CN108737335A - The method of meeting document process based on private clound - Google Patents

The method of meeting document process based on private clound Download PDF

Info

Publication number
CN108737335A
CN108737335A CN201710250892.4A CN201710250892A CN108737335A CN 108737335 A CN108737335 A CN 108737335A CN 201710250892 A CN201710250892 A CN 201710250892A CN 108737335 A CN108737335 A CN 108737335A
Authority
CN
China
Prior art keywords
terminal
document
taste
information
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710250892.4A
Other languages
Chinese (zh)
Inventor
靖飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Little Soldier Crossing River Mdt Infotech Ltd
Original Assignee
Guangzhou Little Soldier Crossing River Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Little Soldier Crossing River Mdt Infotech Ltd filed Critical Guangzhou Little Soldier Crossing River Mdt Infotech Ltd
Priority to CN201710250892.4A priority Critical patent/CN108737335A/en
Publication of CN108737335A publication Critical patent/CN108737335A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

In order to solve the safety problem of meeting document, the present invention provides a kind of method of the meeting document process based on private clound, including:File encryption uploading step and profile download decryption step.It is an advantage of the current invention that in order to ensure that document could be uploaded, download and be used in specific position, the present invention integrates electronic nose by the way that taste generator is arranged in specific position in the terminal using document, to obtain related taste.Document is encrypted and decrypted in the taste of specific position, and using above-mentioned taste, it can be ensured that document could be uploaded, download and be used in specific position, effectively raise confidentiality.

Description

The method of meeting document process based on private clound
Technical field
The method for the meeting document process based on private clound that the present invention relates to a kind of.
Background technology
As the every profession and trade level of informatization increasingly increases, electronic document has become the important carrier of Working information;Especially Government, enterprises and institutions, tablet computer have become the important tool of routine office work, and a large amount of government, enterprises and institutions pass through Tablet computer issues official document, realizes mobile office;The characteristics of due to electronic document itself, in links such as making, use, destructions Many security risks and threat are faced, is also related to state secret with safety problem, partial document while offering convenience, once The national people's livelihood of influence of divulging a secret and safety, safety problem ought to attract great attention.
Document stored in clear is easy to cause information leakage in server and tablet computer;During document transmission use not Encryption is also easy to cause information stealth;Here safety will be stored from document, document two aspects safe to use propose to be based on tablet The document security sharing method of computer.
Invention content
In order to solve the safety problem of meeting document, the present invention provides a kind of side of the meeting document process based on private clound Method, including:File encryption uploading step and profile download decryption step;
The file encryption uploading step, including:
Taste generation step, server are arranged the smell generator in specific position by network instruction and send out encryption taste Road;
Taste information Step is obtained, the electronic nose being arranged in terminal obtains the encryption taste, and is converted into corresponding Odiferous information;
Account authentication step, the user account of terminal and the media interviews of the terminal described in the server check Address is controlled, if all legal,
Key generating step, the terminal the set wherein identity information of central processor, the identity information of its network interface card, time Information and the odiferous information, generate corresponding key;
File encryption step, the terminal are encrypted using the key pair document to be uploaded, and form encrypted document;
Document uploading step, the terminal is by network by the encrypted document upload server;
The profile download decryption step, including:
Profile download step, the terminal are downloaded by the server Basic Authentication, by network from the server Encrypted document;
Session key step, the server, randomly generates session key;
Decruption key issues step, the server combination terminal the set wherein identity information of central processor, its network interface card Identity information and temporal information, generate decruption key, and by session key encryption be handed down to the terminal;
Decrypt smell generation step, the server according to the terminal Basic Authentication, to the smell of corresponding position hair Raw device sends out the instruction of decryption taste;
Information acquiring step is decrypted, the electronic nose in the terminal is set, obtains the decryption taste, and be converted into phase The odiferous information answered;
Encrypted document decryption step, decruption key described in the terminal deciphering, and in conjunction with the smell letter of the decryption taste Breath, decrypts the encrypted document.
Preferably, the identity information of the central processing unit is 16, and the identity information of the network interface card is 16.
Compared with the prior art, the advantages of the present invention are as follows could upload to ensure document in specific position, download With use, the present invention and integrates electronic nose, to obtain by the way that taste generator is arranged in specific position in the terminal using document Take related taste.Document is encrypted and decrypted in the taste of specific position, and using above-mentioned taste, it can be ensured that document exists Specific position could upload, downloads and use, and effectively raise confidentiality.
Description of the drawings
Fig. 1 is the implementation of file encryption uploading step in a kind of method of the meeting document process based on private clound of the present invention The flow chart of example;
Fig. 2 is the implementation of document download decryption step in a kind of method of the meeting document process based on private clound of the present invention The flow chart of example.
Specific implementation mode
The embodiment of the present invention is described further below.
As depicted in figs. 1 and 2, a method of the meeting document process based on private clound, which is characterized in that including:Text Shelves encryption uploading step and profile download decryption step;
The file encryption uploading step, including:
Taste generation step, server are arranged the smell generator in specific position by network instruction and send out encryption taste Road;
Taste information Step is obtained, the electronic nose being arranged in terminal obtains the encryption taste, and is converted into corresponding Odiferous information;
Account authentication step, the user account of terminal and the media interviews of the terminal described in the server check Address is controlled, if all legal,
Key generating step, the terminal the set wherein identity information of central processor, the identity information of its network interface card, time Information and the odiferous information, generate corresponding key;
File encryption step, the terminal are encrypted using the key pair document to be uploaded, and form encrypted document;
Document uploading step, the terminal is by network by the encrypted document upload server;
The profile download decryption step, including:
Profile download step, the terminal are downloaded by the server Basic Authentication, by network from the server Encrypted document;
Session key step, the server, randomly generates session key;
Decruption key issues step, the server combination terminal the set wherein identity information of central processor, its network interface card Identity information and temporal information, generate decruption key, and by session key encryption be handed down to the terminal;
Decrypt smell generation step, the server according to the terminal Basic Authentication, to the smell of corresponding position hair Raw device sends out the instruction of decryption taste;
Information acquiring step is decrypted, the electronic nose in the terminal is set, obtains the decryption taste, and be converted into phase The odiferous information answered;
Encrypted document decryption step, decruption key described in the terminal deciphering, and in conjunction with the smell letter of the decryption taste Breath, decrypts the encrypted document.
Preferably, the identity information of the central processing unit is 16, and the identity information of the network interface card is 16.
It is further described, and it cannot be said that the present invention the above content is made for the present invention in conjunction with specific embodiments Specific implementation be confined to these explanations.For those of ordinary skill in the art to which the present invention belongs, it is not departing from Under the premise of present inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to the protection model of the present invention It encloses.

