CN109639682A - Sharing files method - Google Patents

Sharing files method Download PDF

Info

Publication number
CN109639682A
CN109639682A CN201811533801.9A CN201811533801A CN109639682A CN 109639682 A CN109639682 A CN 109639682A CN 201811533801 A CN201811533801 A CN 201811533801A CN 109639682 A CN109639682 A CN 109639682A
Authority
CN
China
Prior art keywords
file
user
bound device
sharing files
sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811533801.9A
Other languages
Chinese (zh)
Inventor
范炉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN THIN PUTER TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN THIN PUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN THIN PUTER TECHNOLOGY Co Ltd filed Critical SHENZHEN THIN PUTER TECHNOLOGY Co Ltd
Priority to CN201811533801.9A priority Critical patent/CN109639682A/en
Publication of CN109639682A publication Critical patent/CN109639682A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of sharing files methods, comprising: first user's bound device proposes the request for sharing file to second user bound device to server;Server after receiving the request, obtains device id corresponding with second user bound device;The server by utilizing device id encrypts file, and gives encrypted sharing files to second user bound device;Its device id is sent to server when downloading file by second user bound device;For server after the device id that verifying second user bound device is sent is legal, Cai Huiwei second user bound device provides encrypted file;Second user bound device carries out real time decrypting to the file of downloading using the device id of its own.The invention enables by participator the file shared can only be opened by the equipment, file can't see by other equipment, and after the equipment by binding checks file, it is also to encrypt file that cache file, which is copied away, to improve the safety of sharing files.

