CN109639682A - Sharing files method - Google Patents
Sharing files method Download PDFInfo
- Publication number
- CN109639682A CN109639682A CN201811533801.9A CN201811533801A CN109639682A CN 109639682 A CN109639682 A CN 109639682A CN 201811533801 A CN201811533801 A CN 201811533801A CN 109639682 A CN109639682 A CN 109639682A
- Authority
- CN
- China
- Prior art keywords
- file
- user
- bound device
- sharing files
- sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of sharing files methods, comprising: first user's bound device proposes the request for sharing file to second user bound device to server;Server after receiving the request, obtains device id corresponding with second user bound device;The server by utilizing device id encrypts file, and gives encrypted sharing files to second user bound device;Its device id is sent to server when downloading file by second user bound device;For server after the device id that verifying second user bound device is sent is legal, Cai Huiwei second user bound device provides encrypted file;Second user bound device carries out real time decrypting to the file of downloading using the device id of its own.The invention enables by participator the file shared can only be opened by the equipment, file can't see by other equipment, and after the equipment by binding checks file, it is also to encrypt file that cache file, which is copied away, to improve the safety of sharing files.
Description
Technical field
The present invention relates to sharing files field, in particular to a kind of sharing files method.
Background technique
With the development of mobile internet, office worker can pass through handset processes and business at any time and any place
Relevant anything.Many Dropbox both provide the function of sharing files, cooperation.For the data of Company Confidential, once point
Enjoying away just becomes uncontrollable, and the thing that Shi Eryou file is divulged a secret occurs.
Summary of the invention
The present invention provides a kind of sharing files methods, to solve to become uncontrollable once sharing away in the prior art
The problem of.
To solve the above problems, providing a kind of sharing files method, comprising: first as one aspect of the present invention
User's bound device proposes the request for sharing file to second user bound device to server;Server is receiving the request
Afterwards, device id corresponding with second user bound device is obtained;The server by utilizing device id encrypts the file, and
Give encrypted sharing files to second user bound device;Second user bound device is when downloading the file by its equipment
ID is sent to server;Server just can be described after the device id for verifying the second user bound device transmission is legal
Second user bound device provides the encrypted file;Second user bound device is using the device id of its own to downloading
The file carry out real time decrypting.
Preferably, the device id is the IDFV on the ANDROID_ID or ios platform in Android platform.
Preferably, first user's bound device and first user's bound device are after installation APP for the first time and successful log, meeting
Unique device id and its user name are bound.
Preferably, when bound device, user can take an alias for new equipment.
Preferably, administrator has permission to audit to the equipment of user's binding, add, modify, delete etc. and operate.
Share preferably for having encrypted, but the file that second user bound device is not yet downloaded, if administrator obtains
Taking sharing files, person eliminates sharing, then second user bound device cannot get the file after decryption.
Preferably, what second user bound device downloaded it is shared again by sharing file lack of competence.
Preferably, the file cached in second user bound device is encrypted file.
Preferably, first user's bound device can specify whether bound device ID when sharing file.
By adopting the above-described technical solution, the invention enables can only open the text shared by the equipment by participator
Part can't see file by other equipment, and after the equipment by binding checks file, it is also to add that cache file, which is copied away,
Ciphertext part, to improve the safety of sharing files.
Detailed description of the invention
Fig. 1 schematically shows flow chart of the invention.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims
Implement with the multitude of different ways of covering.
Term introduction:
(1) IMEI (International Mobile Equipment Identity): i.e. usually said mobile phone sequence
Number, mobile phone " string number ", for identifying the mobile communication equipments such as each independent mobile phone in mobile telephone network, be equivalent to shifting
The identity card of mobile phone.Sequence number shares 15 bit digitals, and preceding 6 (TAC) are Type Approval numbers, represents type of cell phone.Then 2
Position (FAC) is last assembly number, represents the place of production.6 (SNR) are strings number afterwards, represent production sequence number.Last 1 (SP) is general
It is 0, is check code, it is spare.International mobile equipment identification number is generally affixed in the fuselage back side and outer packing, while existing in hand
In machine memory, it can be inquired by inputting * #06#.
