WO2014146607A1 - 信息处理方法、检索方法、装置、用户终端及服务 - Google Patents

信息处理方法、检索方法、装置、用户终端及服务 Download PDF

Info

Publication number
WO2014146607A1
WO2014146607A1 PCT/CN2014/073872 CN2014073872W WO2014146607A1 WO 2014146607 A1 WO2014146607 A1 WO 2014146607A1 CN 2014073872 W CN2014073872 W CN 2014073872W WO 2014146607 A1 WO2014146607 A1 WO 2014146607A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user terminal
file
private information
encrypted
Prior art date
Application number
PCT/CN2014/073872
Other languages
English (en)
French (fr)
Inventor
黄洁静
汪婵
吴黄伟
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to EP14768769.3A priority Critical patent/EP2940959B1/en
Publication of WO2014146607A1 publication Critical patent/WO2014146607A1/zh
Priority to US14/833,747 priority patent/US20150363609A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the present invention relates to the field of network communication technologies, and in particular, to an information processing method, a retrieval method, a device, a user terminal, and a server.
  • Cloud Computing is a technology that provides dynamic and scalable virtualized resources through the Internet. It can easily access the network through cloud computing, and can store massive amounts of data by configuring a large number of storage devices. management.
  • Cloud computing usually requires a large amount of user participation. Users can upload their files to the cloud server for storage. At this time, the user's files may be open to the public, and third-party users can retrieve the required files from the cloud server. Therefore, in order to protect the privacy and security of the user's files, the user usually encrypts the file before uploading the file to the cloud server, and uploads the encrypted file to the cloud server. At this time, since the file is already encrypted, the third party Users cannot obtain the information they need from the cloud server by searching, making it difficult to fully utilize the performance of the cloud server, resulting in inconvenient information sharing on the Internet and the flexibility of sharing files between users.
  • an information processing method, a retrieval method, a device, a user terminal, and a server are provided to solve the inconvenience of information sharing in the Internet caused by the inability to retrieve the encrypted file on the cloud server in the prior art. And the problem of low flexibility in sharing files between users.
  • an information processing method includes: [07] generating private information according to summary information of a file and Non-private information;
  • the method further includes:
  • the encrypting the file by using the shared key delivered by the trusted server to obtain the encrypted file is: Encrypting the file by using the first shared key that is delivered to obtain the encrypted file;
  • the method further includes: encrypting the private information by using a second shared key delivered by the trust server to obtain encrypted private information;
  • the second aspect provides an information processing method, where the method includes: [18] obtaining an encrypted file and non-private information uploaded by a user terminal, where the encrypted file is a shared by the user terminal through a trust server.
  • the encrypted file obtained by encrypting the file by the key, the non-private information being the non-private information generated by the user terminal according to the summary information of the file;
  • the encrypted file is specifically that the user terminal encrypts the file by using the first shared key delivered by the trusted server.
  • the obtained encrypted file is specifically that the user terminal encrypts the file by using the first shared key delivered by the trusted server.
  • the method further includes: [23] obtaining encrypted private information uploaded by the user terminal, where the encrypted private information is used by the user terminal to perform private information by using a second shared key delivered by the trusted server.
  • the encrypted private information obtained after encryption, The private information is the private information generated by the user terminal according to the summary information of the file.
  • an information processing method includes:
  • the shared key is sent to the user terminal, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, uploads the encrypted file to the cloud server, and generates according to the summary information of the file.
  • Non-private information ;
  • the method further includes: [29] receiving, by the user terminal, the private information generated according to the summary information of the file; [30] Saving the correspondence between the private information and the address information.
  • the user sends a shared key to the user terminal, so that the user terminal encrypts the file according to the shared key.
  • the encrypted file is specifically: sending a first shared key to the user terminal, so that the user terminal encrypts the file according to the first shared key to obtain an encrypted file;
  • the method further includes: sending a second shared key to the user terminal, so that the user terminal encrypts the private information generated according to the digest information of the file according to the second shared key, to obtain Encrypting the private information and uploading the encrypted private information to the cloud server.
  • the fourth aspect provides an information retrieval method, where the method includes: [34] a first user terminal receives, by using a second user terminal, address information for saving an encrypted file of the second user terminal, where The address information is the address information of the encrypted file sent by the second user terminal after the cloud server obtains the encrypted file and the non-private information uploaded by the second user terminal, where the encrypted file is An encrypted file obtained by encrypting a file by the second user terminal according to a shared key sent by the trust server, where the non-private information is generated by the second user terminal according to the summary information of the file; [35] A user terminal obtains non-private information, private information, and a shared key corresponding to the address information from the cloud server and the trust server, where the private information is based on the file by the second user terminal. Summary information generation; [36] the first user terminal obtains address information of the file to be accessed by retrieving the private information and the non-private information;
  • the first user terminal acquires, from the cloud server, a first encrypted file corresponding to address information of the file to be accessed; [38] the first user terminal decrypts the first by using the shared key An encrypted file obtains the file to be accessed.
  • the first user terminal acquires the private information corresponding to the address information from the cloud server and the trust server , non-private information and shared keys include:
  • the first user terminal sends the address information for saving the encrypted file of the second user terminal to the trust server;
  • the first user terminal receives the private information and the shared key corresponding to the address information returned by the trust server;
  • the first user terminal sends the address information of the encrypted file for saving the second user terminal to the cloud server; [43] the first user terminal receives the return of the cloud server The non-private information corresponding to the address information.
  • the first user terminal acquires the private information corresponding to the address information from the cloud server and the trust server , non-private information and shared keys include:
  • the first user terminal sends the address information for saving the encrypted file of the second user terminal to the trust server;
  • the first user terminal receives the first shared key and the second shared key corresponding to the address information returned by the trust server;
  • the first user terminal sends the address information for saving the encrypted file of the second user terminal to the cloud server; [48] the first user terminal receives the return of the cloud server The non-private information and the encrypted private information corresponding to the address information;
  • the first user terminal decrypts the encrypted private information by using the second shared key to obtain privacy Information
  • the first user terminal decrypts the first encrypted file by using the shared key to obtain the to-be-accessed file, specifically: the first user terminal decrypts the first by using the first shared key
  • the encrypted file obtains the file to be accessed.
  • the first user terminal obtains the address information of the file to be accessed by retrieving the private information and the non-private information, including:
  • the first user terminal respectively matches the private information and the non-private information corresponding to each address information with the search condition; [53] the first user terminal obtains the privacy according to the search condition according to the matching result.
  • Information and non-private information
  • the first user terminal determines the privacy information corresponding to the retrieval condition and the address information corresponding to the non-private information as the address information of the file to be accessed.
  • the acquiring, by the first user terminal, the first encrypted file corresponding to the address information of the file to be accessed from the cloud server includes:
  • the first user terminal sends the address information of the file to be accessed to the cloud server;
  • the first user terminal receives the first encrypted file corresponding to the address information of the file to be accessed after the cloud server searches for the corresponding relationship between the saved address information and the encrypted file.
  • an information processing apparatus includes:
  • a generating unit configured to generate private information and non-private information according to the summary information of the file
  • an encryption unit configured to encrypt the file by using a shared key delivered by the trust server to obtain an encrypted file
  • an uploading unit configured to upload an encrypted file and the non-private information to the cloud server
  • a receiving unit configured to receive, by the cloud server, address information that saves the encrypted file
  • a transmission unit configured to transmit address information of the encrypted file to a trust server, so that the trust server saves the address information.
  • the transmission unit is further configured to transmit the privacy information to the trust server, so that the trust server saves a correspondence between the privacy information and the address information.
  • the encryption unit is configured to encrypt the file by using a first shared key delivered by the trust server to obtain an encrypted file.
  • the encryption unit is further configured to encrypt the private information by using a second shared key delivered by the trust server to obtain encrypted private information.
  • the uploading unit is further configured to upload the encrypted private information to the cloud server.
  • an information processing apparatus includes:
  • the obtaining unit is configured to obtain the encrypted file and the non-private information uploaded by the user terminal, where the encrypted file is the encrypted file obtained by encrypting the file by using the shared key delivered by the user terminal.
  • the non-private information is the non-private information generated by the user terminal according to the summary information of the file;
  • a saving unit configured to save a correspondence between the encrypted file and the non-private information
  • a sending unit configured to send the address information of the encrypted file to the user terminal, so that after the user terminal transmits the address information of the encrypted file to the trusted server, The trust server saves the address information.
  • the encrypted file obtained by the obtaining unit is specifically the encrypted file obtained by encrypting a file by using a first shared key delivered by a user terminal by a trusted server;
  • the obtaining unit is further configured to obtain the encrypted private information uploaded by the user terminal, where the encrypted private information is used by the user terminal to encrypt the private information by using the second shared key delivered by the trusted server.
  • the encrypted private information obtained after the user is the private information generated by the user terminal according to the summary information of the file.
  • a sending unit configured to send a shared key to the user terminal, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, and then uploads the encrypted file to the cloud server according to the a non-private information generated by the summary information of the file;
  • a receiving unit configured to receive address information of the encrypted file sent by the user terminal, where the address information is returned by the cloud server to the user terminal Saving address information of the encrypted file;
  • the receiving unit is further configured to receive the privacy information generated by the user terminal according to the summary information of the file;
  • the saving unit is further configured to save a correspondence between the private information and the address information.
  • the sending unit is configured to send a first shared key to the user terminal, so that the user terminal is configured according to the The first shared key encrypts the file, and after obtaining the encrypted file, uploading the encrypted file to the cloud server and non-private information generated according to the summary information of the file;
  • the sending unit is further configured to send a second shared key to the user terminal, so that the user terminal performs, according to the second shared key, private information generated according to the digest information of the file. Encrypting, obtaining encrypted private information, and uploading the encrypted private information to the cloud server.
  • the eighth aspect provides an information retrieving apparatus, where the apparatus includes: [87] a receiving unit, configured to receive, by using a second user terminal, address information for saving an encrypted file of the second user terminal,
  • the address information is an address information that is sent to the second user terminal and saved by the cloud server, after the cloud server obtains the encrypted file and the non-private information uploaded by the second user terminal, where the encrypted file is The encrypted file obtained by encrypting the file by the second user terminal according to the shared key sent by the trust server, where the non-private information is generated by the second user terminal according to the summary information of the file;
  • the acquiring unit is further configured to acquire, from the cloud server, a first encrypted file corresponding to the address information of the file to be accessed;
  • a decryption unit configured to decrypt the first encrypted file by using the shared key to obtain the to-be-accessed file.
  • the acquiring unit includes:
  • a first address sending subunit configured to send, to the trust server, the address information used to save the encrypted file of the second user terminal
  • a first information receiving subunit configured to receive the privacy information and the shared key corresponding to the address information returned by the trust server;
  • the first address sending subunit is further configured to send, to the cloud server, the address information used to save the encrypted file of the second user terminal;
  • the first information receiving subunit is further configured to receive non-private information corresponding to the address information returned by the cloud server.
  • the acquiring unit includes:
  • a second address sending subunit configured to send, to the trust server, the address information used to save the encrypted file of the second user terminal
  • a second information receiving subunit configured to receive a first shared key and a second shared key corresponding to the address information returned by the trust server;
  • the second address sending subunit is further configured to send, to the cloud server, the address information used to save the encrypted file of the second user terminal;
  • the second information receiving subunit is further configured to receive non-private information and encrypted private information corresponding to the address information returned by the cloud server;
  • a second information decryption subunit configured to decrypt the encrypted private information by using the second shared key to obtain private information
  • the decrypting unit is specifically configured to obtain the to-be obtained by decrypting the first encrypted file by using the first shared key Access the file.
  • the searching The unit includes:
  • an information matching subunit configured to match the private information and the non-private information corresponding to each address information with the search condition respectively;
  • a result obtaining subunit configured to obtain, according to the matching result, private information and non-private information that meet the search condition
  • An address determining subunit configured to determine, as the address information of the file to be accessed, the address information corresponding to the private information and the non-private information that meet the retrieval condition.
  • a third address sending subunit configured to send address information of the file to be accessed to the cloud server
  • the third file receiving subunit is configured to receive the first encrypted file corresponding to the address information of the file to be accessed after the cloud server searches for the corresponding relationship between the saved address information and the encrypted file.
  • a ninth aspect a user terminal is provided, where the user terminal includes: a bus, and a network interface, a processor, and a memory connected through the bus, where
  • the network interface configured to form a network connection with the trust server and the cloud server;
  • the processor is configured to generate the private information and the non-private information according to the summary information of the file, and encrypt the file by using a shared key sent by the trusted server to obtain an encrypted file, and use the network interface to the cloud server. Uploading the encrypted file and the non-private information, and receiving the address information of the encrypted file returned by the cloud server, and transmitting the address information of the encrypted file to the trusted server through the network interface, so that the trusted server Saving the address information;
  • the memory is configured to save address information of the encrypted file.
  • the processor is further configured to transmit the private information to the trust server by using the network interface, so that the trust server saves a correspondence between the private information and the address information.
  • the processor is further configured to: encrypt the file by using a first shared key that is sent by the trust server to obtain the encrypted file, and send a second shared key by using the trusted server. Encrypting the private information to obtain encrypted private information, and uploading the encrypted private information to the cloud server through the network interface.
  • a cloud server includes: a bus, and a network interface, a processor, and a memory connected through the bus, where
  • the network interface configured to form a network connection with the user terminal
  • the processor is configured to obtain, by using the network interface, an encrypted file and a non-private information uploaded by the user terminal, where the encrypted file is used by the user terminal to encrypt the file by using a shared key delivered by the trusted server.