Description

Sharing files method
Technical field
The present invention relates to sharing files field, in particular to a kind of sharing files method.
Background technique
With the development of mobile internet, office worker can pass through handset processes and business at any time and any place Relevant anything.Many Dropbox both provide the function of sharing files, cooperation.For the data of Company Confidential, once point Enjoying away just becomes uncontrollable, and the thing that Shi Eryou file is divulged a secret occurs.
Summary of the invention
The present invention provides a kind of sharing files methods, to solve to become uncontrollable once sharing away in the prior art The problem of.
To solve the above problems, providing a kind of sharing files method, comprising: first as one aspect of the present invention User's bound device proposes the request for sharing file to second user bound device to server;Server is receiving the request Afterwards, device id corresponding with second user bound device is obtained;The server by utilizing device id encrypts the file, and Give encrypted sharing files to second user bound device;Second user bound device is when downloading the file by its equipment ID is sent to server;Server just can be described after the device id for verifying the second user bound device transmission is legal Second user bound device provides the encrypted file;Second user bound device is using the device id of its own to downloading The file carry out real time decrypting.
Preferably, the device id is the IDFV on the ANDROID_ID or ios platform in Android platform.
Preferably, first user's bound device and first user's bound device are after installation APP for the first time and successful log, meeting Unique device id and its user name are bound.
Preferably, when bound device, user can take an alias for new equipment.
Preferably, administrator has permission to audit to the equipment of user's binding, add, modify, delete etc. and operate.
Share preferably for having encrypted, but the file that second user bound device is not yet downloaded, if administrator obtains Taking sharing files, person eliminates sharing, then second user bound device cannot get the file after decryption.
Preferably, what second user bound device downloaded it is shared again by sharing file lack of competence.
Preferably, the file cached in second user bound device is encrypted file.
Preferably, first user's bound device can specify whether bound device ID when sharing file.
By adopting the above-described technical solution, the invention enables can only open the text shared by the equipment by participator Part can't see file by other equipment, and after the equipment by binding checks file, it is also to add that cache file, which is copied away, Ciphertext part, to improve the safety of sharing files.
Detailed description of the invention
Fig. 1 schematically shows flow chart of the invention.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims Implement with the multitude of different ways of covering.
Term introduction:
(1) IMEI (International Mobile Equipment Identity): i.e. usually said mobile phone sequence Number, mobile phone " string number ", for identifying the mobile communication equipments such as each independent mobile phone in mobile telephone network, be equivalent to shifting The identity card of mobile phone.Sequence number shares 15 bit digitals, and preceding 6 (TAC) are Type Approval numbers, represents type of cell phone.Then 2 Position (FAC) is last assembly number, represents the place of production.6 (SNR) are strings number afterwards, represent production sequence number.Last 1 (SP) is general It is 0, is check code, it is spare.International mobile equipment identification number is generally affixed in the fuselage back side and outer packing, while existing in hand In machine memory, it can be inquired by inputting * #06#.
(2) ANDROID_ID: when Android device starts for the first time, system can generate one 64 numbers, and handle at random This number is preserved in the form of 16 system character strings, and the character string of this 16 system is exactly ANDROID_ID, works as equipment The value can be reset after being resumed default setting.
(3) IDFV (identifier For Vendor): 6.0 system of iOS increases newly for replacing The interface of uniqueIdentifier.It is to give Vendor identity user, each equipment is answered the affiliated same Vender's With inner, there is identical value.Vender therein refers to application provider, but exact point is said, is anti-by the DNS of BundleID The preceding two parts turned are matched, if identical is exactly the same Vender, such as com.somecompany.appone, For the two BundleID of com.somecompany.apptwo, just belong to the same Vender, shares the same idfv's Value.Unlike idfa ((identifierForIdentifier)), the value of idfv is one surely to get, so very It is adapted as the main id of internal user behavioural analysis, carrys out identity user, substitutes OpenUDID.If user will belong to this All App of Vender are unloaded, then the value of idfv can be reset, i.e., reset the App of this Vender again, the value of idfv and before not Together.
(4) APP (application): application program.
Usual cell phone apparatus has an IMEI that can identify Unique Device, but since IOS and android system are all corresponding It obtains IMEI with program to be limited, at present it is not yet found that the method for effect can be got effectively on two platforms IMEI.ANDROID_ID and IDFV is respectively adopted in Android and ios platform to identify Unique Device in the present invention.
There are problems that safety the sharing of above-mentioned existing file, the present invention is quasi- to provide a kind of safe sharing files Method.For the participator of file, it is possible to specify share file to by the bound device of participator:
After user installs APP and successful log for the first time, unique device id and user name can be bound.
(1) when the first user will share file to second user, it is possible to specify whether the file shared away, which needs, is tied up Locking equipment ID.
(2) when server-side receives sharing request, its corresponding device id can be searched according to the user name of target.
(3) using the device id got then file encryption is shared again.
(4) after the equipment of second user binding opens APP, it will be seen that the first user of user when the listed files of oneself It is shared with the encrypted document of oneself.
Since the intelligent mobile phone platform of current mainstream includes two platforms of Android and IOS, setting in the present invention Standby ID is respectively ANDROID_ID and IDFV on the two platforms.In addition, device id is generating when user's initialization logs in Afterwards, it can choose and Make Alias for device id, while being stored in the database of rear end, such as: the millet mobile phone of Zhang San.When other use When file is shared to Zhang San in family, the designated equipment for being shared with him can choose.
In this way, the present invention indicates bound device by the unique identifier of mobile phone, differentiated in order to facilitate sharing files person, It supports when bound device, takes an alias for new equipment, each user can bind more than one equipment.
The system manager of server end possesses the audit to apparatus bound situation, binding, the permission of unbundlings.For having added Close sharing, but the file that mobile phone terminal is not downloaded, if administrator obtains sharing files person and eliminates sharing, by participator File after decryption cannot successfully be got.
When the recipient of file will download the file shared, need for its device id to be transmitted to server, server is tested After demonstrate,proving successfully, downloading encryption version can be just provided for it.The decryption of document is only seen by current App ability real time decrypting Version.
After file recipient downloads file, lack of competence is shared again by this APP, even if being searched by file system, Encrypted shared document can only be navigated to, it is utterly useless being gone out by sharing.
Compared with the sharing files method on cell phone platform in the prior art, the invention has the characteristics that: (1) exist Different mark ID has been respectively adopted to distinguish Unique Device in IOS and Android platform.The mode of holding equipment alias is shared File person more easily discriminates.(2) and unlike traditional sharing files to user, the sharing in the present invention is shared to " use Name in an account book+equipment ", the two must simultaneously meet, indispensable.(3) file shared safely based on device id, the only equipment are There is key (device id) that file is decrypted, other any equipment are all not all right, therefore even if bulk-breaking is let out by other means Draining to other equipment also can not correctly open.
By adopting the above-described technical solution, the invention enables can only open the text shared by the equipment by participator Part can't see file by other equipment, and after the equipment by binding checks file, it is also to add that cache file, which is copied away, Ciphertext part, to improve the safety of sharing files.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of sharing files method characterized by comprising
First user's bound device proposes the request for sharing file to second user bound device to server;
Server obtains device id corresponding with second user bound device after receiving the request;
The server by utilizing device id encrypts the file, and encrypted sharing files are set to second user binding It is standby;
Its device id is sent to server when downloading the file by second user bound device;
Server can just be bound after the device id for verifying the second user bound device transmission is legal for the second user Equipment provides the encrypted file;
Second user bound device carries out real time decrypting to the file of downloading using the device id of its own.
2. sharing files method according to claim 1, which is characterized in that the device id is in Android platform IDFV on ANDROID_ID or ios platform.
3. sharing files method according to claims 1 and 2, which is characterized in that first user's bound device and first is used Family bound device can bind unique device id and its user name after installation APP for the first time and successful log.
4. sharing files method according to claim 3, which is characterized in that when bound device, user can be new equipment Take an alias.
5. sharing files method according to claim 3, which is characterized in that administrator has permission the equipment to user's binding The operation such as audited, added, being modified, being deleted.
6. sharing files method according to claim 5, which is characterized in that share for having encrypted, but second user The file that bound device is not yet downloaded, if administrator obtains sharing files person and eliminates sharing, second user binding is set The standby file that cannot be got after decryption.
7. sharing files method according to claim 1, which is characterized in that the quilt that second user bound device downloads it Share file lack of competence to be shared again.
8. sharing files method according to claim 1, which is characterized in that is cached in second user bound device is described File is encrypted file.
9. sharing files method according to claim 1, which is characterized in that first user's bound device is when sharing file It can specify whether bound device ID.
CN201811533801.9A 2018-12-14 2018-12-14 Sharing files method Pending CN109639682A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811533801.9A CN109639682A (en) 2018-12-14 2018-12-14 Sharing files method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811533801.9A CN109639682A (en) 2018-12-14 2018-12-14 Sharing files method