(2) ANDROID_ID: when Android device starts for the first time, system can generate one 64 numbers, and handle at random
This number is preserved in the form of 16 system character strings, and the character string of this 16 system is exactly ANDROID_ID, works as equipment
The value can be reset after being resumed default setting.
(3) IDFV (identifier For Vendor): 6.0 system of iOS increases newly for replacing
The interface of uniqueIdentifier.It is to give Vendor identity user, each equipment is answered the affiliated same Vender's
With inner, there is identical value.Vender therein refers to application provider, but exact point is said, is anti-by the DNS of BundleID
The preceding two parts turned are matched, if identical is exactly the same Vender, such as com.somecompany.appone,
For the two BundleID of com.somecompany.apptwo, just belong to the same Vender, shares the same idfv's
Value.Unlike idfa ((identifierForIdentifier)), the value of idfv is one surely to get, so very
It is adapted as the main id of internal user behavioural analysis, carrys out identity user, substitutes OpenUDID.If user will belong to this
All App of Vender are unloaded, then the value of idfv can be reset, i.e., reset the App of this Vender again, the value of idfv and before not
Together.
(4) APP (application): application program.
Usual cell phone apparatus has an IMEI that can identify Unique Device, but since IOS and android system are all corresponding
It obtains IMEI with program to be limited, at present it is not yet found that the method for effect can be got effectively on two platforms
IMEI.ANDROID_ID and IDFV is respectively adopted in Android and ios platform to identify Unique Device in the present invention.
There are problems that safety the sharing of above-mentioned existing file, the present invention is quasi- to provide a kind of safe sharing files
Method.For the participator of file, it is possible to specify share file to by the bound device of participator:
After user installs APP and successful log for the first time, unique device id and user name can be bound.
(1) when the first user will share file to second user, it is possible to specify whether the file shared away, which needs, is tied up
Locking equipment ID.
(2) when server-side receives sharing request, its corresponding device id can be searched according to the user name of target.
(3) using the device id got then file encryption is shared again.
(4) after the equipment of second user binding opens APP, it will be seen that the first user of user when the listed files of oneself
It is shared with the encrypted document of oneself.
Since the intelligent mobile phone platform of current mainstream includes two platforms of Android and IOS, setting in the present invention
Standby ID is respectively ANDROID_ID and IDFV on the two platforms.In addition, device id is generating when user's initialization logs in
Afterwards, it can choose and Make Alias for device id, while being stored in the database of rear end, such as: the millet mobile phone of Zhang San.When other use
When file is shared to Zhang San in family, the designated equipment for being shared with him can choose.
In this way, the present invention indicates bound device by the unique identifier of mobile phone, differentiated in order to facilitate sharing files person,
It supports when bound device, takes an alias for new equipment, each user can bind more than one equipment.
The system manager of server end possesses the audit to apparatus bound situation, binding, the permission of unbundlings.For having added
Close sharing, but the file that mobile phone terminal is not downloaded, if administrator obtains sharing files person and eliminates sharing, by participator
File after decryption cannot successfully be got.
When the recipient of file will download the file shared, need for its device id to be transmitted to server, server is tested
After demonstrate,proving successfully, downloading encryption version can be just provided for it.The decryption of document is only seen by current App ability real time decrypting
Version.
After file recipient downloads file, lack of competence is shared again by this APP, even if being searched by file system,
Encrypted shared document can only be navigated to, it is utterly useless being gone out by sharing.
