CN104966010A - File protection method and system - Google Patents

File protection method and system Download PDF

Info

Publication number
CN104966010A
CN104966010A CN201510349638.0A CN201510349638A CN104966010A CN 104966010 A CN104966010 A CN 104966010A CN 201510349638 A CN201510349638 A CN 201510349638A CN 104966010 A CN104966010 A CN 104966010A
Authority
CN
China
Prior art keywords
user
private information
information file
key
copy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510349638.0A
Other languages
Chinese (zh)
Inventor
丘裕嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jiuzhou Electric Appliance Co Ltd
Original Assignee
Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jiuzhou Electric Appliance Co Ltd filed Critical Shenzhen Jiuzhou Electric Appliance Co Ltd
Priority to CN201510349638.0A priority Critical patent/CN104966010A/en
Publication of CN104966010A publication Critical patent/CN104966010A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a file protection system and method. In a manner of inputting a user key by a user, setting a copy authority and binding a specific device, a private information file is protected, so that the private information file is effectively prevented from being easily attacked and copied; under the condition that the key of the private information file is destroyed, the private information file is further protected by means of the bound device, so that the security of private information of the user is effectively ensured to the greatest extent and extreme guarantee for the security of the private information of the user is brought.

Description

Document protection method and system
Technical field
The present invention relates to the communications field, particularly relate to a kind of document protection method and system.
Background technology
Along with the development of science and technology, the private information of individual and family gets more and more.But the protection of private information but usually to be ignored by people, and the leakage of these private informations, gently then cause harassing and wrecking, heavy then become the convenience of criminal.The most common and the most important private information is mainly audio/video file, and such as video file, recording file, photo files etc., may cause great infringement to the private information of individual.
At present, for file that is individual or family's private information, user is just directly left on equipment mostly, or carry out delete processing, anyone can copy anywhere or anytime or recover like this, effectively can not guarantee the security of private information, this brings safely great hidden danger just to private information.
Summary of the invention
In view of this, be necessary the problem that can not ensure security for above-mentioned private information file, a kind of document protection method and system are provided.
The invention provides a kind of document protection method, comprise the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected;
S20: arrange copy authority by user, for setting the copy authority of private information file;
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
Further, described step S10 is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
Further, described step S20 is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
Further, described step S30 is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
Further, described bound device elects Set Top Box as.
The present invention also provides a kind of file protecting system, comprising:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected;
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file;
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
Further, described user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
Further, described copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
Further, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by described apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
Further, described bound device elects Set Top Box as.
File protecting system of the present invention and method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the document protection method in an embodiment.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the process flow diagram of the document protection method in an embodiment, and as shown in Figure 1, the method comprises the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected.
In the starting stage; for protecting private information file, first input one group of user key by user, user cipher is used for being encrypted private information file; make private information file become the file of encryption, thus greatly protect the security of private information file.
In further embodiment, this step is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.Like this, by adopting the mode of user key and random number combination, the security of encryption is increased further.
S20: arrange copy authority by user, for setting the copy authority of private information file.
For preventing private information file be copied or copy, in this embodiment, after to private information file encryption, by user, the copy authority of private information file is set further, the copy authority of restriction private information file.The copy authority of private information file can be set for copying, can copy limited number of time, can copy and not limit number of times etc.
In further mode, this step is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.Like this, when allowing copy, by the restriction of copying cipher, the security of private information file can be strengthened further.
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user cipher just can be decrypted operation on the equipment of binding.
After to private information file encryption, for preventing other people private information file copy walked and carry out code breaking, infringement private information, in this embodiment, particular device is had to bind the deciphering of private information file, the private information file of encryption only just can be decrypted on the equipment of binding, otherwise can not be decrypted, thus strengthens the security of private information file greatly.
In further mode, this step is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.So just equipment and private information file are bound, and ensure that the uniqueness of institute's bound device.
Further, institute's bound device elects Set Top Box as.