Claims (2)

1. a kind of method of the meeting document process based on private clound, which is characterized in that including:File encryption uploading step and text Shelves download decryption step;
The file encryption uploading step, including:
Taste generation step, server are arranged the smell generator in specific position by network instruction and send out encryption taste;
Taste information Step is obtained, the electronic nose being arranged in terminal obtains the encryption taste, and is converted into corresponding smell Information;
Account authentication step, the user account of terminal and the media access control of the terminal described in the server check Address, if all legal,
Key generating step, the terminal the set wherein identity information of central processor, the identity information of its network interface card, time letter Breath and the odiferous information, generate corresponding key;
File encryption step, the terminal are encrypted using the key pair document to be uploaded, and form encrypted document;
Document uploading step, the terminal is by network by the encrypted document upload server;
The profile download decryption step, including:
Profile download step, the terminal are downloaded from the server by network and are encrypted by the server Basic Authentication Document;
Session key step, the server, randomly generates session key;
Decruption key issues step, the body of the server combination terminal the set wherein identity information of central processor, its network interface card Part information and temporal information generate decruption key, and are handed down to the terminal by session key encryption;
Decrypt smell generation step, the server according to the terminal Basic Authentication, to the smell generator of corresponding position Send out the instruction of decryption taste;
Information acquiring step is decrypted, the electronic nose in the terminal is set, the decryption taste is obtained, and is converted into corresponding Odiferous information;
Encrypted document decryption step, decruption key described in the terminal deciphering, and in conjunction with the odiferous information of the decryption taste, solution The close encrypted document.
2. the method for the meeting document process based on private clound as described in claim 1, which is characterized in that the central processing The identity information of device is 16, and the identity information of the network interface card is 16.
CN201710250892.4A 2017-04-14 2017-04-14 The method of meeting document process based on private clound Pending CN108737335A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710250892.4A CN108737335A (en) 2017-04-14 2017-04-14 The method of meeting document process based on private clound

