CN108400966A - A kind of file access method, equipment and storage device based on timeliness control - Google Patents

A kind of file access method, equipment and storage device based on timeliness control Download PDF

Info

Publication number
CN108400966A
CN108400966A CN201810008832.6A CN201810008832A CN108400966A CN 108400966 A CN108400966 A CN 108400966A CN 201810008832 A CN201810008832 A CN 201810008832A CN 108400966 A CN108400966 A CN 108400966A
Authority
CN
China
Prior art keywords
key
file
server end
file access
timeliness
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810008832.6A
Other languages
Chinese (zh)
Other versions
CN108400966B (en
Inventor
王力哲
宋军
杨帆
高坤
徐衡
胡雨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Keo Information Technology Co ltd
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201810008832.6A priority Critical patent/CN108400966B/en
Publication of CN108400966A publication Critical patent/CN108400966A/en
Application granted granted Critical
Publication of CN108400966B publication Critical patent/CN108400966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The present invention provides a kind of file access method, equipment and storage devices based on timeliness control; the problem of cannot being effectively protected for private file; the present invention devises the file occupation mode of two kinds of timeliness control; one is the modes controlled based on file usage time, make file that can only within a specified time use;Another kind is the mode controlled based on file access times, makes file that can only be used in the file access times upper limit of setting, once being more than usage time or the access times upper limit, the file can be destroyed therewith.A kind of file access equipment and storage device based on timeliness control, for realizing the file access method controlled based on timeliness.The present invention is controlled by timeliness, efficiently solves the problems, such as that file is revealed in public PC equipment, and carries out effective protection to the copy of classified document, has practicability, high efficiency, flexibility and scalability.