  • Obtaining the encrypted file, the non-private information is the non-private information generated by the user terminal according to the summary information of the file;
  • the memory is configured to save a correspondence between the encrypted file and the non-private information
  • the processor is further configured to send, by using the network interface, the address information of the encrypted file to the user terminal, so that the user terminal transmits the address information of the encrypted file to the After the server is trusted, the address information is saved by the trust server.
  • the encrypted file uploaded by the user terminal obtained by the processor through the network interface is specifically the encrypted file obtained by encrypting the file by using the first shared key delivered by the user terminal through the trust server;
  • the processor is further configured to obtain, by using the network interface, encrypted private information that is uploaded by the user terminal, where the encrypted private information is a second shared key pair that is sent by the user terminal by using a trusted server.
  • the encrypted private information obtained by encrypting the private information, wherein the private information is the private information generated by the user terminal according to the summary information of the file.
  • a trust server includes: a bus, and a network interface, a processor, and a memory connected through the bus, wherein [128] the network interface is used to The user terminal forms a network connection;
  • the processor is configured to send a shared key to the user terminal by using the network interface, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, and then uploads the file to the cloud server.
  • the memory is configured to save the address information.
  • the eleventh aspect in a first possible implementation of the eleventh aspect,
  • the processor is further configured to receive, by using the network interface, private information generated by the user terminal according to the summary information of the file;
  • the memory is further configured to save a correspondence between the private information and the address information.
  • the processor is configured to send the first shared key to the user terminal by using the network interface. So that the user terminal encrypts the file according to the first shared key to obtain an encrypted file, and then uploads the encrypted file to the cloud server and non-private information generated according to the summary information of the file;
  • the processor is further configured to send a second shared key to the user terminal by using the network interface, so that the user terminal generates, according to the second shared key pair, the summary information according to the file.
  • the privacy information is encrypted, encrypted privacy information is obtained, and the encrypted private information is uploaded to the cloud server.
  • the twelfth aspect provides a user terminal, where the user terminal is a first user terminal, including: a bus, and a network interface and a processor connected through the bus, where
  • the network interface is configured to form a network connection with the second user terminal, the cloud server, and the trust server;
  • the processor is configured to receive, by the second user terminal, address information for saving an encrypted file of the second user terminal, where the address information is that the cloud server obtains the second user terminal to upload After the encrypted file and the non-private information, the address information of the encrypted file is sent to the second user terminal, where the encrypted file is a shared key pair file sent by the second user terminal according to the trusted server.
  • the non-private information is generated by the second user terminal according to the summary information of the file, and obtained by using the network interface from the cloud server and the trust server
  • the non-private information, the private information, and the shared key corresponding to the address information, wherein the private information is generated by the second user terminal according to the summary information of the file, and the obtained private information and the non-private information are obtained to be accessed.
  • the address information of the file is obtained from the cloud server by using the network interface, and corresponding to the address information of the file to be accessed.
  • An encrypted file obtain the file to be accessed by the shared key to decrypt the first encrypted file.
  • the processor is specifically configured to send, by using the network interface, the address information used to save the encrypted file of the second user terminal to the trust server, and receive the information returned by the trust server. Transmitting the privacy information and the shared key corresponding to the address information, and sending, by using the network interface, the address information for saving the encrypted file of the second user terminal to the cloud server, and receiving the returned by the cloud server Non-private information corresponding to the address information.
  • the processor is specifically configured to send, by using the network interface, the address information used to save the encrypted file of the second user terminal to the trust server, and receive the information returned by the trust server. Transmitting, by the first shared key and the second shared key corresponding to the address information, the address information for saving the encrypted file of the second user terminal to the cloud server, and receiving the returned by the cloud server Non-private information corresponding to the address information and encrypted private information, and decrypting the encrypted private information by the second shared key to obtain private information, and decrypting the first encryption by using the first shared key
  • the file obtains the file to be accessed.
  • the processor is specifically configured to match the private information and the non-private information corresponding to each address information with the search condition respectively, and obtain, according to the matching result, the private information and the non-private information that meet the search condition, and The address information corresponding to the private information and the non-private information that meets the search condition is determined as the address information of the file to be accessed.
  • the processor is specifically configured to send the address information of the to-be-accessed file to the cloud server by using the network interface, and after receiving the correspondence between the saved address information and the encrypted file by the cloud server, Sending a first encrypted file corresponding to the address information of the file to be accessed.
  • the user terminal when the information processing is performed, the user terminal generates the private information and the non-private information according to the summary information of the file, and encrypts the file by using the shared key sent by the trust server to obtain the encrypted file.
  • the cloud server uploads the encrypted file and the non-private information, receives the address information of the encrypted file returned by the cloud server, and transmits the address information of the encrypted file to the trusted server, and the address information of the encrypted file is saved by the trusted server.
  • the first user terminal receives the address information of the encrypted file sent by the second user terminal for saving the second user terminal, and obtains the private information corresponding to the address information from the cloud server and the trust server.
  • the private information and the shared key are obtained by retrieving the private information and the non-private information to obtain the address information of the file to be accessed, obtaining the first encrypted file corresponding to the address information of the file to be accessed from the cloud server, and decrypting the first through the shared key
  • the encrypted file gets the file to be accessed.
  • the trusted third-party user terminal can obtain the required information from the cloud server by searching, the performance of the cloud server can be fully utilized, the convenience of information sharing in the Internet, and the flexibility of sharing files between users using the cloud server can be improved.
  • FIG. 1A is a flow chart of an embodiment of an information processing method according to the present invention.
  • FIG. 1B is a flow chart of another embodiment of an information processing method according to the present invention.
  • FIG. 1C is a flow chart of another embodiment of an information processing method according to the present invention.
  • FIG. 2 is a flow chart of an embodiment of an information retrieval method according to the present invention.
  • FIG. 3 is a flow chart of another embodiment of the information processing method of the present invention.
  • FIG. 5 is a flow chart of another embodiment of the information processing method of the present invention.
  • FIG. 6 is a flow chart of another embodiment of the information retrieval method of the present invention.
  • FIG. 7 is a block diagram of an embodiment of an information processing apparatus of the present invention.
  • FIG. 8 is a block diagram of another embodiment of the information processing apparatus of the present invention.
  • FIG. 9 is a block diagram of another embodiment of the information processing apparatus of the present invention.
  • Figure 10 is a block diagram of an embodiment of an information retrieval device of the present invention.
  • Figure 11 is a block diagram of an embodiment of a user terminal of the present invention.
  • FIG. 12 is a block diagram of an embodiment of a cloud server according to the present invention.
  • Figure 13 is a block diagram of an embodiment of a trust server of the present invention
  • Figure 14 is a block diagram of another embodiment of a user terminal of the present invention. Concrete real
  • FIG. 1A is a flowchart of an embodiment of an information processing method according to the present invention.
  • the embodiment describes a process of information processing from a user terminal side: [169]
  • Step 101 The user terminal generates private information according to the summary information of the file. And non-private information.
  • the file in the embodiment of the present invention refers to a user file to be uploaded to a cloud server for saving.
  • the file type may be a multimedia file or a structured file, where the multimedia file may include a photo, a picture, a video, etc., structured.
  • Files can include WORD documents, Extensible Markup Language (XML) files, and more.
  • the file is composed of the file content and the summary information
  • the summary information refers to the attribute description of the file, such as: a simple attribute description performed by the user, describing and summarizing the file in a concise text form;
  • the summary information may include one or more of a photo person, a photo theme, a scene of a photo, a shooting time, a shooting location, a camera parameter, and a pixel size.
  • the summary information may be divided into two parts: private information and non-private information.
  • the private information refers to some personal sensitive information with confidentiality characteristics.
  • the private information may include photo characters, shooting locations, etc.; non-private information Generally, it does not have a security feature, and thus can be disclosed to the public.
  • the non-private information may include shooting time, pixel size, camera parameters, and the like.
  • the summary information may be extracted from the file by using the crawling technology, the automatic summarization technology, the face recognition technology, and the like in the prior art, and details are not described herein again.
  • the amount of the information contained in the summary information can be adjusted according to the actual needs.
  • the embodiment of the present invention does not limit the privacy information and the non-private information in the summary information to ensure the security of the user information. Sex.
  • Step 102 The user terminal encrypts the file by using the shared key delivered by the trust server to obtain an encrypted file.
  • the trust server may be specifically a server of a trust center, and the trust center is deployed between the cloud server and the user terminal, and may perform cloud information and user terminals for information interaction through the trust server in advance. Issue certificates to achieve identity authentication between them, ie the trust center can have a certificate authority (Cert ificate Authority, CA) Center; and, the trust center can also issue a key for the user terminal, that is, the trust center can also have a Key Distribution Center (KDC).
  • CA Certificate authority
  • KDC Key Distribution Center
  • Step 103 The user terminal uploads the encrypted file and the non-private information to the cloud server.
  • Step 104 The user terminal receives the address information of the saved encrypted file returned by the cloud server.
  • the cloud server needs to save the encrypted file, and send the address information of the encrypted file to the user terminal, so that the user terminal can access and save according to the address information.
  • a file on a cloud server usually the address information may refer to a Uniform Universal Resource Locator (13 ⁇ 41).
  • Step 105 The user terminal transmits the address information of the encrypted file to the trust server, so that the trust server saves the address information of the encrypted file.
  • the user terminal may transmit the address information of the encrypted file to the trusted server, and may also transmit the private information generated according to the summary information of the file, so that the trusted server saves Correspondence between privacy information and address information.
  • the user terminal may encrypt the file by using the first shared key delivered by the trust server to obtain an encrypted file; and the user terminal may send the The second shared key encrypts the private information to obtain encrypted private information, and uploads the encrypted private information while uploading the encrypted file and the non-private information to the cloud server.
  • Step 110 The cloud server obtains an encrypted file uploaded by the user terminal. And non-private information.
  • the encrypted file is an encrypted file obtained by encrypting a file by the user terminal through a shared key issued by the trust server, and the non-private information is non-private information generated by the user terminal according to the summary information of the file.
  • Step 111 The cloud server saves the correspondence between the encrypted file and the non-private information.
  • Step 112 The cloud server sends the address information of the encrypted file to the user terminal, so that the user terminal transmits the address information of the encrypted file to the trusted server, and the address information is saved by the trusted server.
  • the encrypted file may be an encrypted file obtained by encrypting the file by using the first shared key delivered by the user terminal, and the cloud server may obtain the uploaded by the user terminal.
  • the encrypted private information may be encrypted private information obtained by encrypting the private information by using the second shared key sent by the user terminal by the trusted server.
  • the privacy information is private information generated by the user terminal according to the summary information of the file.
  • the first shared key and the second shared key may be the same or different, which is not limited by the embodiment of the present invention.
  • FIG. 1B is an embodiment corresponding to the information processing embodiment on the user terminal side shown in FIG. 1A, and thus the specific process and related information processing.
  • FIG. 1A For the description, reference may be made to the foregoing embodiment shown in FIG. 1A, and details are not described herein again.
  • Step 120 The trust server sends a shared secret to the user terminal. a key, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, and then uploads the encrypted file and the non-private information generated according to the summary information of the file to the cloud server.
  • the trust server may send the first shared key and the second shared key to the user terminal, where the first shared key is used to enable the user terminal to The file is encrypted to obtain the encrypted file, and the second shared key is used to enable the terminal to encrypt the private information generated according to the summary information of the file to obtain encrypted private information uploaded to the cloud service.
  • Step 121 The trust server receives the address information of the encrypted file sent by the user terminal, where the address information is address information of the encrypted file returned by the cloud server to the user terminal.
  • Step 122 The trust server saves the address information.
  • the trust server may further receive the private information generated by the user terminal according to the summary information of the file, and save the correspondence between the private information and the address information.
  • the embodiment of the information processing on the cloud server side shown in FIG. 1C is an embodiment corresponding to the information processing embodiment on the user terminal side and the cloud server side shown in FIG. 1A and FIG. 1B, and therefore For the specific process and related description of the information processing, refer to the foregoing embodiment shown in FIG. 1A and FIG. 1B, and details are not described herein again.
  • [195] It can be seen from the embodiment shown in FIG. 1A to FIG. 1C that, since the encrypted file and the non-private information are saved by the cloud server, and the address information of the encrypted file is saved by the trust server, any third-party user terminal cannot directly access the cloud.
  • the private information is obtained on the server, but only the trusted third-party user terminal can obtain the address information of the encrypted file from the trusted server, and access the private information according to the address information, so that the trusted third-party user terminal can Retrieving private information and non-private information, ensuring the security of user files
  • the trusted third-party user terminal can be made to access the encrypted file.
  • Step 201 The first user terminal receives the address information sent by the second user terminal for saving the encrypted file of the second user terminal, where the address information is obtained by the cloud server to obtain the encrypted file and non-privacy uploaded by the second user terminal. After the information is sent to the second user terminal, the address information of the encrypted file is saved, and the encrypted file is an encrypted file obtained by encrypting the file by the user terminal according to the shared key issued by the trusted server, and the non-private information is the second user.
  • the terminal is generated based on the summary information of the file.
  • the second user terminal is a user terminal that performs information processing according to the foregoing embodiment shown in FIG. 1A and uploads an encrypted file to the cloud server, where the user of the second user terminal authorizes the user of the first user terminal.
  • the file uploaded to the cloud server by the second terminal may be retrieved, so that the second user terminal may send the address information for saving the encrypted file of the second user terminal user to the first user terminal.
  • the encrypted file corresponding to each file has corresponding address information on the cloud server, so the second user terminal sends the information to the first user terminal in this embodiment.
  • the address information may be a plurality of address information corresponding to a plurality of encrypted files.
  • Step 202 The first user terminal acquires the privacy information, the non-private information, and the shared key corresponding to the address information from the cloud server and the trust server, where the privacy information is generated by the second user terminal according to the summary information of the file.