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710250892.4A CN108737335A (en) 2017-04-14 2017-04-14 The method of meeting document process based on private clound

Publications (1)

Publication Number Publication Date
CN108737335A true CN108737335A (en) 2018-11-02

Family

ID=63925136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710250892.4A Pending CN108737335A (en) 2017-04-14 2017-04-14 The method of meeting document process based on private clound

Country Status (1)

Country Link
CN (1) CN108737335A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638568A (en) * 2012-03-02 2012-08-15 深圳市朗科科技股份有限公司 Cloud storage system and data management method thereof
CN103023876A (en) * 2012-11-22 2013-04-03 中国科学院声学研究所 Network terminal, security certification and registration activation methods thereof and server
CN103067401A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for key protection
CN103179086A (en) * 2011-12-21 2013-06-26 中国电信股份有限公司 Method and system for remote storing processing of data
CN103220295A (en) * 2013-04-26 2013-07-24 福建伊时代信息科技股份有限公司 Document encryption and decryption method, device and system
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system
CN103999400A (en) * 2011-12-28 2014-08-20 仁荷大学校产学协力团 Taste-based authentication to securely share data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179086A (en) * 2011-12-21 2013-06-26 中国电信股份有限公司 Method and system for remote storing processing of data
CN103999400A (en) * 2011-12-28 2014-08-20 仁荷大学校产学协力团 Taste-based authentication to securely share data
CN102638568A (en) * 2012-03-02 2012-08-15 深圳市朗科科技股份有限公司 Cloud storage system and data management method thereof
CN103023876A (en) * 2012-11-22 2013-04-03 中国科学院声学研究所 Network terminal, security certification and registration activation methods thereof and server
CN103067401A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for key protection
CN103220295A (en) * 2013-04-26 2013-07-24 福建伊时代信息科技股份有限公司 Document encryption and decryption method, device and system
CN103701611A (en) * 2013-12-30 2014-04-02 天地融科技股份有限公司 Method for accessing and uploading data in data storage system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
全国大学生电子设计竞赛信息安全技术专题邀请赛组委会: "《全国大学生电子设计竞赛信息安全技术专题邀请赛优秀作品选编(第三届)》", 31 May 2015 *
田彦伟等: "基于生物特征的身份加密及其安全性分析", 《安阳工学院学报》 *
科技日报总编室: "《科学生活100问》", 30 June 2011 *
解晖等: "一种面向中小企业的轻量级文件安全管理方案", 《电子科技》 *
陈健: "《"软硬兼施"演绎精彩-软件与我们的生活》", 31 August 2011 *

Similar Documents

Publication Publication Date Title
CN102946392B (en) A kind of url data encrypted transmission method and system
CN103259651B (en) A kind of method and system to terminal data encryption and decryption
CN105812332A (en) Data protection method
WO2017193950A1 (en) Mobile office method, server, client, and system
CN101262349A (en) SMS-based identity authentication method and device
CN204360381U (en) mobile device
CN105025019A (en) Data safety sharing method
CN102833244A (en) Communication method for authentication by fingerprint information
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN104917723A (en) Method, apparatus and system for realizing secure sharing of encryption file
CN110771190A (en) Controlling access to data
CN103338106A (en) Methods and devices for ciphering and deciphering file
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
CN104579680A (en) Method for safe distribution of seed
CN107689957A (en) A kind of digital certificate management method, electronic equipment, storage medium
CN103905557A (en) Data storage method and device used for cloud environment and downloading method and device
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN104936172A (en) Beidou positioning data transmission encryption system
CN103746993A (en) Cloud storage data encryption method with client-controlled decryption private key and server-performed encryption and decryption
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
CN103945348A (en) Asymmetrical secret key short message encryption method and system
CN103310159A (en) Method and system for safely taking out electronic file with mobile intelligent terminal
CN105847261B (en) A kind of electronic signature method based on the wireless encryption and decryption of bluetooth
CN106856468A (en) A kind of TSM Security Agent device for being deployed in cloud storage service end and TSM Security Agent method
CN108256343A (en) Encryption method, device and the decryption method of Shader files, device

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: GUANGZHOU BINGOTECH Co.,Ltd.

Document name: Notification of Passing Preliminary Examination of the Application for Invention

PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181102