Description

A kind of file access method, equipment and storage device based on timeliness control
Technical field
The present invention relates to information security field in computer science more particularly to a kind of file accesss based on timeliness control Method, equipment and storage device.
Background technology
In recent years, the internal file leakage problem very severe of the departments such as enterprise, government, to relevant enterprise, government etc. Bring huge loss.Its problem to have its source in the classified document precautionary measures not in place, stolen and revealed by internal staff. The use of classified document is frequently referred in meeting, but flow of personnel is big in meeting, file is more, it is difficult to be carried out to classified document It is effectively protected.
In many academic conferences, slide demonstration person must use mobile device etc. to copy lantern slide or alternative document To being demonstrated in public PC equipment, malicious persons can usually take various ways to obtain original, even if user is to file Use is encrypted, but malicious persons still can carry out it to crack acquisition information.How secrecy text public PC equipment in is made Part is not leaked, the protection got well, and is a good problem to study.
Invention content
To solve the above-mentioned problems, the file access method that the present invention provides a kind of based on timeliness control and is deposited at equipment Equipment is stored up, a kind of file access method based on timeliness control mainly includes the following steps that:
Step 1:Server end selection needs to carry out the file that timeliness control accesses;
Step 2:Client selection accesses the timeliness control mode when file;
Step 3:According to different timeliness control modes, the file is carried out to include the operation encrypted and decrypted;
Step 4:Client accesses the file;
Step 5:Client detects that the file use finishes, and the file is destroyed.
Further, the timeliness control mode includes being controlled and being based on file access times control based on file usage time Two ways processed.
Further, the timeliness control mode based on the control of file usage time includes the following steps:
Step 3-1:Operation is encrypted to the file configuration key in server end;
Step 3-2:Server end sets sub-key total amount n and thresholding t using the key as shared key;
Step 3-3:Shared key is split according to the sub-key total amount n and thresholding t, server end, obtains n Sub-key;
Step 3-4:According to consistency hash algorithm, server end to client, and sets the n sub- encryption key distributions The sub-key update period;
Step 3-5:File described in client downloads;
Step 3-6:Client sends the information of request sub-key to other clients;
Step 3-7:Client summarizes the sub-key received, is stored in local system;
Step 3-8:The sub-key of storage is sent to server end by client, judges whether the sub-key is contained in clothes It is engaged in the sub-key of device end storage, if so, arriving step 3-9;If it is not, then arriving step 3-10;
Step 3-9:The sub-key of server end storage is updated not yet, and server end, which is sent, agrees to that reconstruct is shared close The information of key arrives step 3-11;
Step 3-10:The sub-key of server end storage has been carried out update, and the file is inaccessible, server end hair Send the information of refusal reconstruct shared key;
Step 3-11:Judge whether obtained sub-key number is less than the thresholding t of setting, if so, step 3-6 is returned to, If it is not, then arriving step 3-12;
Step 3-12:Client obtains the key of the file according to the reconstruct of shared key, decrypts the file.
Further, the timeliness control mode based on the control of file access times includes the following steps:
Step 4-1:Server end is to the file configuration key and the file access times upper limit;
Step 4-2:Access control policy is arranged in server end;
Step 4-3:Server end is encrypted the file by AES;
Step 4-4:Server end carries out encryption attribute to the key and the file access times upper limit, and it is close to obtain key Text;
Step 4-5:Client sends request, obtains the key ciphertext;
Step 4-6:Client is decrypted according to the key ciphertext, obtains on the key and file access times Limit;
Step 4-7:The key ciphertext that the key and file access times are encrypted again is saved in by server end In local system;
Step 4-8:Client sends request, obtains key access times;
Step 4-9:Judge whether access times are less than the file access times upper limit set to the key, if so, To step 4-10;If it is not, then arriving step 4-11;
Step 4-10:Client is decrypted according to file described in the key pair, and sends message to server end, makes Key counter in server end adds 1;
Step 4-11:Client destroys the key.
Further, the period update of file key is to share algorithm and consistency hash algorithm using key, and combine One-way hash chain so that the use of file can only be in upper primary key updating and next time between key updating.
Further, the method for sub-key update is:It will have permission online using the user of file as memory node, when When Adding User or reducing user, when according to newly-increased or reduction memory node, it would be desirable to which the object of change is remapped to new On memory node.
Further, if file usage time is more than the preset time, system background can send information, order update All sub-keys of storage.
Further, it after having used the key and file access times every time, is required for the key and file Access times are again in encrypting storing to local file system.
A kind of storage device, store instruction and data are for realizing a kind of file access method based on timeliness control.
A kind of file access equipment based on timeliness control, including:Processor and the storage device;The processor adds It carries and executes the instruction in the storage device and data for realizing a kind of file access method controlled based on timeliness.
The advantageous effect that technical solution provided by the invention is brought is:It is controlled by timeliness, efficiently solves file and exist The problem of being revealed in public PC equipment, and to the copy of classified document carry out effective protection, have practicability, high efficiency, flexibly Property and scalability.