This document protection method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
Meanwhile, the present invention also provides a kind of file protecting system, and this system comprises:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected.
In the starting stage; for protecting private information file, first user key setting unit inputs one group of user key by user, and user cipher is used for being encrypted private information file; make private information file become the file of encryption, thus greatly protect the security of private information file.
In further embodiment, user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.Like this, by adopting the mode of user key and random number combination, the security of encryption is increased further.
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file.
For preventing private information file be copied or copy, in this embodiment, copy priority assignation unit after to private information file encryption, is set the copy authority of private information file by user, the copy authority of restriction private information file further.The copy authority of private information file can be set for copying, can copy limited number of time, can copy and not limit number of times etc.
In further mode, copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.Like this, when allowing copy, by the restriction of copying cipher, the security of private information file can be strengthened further.
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
After to private information file encryption, for preventing other people private information file copy walked and carry out code breaking, infringement private information, in this embodiment, the deciphering of private information file has particular device to bind by apparatus bound unit, the private information file of encryption only just can be decrypted on the equipment of binding, otherwise can not be decrypted, thus strengthens the security of private information file greatly.
In further mode, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.So just equipment and private information file are bound, and ensure that the uniqueness of institute's bound device.
Further, institute's bound device elects Set Top Box as.
This file protecting system; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
File protecting system of the present invention and method; the mode inputting user key by user, copy authority is set and binds with particular device; private information file is protected; thus effectively prevent private information file from being encroached on easily and copying; protected further by the equipment of binding when private information file key is destroyed; this just effectively guarantees the security of private information greatly, brings safely great guarantee to private information.
These are only preferred embodiment of the present invention, not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a document protection method, is characterized in that, comprises the steps:
S10: input one group of user key by user, carries out user encryption to needing the private information file protected;
S20: arrange copy authority by user, for setting the copy authority of private information file;
S30: the equipment being arranged the binding of private information file by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
2. document protection method according to claim 1; it is characterized in that; described step S10 is specially: input one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
3. document protection method according to claim 1, it is characterized in that, described step S20 is specially: arrange copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
4. document protection method according to claim 1, is characterized in that, described step S30 is specially: using the master chip sequence number of institute's bound device as the secret key of equipment, produces one group of random array and device keys combination producing first rank random secret key simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
5. document protection method according to claim 1, is characterized in that, described bound device elects Set Top Box as.
6. a file protecting system, is characterized in that, comprising:
User key setting unit, inputs one group of user key by user, carries out user encryption to needing the private information file protected;
Copy priority assignation unit, arranges copy authority by user, for setting the copy authority of private information file;
Apparatus bound unit, is arranged the equipment of private information file binding by user, the private information file after encryption only uses user key just can be decrypted operation on the equipment of binding.
7. file protecting system according to claim 6; it is characterized in that; described user key setting unit inputs one group of user key by user, generates one group of random number simultaneously, random number and user key is carried out combination and is jointly encrypted private information file.
8. file protecting system according to claim 6, it is characterized in that, described copy priority assignation unit arranges copy authority by user, if user arranges private information, file does not limit number of times for copying limited number of time or can copy, then arrange copying cipher by user; Need copying cipher be inputted when copying private information file, if copying cipher correctly can copy, otherwise can not copy.
9. file protecting system according to claim 6, is characterized in that, the master chip sequence number of institute's bound device as the secret key of equipment, is produced one group of random array and device keys combination producing first rank random secret key by described apparatus bound unit simultaneously; Generate second-order random secret key after user key and random number being combined, by the first rank random secret key and the final encryption key of second-order random secret key combination producing, private information file is encrypted.
10. file protecting system according to claim 6, is characterized in that, described bound device elects Set Top Box as.
CN201510349638.0A 2015-06-23 2015-06-23 File protection method and system Pending CN104966010A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510349638.0A CN104966010A (en) 2015-06-23 2015-06-23 File protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510349638.0A CN104966010A (en) 2015-06-23 2015-06-23 File protection method and system

Publications (1)

