CN104966010A - File protection method and system - Google Patents
File protection method and system Download PDFInfo
- Publication number
- CN104966010A CN104966010A CN201510349638.0A CN201510349638A CN104966010A CN 104966010 A CN104966010 A CN 104966010A CN 201510349638 A CN201510349638 A CN 201510349638A CN 104966010 A CN104966010 A CN 104966010A
- Authority
- CN
- China
- Prior art keywords
- user
- private information
- information file
- key
- copy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a file protection system and method. In a manner of inputting a user key by a user, setting a copy authority and binding a specific device, a private information file is protected, so that the private information file is effectively prevented from being easily attacked and copied; under the condition that the key of the private information file is destroyed, the private information file is further protected by means of the bound device, so that the security of private information of the user is effectively ensured to the greatest extent and extreme guarantee for the security of the private information of the user is brought.
Description
Technical field
The present invention relates to the communications field, particularly relate to a kind of document protection method and system.
Background technology
Along with the development of science and technology, the private information of individual and family gets more and more.But the protection of private information but usually to be ignored by people, and the leakage of these private informations, gently then cause harassing and wrecking, heavy then become the convenience of criminal.The most common and the most important private information is mainly audio/video file, and such as video file, recording file, photo files etc., may cause great infringement to the private information of individual.
At present, for file that is individual or family's private information, user is just directly left on equipment mostly, or carry out delete processing, anyone can copy anywhere or anytime or recover like this, effectively can not guarantee the security of private information, this brings safely great hidden danger just to private information.
Summary of the invention
In view of this, be necessary the problem that can not ensure security for above-mentioned private information file, a kind of document protection method and system are provided.
The invention provides a kind of document protection method, comprise the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected;
S20: arrange copy authority by user, for setting the copy authority of private information file;
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
Further, described step S10 is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
Further, described step S20 is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
Further, described step S30 is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
Further, described bound device elects Set Top Box as.
The present invention also provides a kind of file protecting system, comprising:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected;
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file;
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
Further, described user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
Further, described copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
Further, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by described apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
Further, described bound device elects Set Top Box as.
File protecting system of the present invention and method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the document protection method in an embodiment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the process flow diagram of the document protection method in an embodiment, and as shown in Figure 1, the method comprises the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected.
In the starting stage; for protecting private information file, first input one group of user key by user, user cipher is used for being encrypted private information file; make private information file become the file of encryption, thus greatly protect the security of private information file.
In further embodiment, this step is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.Like this, by adopting the mode of user key and random number combination, the security of encryption is increased further.
S20: arrange copy authority by user, for setting the copy authority of private information file.
For preventing private information file be copied or copy, in this embodiment, after to private information file encryption, by user, the copy authority of private information file is set further, the copy authority of restriction private information file.The copy authority of private information file can be set for copying, can copy limited number of time, can copy and not limit number of times etc.
In further mode, this step is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.Like this, when allowing copy, by the restriction of copying cipher, the security of private information file can be strengthened further.
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user cipher just can be decrypted operation on the equipment of binding.
After to private information file encryption, for preventing other people private information file copy walked and carry out code breaking, infringement private information, in this embodiment, particular device is had to bind the deciphering of private information file, the private information file of encryption only just can be decrypted on the equipment of binding, otherwise can not be decrypted, thus strengthens the security of private information file greatly.
In further mode, this step is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.So just equipment and private information file are bound, and ensure that the uniqueness of institute's bound device.
Further, institute's bound device elects Set Top Box as.
This document protection method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
Meanwhile, the present invention also provides a kind of file protecting system, and this system comprises:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected.
In the starting stage; for protecting private information file, first user key setting unit inputs one group of user key by user, and user cipher is used for being encrypted private information file; make private information file become the file of encryption, thus greatly protect the security of private information file.
In further embodiment, user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.Like this, by adopting the mode of user key and random number combination, the security of encryption is increased further.
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file.
For preventing private information file be copied or copy, in this embodiment, copy priority assignation unit after to private information file encryption, is set the copy authority of private information file by user, the copy authority of restriction private information file further.The copy authority of private information file can be set for copying, can copy limited number of time, can copy and not limit number of times etc.
In further mode, copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.Like this, when allowing copy, by the restriction of copying cipher, the security of private information file can be strengthened further.
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
After to private information file encryption, for preventing other people private information file copy walked and carry out code breaking, infringement private information, in this embodiment, the deciphering of private information file has particular device to bind by apparatus bound unit, the private information file of encryption only just can be decrypted on the equipment of binding, otherwise can not be decrypted, thus strengthens the security of private information file greatly.
In further mode, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.So just equipment and private information file are bound, and ensure that the uniqueness of institute's bound device.
Further, institute's bound device elects Set Top Box as.
This file protecting system; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
File protecting system of the present invention and method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
These are only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a document protection method, is characterized in that, comprises the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected;
S20: arrange copy authority by user, for setting the copy authority of private information file;
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
2. document protection method according to claim 1; it is characterized in that; described step S10 is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
3. document protection method according to claim 1, it is characterized in that, described step S20 is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
4. document protection method according to claim 1, is characterized in that, described step S30 is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
5. document protection method according to claim 1, is characterized in that, described bound device elects Set Top Box as.