Description of the drawings
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of flow chart of the file access method controlled based on timeliness in the embodiment of the present invention;
Fig. 2 is the flow chart of the timeliness control mode controlled based on file usage time in the embodiment of the present invention;
Fig. 3 is the flow chart of the timeliness control mode controlled based on file access times in the embodiment of the present invention;
Fig. 4 is the schematic diagram that hardware device works in the embodiment of the present invention.
Specific implementation mode
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail The specific implementation mode of the present invention.
The embodiment provides it is a kind of based on timeliness control file access method, equipment and storage device, one The file access method that kind is controlled based on timeliness efficiently solves file public by the timeliness control to file access The problem of being revealed in PC equipment, and effective protection is carried out to the copy of classified document;A kind of guarantee safety of electronic file equipment and Storage device, for realizing a kind of file access method based on timeliness control.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of the file access method controlled based on timeliness in the embodiment of the present invention, Include the following steps:
S101:Server end selection needs to carry out the file that timeliness control accesses;
S102:Client selection accesses the timeliness control mode when file;The timeliness control mode includes being based on File usage time controls and controls two ways based on file access times
S103:According to different timeliness control modes, the file is carried out to include the operation encrypted and decrypted;
S104:Client accesses the file;
S105:Client detects that the file use finishes, and the file is destroyed.
Referring to FIG. 2, Fig. 2 is the flow of the timeliness control mode controlled based on file usage time in the embodiment of the present invention Figure, specifically comprises the following steps:
S201:Operation is encrypted to the file configuration key in server end;
S202:Server end sets sub-key total amount n and thresholding t using the key as shared key;
S203:Shared key is split according to the sub-key total amount n of the setting and thresholding t, server end, is obtained N sub-key;
S204:According to consistency hash algorithm, the n sub- encryption key distributions to client, and are set son by server end The key updating period;
S205:File described in client downloads;
S206:Client sends the information of request sub-key to other clients;
S207:Client summarizes the sub-key received, is stored in local system;
S208:The sub-key of storage is sent to server by client, judges whether the sub-key is contained in server In the sub-key for holding storage, if so, arriving step S209;If it is not, then arriving step S210;
S209:The sub-key of server end storage is updated not yet, and server end, which is sent, agrees to reconstruct shared key Information, arrive step S211;
S210:The key of server end storage has been carried out update, and the file is inaccessible, and server end sends refusal Reconstruct the information of shared key;The period update of file key is to share algorithm and consistency hash algorithm using key, and tie Close one-way hash chain so that the use of file can only be in upper primary key updating and next time between key updating;Sub-key is more New method is:It will have permission online using the user of file as memory node, when Adding User or reducing user, according to When newly-increased or reduction memory node, it would be desirable to which the object of change is remapped on new memory node;If file usage time More than the preset time, system background can send information, order all sub-keys updated storage;
S211:Judge whether obtained sub-key number is less than the thresholding t of setting, if so, step S206 is returned to, if not It is then to arrive step S212;
S212:Client obtains the key of the file according to the reconstruct of shared key, decrypts the file.
Referring to FIG. 3, Fig. 3 is the flow of the timeliness control mode controlled based on file access times in the embodiment of the present invention Figure, specifically comprises the following steps:
S301:Server end is to the file configuration key and the file access times upper limit;
S302:Access control policy is arranged in server end;
S303:Server end is encrypted the file by AES;
S304:Server end carries out encryption attribute to the key and the file access times upper limit, obtains key ciphertext;
S305:Client sends request, obtains the key ciphertext;
S306:Client is decrypted according to the key ciphertext, obtains the key and the file access times upper limit;
S307:The key ciphertext that the key and file access times are encrypted again is saved in local by server end In system;
S308:Client sends request, obtains key access times;
S309:Judge whether access times are less than the file access times upper limit of setting to the key, if so, arriving step Rapid S310;If it is not, then arriving step S311;
S310:Client is decrypted according to file described in the key pair, and sends message to server, makes server In key counter add 1;After having used the key and file access times every time, it is required for the key and file Access times are again in encrypting storing to local file system;
S311:Client destroys the key.
Fig. 4 is referred to, Fig. 4 is the hardware device operating diagram of the embodiment of the present invention, and the hardware device specifically includes: A kind of guarantee safety of electronic file equipment 401, processor 402 and storage device 403.
A kind of guarantee safety of electronic file equipment 401:A kind of guarantee safety of electronic file equipment 401 realizes described one The file access method that kind is controlled based on timeliness.
Processor 402:The processor 402 loads and executes the instruction in the storage device 403 and data for real A kind of existing file access method based on timeliness control.