  • the first user terminal since the first user terminal is an authorized user terminal of the second user terminal, the first user terminal may first access the encrypted file stored on the cloud server before the second user terminal saves the encrypted file on the cloud server.
  • the specific authentication mode may be based on the user certificate-based authentication, or the single-factor based network authentication, or the two-factor based network authentication, or the multi-factor based network authentication, which is not limited in this embodiment of the present invention.
  • the authentication process may be initiated by the first user terminal, or may be initiated by the trust server, which is not limited in this embodiment of the present invention.
  • the first user terminal may send the encryption for saving the second user terminal to the trust server.
  • the first user terminal may send the address information of the encrypted file for saving the second user terminal to the trust server, and receive the first shared key and the second shared key corresponding to the address information returned by the trusted server, And the first user terminal sends the address information for saving the encrypted file of the second user terminal to the cloud server, and receives the non-private information and the encrypted private information corresponding to the address information returned by the cloud server, and encrypts the second shared key pair.
  • the privacy information is decrypted to obtain private information.
  • Step 203 The first user terminal obtains address information of the file to be accessed by retrieving the private information and the non-private information.
  • the first user terminal may match the private information and the non-private information corresponding to each address information with the search condition respectively, and obtain, according to the matching result, the private information and the non-private information that meet the search condition, and The address information corresponding to the private information and the non-private information that meets the search condition is determined as the address information of the file to be accessed.
  • the first user terminal may first match the first search condition with the non-private information, and the cloud server returns a first search result, where the first search result includes the first search condition.
  • the cloud server returns a first search result, where the first search result includes the first search condition.
  • Non-private information and corresponding privacy information match the corresponding private information with the second search condition, and returning a second search result, the second search result including the private information that meets the second search condition and the corresponding Non-private information.
  • Step 204 The first user terminal acquires, from the cloud server, a first encrypted file corresponding to the address information of the file to be accessed.
  • the first user terminal may send the address information of the file to be accessed to the cloud server, and the cloud server searches for the corresponding relationship between the saved address information and the encrypted file, and obtains the first corresponding to the address information of the file to be accessed. Encrypting the file, and transmitting the first encrypted file to the first user terminal.
  • Step 205 The first user terminal decrypts the first encrypted file by using the shared key to obtain a file to be accessed.
  • step 202 when the trust server returns the first shared key and the second shared key corresponding to the address information, the first user terminal may decrypt the first encrypted file by using the first shared key to obtain a to-be-accessed file.
  • N is a natural number
  • N encrypted files wherein the to-be-accessed file is at least one of the foregoing N files that satisfies a search condition, and the at least one file is encrypted
  • the file is the first encrypted file.
  • the trust server since the trust server is introduced in the process of performing information retrieval, the encrypted file uploaded by the user terminal to the cloud server can be retrieved by the trusted third-party user terminal. While ensuring the security of user files, since trusted third-party user terminals can obtain the required information from the cloud server by searching, the performance of the cloud server can be fully utilized, the convenience of information sharing in the Internet, and the use of the cloud server can be improved. The flexibility to share files between users.
  • Step 301 The user terminal of User A sends a key request message to the trust server.
  • Step 302 The trust server returns a shared key to the user terminal according to the key request message.
  • the trust server can be used to deliver the shared key for different user terminals. Therefore, after the shared key is sent for each user terminal, the correspondence between the user ID and the shared key can be saved.
  • Step 303 The user terminal extracts summary information of the file from the file to be uploaded, and divides the summary information into private information and non-private information.
  • Step 304 The user terminal encrypts the uploaded file by using the shared key to obtain an encrypted file.
  • Step 305 The user terminal uploads the non-private information of the encrypted file and the file to the cloud server.
  • Step 306 The cloud server saves the correspondence between the received encrypted file, the non-private information, and the user identifier.
  • Step 307 The cloud server returns the URL of the saved encrypted file to the user terminal of user A.
  • Step 308 The user terminal transmits the URL and private information of the saved encrypted file to the trust server.
  • Step 309 The trust server saves the correspondence between the received URL, the private information, and the user identifier A.
  • FIG. 4 is a flowchart of another embodiment of an information retrieval method according to the present invention. The embodiment is based on the information obtained by the information processing embodiment shown in FIG. 3, and respectively implements unauthorized user information retrieval and authorized user information retrieval. process: [227] The following steps 401 to 403 describe the information retrieval process of an unauthorized user:
  • Step 401 The unauthorized user B sends an information retrieval request to the cloud server through the user terminal.
  • the information retrieval request may include a retrieval condition for matching with the information.
  • Step 402 The cloud server searches for the saved non-private information of each user according to the information retrieval request.
  • Step 403 The cloud server returns non-private information conforming to the information retrieval request to the user terminal of user B.
  • a certain retrieval service can be provided while ensuring the security and privacy of the user file.
  • Step 404 The user terminal of User A sends an authorization permission message to the trust server, and the authorization permission message permits the user C to access the encrypted file stored by the user A on the cloud server.
  • Step 405 The user terminal of User A sends the URL of the encrypted file to the user terminal of User C.
  • Step 406 The user terminal of user C completes identity authentication through the certificate of user C and the trust server.
  • a single-factor based network authentication or a two-factor based network authentication, or a multi-factor based network authentication may be used, which is not limited in this embodiment of the present invention. .
  • Step 407 The user terminal of the user C sends a URL for saving the encrypted file to the trust server.
  • the user terminal of the user A in the foregoing step 405 may not send the URL of the encrypted file to the user terminal of the user C, but complete the identity between the user terminal of the user C and the trusted server.
  • the trust server actively sends the URL of the encrypted file of the user terminal of the user A to the user terminal of the user C.
  • the user terminal of user C may obtain authorization of multiple users. Therefore, when the user terminal of user C has a retrieval requirement for the file of the user terminal of user A, the encrypted file of the user terminal of the saved user A may be sent to the trust server. URL.
  • Step 408 The trust server searches for the saved correspondence according to the received URL, and obtains the private information and the shared key corresponding to the URL.
  • Step 409 The trust server returns the privacy information and the shared key corresponding to the URL to the user terminal of the user C.
  • Step 410 The user terminal of the user C sends a URL for saving the encrypted file to the cloud server.
  • Step 41 1 The cloud server searches for the saved correspondence according to the received URL, and obtains non-private information corresponding to the URL.
  • Step 412 The cloud server returns non-private information corresponding to the URL to the user terminal of the user C.
  • Step 413 The user terminal of the user C searches for the private information and the non-private information, and obtains the URL corresponding to the private information and the non-private information of the search condition.
  • the URL is used to store the address information of the encrypted file of the user A. Since each URL corresponds to one encrypted file, correspondingly, each URL can simultaneously correspond to the private information of the saved encrypted file, and non-privacy. Information and shared secrets. Therefore, the user terminal of the user C can store the correspondence between the privacy information, the shared key, and the non-private information of each encrypted file with each URL as a key. [247] Searching with the summary information composed of the private information and the non-private information corresponding to the same URL at the time of retrieval, and obtaining the summary information meeting the search condition, obtaining the URL corresponding to the summary information through the saved correspondence.
  • the user terminal of the user C may first match the first search condition by using the non-private information in the summary information, and return, by the cloud server, the first search result, where the first search result includes The non-private information conforming to the first search condition and the summary information composed of the corresponding private information; and then matching the private information in the summary information in the first search result with the second search condition, and returning the second search result,
  • the second search result includes summary information composed of the private information and the non-private information that meet the second search condition.
  • the privacy information may be matched first, and then the non-private information may be matched, and the non-private information and the private information may be matched at the same time, which is not limited in this embodiment.
  • Step 414 The user terminal of the user C sends the obtained URL to the cloud server.
  • Step 415 The cloud server searches for the correspondence according to the received URL, and obtains an encrypted file corresponding to the URL.
  • Step 416 The cloud server returns the found encrypted file to the user terminal of user C.
  • Step 417 The user terminal of the user C decrypts the encrypted file according to the shared key of the encrypted file.
  • the user terminal of the user C obtains the shared key corresponding to the URL that satisfies the search condition according to the correspondence stored in step 413, and decrypts the received encrypted file by the shared key.
  • FIG. 5 it is a flowchart of another embodiment of the information processing method of the present invention:
  • Step 501 User A's user terminal sends a key request message to the trust server.
  • Step 502 The trust server returns the shared key 1 and the shared key 2 to the user terminal according to the key request message.
  • the trust server can be used to deliver the shared key for different user terminals. Therefore, after the shared key is sent for each user terminal, the user identifier and the first shared key and the second shared key can be saved. Correspondence relationship.
  • Step 503 The user terminal of User A extracts summary information of the file from the file to be uploaded, and divides the summary information into private information and non-private information.
  • Step 504 The user terminal of the user A encrypts the file to be uploaded by using the shared key 1 to obtain an encrypted file, and encrypts the private information to obtain the encrypted private information.
  • the file is composed of the file content and the summary information. Therefore, the user terminal of the user A can encrypt the file through the shared key 1, and can also encrypt the file content through the shared key 1.
  • Step 505 User A's user terminal uploads the encrypted file, encrypted private information, and non-private information to the cloud server.
  • Step 506 The cloud server saves the correspondence between the received encrypted file, the encrypted private information, the non-private information and the user identification A.
  • Step 507 The cloud server returns the URL of the saved encrypted file to the user terminal of user A.
  • Step 508 The user terminal transmits the URL of the encrypted file to the trust server.
  • Step 509 The trust server saves the correspondence between the received URL and the user identifier A.
  • FIG. 6 is a flowchart of another embodiment of an information retrieval method according to the present invention. The embodiment is based on the information obtained by the information processing embodiment shown in FIG. 5, and implements authorized user information retrieval and unauthorized user information retrieval, respectively. Process:
  • Step 601 Unauthorized User B sends an information retrieval request to the cloud server through the user terminal.
  • Step 602 The cloud server searches for the saved non-private information of each user according to the information retrieval request.
  • Step 603 The cloud server returns non-private information conforming to the information retrieval request to the user terminal of user B.
  • Step 604 User A's user terminal sends an authorization permission message to the trust server, which authorizes the user C to access the encrypted file stored by the user A on the cloud server.
  • Step 605 The user terminal of User A sends the URL of the encrypted file to the user terminal of User C.
  • Step 606 The user terminal of user C completes identity authentication through the certificate of user C and the trust server.
  • the embodiment of the present invention does not limit the network authentication based on the single factor, or the network authentication based on the two factors, or the network authentication based on the multi-factor. .
  • Step 607 The user terminal of the user C sends a URL for saving the encrypted file to the trust server.
  • the user terminal of the user A in the foregoing step 605 may not send the URL of the encrypted file to the user terminal of the user C, but complete the identity between the user terminal of the user C and the trust server.
  • the trust server actively sends the URL of the encrypted file of the user terminal of the user A to the user terminal of the user C.
  • the user terminal of user C may obtain authorization of multiple users. Therefore, when the user terminal of user C has a retrieval requirement for the file of the user terminal of user A, the encrypted file of the user terminal of the saved user A may be sent to the trust server.
  • Step 608 The trust server searches for the saved correspondence according to the received URL, and obtains the shared key 1 and the shared key 2 corresponding to the URL.
  • Step 609 The trust server feeds back the shared key 1 and the shared key 2 corresponding to the URL to the user terminal of the user C.
  • Step 610 The user terminal of the user C sends a URL for saving the encrypted file to the cloud server.
  • Step 61 The cloud server searches for the saved correspondence according to the received URL, and obtains non-private information and encrypted private information corresponding to the URL.
  • Step 612 The cloud server returns non-private information and encrypted private information corresponding to the URL to the user terminal of the user C.
  • Step 613 The user terminal of the user C decrypts the encrypted private information by using the shared key 2 to obtain privacy information.
  • the URL is used to store the address information of the encrypted file of the user A. Since each URL corresponds to one encrypted file, correspondingly, each URL can simultaneously correspond to the encrypted private information of the saved encrypted file, Privacy information and shared secrets. Therefore, the user terminal of the user C can store the correspondence between the encrypted private information of each encrypted file, the shared key 1, the shared key 2, and the non-private information with each URL as a key. Correspondingly, when the encrypted private information is decrypted, the encrypted private information is decrypted by the shared key 2 corresponding to the encrypted private information. [288] Step 614: The user terminal of the user C searches for the private information and the non-private information, and obtains a URL corresponding to the private information and the non-private information of the search condition.
  • the summary information composed of the private information and the non-private information corresponding to the same URL is searched, and after the summary information meeting the search condition is obtained, the summary information is obtained through the saved correspondence relationship.
  • the corresponding URL is searched, and after the summary information meeting the search condition is obtained, the summary information is obtained through the saved correspondence relationship.
  • the user terminal of the user C may first match the first search condition by using the non-private information in the summary information, and the cloud server returns a first search result, where the first search result includes The non-private information conforming to the first search condition and the summary information composed of the corresponding private information; and then matching the private information in the summary information in the first search result with the second search condition, and returning the second search result,
  • the second search result includes summary information composed of the private information and the non-private information that meet the second search condition.
  • the privacy information may be matched first, and then the non-private information may be matched, and the non-private information and the private information may be matched at the same time, which is not limited in this embodiment.
  • Step 615 The user terminal of the user C sends the obtained URL to the cloud server.
  • Step 616 The cloud server searches for the correspondence according to the received URL, and obtains an encrypted file corresponding to the URL.
  • Step 617 The cloud server returns the found encrypted file to the user terminal of user C.
  • Step 618 The user terminal of user C decrypts the encrypted file according to the shared key 1 of the encrypted file.
  • the present invention also provides an embodiment of a user terminal, a cloud server, and a trust server.