Compared with the sharing files method on cell phone platform in the prior art, the invention has the characteristics that: (1) exist
Different mark ID has been respectively adopted to distinguish Unique Device in IOS and Android platform.The mode of holding equipment alias is shared
File person more easily discriminates.(2) and unlike traditional sharing files to user, the sharing in the present invention is shared to " use
Name in an account book+equipment ", the two must simultaneously meet, indispensable.(3) file shared safely based on device id, the only equipment are
There is key (device id) that file is decrypted, other any equipment are all not all right, therefore even if bulk-breaking is let out by other means
Draining to other equipment also can not correctly open.
By adopting the above-described technical solution, the invention enables can only open the text shared by the equipment by participator
Part can't see file by other equipment, and after the equipment by binding checks file, it is also to add that cache file, which is copied away,
Ciphertext part, to improve the safety of sharing files.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (9)
1. a kind of sharing files method characterized by comprising
First user's bound device proposes the request for sharing file to second user bound device to server;
Server obtains device id corresponding with second user bound device after receiving the request;
The server by utilizing device id encrypts the file, and encrypted sharing files are set to second user binding
It is standby;
Its device id is sent to server when downloading the file by second user bound device;
Server can just be bound after the device id for verifying the second user bound device transmission is legal for the second user
Equipment provides the encrypted file;
Second user bound device carries out real time decrypting to the file of downloading using the device id of its own.
2. sharing files method according to claim 1, which is characterized in that the device id is in Android platform
IDFV on ANDROID_ID or ios platform.
3. sharing files method according to claims 1 and 2, which is characterized in that first user's bound device and first is used
Family bound device can bind unique device id and its user name after installation APP for the first time and successful log.
4. sharing files method according to claim 3, which is characterized in that when bound device, user can be new equipment
Take an alias.
5. sharing files method according to claim 3, which is characterized in that administrator has permission the equipment to user's binding
The operation such as audited, added, being modified, being deleted.
6. sharing files method according to claim 5, which is characterized in that share for having encrypted, but second user
The file that bound device is not yet downloaded, if administrator obtains sharing files person and eliminates sharing, second user binding is set
The standby file that cannot be got after decryption.
7. sharing files method according to claim 1, which is characterized in that the quilt that second user bound device downloads it
Share file lack of competence to be shared again.
8. sharing files method according to claim 1, which is characterized in that is cached in second user bound device is described
File is encrypted file.
9. sharing files method according to claim 1, which is characterized in that first user's bound device is when sharing file
It can specify whether bound device ID.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811533801.9A CN109639682A (en) | 2018-12-14 | 2018-12-14 | Sharing files method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811533801.9A CN109639682A (en) | 2018-12-14 | 2018-12-14 | Sharing files method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109639682A true CN109639682A (en) | 2019-04-16 |
Family
ID=66074076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811533801.9A Pending CN109639682A (en) | 2018-12-14 | 2018-12-14 | Sharing files method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109639682A (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333076A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | File sharing system and method, and network information integration system and method |
CN103561021A (en) * | 2013-11-01 | 2014-02-05 | 全渝娟 | Method for realizing cloud storage system |
CN103902916A (en) * | 2012-12-25 | 2014-07-02 | 联想(北京)有限公司 | Processing method and electronic device |
CN104917787A (en) * | 2014-03-11 | 2015-09-16 | 中国电信股份有限公司 | File secure sharing method and system based on group key |
CN105376591A (en) * | 2015-12-17 | 2016-03-02 | Tcl集团股份有限公司 | Method and system for remotely controlling synchronous execution of shared file |