Storage device 403:403 store instruction of the storage device and data;The storage device 403 is for realizing described A kind of file access method based on timeliness control.
The beneficial effects of the invention are as follows:It is controlled by timeliness, efficiently solves what file was revealed in public PC equipment Problem, and effective protection is carried out to the copy of classified document, there is practicability, high efficiency, flexibility and scalability.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of file access method based on timeliness control, it is characterised in that:Include the following steps:
Step 1:Server end selection needs to carry out the file that timeliness control accesses;
Step 2:Client selection accesses the timeliness control mode when file;
Step 3:According to different timeliness control modes, the file is carried out to include the operation encrypted and decrypted;
Step 4:Client accesses the file;
Step 5:Client detects that the file use finishes, and the file is destroyed.
2. a kind of file access method based on timeliness control as described in claim 1, it is characterised in that:The timeliness control Mode includes being controlled based on file usage time and controlling two ways based on file access times.
3. a kind of file access method based on timeliness control as described in claim 1, it is characterised in that:It is used based on file The timeliness control mode of time control includes the following steps:
Step 3-1:Operation is encrypted to the file configuration key in server end;
Step 3-2:Server end sets sub-key total amount n and thresholding t using the key as shared key;
Step 3-3:Shared key is split according to the sub-key total amount n and thresholding t, server end, it is close to obtain n son Key;
Step 3-4:According to consistency hash algorithm, server end is by the n sub- encryption key distributions to client, and it is close to set son The key update cycle;
Step 3-5:File described in client downloads;
Step 3-6:Client sends the information of request sub-key to other clients;
Step 3-7:Client summarizes the sub-key received, is stored in local system;
Step 3-8:The sub-key of storage is sent to server end by client, judges whether the sub-key is contained in server In the sub-key for holding storage, if so, arriving step 3-9;If it is not, then arriving step 3-10;
Step 3-9:The sub-key of server end storage is updated not yet, and server end, which is sent, agrees to reconstruct shared key Information arrives step 3-11;
Step 3-10:The sub-key of server end storage has been carried out update, and the file is inaccessible, and server end transmission is refused The information of reconstruct shared key absolutely;
Step 3-11:Judge whether obtained sub-key number is less than the thresholding t of setting, if so, step 3-6 is returned to, if not It is then to arrive step 3-12;
Step 3-12:Client obtains the key of the file according to the reconstruct of shared key, decrypts the file.
4. a kind of file access method based on timeliness control as described in claim 1, it is characterised in that:It is used based on file The timeliness control mode of number control includes the following steps:
Step 4-1:Server end is to the file configuration key and the file access times upper limit;
Step 4-2:Access control policy is arranged in server end;
Step 4-3:Server end is encrypted the file by AES;
Step 4-4:Server end carries out encryption attribute to the key and the file access times upper limit, obtains key ciphertext;
Step 4-5:Client sends request, obtains the key ciphertext;
Step 4-6:Client is decrypted according to the key ciphertext, obtains the key and the file access times upper limit;
Step 4-7:The key ciphertext that the key and file access times are encrypted again is saved in local by server end In system;
Step 4-8:Client sends request, obtains key access times;
Step 4-9:Judge whether access times are less than the file access times upper limit of setting to the key, if so, arriving step Rapid 4-10;If it is not, then arriving step 4-11;
Step 4-10:Client is decrypted according to file described in the key pair, and sends message to server end, makes service Key counter in device end adds 1;
Step 4-11:Client destroys the key.
5. a kind of file access method based on timeliness control as claimed in claim 3, it is characterised in that:The week of file key Phase update is to share algorithm and consistency hash algorithm using key, and combine one-way hash chain so that the use of file can only In upper primary key updating and next time between key updating.
6. a kind of file access method based on timeliness control as claimed in claim 3, it is characterised in that:Sub-key update Method is:It will have permission online using the user of file as memory node, when Adding User or reducing user, according to newly-increased Or when reducing memory node, it would be desirable to which the object of change is remapped on new memory node.
7. a kind of file access method based on timeliness control as claimed in claim 3, it is characterised in that:If file uses Between be more than the preset time, system background can send information, order all sub-keys updated storage.
8. a kind of file access method based on timeliness control as claimed in claim 4, it is characterised in that:When having used every time After the key and file access times, be required for by the key and file access times again encrypting storing to local file In system.
9. a kind of storage device, it is characterised in that:The storage device store instruction and data are for realizing claim 1~8 The file access method that any one described is controlled based on timeliness.
10. a kind of file access equipment based on timeliness control, it is characterised in that:Including:Processor and the storage device;Institute Processor is stated to load and execute the instruction in the storage device and data for realizing any one described in claim 1~8 The file access method that kind is controlled based on timeliness.
CN201810008832.6A 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment Active CN108400966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810008832.6A CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810008832.6A CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Publications (2)