  • FIG. 7 is a block diagram of an embodiment of an information processing apparatus according to the present invention
  • the information processing apparatus can be disposed in a user terminal:
  • the information processing apparatus includes: a generating unit 710, an encrypting unit 720, an uploading unit 730, a receiving unit 740, and a transmitting unit 750.
  • the generating unit 710 is configured to generate private information and non-private information according to the summary information of the file.
  • the encryption unit 720 is configured to encrypt the file by using a shared key delivered by the trust server to obtain an encrypted file.
  • uploading unit 730 configured to upload an encrypted file and the non-private information to the cloud server
  • the receiving unit 740 is configured to receive address information that is saved by the cloud server and save the encrypted file.
  • a transmitting unit 750 configured to transmit address information of the encrypted file to a trusted server, so that the trust The server saves the address information.
  • the transmitting unit 750 is further configured to transmit the privacy information to the trust server, so that the trust server saves a correspondence between the privacy information and the address information.
  • the encryption unit 720 is specifically configured to encrypt the file by using a first shared key delivered by the trust server to obtain an encrypted file.
  • the encryption unit 720 is further configured to encrypt the private information by using a second shared key delivered by the trust server to obtain encrypted private information.
  • the uploading unit 730 is further configured to The cloud server uploads the encrypted private information.
  • FIG. 8 is a block diagram of another embodiment of an information processing apparatus according to the present invention, the information processing apparatus can be configured.
  • the cloud server In the cloud server:
  • the information processing apparatus includes: an obtaining unit 810, a saving unit 820, and a sending unit 830.
  • the obtaining unit 810 is configured to obtain an encrypted file and a non-private information uploaded by the user terminal, where the encrypted file is an encrypted file obtained by encrypting the file by using the shared key delivered by the user terminal by the trusted terminal.
  • the non-private information is non-private information generated by the user terminal according to the summary information of the file;
  • the saving unit 820 is configured to save a correspondence between the encrypted file and the non-private information
  • the sending unit 830 is configured to send the address information of the encrypted file to the user terminal, so that the user terminal transmits the address information of the encrypted file to the trusted server, The trust server saves the address information.
  • the trust server saves the address information.
  • the encrypted file obtained by the obtaining unit 810 is specifically an encrypted file obtained by encrypting a file by the user terminal through a first shared key delivered by the trust server;
  • the obtaining unit 810 is further configured to obtain the encrypted private information that is uploaded by the user terminal, where the encrypted private information is used by the user terminal to encrypt the private information by using the second shared key delivered by the trusted server.
  • the obtained encrypted private information is the private information generated by the user terminal according to the summary information of the file.
  • FIG. 9 is a block diagram of another embodiment of an information processing apparatus according to the present invention
  • the information processing apparatus can be disposed in a trust server:
  • the information processing apparatus includes: a sending unit 910, a receiving unit 920, and a saving unit 930.
  • the sending unit 910 is configured to send a shared key to the user terminal, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, and then uploads the encrypted file to the cloud server. And non-private information generated based on the summary information of the file;
  • receiving unit 920 configured to receive address information of the encrypted file sent by the user terminal, where the address information is address information that is saved by the cloud server to the user terminal to save the encrypted file;
  • the saving unit 930 is configured to save the address information. [323] In a specific implementation:
  • the receiving unit 920 is further configured to receive the summary information according to the file that is transmitted by the user terminal. Generated private information;
  • the saving unit 930 is further configured to save a correspondence between the private information and the address information. [326] In another specific implementation:
  • the sending unit 910 may be specifically configured to send the first shared key to the user terminal, so that the user terminal encrypts the file according to the first shared key, and obtains the encrypted file.
  • the cloud server uploads the encrypted file and non-private information generated according to the summary information of the file;
  • the sending unit 910 may be further configured to send a second shared key to the user terminal, so that the user terminal generates the privacy according to the summary information of the file according to the second shared key.
  • the information is encrypted, encrypted privacy information is obtained, and the encrypted private information is uploaded to the cloud server.
  • FIG. 10 is a block diagram of an embodiment of an information retrieval apparatus according to the present invention.
  • the information retrieval apparatus may be disposed on a first user terminal side;
  • the information retrieval device includes: a receiving unit 1010, an obtaining unit 1020, a retrieving unit 1030, and a decrypting unit 1040.
  • the receiving unit 1010 is configured to receive, by the second user terminal, address information for saving an encrypted file of the second user terminal, where the address information is that the cloud server obtains the second user terminal. After the encrypted file and the non-private information are uploaded, the address information of the encrypted file is sent to the second user terminal, where the encrypted file is a shared key pair sent by the second user terminal according to the trusted server. The encrypted file obtained by the file is encrypted, and the non-private information is generated by the second user terminal according to the summary information of the file;
  • the obtaining unit 1020 is configured to obtain non-private information, private information, and a shared key corresponding to the address information from the cloud server and the trust server, where the private information is the second user.
  • the terminal generates according to the summary information of the file;
  • the retrieving unit 1030 is configured to obtain address information of the file to be accessed by retrieving the private information and the non-private information;
  • the obtaining unit 1020 is further configured to acquire, from the cloud server, a first encrypted file corresponding to the address information of the file to be accessed;
  • the decryption unit 1040 is configured to obtain the to-be-accessed file by decrypting the first encrypted file by using the shared key. [336] In the first specific implementation:
  • the acquisition unit 1020 can include (not shown in Figure 10):
  • a first address sending subunit configured to send, to the trust server, the address information used to save the encrypted file of the second user terminal
  • a first information receiving subunit configured to receive the privacy information and the shared key corresponding to the address information returned by the trust server;
  • the first address sending subunit is further configured to send, to the cloud server, the address information used to save the encrypted file of the second user terminal;
  • the first information receiving subunit is further configured to receive non-private information corresponding to the address information returned by the cloud server.
  • the acquisition unit 1020 may include (not shown in FIG. 10):
  • a second address sending subunit configured to send, to the trust server, the address information used to save the encrypted file of the second user terminal
  • a second information receiving subunit configured to receive a first shared key and a second shared key corresponding to the address information returned by the trust server;
  • the second address sending subunit is further configured to send, to the cloud server, the address information used to save the encrypted file of the second user terminal;
  • the second information receiving subunit is further configured to receive non-private information and encrypted private information corresponding to the address information returned by the cloud server;
  • a second information decryption subunit configured to decrypt the encrypted private information by using the second shared key to obtain private information
  • the decryption unit 1040 may be specifically configured to obtain the to-be-accessed file by decrypting the first encrypted file by using the first shared key.
  • the obtaining unit 1020 may include (not shown in FIG. 10): [352] a third address sending subunit, configured to send address information of the file to be accessed to the cloud server;
  • the third file receiving subunit is configured to receive the first encrypted file corresponding to the address information of the file to be accessed after the cloud server searches for the corresponding relationship between the saved address information and the encrypted file.
  • the retrieval unit 1030 can include (not shown in Figure 10):
  • an information matching subunit configured to match the private information and the non-private information corresponding to each address information with the retrieval conditions respectively;
  • a result obtaining subunit configured to obtain, according to the matching result, private information and non-private information that meet the search condition;
  • an address determining subunit configured to: use the private information and non-privacy that meet the search condition The address information corresponding to the information is determined as the address information of the file to be accessed.
  • the user terminal is a terminal having an information processing function:
  • the terminal includes a bus 1 110, and a network interface 1120, a processor 1130, and a memory 1 140 connected by the bus 1 110.
  • the network interface 1120 is configured to form a network connection with the trust server and the cloud server.
  • the processor 1130 is configured to generate the private information and the non-private information according to the summary information of the file, and encrypt the file by using a shared key sent by the trusted server to obtain an encrypted file, and use the network interface 1120 to
  • the cloud server uploads the encrypted file and the non-private information, and receives the address information of the encrypted file returned by the cloud server, and transmits the address information of the encrypted file to the trusted server through the network interface 1120, so as to The trust server saves the address information of the encrypted file;
  • the memory 1140 is configured to save address information of the encrypted file.
  • the processor 1130 may further transmit the private information to the trust server by using the network interface 1120, so that the trust server saves the private information and the The correspondence between the address information.
  • the processor 1130 is further configured to: encrypt the file by using a first shared key delivered by a trusted server to obtain an encrypted file, and send the encrypted file by using a trusted server. Second share The key encrypts the private information to obtain encrypted private information, and uploads the encrypted private information by uploading the encrypted file and the non-private information to the cloud server through the network interface 1120.
  • FIG. 12 it is a block diagram of an embodiment of a cloud server according to the present invention:
  • the cloud server includes: a bus 1210, and a network interface 1220, a processor 1230, and a memory 1240 connected by the bus 1210.
  • the network interface 1220 is configured to form a network connection with the user terminal
  • the processor 1230 is configured to obtain, by using the network interface 1220, an encrypted file and a non-private information uploaded by the user terminal, where the encrypted file is used by the user terminal to share the file by using a shared key delivered by the user terminal.
  • the encrypted file obtained after the encryption, the non-private information is non-private information generated by the user terminal according to the summary information of the file;
  • the memory 1240 is configured to save a correspondence between the encrypted file and the non-private information
  • the processor 1230 is further configured to send, by using the network interface 1220, the address information of the encrypted file to the user terminal, so that the user terminal transmits the address information of the encrypted file to After the trust server, the address information is saved by the trust server.
  • the encrypted file uploaded by the user terminal obtained by the processor 1230 through the network interface is specifically an encrypted file obtained by encrypting a file by using the first shared key delivered by the user terminal through the trust server;
  • the processor 1230 is further configured to obtain, by using the network interface, the encrypted file and the non-private information uploaded by the user terminal, and obtain the encrypted private information uploaded by the user terminal, where the encrypted private information is The encrypted private information obtained by the user terminal encrypting the private information by using the second shared key delivered by the trusted server, where the private information is the private information generated by the user terminal according to the summary information of the file.
  • FIG. 13 a block diagram of an embodiment of a trust server of the present invention:
  • the trust server includes: a bus 1310, and a network interface 1320, a processor 1330, and a memory 1340 connected by the bus 1310.
  • the network interface 1320 is configured to form a network connection with the user terminal
  • the processor 1330 is configured to send a shared key to the user terminal by using the network interface 1320, so that the user terminal encrypts the file according to the shared key to obtain an encrypted file, and then sends the encrypted file to the cloud server.
  • the memory 1340 is configured to save the address information. [380] In a specific implementation:
  • the processor 1330 is further configured to receive, by using the network interface 1320, the private information generated by the user terminal according to the summary information of the file;
  • the memory 1340 is further configured to save a correspondence between the private information and the address information.
  • the processor 1330 may be specifically configured to send a first shared key to the user terminal by using the network interface 1320, so that the user terminal is configured according to the The first shared key encrypts the file, and after obtaining the encrypted file, uploading the encrypted file to the cloud server and non-private information generated according to the summary information of the file;
  • the processor 1330 is further configured to send, by using the network interface 1320, a second shared key to the user terminal, so that the user terminal according to the second shared key pair according to the file
  • the private information generated by the summary information is encrypted to obtain encrypted private information, and the encrypted private information is uploaded to the cloud server.
  • FIG. 14 a block diagram of another embodiment of a user terminal according to the present invention
  • the user terminal can serve as a first user terminal, and when the user terminal shown in FIG. 11 is a second user terminal, the first user terminal
  • the third user terminal authorized as the second user terminal can retrieve the information of the second user terminal:
  • the user terminal includes: a bus 1410, and a network interface 1420 and a processor 1430 connected by the bus 1410.
  • the network interface 1420 is configured to form a network connection with the second user terminal, the cloud server, and the trust server.
  • the processor 1430 is configured to receive, by the second user terminal, address information for saving an encrypted file of the second user terminal, where the address information is that the cloud server obtains the second user terminal. After the encrypted file and the non-private information are uploaded, the address information of the encrypted file is sent to the second user terminal, where the encrypted file is a shared key pair sent by the second user terminal according to the trusted server. The encrypted file obtained by the file is encrypted, and the non-private information is generated by the second user terminal according to the summary information of the file, and is obtained by using the network interface 1420 from the cloud server and the trust server.
  • Non-private information, private information, and a total of the address information corresponding to the address information The private information is generated by the second user terminal according to the summary information of the file, and the address information of the file to be accessed is obtained by retrieving the private information and the non-private information, by using the network interface 1420 Obtaining, by the cloud server, a first encrypted file corresponding to the address information of the to-be-accessed file, and decrypting the first encrypted file by using the shared key to obtain the to-be-accessed file.
  • the processor 1430 may be specifically configured to send, by using the network interface 1420, the encrypted file for saving the second user terminal to the trust server.
  • the processor 1430 may be specifically configured to send, by using the network interface 1420, the encrypted file for saving the second user terminal to the trust server.
  • the processor 1430 may be specifically configured to match the private information and the non-private information corresponding to each address information with the search conditions respectively, and obtain the compliance according to the matching result.
  • the private information and the non-private information of the search condition are determined, and the address information corresponding to the private information and the non-private information that meet the search condition is determined as the address information of the file to be accessed.
  • the processor 1430 may be specifically configured to send, by using the network interface 1420, address information of the file to be accessed to the cloud server, and receive the cloud server. After searching the correspondence between the saved address information and the encrypted file, the first encrypted file corresponding to the address information of the file to be accessed is sent. [394] It can be seen from the foregoing embodiment that, when performing information processing, the user terminal generates the private information and the non-private information according to the summary information of the file, and encrypts the file by using the shared key sent by the trust server to obtain the encrypted file.
