file is opened in virtual secure interface, file is done first to server Permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto local Virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to different user Different rights and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses the public affairs of B with the private key encryption file of A first Key encrypts file, issues party B-subscriber, and B will use file to first have to be decrypted with the private key of B oneself again with the public key decryptions of A, be mirrored to It is shown in the virtual secure interface of B, improves the safety standard of office system, prevent the attack from internet.
CN201410117398.7A 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things Expired - Fee Related CN104954325B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410117398.7A CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410117398.7A CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Publications (2)

Publication Number Publication Date
CN104954325A CN104954325A (en) 2015-09-30
CN104954325B true CN104954325B (en) 2018-06-22

Family

ID=54168685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410117398.7A Expired - Fee Related CN104954325B (en) 2014-03-27 2014-03-27 A kind of safe office procedure based on Internet of Things

Country Status (1)

Country Link
CN (1) CN104954325B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112714433B (en) * 2021-03-23 2021-06-18 中国信息通信研究院 Machine-card binding method, computer storage medium and electronic device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
CN102148819A (en) * 2010-12-31 2011-08-10 无锡华御信息技术有限公司 Information leakage-prevention collaborative office security system and method
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
CN102761521A (en) * 2011-04-26 2012-10-31 上海格尔软件股份有限公司 Cloud security storage and sharing service platform
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7793110B2 (en) * 2006-05-24 2010-09-07 Palo Alto Research Center Incorporated Posture-based data protection

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215214A (en) * 2010-07-29 2011-10-12 上海华御信息技术有限公司 Selective-transparent-encryption/decryption-based file protection method and system
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
CN201919030U (en) * 2010-12-10 2011-08-03 航天信息股份有限公司 System for storing and managing network files
CN102148819A (en) * 2010-12-31 2011-08-10 无锡华御信息技术有限公司 Information leakage-prevention collaborative office security system and method
CN102761521A (en) * 2011-04-26 2012-10-31 上海格尔软件股份有限公司 Cloud security storage and sharing service platform
CN102611681A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Enterprise and public institution information leakage preventing method based on cloud architecture
CN103248479A (en) * 2012-02-06 2013-08-14 中兴通讯股份有限公司 Cloud storage safety system, data protection method and data sharing method
CN102970299A (en) * 2012-11-27 2013-03-13 西安电子科技大学 File safe protection system and method thereof
CN103326849A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 Internet of Things secure transmission method
CN103326999A (en) * 2012-12-14 2013-09-25 无锡华御信息技术有限公司 File safety management system based on cloud service

Also Published As

Publication number Publication date
CN104954325A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
CN106104562B (en) System and method for securely storing and recovering confidential data
KR101888903B1 (en) Methods and apparatus for migrating keys
CN103546421B (en) Network work based on PKI technology exchange security system and its implementation
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN106453361B (en) A kind of security protection method and system of the network information
US20170279807A1 (en) Safe method to share data and control the access to these in the cloud
CN103595721A (en) Safe sharing method, sharing device and sharing system for files of network disk
CN103973714B (en) Email account generation method and system
CN104486087B (en) A kind of digital signature method based on remote hardware security module
CN103929434A (en) File sharing method based on encryption and permission system
CN108134671A (en) A kind of transparent encryption system and its encipher-decipher method based on quantum true random number
CN101815063A (en) File security management system applied to network and management method thereof
CN103475474A (en) Method for providing and acquiring shared enciphered data and identity authentication equipment
CN112989320B (en) User state management system and method for password equipment
CN107743119A (en) A kind of E-Government electronics license shared platform and sharing method
US9571469B2 (en) Computer implemented system and method for ahead-of-time delivery of electronic content
CN104954325B (en) A kind of safe office procedure based on Internet of Things
CA2793422C (en) Hypertext link verification in encrypted e-mail for mobile devices
US10491574B1 (en) Secure storage and transport with clouds
US11463251B2 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN103532958A (en) Method for encrypting website resources
CN107819751A (en) A kind of safe automated log on management system
CN106790312A (en) A kind of cloud storage data safety based on ABE shares implementation method
CN106487796A (en) Identity card reads the safe ciphering unit in equipment and its application process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308

Applicant after: ZHENGZHOU IOT INDUSTRIAL TECHNOLOGY INNOVATION INSTITUTE CO., LTD.

Address before: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308

Applicant before: HENAN SINO-TECH INTERNET OF THINGS CO., LTD.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180622

Termination date: 20190327