Publication Number Publication Date
CN108400966A true CN108400966A (en) 2018-08-14
CN108400966B CN108400966B (en) 2020-08-07

Family

ID=63093806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810008832.6A Active CN108400966B (en) 2018-01-04 2018-01-04 File access method and equipment based on aging control and storage equipment

Country Status (1)

Country Link
CN (1) CN108400966B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110289955A (en) * 2019-06-25 2019-09-27 杭州趣链科技有限公司 A kind of key management method for serving certificate agency based on threshold cryptography model
WO2020099996A1 (en) * 2018-11-15 2020-05-22 International Business Machines Corporation Data-encryption-based purpose-specific access control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
US20150169896A1 (en) * 2013-12-17 2015-06-18 Inwellcom Technology Co., Ltd. File management system and method
CN105335666A (en) * 2015-09-30 2016-02-17 四川效率源信息安全技术股份有限公司 Method for preventing electronic document from being leaked

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
US20150169896A1 (en) * 2013-12-17 2015-06-18 Inwellcom Technology Co., Ltd. File management system and method
CN103839011A (en) * 2014-03-11 2014-06-04 福建伊时代信息科技股份有限公司 Protecting method and device of confidential files
CN105335666A (en) * 2015-09-30 2016-02-17 四川效率源信息安全技术股份有限公司 Method for preventing electronic document from being leaked

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020099996A1 (en) * 2018-11-15 2020-05-22 International Business Machines Corporation Data-encryption-based purpose-specific access control
GB2593642A (en) * 2018-11-15 2021-09-29 Ibm Data-encryption-based purpose-specific access control
CN110289955A (en) * 2019-06-25 2019-09-27 杭州趣链科技有限公司 A kind of key management method for serving certificate agency based on threshold cryptography model

Also Published As

Publication number Publication date
CN108400966B (en) 2020-08-07

Similar Documents

Publication Publication Date Title
Darwazeh et al. A secure cloud computing model based on data classification
Seiger et al. SecCSIE: a secure cloud storage integrator for enterprises
US9178856B2 (en) System, method, apparatus and computer programs for securely using public services for private or enterprise purposes
US20140281520A1 (en) Secure cloud data sharing
CN105378649A (en) Multiple authority data security and access
Grechaninov et al. Decentralized Access Demarcation System Construction in Situational Center Network
WO2020206953A1 (en) Data processing method and system
CN103268456A (en) Method and device for file safety control
Khan et al. A study of incremental cryptography for security schemes in mobile cloud computing environments
Yee et al. Review on confidentiality, integrity and availability in information security
Memmi et al. Data protection: Combining fragmentation, encryption, and dispersion
CN108400966A (en) A kind of file access method, equipment and storage device based on timeliness control
Agarkhed et al. Security and privacy for data storage service scheme in cloud computing
JP2008242665A (en) Encryption processing device, encryption processing method and file dividing and storing system
Anwar Data security issues in the realm of mobile cloud computing: A survey
US20210320791A1 (en) Systems and methods for adaptive recursive descent data redundancy
Ahmed et al. Enhancing The Data Security In Cloud Computing By Using New Encryption Method
Kopacz et al. Cloud Computing Security and Future
Bagaeen et al. Storage as a service (staas) security challenges and solutions in cloud computing environment: An evaluation review
Raja et al. An enhanced study on cloud data services using security technologies
Jaikar et al. Secure data distribution using secret splitting over cloud
Pandi A Simplified Policy Modification Framework By External provider For Human Medical Record Sharing
Pitchay et al. Mobile application design for protecting the data in cloud using enhanced technique of encryption
Ke et al. Cross-group secret sharing for secure cloud storage service
CN112953890B (en) Information encryption method and device for client side energy consumption control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Song Jun

Inventor after: Yang Fan

Inventor after: Gao Kun

Inventor after: Xu Heng

Inventor after: Hu Yutao

Inventor before: Wang Lizhe

Inventor before: Song Jun

Inventor before: Yang Fan

Inventor before: Gao Kun

Inventor before: Xu Heng

Inventor before: Hu Yutao

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220414

Address after: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong

Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan

Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY)

TR01 Transfer of patent right
CP02 Change in the address of a patent holder

Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong

Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder
CP03 Change of name, title or address

Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee after: Guangzhou Keo Information Technology Co.,Ltd.

Country or region after: China

Address before: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province

Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address