CN104954325B - A kind of safe office procedure based on Internet of Things - Google Patents
A kind of safe office procedure based on Internet of Things Download PDFInfo
- Publication number
- CN104954325B CN104954325B CN201410117398.7A CN201410117398A CN104954325B CN 104954325 B CN104954325 B CN 104954325B CN 201410117398 A CN201410117398 A CN 201410117398A CN 104954325 B CN104954325 B CN 104954325B
- Authority
- CN
- China
- Prior art keywords
- file
- user
- module
- client
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention discloses a kind of safe office systems based on Internet of Things, which is characterized in that including:Server end:File module, secure storage file module are uploaded including subscriber information storing module, key generation and release module, processing user;Management end:Including user authority setting module, secret key distribution module;Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label model, reading paper document electronic module tag.A kind of safe office system and method based on Internet of Things provided by the invention improve the safety standard of office system, effectively prevent the attack from internet.
Description
Technical field
The present invention relates to a kind of safe office systems and method based on Internet of Things.
Background technology
Internet of Things is the important component of generation information technology, and English name is:“The Internet of
things”.As its name suggests, Internet of Things is exactly the internet that object object is connected.Internet of Things by Intellisense, identification technology with it is pervasive
It calculates, be widely used in the fusion of network, be also therefore referred to as what the world information industry after computer, internet developed
Third wave.Existing office system is faced with the prestige of more and more network attacks in today that network is generally applied
The side of body other than installing a part of firewall software, can be used for preventing the attack from internet without better method.
Invention content
The present invention provides a kind of safe office system and method based on Internet of Things to solve the deficiencies in the prior art,
The safety standard of office system is improved, prevents the attack from internet.
In order to solve the above technical problems, a kind of safe office system and method based on Internet of Things provided by the invention, are adopted
With following technical solution:
A kind of safe office system based on Internet of Things, which is characterized in that including:
Server end:Including subscriber information storing module, key generation and release module, the upper transmitting file mould of processing user
Block, secure storage file module;
Management end:Including user authority setting module, secret key distribution module;
Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label mould
Block reads paper document electronic module tag.
A kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success,
The success of management end Connection Service device, is configured the permission and associated documents of the user on server, and the information of setting is with changing
The mode of the public key encryption of user is sent to server end, and then the encryption policy file received is stored in use by server end
Family information storage area, in each corresponding client that then server issues encryption policy file, client receive plus
It is decrypted after close strategy file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user
Interface, in the virtual secure interface, user carries out the upload of file, and file is encrypted and then sets by using the public key at family instead
Fixed different level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user
Interface is opened and is downloaded file in the virtual secure interface, file opened in virtual secure interface, file arrives service first
Device does permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto
Local virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to difference
The different rights of user and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses B with the private key encryption file of A first
Public key encryption file, issue party B-subscriber, B will use file first have to be decrypted with the private key of B oneself again with the public key decryptions of A, mirror
It is shown in picture to the virtual secure interface of B.
A kind of safe office system and method based on Internet of Things provided by the invention improve the safety post of office system
Standard effectively prevents the attack from internet.
Description of the drawings
Fig. 1 is a kind of structure diagram of safe office system based on Internet of Things described in the embodiment of the present invention.
Fig. 2 is a kind of step schematic diagram of safe office procedure based on Internet of Things described in the embodiment of the present invention.
Specific embodiment
The safe office system based on Internet of Things and method being supplied to below in conjunction with the accompanying drawings to the embodiment of the present invention carry out
Detailed description.
As shown in Figure 1, a kind of safe office system based on Internet of Things provided in an embodiment of the present invention, which is characterized in that
Including:
Server end:Including subscriber information storing module, key generation and release module, the upper transmitting file mould of processing user
Block, secure storage file module;
Management end:Including user authority setting module, secret key distribution module;
Client:Including the interim secure storage module of key, obtain server key module, reading electronic document label mould
Block reads paper document electronic module tag.
A kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success,
The success of management end Connection Service device, is configured the permission and associated documents of the user on server, and the information of setting is with changing
The mode of the public key encryption of user is sent to server end, and then the encryption policy file received is stored in use by server end
Family information storage area, in each corresponding client that then server issues encryption policy file, client receive plus
It is decrypted after close strategy file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user
Interface, in the virtual secure interface, user carries out the upload of file, and file is encrypted and then sets by using the public key at family instead
Fixed different level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character of a user
Interface is opened and is downloaded file in the virtual secure interface, file opened in virtual secure interface, file arrives service first
Device does permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto
Local virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to difference
The different rights of user and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses B with the private key encryption file of A first
Public key encryption file, issue party B-subscriber, B will use file first have to be decrypted with the private key of B oneself again with the public key decryptions of A, mirror
It is shown in picture to the virtual secure interface of B.
A kind of safe office system and method based on Internet of Things provided by the invention improve the safety post of office system
Standard effectively prevents the attack from internet.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can readily occur in change or replacement, should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention described should be subject to the protection scope in claims.
Claims (1)
1. a kind of safe office procedure based on Internet of Things, which is characterized in that include the following steps:
S1:Administrator coordinates password progress two-factor authentication mode to log in management end by fingerprint key, after certification success, management
The success of Connection Service device is held, the permission and associated documents of the user on server are configured, the information of setting is with the user
The mode of public key encryption be sent to server end, then the encryption policy file received is stored in user's letter by server end
Storage region is ceased, then server is issued to encryption policy file in each corresponding client, and client receives encryption plan
Slightly it is decrypted after file using the private key of oneself, and strategy file is applied to own customers end;
S2:User is logged in by client using username and password, and client fictionalizes the safe individual character interface of a user,
In the virtual secure interface, user carries out the upload of file, and file is encrypted by the public key of the user and then set not
Same level of confidentiality is uploaded, and the file after upload is saved in the secure storage section of server end;
S3:User is logged in by client using username and password, and client fictionalizes the safe individual character interface of a user,
File is opened and downloaded in the virtual secure interface, file is opened in virtual secure interface, file is done first to server
Permission relevant authentication, it was demonstrated that whether the user has permission opening this document, if permission is permitted, file will be mirrored onto local
Virtual secure interface, and this document is opened by the private key of the user;
S4:The file transmitted in client is received on server, stores files into secure storage section, according to different user
Different rights and level of confidentiality classification storage file;
S5:When A and B are used interchangeably file between user, then server reuses the public affairs of B with the private key encryption file of A first
Key encrypts file, issues party B-subscriber, and B will use file to first have to be decrypted with the private key of B oneself again with the public key decryptions of A, be mirrored to
It is shown in the virtual secure interface of B, improves the safety standard of office system, prevent the attack from internet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410117398.7A CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410117398.7A CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104954325A CN104954325A (en) | 2015-09-30 |
CN104954325B true CN104954325B (en) | 2018-06-22 |
Family
ID=54168685
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410117398.7A Expired - Fee Related CN104954325B (en) | 2014-03-27 | 2014-03-27 | A kind of safe office procedure based on Internet of Things |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104954325B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112714433B (en) * | 2021-03-23 | 2021-06-18 | 中国信息通信研究院 | Machine-card binding method, computer storage medium and electronic device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036231A (en) * | 2010-09-07 | 2011-04-27 | 北京兵港科技发展有限公司 | Network architecture security system for Internet of Things and security method thereof |