6. a file protecting system, is characterized in that, comprising:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected;
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file;
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
7. file protecting system according to claim 6; it is characterized in that; described user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
8. file protecting system according to claim 6, it is characterized in that, described copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
9. file protecting system according to claim 6, is characterized in that, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by described apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
10. file protecting system according to claim 6, is characterized in that, described bound device elects Set Top Box as.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510349638.0A CN104966010A (en) | 2015-06-23 | 2015-06-23 | File protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510349638.0A CN104966010A (en) | 2015-06-23 | 2015-06-23 | File protection method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104966010A true CN104966010A (en) | 2015-10-07 |
Family
ID=54220048
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510349638.0A Pending CN104966010A (en) | 2015-06-23 | 2015-06-23 | File protection method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104966010A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038390A (en) * | 2017-04-10 | 2017-08-11 | 谭宁敏 | File encryption decryption system |
CN107220554A (en) * | 2017-06-20 | 2017-09-29 | 努比亚技术有限公司 | A kind of file forwarding management method and corresponding system, terminal device |
CN108985075A (en) * | 2017-06-02 | 2018-12-11 | 成都小娱网络科技有限公司 | A kind of image file disk encryption system and method for lightweight |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447002A (en) * | 2007-11-27 | 2009-06-03 | 台达电子工业股份有限公司 | File duplication frequency encryption method of man machine interface |
CN101692266A (en) * | 2009-09-25 | 2010-04-07 | 天津大学 | Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID |
CN101692265A (en) * | 2009-09-25 | 2010-04-07 | 天津大学 | Method of encrypting and protecting files |
CN102279814A (en) * | 2011-08-19 | 2011-12-14 | 北方工业大学 | Encryption anti-copy system and anti-copy method thereof |
CN104182500A (en) * | 2014-08-15 | 2014-12-03 | 深圳市中兴移动通信有限公司 | Safety reminding method and device |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
-
2015
- 2015-06-23 CN CN201510349638.0A patent/CN104966010A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447002A (en) * | 2007-11-27 | 2009-06-03 | 台达电子工业股份有限公司 | File duplication frequency encryption method of man machine interface |
CN101692266A (en) * | 2009-09-25 | 2010-04-07 | 天津大学 | Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID |
CN101692265A (en) * | 2009-09-25 | 2010-04-07 | 天津大学 | Method of encrypting and protecting files |
CN102279814A (en) * | 2011-08-19 | 2011-12-14 | 北方工业大学 | Encryption anti-copy system and anti-copy method thereof |
CN104182500A (en) * | 2014-08-15 | 2014-12-03 | 深圳市中兴移动通信有限公司 | Safety reminding method and device |
CN104573551A (en) * | 2014-12-25 | 2015-04-29 | 广东欧珀移动通信有限公司 | File processing method and mobile terminal |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038390A (en) * | 2017-04-10 | 2017-08-11 | 谭宁敏 | File encryption decryption system |
CN108985075A (en) * | 2017-06-02 | 2018-12-11 | 成都小娱网络科技有限公司 | A kind of image file disk encryption system and method for lightweight |
CN107220554A (en) * | 2017-06-20 | 2017-09-29 | 努比亚技术有限公司 | A kind of file forwarding management method and corresponding system, terminal device |
CN107220554B (en) * | 2017-06-20 | 2020-11-27 | 深圳市六度人和科技有限公司 | File forwarding management method, corresponding system and terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120278618A1 (en) | Methods of authorizing a computer license | |
EP3035585B1 (en) | S-box selection in white-box cryptographic implementation | |
CN104796534B (en) | A kind of information content processing method and processing device | |
CN109035519B (en) | Biological feature recognition device and method | |
CN110311787B (en) | Authorization management method, system, device and computer readable storage medium | |
CN1655495A (en) | System and method for security key transmission with strong pairing to destination client | |
US8392723B2 (en) | Information processing apparatus and computer readable medium for preventing unauthorized operation of a program | |
CN101908113B (en) | Authentication method and authentication system | |
CN102461114A (en) | Method for performing double domain encryption a memory device | |
CN103236930A (en) | Data encryption method and system | |
CN110298186B (en) | Non-key data encryption and decryption method based on dynamic reconfigurable cipher chip | |
CN110096849A (en) | A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing | |
CN106796624A (en) | Challenge responses method and associated computing device | |
CN111859415A (en) | Neural network model encryption system and method | |
EP2922235A1 (en) | Security module for secure function execution on untrusted platform | |
CN102461113A (en) | Method and system for content replication control | |
CN101730886B (en) | Secure storage system and method of use | |
CN104966010A (en) | File protection method and system | |
CN101681408B (en) | Data security | |
CN104376270A (en) | File protection method and system | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN104281415A (en) | Data processing method and device for air conditioner | |
CN101339589B (en) | Method for implementing information safety by dummy machine technology | |
CN106650329A (en) | Individual authorization method of data export equipment | |
Abboud | Multifactor authentication for software protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151007 |