  • the cloud server uploads the encrypted file and the non-private information, receives the address information of the encrypted file returned by the cloud server, and transmits the address information of the encrypted file to the trusted server, and the address information of the encrypted file is saved by the trusted server. Because the encrypted file and the non-private information are saved by the cloud server, and the address information of the encrypted file is saved by the trust server, any third-party user terminal cannot obtain the private information directly from the cloud server, but only the trusted third-party user terminal. In order to obtain the address information of the encrypted file from the trust server, And accessing the private information according to the address information, so that the trusted third-party user terminal can retrieve the private information and the non-private information, and the trusted third-party user terminal can be ensured while ensuring the security of the user file.
  • the first user terminal receives the address information of the encrypted file sent by the second user terminal for saving the second user terminal, and obtains the private information corresponding to the address information from the cloud server and the trust server.
  • the private information and the shared key are obtained by retrieving the private information and the non-private information to obtain the address information of the file to be accessed, obtaining the first encrypted file corresponding to the address information of the file to be accessed from the cloud server, and decrypting the first through the shared key
  • the encrypted file gets the file to be accessed.
  • the encrypted file uploaded by the user terminal to the cloud server can be retrieved by the trusted third-party user terminal, while ensuring the security of the user file. Since the trusted third-party user terminal can obtain the required information from the cloud server by searching, the performance of the cloud server can be fully utilized, the convenience of information sharing in the Internet, and the flexibility of sharing files between users using the cloud server can be improved.
  • the techniques in the embodiments of the present invention can be implemented by means of software plus a necessary general hardware platform.
  • the technical solution in the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product, and the computer software product may be stored in a storage medium, such as a ROM/RAM. , a diskette, an optical disk, etc., comprising instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention or in certain portions of the embodiments.
  • a computer device which may be a personal computer, server, or network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了信息处理方法、检索方法、装置、用户终端及服务器,该检索方法包括:第一用户终端接收第二用户终端发送的用于保存第二用户终端用户的加密文件的地址信息;从云服务器上和信任服务器上获取与所述地址信息对应的隐私信息、非隐私信息及共享密钥;通过检索隐私信息和非隐私信息获得待访问文件的地址信息;从云服务器获取与待访问文件的地址信息对应的第一加密文件;通过共享密钥解密第一加密文件获得待访问文件。本发明中由于在进行信息检索过程中引入了信任服务器,从而使得用户终端上传到云服务器的加密文件能够被受信任的第三方用户终端进行检索,在保证了用户文件安全性的同时,可以充分利用云服务器的性能。

Description

信息处理方法、 检索方法、 装置、 用户终端及服务 本申请要求于 2013年 3月 21日提交中国专利局、 申请号为 201310091474.7中 国专利申请的优先权, 其全部内容通过引用结合在本申请中。 技术领域
[01] 本发明涉及网络通信技术领域, 特别涉及信息处理方法、 检索方法、 装置、 用户终 端及服务器。
背景技术
[02] 云计算 (Cloud Comput ing ) 是一种通过互联网提供动态易扩展的虚拟化资源的技 术, 通过云计算可以便捷地访问网络, 并且通过配置大量的存储设备, 可以实现海量数 据的存储和管理。
[03] 云计算通常要求用户大量的参与, 用户可以将自身文件上传到云服务器上进行保 存, 此时用户的文件可能对外开放, 第三方用户可以从云服务器上检索需要的文件。 因 此为了保护用户的文件的隐私性和安全性, 用户在将文件上传到云服务器之前, 通常会 对文件进行加密, 并向云服务器上传加密后的文件, 此时由于文件已经加密, 因此第三 方用户无法通过检索从云服务器获得需要的信息, 从而难以充分利用云服务器的性能, 导致互联网中信息共享的不便以及用户间共享文件的灵活性不高。
发明内容
[04] 本发明实施例中提供了信息处理方法、 检索方法、 装置、 用户终端及服务器, 以解 决现有技术中无法对云服务器上的加密文件进行检索, 而导致的互联网中信息共享的不 便以及用户间共享文件的灵活性不高的问题。
[05] 为了解决上述技术问题, 本发明实施例公开了如下技术方案: [06] 第一方面, 提供一种信息处理方法, 所述方法包括: [07] 根据文件的摘要信息生成隐私信息和非隐私信息;
[08] 通过信任服务器下发的共享密钥对所述文件进行加密得到加密文件; [09] 向云服务器上传加密文件和所述非隐私信息;
[10] 接收云服务器返回的保存所述加密文件的地址信息;
[11] 将所述加密文件的地址信息传输给信任服务器, 以使所述信任服务器保存所述地址 信息。 [12] 结合第一方面, 在第一方面的第一种可能的实现方式中, 所述方法还包括:
[13] 将所述隐私信息传输给所述信任服务器, 以使所述信任服务器保存所述隐私信息与 所述地址信息的对应关系。
[14] 结合第一方面, 在第一方面的第二种可能的实现方式中, 所述通过信任服务器下发 的共享密钥对所述文件进行加密得到加密文件具体为: 通过所述信任服务器下发的第一 共享密钥对所述文件进行加密得到所述加密文件;
[15] 所述方法还包括: 通过所述信任服务器下发的第二共享密钥对所述隐私信息进行加 密得到加密隐私信息;
[16] 向所述云服务器上传所述加密隐私信息。
[17] 第二方面, 提供一种信息处理方法, 所述方法包括: [18] 获得用户终端上传的加密文件和非隐私信息, 所述加密文件为所述用户终端通过信 任服务器下发的共享密钥对文件进行加密后得到的所述加密文件, 所述非隐私信息为所 述用户终端根据所述文件的摘要信息生成的所述非隐私信息;
[19] 保存所述加密文件与所述非隐私信息的对应关系;
[20] 向所述用户终端下发保存所述加密文件的地址信息, 以使所述用户终端将所述加密 文件的地址信息传输给所述信任服务器后, 由所述信任服务器保存所述地址信息。
[21] 结合第二方面, 在第二方面的第一种可能的实现方式中, 所述加密文件具体为所述 用户终端通过所述信任服务器下发的第一共享密钥对文件进行加密后得到的所述加密文 件;
[22] 所述方法还包括: [23] 获得所述用户终端上传的加密隐私信息, 所述加密隐私信息为所述用户终端通过所 述信任服务器下发的第二共享密钥对隐私信息进行加密后得到的所述加密隐私信息, 所 述隐私信息为用户终端根据所述文件的摘要信息生成的所述隐私信息。
[24] 第三方面, 提供一种信息处理方法, 所述方法包括:
[25] 向用户终端下发共享密钥, 以使所述用户终端根据所述共享密钥对文件进行加密得 到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘要信息生成的非隐 私信息;
[26] 接收所述用户终端发送的所述加密文件的地址信息, 所述地址信息为所述云服务器 向所述用户终端返回的保存所述加密文件的地址信息;
[27] 保存所述地址信息。
[28] 结合第三方面, 在第三方面的第一种可能的实现方式中, 所述方法还包括: [29] 接收所述用户终端传输的根据所述文件的摘要信息生成的隐私信息; [30] 保存所述隐私信息与所述地址信息的对应关系。
[31] 结合第三方面, 在第三方面的第二种可能的实现方式中, 所述向用户终端下发共享 密钥, 以使所述用户终端根据所述共享密钥对文件进行加密得到加密文件具体为: 向用 户终端下发第一共享密钥, 以使所述用户终端根据所述第一共享密钥对文件进行加密, 得到加密文件;
[32] 所述方法还包括: 向用户终端下发第二共享密钥, 以使所述用户终端根据所述第二 共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密, 得到加密隐私信息, 并向所 述云服务器上传所述加密隐私信息。
[33] 第四方面, 提供一种信息检索方法, 所述方法包括: [34] 第一用户终端接收第二用户终端发送的用于保存所述第二用户终端的加密文件的 地址信息, 所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非隐 私信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为 所述第二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件, 所 述非隐私信息为所述第二用户终端根据所述文件的摘要信息生成; [35] 所述第一用户终端从所述云服务器上和所述信任服务器上获取与所述地址信息对应的 非隐私信息、 隐私信息及共享密钥, 所述隐私信息为所述第二用户终端根据所述文件的摘要 信息生成; [36] 所述第一用户终端通过检索所述隐私信息和所述非隐私信息获得待访问文件的地 址信息;
[37] 所述第一用户终端从所述云服务器获取与所述待访问文件的地址信息对应的第一 加密文件; [38] 所述第一用户终端通过所述共享密钥解密所述第一加密文件获得所述待访问文件。
[39] 结合第四方面, 在第四方面的第一种可能的实现方式中, 所述第一用户终端从所述 云服务器上和所述信任服务器上获取与所述地址信息对应的隐私信息、 非隐私信息及共 享密钥包括:
[40] 所述第一用户终端向所述信任服务器发送所述用于保存所述第二用户终端的加密 文件的地址信息;
[41] 所述第一用户终端接收所述信任服务器返回的与所述地址信息对应的隐私信息和 共享密钥;
[42] 所述第一用户终端向所述云服务器发送所述用于保存所述第二用户终端的加密文 件的地址信息; [43] 所述第一用户终端接收所述云服务器返回的与所述地址信息对应的非隐私信息。
[44] 结合第四方面, 在第四方面的第二种可能的实现方式中, 所述第一用户终端从所述 云服务器上和所述信任服务器上获取与所述地址信息对应的隐私信息、 非隐私信息及共 享密钥包括:
[45] 所述第一用户终端向所述信任服务器发送所述用于保存所述第二用户终端的加密 文件的地址信息;
[46] 所述第一用户终端接收所述信任服务器返回的与所述地址信息对应的第一共享密 钥和第二共享密钥;
[47] 所述第一用户终端向所述云服务器发送所述用于保存所述第二用户终端的加密文 件的地址信息; [48] 所述第一用户终端接收所述云服务器返回的与所述地址信息对应的非隐私信息和 加密隐私信息;
[49] 所述第一用户终端通过所述第二共享密钥对所述加密隐私信息进行解密得到隐私 信息;