CN201898525U (en) * | 2010-08-24 | 2011-07-13 | 北京兵港科技发展有限公司 | IOT (Internet of Things) network architecture with safety system |
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
CN102148819A (en) * | 2010-12-31 | 2011-08-10 | 无锡华御信息技术有限公司 | Information leakage-prevention collaborative office security system and method |
CN102215214A (en) * | 2010-07-29 | 2011-10-12 | 上海华御信息技术有限公司 | Selective-transparent-encryption/decryption-based file protection method and system |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
CN102761521A (en) * | 2011-04-26 | 2012-10-31 | 上海格尔软件股份有限公司 | Cloud security storage and sharing service platform |
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN103326849A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | Internet of Things secure transmission method |
CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7793110B2 (en) * | 2006-05-24 | 2010-09-07 | Palo Alto Research Center Incorporated | Posture-based data protection |
-
2014
- 2014-03-27 CN CN201410117398.7A patent/CN104954325B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102215214A (en) * | 2010-07-29 | 2011-10-12 | 上海华御信息技术有限公司 | Selective-transparent-encryption/decryption-based file protection method and system |
CN201898525U (en) * | 2010-08-24 | 2011-07-13 | 北京兵港科技发展有限公司 | IOT (Internet of Things) network architecture with safety system |
CN102036231A (en) * | 2010-09-07 | 2011-04-27 | 北京兵港科技发展有限公司 | Network architecture security system for Internet of Things and security method thereof |
CN201919030U (en) * | 2010-12-10 | 2011-08-03 | 航天信息股份有限公司 | System for storing and managing network files |
CN102148819A (en) * | 2010-12-31 | 2011-08-10 | 无锡华御信息技术有限公司 | Information leakage-prevention collaborative office security system and method |
CN102761521A (en) * | 2011-04-26 | 2012-10-31 | 上海格尔软件股份有限公司 | Cloud security storage and sharing service platform |
CN102611681A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Enterprise and public institution information leakage preventing method based on cloud architecture |
CN103248479A (en) * | 2012-02-06 | 2013-08-14 | 中兴通讯股份有限公司 | Cloud storage safety system, data protection method and data sharing method |
CN102970299A (en) * | 2012-11-27 | 2013-03-13 | 西安电子科技大学 | File safe protection system and method thereof |
CN103326849A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | Internet of Things secure transmission method |
CN103326999A (en) * | 2012-12-14 | 2013-09-25 | 无锡华御信息技术有限公司 | File safety management system based on cloud service |
Also Published As
Publication number | Publication date |
---|---|
CN104954325A (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10003582B2 (en) | Technologies for synchronizing and restoring reference templates | |
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
KR101888903B1 (en) | Methods and apparatus for migrating keys | |
CN103546421B (en) | Network work based on PKI technology exchange security system and its implementation | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
CN106453361B (en) | A kind of security protection method and system of the network information | |
US20170279807A1 (en) | Safe method to share data and control the access to these in the cloud | |
CN103595721A (en) | Safe sharing method, sharing device and sharing system for files of network disk | |
CN103973714B (en) | Email account generation method and system | |
CN104486087B (en) | A kind of digital signature method based on remote hardware security module | |
CN103929434A (en) | File sharing method based on encryption and permission system | |
CN108134671A (en) | A kind of transparent encryption system and its encipher-decipher method based on quantum true random number | |
CN101815063A (en) | File security management system applied to network and management method thereof | |
CN103475474A (en) | Method for providing and acquiring shared enciphered data and identity authentication equipment | |
CN112989320B (en) | User state management system and method for password equipment | |
CN107743119A (en) | A kind of E-Government electronics license shared platform and sharing method | |
US9571469B2 (en) | Computer implemented system and method for ahead-of-time delivery of electronic content | |
CN104954325B (en) | A kind of safe office procedure based on Internet of Things | |
CA2793422C (en) | Hypertext link verification in encrypted e-mail for mobile devices | |
US10491574B1 (en) | Secure storage and transport with clouds | |
US11463251B2 (en) | Method for secure management of secrets in a hierarchical multi-tenant environment | |
CN103532958A (en) | Method for encrypting website resources | |
CN107819751A (en) | A kind of safe automated log on management system | |
CN106790312A (en) | A kind of cloud storage data safety based on ABE shares implementation method | |
CN106487796A (en) | Identity card reads the safe ciphering unit in equipment and its application process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308 Applicant after: ZHENGZHOU IOT INDUSTRIAL TECHNOLOGY INNOVATION INSTITUTE CO., LTD. Address before: No. 13, No. 2, No. 49, No. 2, Jinshui East Road, Zheng Dong new area, Zhengzhou City, Henan Province, No. 308 Applicant before: HENAN SINO-TECH INTERNET OF THINGS CO., LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180622 Termination date: 20190327 |