CN108400966A - A kind of file access method, equipment and storage device based on timeliness control - Google Patents
A kind of file access method, equipment and storage device based on timeliness control Download PDFInfo
- Publication number
- CN108400966A CN108400966A CN201810008832.6A CN201810008832A CN108400966A CN 108400966 A CN108400966 A CN 108400966A CN 201810008832 A CN201810008832 A CN 201810008832A CN 108400966 A CN108400966 A CN 108400966A
- Authority
- CN
- China
- Prior art keywords
- key
- file
- server end
- file access
- timeliness
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000009826 distribution Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/085—Secret sharing or secret splitting, e.g. threshold schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810008832.6A CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810008832.6A CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108400966A true CN108400966A (en) | 2018-08-14 |
CN108400966B CN108400966B (en) | 2020-08-07 |
Family
ID=63093806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810008832.6A Active CN108400966B (en) | 2018-01-04 | 2018-01-04 | File access method and equipment based on aging control and storage equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108400966B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110289955A (en) * | 2019-06-25 | 2019-09-27 | 杭州趣链科技有限公司 | A kind of key management method for serving certificate agency based on threshold cryptography model |
WO2020099996A1 (en) * | 2018-11-15 | 2020-05-22 | International Business Machines Corporation | Data-encryption-based purpose-specific access control |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103607273A (en) * | 2013-07-18 | 2014-02-26 | 焦点科技股份有限公司 | Data file encryption and decryption method based on time limit control |
CN103839011A (en) * | 2014-03-11 | 2014-06-04 | 福建伊时代信息科技股份有限公司 | Protecting method and device of confidential files |
US20150169896A1 (en) * | 2013-12-17 | 2015-06-18 | Inwellcom Technology Co., Ltd. | File management system and method |
CN105335666A (en) * | 2015-09-30 | 2016-02-17 | 四川效率源信息安全技术股份有限公司 | Method for preventing electronic document from being leaked |
-
2018
- 2018-01-04 CN CN201810008832.6A patent/CN108400966B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102710633A (en) * | 2012-05-29 | 2012-10-03 | 大连佳姆信息安全软件技术有限公司 | Cloud security management system of security electronic documents and method |
CN103607273A (en) * | 2013-07-18 | 2014-02-26 | 焦点科技股份有限公司 | Data file encryption and decryption method based on time limit control |
US20150169896A1 (en) * | 2013-12-17 | 2015-06-18 | Inwellcom Technology Co., Ltd. | File management system and method |
CN103839011A (en) * | 2014-03-11 | 2014-06-04 | 福建伊时代信息科技股份有限公司 | Protecting method and device of confidential files |
CN105335666A (en) * | 2015-09-30 | 2016-02-17 | 四川效率源信息安全技术股份有限公司 | Method for preventing electronic document from being leaked |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020099996A1 (en) * | 2018-11-15 | 2020-05-22 | International Business Machines Corporation | Data-encryption-based purpose-specific access control |
GB2593642A (en) * | 2018-11-15 | 2021-09-29 | Ibm | Data-encryption-based purpose-specific access control |
CN110289955A (en) * | 2019-06-25 | 2019-09-27 | 杭州趣链科技有限公司 | A kind of key management method for serving certificate agency based on threshold cryptography model |
Also Published As
Publication number | Publication date |
---|---|
CN108400966B (en) | 2020-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Darwazeh et al. | A secure cloud computing model based on data classification | |
Seiger et al. | SecCSIE: a secure cloud storage integrator for enterprises | |
US9178856B2 (en) | System, method, apparatus and computer programs for securely using public services for private or enterprise purposes | |
US20140281520A1 (en) | Secure cloud data sharing | |
CN105378649A (en) | Multiple authority data security and access | |
Grechaninov et al. | Decentralized Access Demarcation System Construction in Situational Center Network | |
WO2020206953A1 (en) | Data processing method and system | |
CN103268456A (en) | Method and device for file safety control | |
Khan et al. | A study of incremental cryptography for security schemes in mobile cloud computing environments | |
Yee et al. | Review on confidentiality, integrity and availability in information security | |
Memmi et al. | Data protection: Combining fragmentation, encryption, and dispersion | |
CN108400966A (en) | A kind of file access method, equipment and storage device based on timeliness control | |
Agarkhed et al. | Security and privacy for data storage service scheme in cloud computing | |
JP2008242665A (en) | Encryption processing device, encryption processing method and file dividing and storing system | |
Anwar | Data security issues in the realm of mobile cloud computing: A survey | |
US20210320791A1 (en) | Systems and methods for adaptive recursive descent data redundancy | |
Ahmed et al. | Enhancing The Data Security In Cloud Computing By Using New Encryption Method | |
Kopacz et al. | Cloud Computing Security and Future | |
Bagaeen et al. | Storage as a service (staas) security challenges and solutions in cloud computing environment: An evaluation review | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Jaikar et al. | Secure data distribution using secret splitting over cloud | |
Pandi | A Simplified Policy Modification Framework By External provider For Human Medical Record Sharing | |
Pitchay et al. | Mobile application design for protecting the data in cloud using enhanced technique of encryption | |
Ke et al. | Cross-group secret sharing for secure cloud storage service | |
CN112953890B (en) | Information encryption method and device for client side energy consumption control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Song Jun Inventor after: Yang Fan Inventor after: Gao Kun Inventor after: Xu Heng Inventor after: Hu Yutao Inventor before: Wang Lizhe Inventor before: Song Jun Inventor before: Yang Fan Inventor before: Gao Kun Inventor before: Xu Heng Inventor before: Hu Yutao |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220414 Address after: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Address before: 430074 No. 388 Lu Lu, Hongshan District, Hubei, Wuhan Patentee before: CHINA University OF GEOSCIENCES (WUHAN CITY) |
|
TR01 | Transfer of patent right | ||
CP02 | Change in the address of a patent holder |
Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee after: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Address before: 510000 rooms 2706 and 2708, 27th floor, No. 57, Zhongshan 1st Road, Yuexiu District, Guangzhou, Guangdong Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. |
|
CP02 | Change in the address of a patent holder | ||
CP03 | Change of name, title or address |
Address after: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee after: Guangzhou Keo Information Technology Co.,Ltd. Country or region after: China Address before: 510000 room 1001, No. 27, Huanyu 1st Road, Guangzhou International Biological Island, Huangpu District, Guangzhou, Guangdong Province Patentee before: GUANGZHOU KEAO INFORMATION TECHNOLOGY Co.,Ltd. Country or region before: China |
|
CP03 | Change of name, title or address |