[50] 所述第一用户终端通过所述共享密钥解密所述第一加密文件获得所述待访问文件 具体为: 所述第一用户终端通过所述第一共享密钥解密所述第一加密文件获得所述待访 问文件。 [51] 结合第四方面, 或第四方面的第一种可能的实现方式, 或第四方面的第二种可能的 实现方式, 在第四方面的第三种可能的实现方式中, 所述第一用户终端通过检索所述隐 私信息和非隐私信息获得待访问文件的地址信息包括:
[52] 所述第一用户终端将每个地址信息对应的隐私信息和非隐私信息分别与检索条件 进行匹配; [53] 所述第一用户终端根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私信 息;
[54] 所述第一用户终端将符合所述检索条件的隐私信息和非隐私信息对应的地址信息 确定为待访问文件的地址信息。
[55] 结合第四方面, 或第四方面的第一种可能的实现方式, 或第四方面的第二种可能的 实现方式, 或第四方面的第三种可能的实现方式, 在第四方面的第四种可能的实现方式 中, 所述第一用户终端从所述云服务器获取与所述待访问文件的地址信息对应的第一加 密文件包括:
[56] 所述第一用户终端向所述云服务器发送所述待访问文件的地址信息;
[57] 所述第一用户终端接收所述云服务器查找保存的地址信息与加密文件的对应关系 后, 发送的与所述待访问文件的地址信息对应的第一加密文件。
[58] 第五方面, 提供一种信息处理装置, 所述装置包括:
[59] 生成单元, 用于根据文件的摘要信息生成隐私信息和非隐私信息;
[60] 加密单元, 用于通过信任服务器下发的共享密钥对所述文件进行加密得到加密文 件;
[61] 上传单元, 用于向云服务器上传加密文件和所述非隐私信息;
[62] 接收单元, 用于接收云服务器返回的保存所述加密文件的地址信息; [63] 传输单元, 用于将所述加密文件的地址信息传输给信任服务器, 以使所述信任服务 器保存所述地址信息。
[64] 结合第五方面, 在第五方面的第一种可能的实现方式,
[65] 所述传输单元, 还用于将所述隐私信息传输给所述信任服务器, 以使所述信任服务 器保存所述隐私信息与所述地址信息的对应关系。
[66] 结合第五方面, 在第五方面的第二种可能的实现方式,
[67] 所述加密单元, 具体用于通过所述信任服务器下发的第一共享密钥对所述文件进行 加密得到加密文件;
[68] 所述加密单元, 还用于通过所述信任服务器下发的第二共享密钥对所述隐私信息进 行加密得到加密隐私信息;
[69] 所述上传单元, 还用于向所述云服务器上传所述加密隐私信息。
[70] 第六方面, 提供一种信息处理装置, 所述装置包括:
[71] 获得单元, 用于获得用户终端上传的加密文件和非隐私信息, 所述加密文件为所述 用户终端通过信任服务器下发的共享密钥对文件进行加密后得到的所述加密文件, 所述 非隐私信息为所述用户终端根据所述文件的摘要信息生成的所述非隐私信息;
[72] 保存单元, 用于保存所述加密文件与所述非隐私信息的对应关系;
[73] 下发单元, 用于向所述用户终端下发保存所述加密文件的地址信息, 以使所述用户 终端将所述加密文件的地址信息传输给所述信任服务器后, 由所述信任服务器保存所述 地址信息。 [74] 结合第六方面, 在第六方面的第一种可能的实现方式,
[75] 所述获得单元获取的所述加密文件具体为所述用户终端通过信任服务器下发的第 一共享密钥对文件进行加密后得到的所述加密文件;
[76] 所述获得单元, 还用于获得所述用户终端上传的加密隐私信息, 所述加密隐私信息 为所述用户终端通过所述信任服务器下发的第二共享密钥对隐私信息进行加密后得到的 所述加密隐私信息, 所述隐私信息为用户终端根据所述文件的摘要信息生成的所述隐私 信息。 [77] 第七方面, 提供一种信息处理装置, 所述装置包括:
[78] 下发单元, 用于向用户终端下发共享密钥, 以使所述用户终端根据所述共享密钥对 文件进行加密得到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘要 信息生成的非隐私信息; [79] 接收单元, 用于接收所述用户终端发送的所述加密文件的地址信息, 所述地址信息 为所述云服务器向所述用户终端返回的保存所述加密文件的地址信息;
[80] 保存单元, 用于保存所述地址信息。
[81] 结合第七方面, 在第七方面的第一种可能的实现方式中,
[82] 所述接收单元, 还用于接收所述用户终端传输的根据所述文件的摘要信息生成的隐 私信息;
[83] 所述保存单元, 还用于保存所述隐私信息与所述地址信息的对应关系。
[84] 结合第七方面, 在第七方面的第二种可能的实现方式中, 所述下发单元, 具体用于 向用户终端下发第一共享密钥, 以使所述用户终端根据所述第一共享密钥对文件进行加 密, 得到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘要信息生成的非 隐私信息;
[85] 所述下发单元, 还用于向用户终端下发第二共享密钥, 以使所述用户终端根据所述 第二共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密,得到加密隐私信息, 并向所述云服务器上传所述加密隐私信息。
[86] 第八方面, 提供一种信息检索装置, 所述装置包括: [87] 接收单元, 用于接收第二用户终端发送的用于保存所述第二用户终端的加密文件的 地址信息, 所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非隐私信 息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为所述第二 用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件, 所述非隐私信息 为所述第二用户终端根据所述文件的摘要信息生成; [88] 获取单元, 用于从所述云服务器上和所述信任服务器上获取与所述地址信息对应的非 隐私信息、 隐私信息及共享密钥, 所述隐私信息为所述第二用户终端根据所述文件的摘要信 息生成; [89] 检索单元, 用于通过检索所述隐私信息和所述非隐私信息获得待访问文件的地址信 息;
[90] 所述获取单元, 还用于从所述云服务器获取与所述待访问文件的地址信息对应的第 一加密文件;
[91] 解密单元, 用于通过所述共享密钥解密所述第一加密文件获得所述待访问文件。
[92] 结合第八方面, 在第八方面的第一种可能的实现方式, 所述获取单元包括:
[93] 第一地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
[94] 第一信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的隐私 信息和共享密钥;
[95] 所述第一地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息;
[96] 所述第一信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息。
[97] 结合第八方面, 在第八方面的第二种可能的实现方式, 所述获取单元包括:
[98] 第二地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
[99] 第二信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的第一 共享密钥和第二共享密钥;
[100】所述第二地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息;
[101】所述第二信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息和加密隐私信息;
[102】第二信息解密子单元, 用于通过所述第二共享密钥对所述加密隐私信息进行解密得 到隐私信息;
[103】所述解密单元, 具体用于通过所述第一共享密钥解密所述第一加密文件获得所述待 访问文件。
[104】结合第八方面, 或第八方面的第一种可能的实现方式, 或第八方面的第二种可能的 实现方式, 在第八方面的第三种可能的实现方式, 所述检索单元包括:
[105】信息匹配子单元, 用于将每个地址信息对应的隐私信息和非隐私信息分别与检索条 件进行匹配;
[106】结果获得子单元, 用于根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私 信息;
[107】地址确定子单元, 用于将符合所述检索条件的隐私信息和非隐私信息对应的地址信 息确定为待访问文件的地址信息。
[108】结合第八方面, 或第八方面的第一种可能的实现方式, 或第八方面的第二种可能的 实现方式, 或第八方面的第三种可能的实现方式, 在第八方面的第四种可能的实现方式, 所述获取单元包括:
[109】第三地址发送子单元, 用于向所述云服务器发送所述待访问文件的地址信息;
[110】第三文件接收子单元, 用于接收所述云服务器查找保存的地址信息与加密文件的对 应关系后, 发送的与所述待访问文件的地址信息对应的第一加密文件。
[111】第九方面, 提供一种用户终端, 所述用户终端包括: 总线, 以及通过所述总线连接 的网络接口、 处理器及存储器, 其中,
[112】所述网络接口, 用于与信任服务器和云服务器形成网络连接;
[113】所述处理器, 用于根据文件的摘要信息生成隐私信息和非隐私信息, 通过信任服务 器下发的共享密钥对所述文件进行加密得到加密文件, 通过所述网络接口向云服务器上 传加密文件和所述非隐私信息, 以及接收云服务器返回的保存所述加密文件的地址信息, 并将所述加密文件的地址信息通过所述网络接口传输给信任服务器, 以使所述信任服务 器保存所述地址信息;
[114】所述存储器, 用于保存所述加密文件的地址信息。 [115】结合第九方面, 在第九方面的第一种可能的实现方式中,
[116】所述处理器, 还用于通过所述网络接口将所述隐私信息传输给所述信任服务器, 以 使所述信任服务器保存所述隐私信息与所述地址信息的对应关系。 [117】结合第九方面, 在第九方面的第二种可能的实现方式中,
[118】所述处理器, 还用于通过所述信任服务器下发的第一共享密钥对所述文件进行加密 得到所述加密文件, 以及通过所述信任服务器下发的第二共享密钥对所述隐私信息进行 加密得到加密隐私信息, 并通过所述网络接口向所述云服务器上传所述加密隐私信息。 [119】第十方面, 提供一种云服务器, 所述云服务器包括: 总线, 以及通过所述总线连接 的网络接口、 处理器及存储器, 其中,
[120】所述网络接口, 用于与用户终端形成网络连接;
[121】所述处理器, 用于通过所述网络接口获得用户终端上传的加密文件和非隐私信息, 所述加密文件为所述用户终端通过信任服务器下发的共享密钥对文件进行加密后得到的 所述加密文件, 所述非隐私信息为所述用户终端根据所述文件的摘要信息生成的所述非 隐私信息;
[122】所述存储器, 用于保存所述加密文件与所述非隐私信息的对应关系;
[123】所述处理器, 还用于通过所述网络接口向所述用户终端下发保存所述加密文件的地 址信息, 以使所述用户终端将所述加密文件的地址信息传输给所述信任服务器后, 由所 述信任服务器保存所述地址信息。
[124】结合第十方面, 在第十方面的第一种可能的实现方式中,
[125】所述处理器通过所述网络接口获得的用户终端上传的加密文件具体为所述用户终 端通过信任服务器下发的第一共享密钥对文件进行加密后得到的所述加密文件;
[126】所述处理器, 还用于在通过所述网络接口获得所述用户终端上传的加密隐私信息, 所述加密隐私信息为所述用户终端通过信任服务器下发的第二共享密钥对隐私信息进行 加密后得到的所述加密隐私信息, 所述隐私信息为用户终端根据所述文件的摘要信息生 成的所述隐私信息。
[127】第十一方面, 提供一种信任服务器, 所述信任服务器包括: 总线, 以及通过所述总 线连接的网络接口、 处理器及存储器, 其中, [128】所述网络接口, 用于与用户终端形成网络连接;
[129】所述处理器, 用于通过所述网络接口向用户终端下发共享密钥, 以使所述用户终端 根据所述共享密钥对文件进行加密得到加密文件后, 向云服务器上传所述加密文件以及 根据所述文件的摘要信息生成的非隐私信息, 以及通过所述网络接口接收所述用户终端 发送的所述加密文件的地址信息, 所述地址信息为所述云服务器向所述用户终端返回的 保存所述加密文件的地址信息;
[130】所述存储器, 用于保存所述地址信息。 [131】结合第十一方面, 在第十一方面的第一种可能的实现方式中,
[132】所述处理器, 还用于通过所述网络接口接收所述用户终端传输的根据所述文件的摘 要信息生成的隐私信息;
[133】所述存储器, 还用于保存所述隐私信息与所述地址信息的对应关系。 [134】结合第十一方面, 在第十一方面的第二种可能的实现方式中, [135】所述处理器, 具体用于通过所述网络接口向用户终端下发第一共享密钥, 以使所述用 户终端根据所述第一共享密钥对文件进行加密, 得到加密文件后, 向云服务器上传所述加密 文件以及根据所述文件的摘要信息生成的非隐私信息;
[136】所述处理器, 还用于通过所述网络接口向用户终端下发第二共享密钥, 以使所述用户 终端根据所述第二共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密, 得到加密 隐私信息, 并向所述云服务器上传所述加密隐私信息。
[137】第十二方面, 提供一种用户终端, 所述用户终端作为第一用户终端, 包括: 总线, 以及通过所述总线连接的网络接口及处理器, 其中,
[138】所述网络接口, 用于与第二用户终端、 云服务器及信任服务器形成网络连接;
[139】所述处理器, 用于接收第二用户终端发送的用于保存所述第二用户终端的加密文件 的地址信息, 所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非隐私 信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为所述第 二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件, 所述非隐私信 息为所述第二用户终端根据所述文件的摘要信息生成,以及通过所述网络接口从所述云服务 器上和所述信任服务器上获取与所述地址信息对应的非隐私信息、 隐私信息及共享密钥, 所 述隐私信息为所述第二用户终端根据所述文件的摘要信息生成,通过检索所述隐私信息和所 述非隐私信息获得待访问文件的地址信息, 通过所述网络接口从所述云服务器获取与所 述待访问文件的地址信息对应的第一加密文件, 通过所述共享密钥解密所述第一加密文 件获得所述待访问文件。 [140】结合第十二方面, 在第十二方面的第一种可能的实现方式中,
[141】所述处理器, 具体用于通过所述网络接口向所述信任服务器发送所述用于保存所述 第二用户终端的加密文件的地址信息, 并接收所述信任服务器返回的与所述地址信息对 应的隐私信息和共享密钥, 以及通过所述网络接口向所述云服务器发送所述用于保存所 述第二用户终端的加密文件的地址信息, 并接收所述云服务器返回的与所述地址信息对 应的非隐私信息。