Publication Number Publication Date
CN104966010A true CN104966010A (en) 2015-10-07

Family

ID=54220048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510349638.0A Pending CN104966010A (en) 2015-06-23 2015-06-23 File protection method and system

Country Status (1)

Country Link
CN (1) CN104966010A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038390A (en) * 2017-04-10 2017-08-11 谭宁敏 File encryption decryption system
CN107220554A (en) * 2017-06-20 2017-09-29 努比亚技术有限公司 A kind of file forwarding management method and corresponding system, terminal device
CN108985075A (en) * 2017-06-02 2018-12-11 成都小娱网络科技有限公司 A kind of image file disk encryption system and method for lightweight

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447002A (en) * 2007-11-27 2009-06-03 台达电子工业股份有限公司 File duplication frequency encryption method of man machine interface
CN101692266A (en) * 2009-09-25 2010-04-07 天津大学 Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
CN101692265A (en) * 2009-09-25 2010-04-07 天津大学 Method of encrypting and protecting files
CN102279814A (en) * 2011-08-19 2011-12-14 北方工业大学 Encryption anti-copy system and anti-copy method thereof
CN104182500A (en) * 2014-08-15 2014-12-03 深圳市中兴移动通信有限公司 Safety reminding method and device
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101447002A (en) * 2007-11-27 2009-06-03 台达电子工业股份有限公司 File duplication frequency encryption method of man machine interface
CN101692266A (en) * 2009-09-25 2010-04-07 天津大学 Method of intensively encrypting and protecting files by using hidden partition (HPA) and CPU ID
CN101692265A (en) * 2009-09-25 2010-04-07 天津大学 Method of encrypting and protecting files
CN102279814A (en) * 2011-08-19 2011-12-14 北方工业大学 Encryption anti-copy system and anti-copy method thereof
CN104182500A (en) * 2014-08-15 2014-12-03 深圳市中兴移动通信有限公司 Safety reminding method and device
CN104573551A (en) * 2014-12-25 2015-04-29 广东欧珀移动通信有限公司 File processing method and mobile terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038390A (en) * 2017-04-10 2017-08-11 谭宁敏 File encryption decryption system
CN108985075A (en) * 2017-06-02 2018-12-11 成都小娱网络科技有限公司 A kind of image file disk encryption system and method for lightweight
CN107220554A (en) * 2017-06-20 2017-09-29 努比亚技术有限公司 A kind of file forwarding management method and corresponding system, terminal device
CN107220554B (en) * 2017-06-20 2020-11-27 深圳市六度人和科技有限公司 File forwarding management method, corresponding system and terminal equipment

Similar Documents

Publication Publication Date Title
US20120278618A1 (en) Methods of authorizing a computer license
EP3035585B1 (en) S-box selection in white-box cryptographic implementation
CN104796534B (en) A kind of information content processing method and processing device
CN109035519B (en) Biological feature recognition device and method
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
CN1655495A (en) System and method for security key transmission with strong pairing to destination client
US8392723B2 (en) Information processing apparatus and computer readable medium for preventing unauthorized operation of a program
CN101908113B (en) Authentication method and authentication system
CN102461114A (en) Method for performing double domain encryption a memory device
CN103236930A (en) Data encryption method and system
CN110298186B (en) Non-key data encryption and decryption method based on dynamic reconfigurable cipher chip
CN110096849A (en) A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
CN106796624A (en) Challenge responses method and associated computing device
CN111859415A (en) Neural network model encryption system and method
EP2922235A1 (en) Security module for secure function execution on untrusted platform
CN102461113A (en) Method and system for content replication control
CN101730886B (en) Secure storage system and method of use
CN104966010A (en) File protection method and system
CN101681408B (en) Data security
CN104376270A (en) File protection method and system
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN104281415A (en) Data processing method and device for air conditioner
CN101339589B (en) Method for implementing information safety by dummy machine technology
CN106650329A (en) Individual authorization method of data export equipment
Abboud Multifactor authentication for software protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151007