Publications (1)

Publication Number Publication Date
CN109639682A true CN109639682A (en) 2019-04-16

Family

ID=66074076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811533801.9A Pending CN109639682A (en) 2018-12-14 2018-12-14 Sharing files method

Country Status (1)

Country Link
CN (1) CN109639682A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333076A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 File sharing system and method, and network information integration system and method
CN103561021A (en) * 2013-11-01 2014-02-05 全渝娟 Method for realizing cloud storage system
CN103902916A (en) * 2012-12-25 2014-07-02 联想(北京)有限公司 Processing method and electronic device
CN104917787A (en) * 2014-03-11 2015-09-16 中国电信股份有限公司 File secure sharing method and system based on group key
CN105376591A (en) * 2015-12-17 2016-03-02 Tcl集团股份有限公司 Method and system for remotely controlling synchronous execution of shared file
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
US20170019380A1 (en) * 2014-10-06 2017-01-19 Micron Technology, Inc. Secure shared key sharing systems and methods
CN107370767A (en) * 2017-09-11 2017-11-21 安徽省未来博学信息技术有限公司 A kind of internet share system
US20180167373A1 (en) * 2016-12-08 2018-06-14 Yahoo! Inc. Computerized system and method for automatically sharing device pairing credentials across multiple devices
US20180191733A1 (en) * 2017-01-03 2018-07-05 International Business Machines Corporation Verification of geolocation of devices in a cloud data center
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage
CN108933758A (en) * 2017-05-23 2018-12-04 中国电信股份有限公司 Cloud storage encipher-decipher method, device and system can be shared

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102333076A (en) * 2011-07-21 2012-01-25 上海互联网软件有限公司 File sharing system and method, and network information integration system and method
CN103902916A (en) * 2012-12-25 2014-07-02 联想(北京)有限公司 Processing method and electronic device
CN103561021A (en) * 2013-11-01 2014-02-05 全渝娟 Method for realizing cloud storage system
CN104917787A (en) * 2014-03-11 2015-09-16 中国电信股份有限公司 File secure sharing method and system based on group key
US20170019380A1 (en) * 2014-10-06 2017-01-19 Micron Technology, Inc. Secure shared key sharing systems and methods
CN105653969A (en) * 2015-04-27 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Data processing method, apparatus and electronic equipment
CN105376591A (en) * 2015-12-17 2016-03-02 Tcl集团股份有限公司 Method and system for remotely controlling synchronous execution of shared file
US20180167373A1 (en) * 2016-12-08 2018-06-14 Yahoo! Inc. Computerized system and method for automatically sharing device pairing credentials across multiple devices
US20180191733A1 (en) * 2017-01-03 2018-07-05 International Business Machines Corporation Verification of geolocation of devices in a cloud data center
CN108933758A (en) * 2017-05-23 2018-12-04 中国电信股份有限公司 Cloud storage encipher-decipher method, device and system can be shared
CN107370767A (en) * 2017-09-11 2017-11-21 安徽省未来博学信息技术有限公司 A kind of internet share system
CN108259169A (en) * 2018-01-09 2018-07-06 北京大学深圳研究生院 A kind of file security sharing method and system based on block chain cloud storage

Similar Documents

Publication Publication Date Title
JP4668619B2 (en) Device key
CN104662870B (en) Data safety management system
CN105027493A (en) Secure mobile app connection bus
CN107493174B (en) SSL certificate intelligent binding and management method based on CDN
KR20090031672A (en) Authentication method for wireless transactions
CN101567893A (en) Method and system for uploading files in WEB application
CN108270561B (en) Data sending method and device and key index generating method and device
KR101648364B1 (en) Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption
CN102024124B (en) Method, and device for processing mobile widgets as well as client-side
CN105072134A (en) Cloud disk system file secure transmission method based on three-level key
JP2007249507A (en) Information leakage prevention method, information leakage prevention system and information terminal
CN103905557A (en) Data storage method and device used for cloud environment and downloading method and device
CN108509799A (en) A kind of template document acquisition methods, apparatus and system
CN108494724B (en) Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN109981677A (en) A kind of credit management method and device
JP6784394B2 (en) File division / combination system and its method
CN106503529A (en) A kind of cloud storage system based on fingerprint
CN109639682A (en) Sharing files method
CN110008654A (en) Electronic document treating method and apparatus
JP5162396B2 (en) Storage service system and file protection program
CN108270741A (en) Mobile terminal authentication method and system
CN106485128A (en) A kind of system based on removable storage device fingerprint
CN106570416A (en) Fingerprint-based cloud storage method
CN106570417A (en) Data security storage method
CN106506635A (en) A kind of portable method for cloud storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190416