[142】结合第十二方面, 在第十二方面的第二种可能的实现方式中,
[143】所述处理器, 具体用于通过所述网络接口向所述信任服务器发送所述用于保存所述 第二用户终端的加密文件的地址信息, 并接收所述信任服务器返回的与所述地址信息对 应的第一共享密钥和第二共享密钥, 向所述云服务器发送所述用于保存所述第二用户终 端的加密文件的地址信息, 并接收所述云服务器返回的与所述地址信息对应的非隐私信 息和加密隐私信息, 以及通过所述第二共享密钥对所述加密隐私信息进行解密得到隐私 信息, 并通过所述第一共享密钥解密所述第一加密文件获得所述待访问文件。
[144】结合第十二方面, 或第十二方面的第一种可能的实现方式, 或第十二方面的第二种 可能的实现方式, 在第十二方面的第三种可能的实现方式中,
[145】所述处理器, 具体用于将每个地址信息对应的隐私信息和非隐私信息分别与检索条 件进行匹配, 根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私信息, 将符合 所述检索条件的隐私信息和非隐私信息对应的地址信息确定为待访问文件的地址信息。
[146】结合第十二方面, 或第十二方面的第一种可能的实现方式, 或第十二方面的第二种 可能的实现方式, 或第十二方面的第三种可能的实现方式, 在第十二方面的第四种可能 的实现方式中,
[147】所述处理器, 具体用于通过所述网络接口向所述云服务器发送所述待访问文件的地 址信息, 并接收所述云服务器查找保存的地址信息与加密文件的对应关系后, 发送的与 所述待访问文件的地址信息对应的第一加密文件。 [148】本发明实施例中, 在进行信息处理时, 用户终端根据文件的摘要信息生成隐私信息 和非隐私信息, 通过信任服务器下发的共享密钥对所述文件进行加密得到加密文件, 向 云服务器上传加密文件和非隐私信息, 接收云服务器返回的保存加密文件的地址信息, 并将该加密文件的地址信息传输给信任服务器, 由信任服务器保存加密文件的地址信息; 应用本发明实施例, 由于通过云服务器保存加密文件和非隐私信息, 以及通过信任服务 器保存加密文件的地址信息, 使得任意第三方用户终端无法直接从云服务器上获得隐私 信息,而是只有受信任的第三方用户终端才能从信任服务器上获得加密文件的地址信息, 并按照该地址信息对隐私信息进行访问, 从而使得受信任的第三方用户终端可以对隐私 信息和非隐私信息进行检索, 在保证了用户文件安全性的同时, 可以使得受信任的第三 方用户终端对加密文件进行访问。 在进行信息检索时, 第一用户终端接收第二用户终端 发送的用于保存第二用户终端的加密文件的地址信息, 从云服务器上和信任服务器上获 取与该地址信息对应的隐私信息、 非隐私信息及共享密钥, 通过检索隐私信息和非隐私 信息获得待访问文件的地址信息, 从云服务器获取与待访问文件的地址信息对应的第一 加密文件, 并通过共享密钥解密该第一加密文件获得待访问文件。 应用本发明实施例, 由于在进行信息检索过程中引入了信任服务器, 从而使得用户终端上传到云服务器的加 密文件能够被受信任的第三方用户终端进行检索, 在保证了用户文件安全性的同时, 由 于受信任的第三方用户终端可以通过检索从云服务器获得需要的信息, 因此可以充分利 用云服务器的性能, 提高互联网中信息共享的方便性以及使用云服务器的用户间共享文 件的灵活性。
附图说明
[149】为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对实施例或现有 技术描述中所需要使用的附图作简单地介绍, 显而易见地, 对于本领域普通技术人员而 言, 在不付出创造性劳动性的前提下, 还可以根据这些附图获得其他的附图。
[150]图 1A为本发明信息处理方法的一个实施例流程图;
[151]图 1B为本发明信息处理方法的另一个实施例流程图;
[152]图 1C为本发明信息处理方法的另一个实施例流程图;
[153]图 2为本发明信息检索方法的一个实施例流程图;
[154]图 3为本发明信息处理方法的另- -个实施例流程图;
[155]图 4为本发明信息检索方法的另- -个实施例流程图;
[156]图 5为本发明信息处理方法的另- -个实施例流程图;
[157]图 6为本发明信息检索方法的另- -个实施例流程图;
[158]图 7为本发明信息处理装置的一个实施例框图;
[159]图 8为本发明信息处理装置的另- -个实施例框图;
[160]图 9为本发明信息处理装置的另- -个实施例框图;
[161]图 10为本发明信息检索装置的一个实施例框图;
[162]图 11为本发明用户终端的一个实施例框图;
[163]图 12为本发明云服务器的实施例框图;
[164]图 13为本发明信任服务器的实施例框图; [165】图 14为本发明用户终端的另一个实施例框图。 具体实 式
[166】本发明如下实施例提供了信息处理方法、 检索方法、 装置、 用户终端及服务器。 [167】为了使本技术领域的人员更好地理解本发明实施例中的技术方案, 并使本发明实施 例的上述目的、 特征和优点能够更加明显易懂, 下面结合附图对本发明实施例中技术方 案作进一步详细的说明。
[168】参见图 1A, 为本发明信息处理方法的一个实施例流程图, 该实施例从用户终端侧描 述了信息处理的过程: [169】步骤 101 : 用户终端根据文件的摘要信息生成隐私信息和非隐私信息。
[170】本发明实施例中的文件指待上传到云服务器进行保存的用户文件, 文件的类型可以 具体为多媒体文件或者结构化文件, 其中, 多媒体文件可以包括照片、 图片、 视频等, 结构化文件可以包括 WORD文档、 可扩展标记语言 (Extens ible Markup Language, XML ) 文件等。 [171】其中, 文件由文件内容和摘要信息组成, 摘要信息指对文件的属性描述, 如: 用户 对文件进行的简单的属性描述, 以简洁的文字形式对文件进行的描述和概括; 以照片文 件为例, 其摘要信息可以包括照片人物、 照片主题、 照片的场景、 拍摄时间、 拍摄地点、 相机参数和像素尺寸等中的一个或多个。 进一步, 摘要信息可以分为隐私信息和非隐私 信息两部分, 其中, 隐私信息指某些具有保密特性的个人敏感信息, 以照片为例, 隐私 信息可以包括照片人物、 拍摄地点等; 非隐私信息通常不具有保密特性, 因此可以对外 公开, 以照片为例, 非隐私信息可以包括拍摄时间、 像素尺寸、 相机参数等。
[172】本发明实施例中, 可以使用现有技术中的爬虫技术、 自动文摘技术、 人脸识别技术 等从文件中提取摘要信息, 在此不再赘述。 摘要信息中所包含信息量的多少可以根据实 际需要进行调整, 对此本发明实施例不进行限制, 本发明实施例重点在于区分摘要信息 中的隐私信息和非隐私信息, 以保证用户信息的安全性。
[173】步骤 102 :用户终端通过信任服务器下发的共享密钥对文件进行加密得到加密文件。
[174】本发明实施例中, 信任服务器可以具体为某个信任中心的服务器, 该信任中心部署 在云服务器和用户终端之间, 可以预先向通过该信任服务器进行信息交互的云服务器和 用户终端颁发证书, 实现它们之间的身份认证, 即信任中心可以具有一个证书授权 ( Cert ificate Authority , CA ) 中心; 并且, 信任中心还可以为用户终端下发密钥, 即 信任中心还可以具有一个密钥分发中心 (Key Di stribut ion Center , KDC )。
[175】步骤 103: 用户终端向云服务器上传加密文件和非隐私信息。
[176】步骤 104: 用户终端接收云服务器返回的保存加密文件的地址信息。 [177】本实施例中, 云服务器接收到用户终端上传的加密文件后, 需要保存该加密文件, 并将保存该加密文件的地址信息发送给用户终端, 以便用户终端可以根据该地址信息访 问保存在云服务器上的文件, 通常该地址信息可以指统一资源定位符 (Uni form Universal Resource Locator , 1¾1)。
[178】步骤 105: 用户终端将加密文件的地址信息传输给信任服务器, 以使信任服务器保 存所述加密文件的地址信息。
[179】结合上述实施例, 在一个具体的实现方式中, 用户终端在将加密文件的地址信息传 输给信任服务器的同时, 还可以传输根据文件的摘要信息生成的隐私信息, 以使信任服 务器保存隐私信息与地址信息的对应关系。
[180】结合上述实施例, 在另一个具体的实现方式中, 用户终端可以通过信任服务器下发 的第一共享密钥对文件进行加密得到加密文件; 以及用户终端可以通过信任服务器下发 的第二共享密钥对隐私信息进行加密得到加密隐私信息, 并在向云服务器上传加密文件 和非隐私信息的同时, 上传加密隐私信息。
[181】参见图 1Β, 为本发明信息处理方法的另一个实施例流程图, 该实施例从云服务器侧 描述了信息处理的过程: [182】步骤 110: 云服务器获得用户终端上传的加密文件和非隐私信息。
[183】其中, 加密文件为用户终端通过信任服务器下发的共享密钥对文件进行加密后得到 的加密文件, 非隐私信息为用户终端根据文件的摘要信息生成的非隐私信息。
[184】步骤 111 : 云服务器保存加密文件与非隐私信息的对应关系。
[185】步骤 112: 云服务器向用户终端下发保存加密文件的地址信息, 以使用户终端将加 密文件的地址信息传输给信任服务器后, 并由信任服务器保存该地址信息。
[186】在一个具体的实现方式中, 加密文件可以具体为用户终端通过信任服务器下发的第 一共享密钥对文件进行加密后得到的加密文件, 云服务器可以在获得用户终端上传的加 密文件和非隐私信息的同时获得用户终端上传的加密隐私信息, 该加密隐私信息可以为 用户终端通过信任服务器下发的第二共享密钥对隐私信息进行加密后得到的加密隐私信 息, 所述隐私信息为用户终端根据所述文件的摘要信息生成的隐私信息。 其中, 所述第 一共享密钥与所述第二共享密钥可以相同或不同, 本发明实施例对此不作限定。 [187】需要说明的是, 上述图 1B示出的云服务器侧的信息处理实施例为与图 1A示出的用 户终端侧的信息处理实施例对应的实施例, 因此信息处理的具体过程和相关描述可以参 见前述图 1A示出的实施例, 在此不再赘述。
[188】参见图 1C, 为本发明信息处理方法的, 另一个实施例流程图, 该实施例从信任服务 器侧描述了信息处理过程: [189】步骤 120: 信任服务器向用户终端下发共享密钥, 以使用户终端根据所述共享密钥 对文件进行加密得到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘 要信息生成的非隐私信息。
[190】在一个具体的实现方式中, 信任服务器可以向所述用户终端下发第一共享密钥和第 二共享密钥, 所述第一共享密钥用于使所述用户终端对所述文件进行加密得到所述加密 文件, 所述第二共享密钥用于使所述终端对根据所述文件的摘要信息生成的隐私信息进 行加密, 得到向云服务上传的加密隐私信息。
[191】步骤 121 : 信任服务器接收所述用户终端发送的所述加密文件的地址信息, 所述地 址信息为所述云服务器向所述用户终端返回的保存所述加密文件的地址信息。
[192】步骤 122 : 信任服务器保存所述地址信息。 [193】在一个具体的实现方式中, 信任服务器还可以接收所述用户终端传输的根据所述文 件的摘要信息生成的隐私信息, 并保存所述隐私信息与所述地址信息的对应关系。
[194】需要说明的是, 上述图 1C示出的云服务器侧的信息处理实施例为与图 1A和图 1B 示出的用户终端侧和云服务器侧的信息处理实施例对应的实施例, 因此信息处理的具体 过程和相关描述可以参见前述图 1A和图 1B示出的实施例, 在此不再赘述。 [195】由上述图 1A至图 1C示出的实施例可见, 由于通过云服务器保存加密文件和非隐私 信息, 以及通过信任服务器保存加密文件的地址信息, 使得任意第三方用户终端无法直 接从云服务器上获得隐私信息, 而是只有受信任的第三方用户终端才能从信任服务器上 获得加密文件的地址信息, 并按照该地址信息对隐私信息进行访问, 从而使得受信任的 第三方用户终端可以对隐私信息和非隐私信息进行检索, 在保证了用户文件安全性的同 时, 可以使得受信任的第三方用户终端对加密文件进行访问。
[196】参见图 2 , 为本发明信息检索方法的一个实施例流程图, 该实施例从用户终端侧描 述了信息检索的过程, 该实施例应用前述云服务器和信息服务器保存的信息进行信息检 索: [197】步骤 201 : 第一用户终端接收第二用户终端发送的用于保存第二用户终端的加密文 件的地址信息, 该地址信息为云服务器获得第二用户终端上传的加密文件和非隐私信息后, 向第二用户终端下发的保存加密文件的地址信息, 该加密文件为用户终端根据信任服务器下 发的共享密钥对文件进行加密得到的加密文件, 该非隐私信息为第二用户终端根据文件的摘 要信息生成。 [198】本实施例中, 假设第二用户终端为按照前述图 1A 所示实施例进行信息处理并向云 服务器上传加密文件的用户终端, 其中第二用户终端的用户授权第一用户终端的用户可 以对该第二终端上传到云服务器的文件进行检索访问, 因此第二用户终端可以向第一用 户终端发送用于保存第二用户终端用户的加密文件的地址信息。
[199]由于第二用户终端上传的文件通常为多个, 每个文件对应的加密文件在云服务器上 都有相应的地址信息, 因此本实施例中第二用户终端向第一用户终端发送的地址信息可 以为对应多个加密文件的多个地址信息。
[200】步骤 202 : 第一用户终端从云服务器上和信任服务器上获取与地址信息对应的隐私信 息、 非隐私信息及共享密钥, 该隐私信息为第二用户终端根据文件的摘要信息生成。
[201】本实施例中, 由于第一用户终端为第二用户终端的授权用户终端, 因此第一用户终 端要访问第二用户终端保存在云服务器上的加密文件之前, 可以先与信任服务器之间进 行认证。 具体的认证方式可以采用基于用户证书的认证, 或者基于单因素的网络认证, 或者基于双因素的网络认证, 或者基于多因素的网络认证, 对此本发明实施例不进行限 制。 其中, 认证过程可以由第一用户终端发起, 也可以由信任服务器发起, 对此本发明 实施例不进行限制。 [202】在一个具体的实现方式中, 当信任服务器保存了隐私信息, 云服务器上保存了加密 文件和非隐私信息时,第一用户终端可以向信任服务器发送用于保存第二用户终端的加密 文件的地址信息, 并接收信任服务器返回的与该地址信息对应的隐私信息和共享密钥, 以及第一用户终端向云服务器发送用于保存第二用户终端的加密文件的地址信息, 并接收 云服务器返回的与该地址信息对应的非隐私信息。 [203】在另一个具体的实现方式中, 当云服务器上保存了加密文件、 加密隐私信息和非隐 私信息时, 第一用户终端可以向信任服务器发送用于保存第二用户终端的加密文件的地址 信息, 并接收信任服务器返回的与地址信息对应的第一共享密钥和第二共享密钥, 以及 第一用户终端向云服务器发送用于保存第二用户终端的加密文件的地址信息, 并接收云服 务器返回的与地址信息对应的非隐私信息和加密隐私信息, 通过第二共享密钥对加密隐 私信息进行解密得到隐私信息。