CN105653969A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, apparatus and electronic equipment |
US20170019380A1 (en) * | 2014-10-06 | 2017-01-19 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
CN107370767A (en) * | 2017-09-11 | 2017-11-21 | 安徽省未来博学信息技术有限公司 | A kind of internet share system |
US20180167373A1 (en) * | 2016-12-08 | 2018-06-14 | Yahoo! Inc. | Computerized system and method for automatically sharing device pairing credentials across multiple devices |
US20180191733A1 (en) * | 2017-01-03 | 2018-07-05 | International Business Machines Corporation | Verification of geolocation of devices in a cloud data center |
CN108259169A (en) * | 2018-01-09 | 2018-07-06 | 北京大学深圳研究生院 | A kind of file security sharing method and system based on block chain cloud storage |
CN108933758A (en) * | 2017-05-23 | 2018-12-04 | 中国电信股份有限公司 | Cloud storage encipher-decipher method, device and system can be shared |
-
2018
- 2018-12-14 CN CN201811533801.9A patent/CN109639682A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102333076A (en) * | 2011-07-21 | 2012-01-25 | 上海互联网软件有限公司 | File sharing system and method, and network information integration system and method |
CN103902916A (en) * | 2012-12-25 | 2014-07-02 | 联想(北京)有限公司 | Processing method and electronic device |
CN103561021A (en) * | 2013-11-01 | 2014-02-05 | 全渝娟 | Method for realizing cloud storage system |
CN104917787A (en) * | 2014-03-11 | 2015-09-16 | 中国电信股份有限公司 | File secure sharing method and system based on group key |
US20170019380A1 (en) * | 2014-10-06 | 2017-01-19 | Micron Technology, Inc. | Secure shared key sharing systems and methods |
CN105653969A (en) * | 2015-04-27 | 2016-06-08 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, apparatus and electronic equipment |
CN105376591A (en) * | 2015-12-17 | 2016-03-02 | Tcl集团股份有限公司 | Method and system for remotely controlling synchronous execution of shared file |
US20180167373A1 (en) * | 2016-12-08 | 2018-06-14 | Yahoo! Inc. | Computerized system and method for automatically sharing device pairing credentials across multiple devices |
US20180191733A1 (en) * | 2017-01-03 | 2018-07-05 | International Business Machines Corporation | Verification of geolocation of devices in a cloud data center |
CN108933758A (en) * | 2017-05-23 | 2018-12-04 | 中国电信股份有限公司 | Cloud storage encipher-decipher method, device and system can be shared |
CN107370767A (en) * | 2017-09-11 | 2017-11-21 | 安徽省未来博学信息技术有限公司 | A kind of internet share system |
CN108259169A (en) * | 2018-01-09 | 2018-07-06 | 北京大学深圳研究生院 | A kind of file security sharing method and system based on block chain cloud storage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4668619B2 (en) | Device key | |
CN104662870B (en) | Data safety management system | |
CN105027493A (en) | Secure mobile app connection bus | |
CN107493174B (en) | SSL certificate intelligent binding and management method based on CDN | |
KR20090031672A (en) | Authentication method for wireless transactions | |
CN101567893A (en) | Method and system for uploading files in WEB application | |
CN108270561B (en) | Data sending method and device and key index generating method and device | |
KR101648364B1 (en) | Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption | |
CN102024124B (en) | Method, and device for processing mobile widgets as well as client-side | |
CN105072134A (en) | Cloud disk system file secure transmission method based on three-level key | |
JP2007249507A (en) | Information leakage prevention method, information leakage prevention system and information terminal | |
CN103905557A (en) | Data storage method and device used for cloud environment and downloading method and device | |
CN108509799A (en) | A kind of template document acquisition methods, apparatus and system | |
CN108494724B (en) | Cloud storage encryption system based on multi-authority attribute encryption algorithm | |
CN109981677A (en) | A kind of credit management method and device | |
JP6784394B2 (en) | File division / combination system and its method | |
CN106503529A (en) | A kind of cloud storage system based on fingerprint | |
CN109639682A (en) | Sharing files method | |
CN110008654A (en) | Electronic document treating method and apparatus | |
JP5162396B2 (en) | Storage service system and file protection program | |
CN108270741A (en) | Mobile terminal authentication method and system | |
CN106485128A (en) | A kind of system based on removable storage device fingerprint | |
CN106570416A (en) | Fingerprint-based cloud storage method | |
CN106570417A (en) | Data security storage method | |
CN106506635A (en) | A kind of portable method for cloud storage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190416 |