[204】步骤 203 : 第一用户终端通过检索所述隐私信息和非隐私信息获得待访问文件的地 址信息。
[205】可选的, 第一用户终端可以将每个地址信息对应的隐私信息和非隐私信息分别与检 索条件进行匹配, 根据匹配结果, 获得符合该检索条件的隐私信息和非隐私信息, 将符 合所述检索条件的隐私信息和非隐私信息对应的地址信息确定为待访问文件的地址信 息。
[206】在一个具体的检索方式中, 第一用户终端可以先用非隐私信息与第一检索条件进行 匹配, 由云服务器返回第一检索结果, 该第一检索结果中包含符合第一检索条件的非隐 私信息以及对应的隐私信息; 然后再用该对应的隐私信息与第二检索条件进行匹配, 返 回第二检索结果, 该第二检索结果中包含符合第二检索条件的隐私信息及对应的非隐私 信息。 即, 将检索条件分解成对应于非隐私信息的第一检索条件, 和对应于隐私信息的 第二检索条件, 通过两次匹配, 分别对非隐私信息和隐私信息进行匹配; 需要说明的是, 在实际匹配过程中, 也可以先匹配隐私信息, 再匹配非隐私信息, 也可以同时匹配非隐 私信息和隐私信息, 对此本发明实施例不进行限制。 [207】步骤 204: 第一用户终端从云服务器获取与待访问文件的地址信息对应的第一加密 文件。
[208】具体的, 第一用户终端可以向云服务器发送待访问文件的地址信息, 云服务器查找 保存的地址信息与加密文件的对应关系后, 得到与该待访问文件的地址信息对应的第一 加密文件, 将该第一加密文件发送给第一用户终端。 [209】步骤 205 : 第一用户终端通过共享密钥解密第一加密文件获得待访问文件。
[210】在步骤 202 中, 当信任服务器返回了与地址信息对应的第一共享密钥和第二共享密 钥时, 第一用户终端可以通过第一共享密钥解密第一加密文件获得待访问文件。
[211】为了进一步描述上述实施例中所涉及文件之间的关系, 举例说明如下: 假设第二用户终 端共有 N (N为自然数) 个文件, 对这 N个文件进行加密得到第二用户终端的 N个加密文件, 其中待访问文件为前述 N个文件中满足检索条件的至少一个文件, 所述至少一个文件加密后 的文件即为第一加密文件。
[212】由上述实施例可见, 本发明实施例中由于在进行信息检索过程中引入了信任服务 器, 从而使得用户终端上传到云服务器的加密文件能够被受信任的第三方用户终端进行 检索, 在保证了用户文件安全性的同时, 由于受信任的第三方用户终端可以通过检索从 云服务器获得需要的信息, 因此可以充分利用云服务器的性能, 提高互联网中信息共享 的方便性以及使用云服务器的用户间共享文件的灵活性。
[213】下面结合用户终端、 云服务器及信任服务器三方之间的交互详细描述本发明实施例 中的信息处理过程和信息检索过程。
[214】参见图 3, 为本发明信息处理方法的另一个实施例流程图: [215】步骤 301 : 用户 A的用户终端向信任服务器发送密钥请求消息。
[216】步骤 302 : 信任服务器根据密钥请求消息向用户终端返回共享密钥。
[217】信任服务器可以用于为不同的用户终端下发共享密钥, 因此在为每个用户终端下发 共享密钥后, 可以保存用户标识与共享密钥的对应关系。
[218】步骤 303 : 用户终端从待上传文件中提取文件的摘要信息, 并将该摘要信息划分为 隐私信息和非隐私信息。
[219】步骤 304: 用户终端通过共享密钥对待上传文件进行加密得到加密文件。
[220】本发明实施例中, 通过共享密钥对待上传文件进行加密时, 可以采用各种现有的加 密算法, 例如高级加密标准 (Advanced Encrypt ion Standard , AES ) 算法。
[221】步骤 305 : 用户终端将加密文件和文件的非隐私信息上传到云服务器。 [222】步骤 306 : 云服务器保存接收到的加密文件、 非隐私信息及用户标识的对应关系。
[223】步骤 307 : 云服务器将保存加密文件的 URL返回给用户 A的用户终端。
[224】步骤 308 : 用户终端将保存加密文件的 URL和隐私信息传输给信任服务器。
[225】步骤 309: 信任服务器保存接收到的 URL、 隐私信息与用户标识 A的对应关系。
[226】参见图 4, 为本发明信息检索方法的另一个实施例流程图, 该实施例基于图 3所示 信息处理实施例获得的信息,分别实现未授权用户信息检索和授权用户信息检索的过程: [227】下述步骤 401至 403描述了未授权用户的信息检索过程:
[228】步骤 401 : 未授权用户 B通过用户终端向云服务器发送信息检索请求。
[229】其中, 信息检索请求中可以包含检索条件, 用于与信息进行匹配。
[230】步骤 402 : 云服务器根据信息检索请求查找保存的各个用户的非隐私信息。 [231】步骤 403 : 云服务器将符合信息检索请求的非隐私信息返回给用户 B的用户终端。
[232】本发明实施例中, 对于未授权用户, 由于其仅可以检索到云服务器上保存的用户的 非隐私信息, 因此在保证用户文件安全性和隐私性的同时, 可以提供一定的检索服务。
[233】下述步骤 404至 417描述了授权用户的信息检索过程:
[234】步骤 404 : 用户 A的用户终端向信任服务器发送授权许可消息, 所述授权许可消息 许可用户 C访问用户 A存储在云服务器的加密文件。
[235】步骤 405 : 用户 A的用户终端将加密文件的 URL发送给用户 C的用户终端。
[236】步骤 406 : 用户 C的用户终端通过用户 C的证书与信任服务器之间完成身份认证。
[237】其中, 除了采用基于用户证书的认证方式外, 也可以采用基于单因素的网络认证, 或者基于双因素的网络认证, 或者基于多因素的网络认证, 对此本发明实施例不进行限 制。
[238】步骤 407 : 用户 C的用户终端向信任服务器发送保存加密文件的 URL。
[239】需要说明的是, 可选的, 前述步骤 405中用户 A的用户终端可以不向用户 C的用户 终端发送加密文件的 URL, 而是在用户 C的用户终端与信任服务器之间完成身份认证后, 由信任服务器主动向用户 C的用户终端发送用户 A的用户终端的加密文件的 URL。用户 C 的用户终端可能获得了多个用户的授权, 因此当用户 C的用户终端对用户 A的用户终端 的文件有检索需求时, 可以向信任服务器发送保存的用户 A 的用户终端的加密文件的 URL。
[240】步骤 408 : 信任服务器根据接收到的 URL查找保存的对应关系, 得到与该 URL对应 的隐私信息和共享密钥。 [241】步骤 409 :信任服务器向用户 C的用户终端返回与 URL对应的隐私信息和共享密钥。 [242】步骤 410: 用户 C的用户终端向云服务器发送保存加密文件的 URL。 [243】步骤 41 1 : 云服务器根据接收到的 URL查找保存的对应关系, 得到与该 URL对应的 非隐私信息。
[244】步骤 412 : 云服务器向用户 C的用户终端返回与 URL对应的非隐私信息。
[245】步骤 413 : 用户 C的用户终端对隐私信息和非隐私信息进行检索, 获得符合检索条 件的隐私信息和非隐私信息对应的 URL。
[246】本实施例中, URL为用于保存用户 A的加密文件的地址信息, 由于每个 URL对应一 个加密文件, 相应的, 每个 URL可以同时对应所保存加密文件的隐私信息、 非隐私信息 和共享密钥。 因此用户 C的用户终端可以以每个 URL为关键字保存每个加密文件的隐私 信息、 共享密钥和非隐私信息之间的对应关系。 [247】在检索时以对应同一 URL的隐私信息和非隐私信息组成的摘要信息进行检索, 在得 到符合检索条件的摘要信息后, 通过保存的对应关系, 获得与该摘要信息对应的 URL。
[248】在一个具体的检索方式中, 用户 C的用户终端可以先用摘要信息中的非隐私信息与 第一检索条件进行匹配, 由云服务器返回第一检索结果, 该第一检索结果中包含符合第 一检索条件的非隐私信息以及对应的隐私信息组成的摘要信息; 然后再用该第一检索结 果中的摘要信息中的隐私信息与第二检索条件进行匹配, 返回第二检索结果, 该第二检 索结果中包含符合第二检索条件的隐私信息和非隐私信息组成的摘要信息。 需要说明的 是, 在实际匹配过程中, 也可以先匹配隐私信息, 再匹配非隐私信息, 也可以同时匹配 非隐私信息和隐私信息, 对此本实施例不进行限制。
[249】步骤 414 : 用户 C的用户终端将获得的 URL发送给云服务器。 [250】步骤 415 : 云服务器根据接收到的 URL查找对应关系, 获得与该 URL对应的加密文 件。
[251】步骤 416 : 云服务器将查找到的加密文件返回给用户 C的用户终端。
[252】步骤 417 : 用户 C的用户终端根据该加密文件的共享密钥对该加密文件进行解密。
[253】用户 C的用户终端根据步骤 413中保存的对应关系获得与符合检索条件的 URL对应 的共享密钥, 通过该共享密钥对接收到的加密文件进行解密。
[254】由上述实施例可见, 由于在进行信息检索过程中引入了信任服务器, 从而使得用户 终端上传到云服务器的加密文件能够被受信任的第三方用户终端进行检索, 在保证了用 户文件安全性的同时, 由于受信任的第三方用户终端可以通过检索从云服务器获得需要 的信息, 因此可以充分利用云服务器的性能, 提高互联网中信息共享的方便性以及使用 云服务器的用户间共享文件的灵活性。
[255】参见图 5, 为本发明信息处理方法的另一个实施例流程图:
[256】步骤 501 : 用户 A的用户终端向信任服务器发送密钥请求消息。
[257】步骤 502 : 信任服务器根据密钥请求消息向用户终端返回共享密钥 1和共享密钥 2。
[258】信任服务器可以用于为不同的用户终端下发共享密钥, 因此在为每个用户终端下发 共享密钥后, 可以保存用户标识与第一共享密钥和第二共享密钥的对应关系。
[259】步骤 503 : 用户 A的用户终端从待上传文件中提取文件的摘要信息, 并将该摘要信 息划分为隐私信息和非隐私信息。
[260】步骤 504 : 用户 A的用户终端通过共享密钥 1加密待上传文件得到加密文件, 通过 共享密钥 2加密隐私信息得到加密隐私信息。
[261】本发明实施例中, 文件由文件内容和摘要信息组成, 因此用户 A的用户终端可以通 过共享密钥 1加密文件, 也可以通过共享密钥 1加密文件内容。
[262】步骤 505 : 用户 A的用户终端将加密文件、 加密隐私信息和非隐私信息上传到云服 务器。
[263】步骤 506 : 云服务器保存接收到的加密文件、 加密隐私信息、 非隐私信息与用户标 识 A的对应关系。
[264】步骤 507 : 云服务器将保存加密文件的 URL返回给用户 A的用户终端。
[265】步骤 508 : 用户终端将加密文件的 URL传输给信任服务器。
[266】步骤 509: 信任服务器保存接收到的 URL与用户标识 A的对应关系。
[267】参见图 6, 为本发明信息检索方法的另一个实施例流程图, 该实施例基于图 5所示 信息处理实施例获得的信息,分别实现授权用户信息检索和非授权用户信息检索的过程:
[268】下述步骤 601至 603描述了未授权用户的信息检索过程:
[269】步骤 601 : 未授权用户 B通过用户终端向云服务器发送信息检索请求。
[270】其中, 信息检索请求中可以包含检索条件, 用于与信息进行匹配。 [271】步骤 602 : 云服务器根据所述信息检索请求查找保存的各个用户的非隐私信息。
[272】步骤 603 : 云服务器将符合信息检索请求的非隐私信息返回给用户 B的用户终端。
[273】本发明实施例中, 对于未授权用户, 由于其仅可以检索到云服务器上保存的用户的 非隐私信息, 因此在保证用户文件安全性和隐私性的同时, 可以提供一定的检索服务。 [274】下述步骤 604至步骤 617描述了授权用户的信息检索过程:
[275】步骤 604 : 用户 A的用户终端向信任服务器发送授权许可消息, 所述授权许可消息 许可用户 C访问用户 A存储在云服务器的加密文件。
[276】步骤 605 : 用户 A的用户终端将加密文件的 URL发送给用户 C的用户终端。
[277】步骤 606 : 用户 C的用户终端通过用户 C的证书与信任服务器之间完成身份认证。 [278】其中, 除了采用基于用户证书的认证方式外, 也可以采用基于单因素的网络认证, 或者基于双因素的网络认证, 或者基于多因素的网络认证, 对此本发明实施例不进行限 制。
[279】步骤 607 : 用户 C的用户终端向信任服务器发送保存加密文件的 URL。
[280】需要说明的是, 可选的, 前述步骤 605中用户 A的用户终端可以不向用户 C的用户 终端发送加密文件的 URL , 而是在用户 C的用户终端与信任服务器之间完成身份认证后, 由信任服务器主动向用户 C的用户终端发送用户 A的用户终端的加密文件的 URL。用户 C 的用户终端可能获得了多个用户的授权, 因此当用户 C的用户终端对用户 A的用户终端 的文件有检索需求时, 可以向信任服务器发送保存的用户 A 的用户终端的加密文件的 URL。 [281】步骤 608 : 信任服务器根据接收到的 URL查找保存的对应关系, 得到与该 URL对应 的共享密钥 1和共享密钥 2。
[282】步骤 609 : 信任服务器向用户 C的用户终端反馈与 URL对应的共享密钥 1和共享密 钥 2。
[283】步骤 610 : 用户 C的用户终端向云服务器发送保存加密文件的 URL。 [284】步骤 61 1 : 云服务器根据接收到的 URL查找保存的对应关系, 得到与该 URL对应的 非隐私信息和加密隐私信息。 [285】步骤 612 : 云服务器向用户 C的用户终端返回与 URL对应的非隐私信息和加密隐私 信息。
[286】步骤 613 : 用户 C的用户终端通过共享密钥 2对加密隐私信息进行解密得到隐私信 息。 [287】本实施例中, URL为用于保存用户 A的加密文件的地址信息, 由于每个 URL对应一 个加密文件, 相应的, 每个 URL可以同时对应所保存加密文件的加密隐私信息、 非隐私 信息和共享密钥。 因此用户 C的用户终端可以以每个 URL为关键字保存每个加密文件的 加密隐私信息、 共享密钥 1、 共享密钥 2和非隐私信息之间的对应关系。 相应的, 在解 密加密隐私信息时, 以加密隐私信息对应的共享密钥 2对该加密隐私信息进行解密。 [288】步骤 614 : 用户 C的用户终端对隐私信息和非隐私信息进行检索, 获得符合检索条 件的隐私信息和非隐私信息对应的 URL。
[289】本实施例中在检索时, 以对应同一 URL的隐私信息和非隐私信息组成的摘要信息进 行检索, 在得到符合检索条件的摘要信息后, 通过保存的对应关系, 获得与该摘要信息 对应的 URL。
[290】在一个具体的检索方式中, 用户 C的用户终端可以先用摘要信息中的非隐私信息与 第一检索条件进行匹配, 由云服务器返回第一检索结果, 该第一检索结果中包含符合第 一检索条件的非隐私信息以及对应的隐私信息组成的摘要信息; 然后再用该第一检索结 果中的摘要信息中的隐私信息与第二检索条件进行匹配, 返回第二检索结果, 该第二检 索结果中包含符合第二检索条件的隐私信息和非隐私信息组成的摘要信息。 需要说明的 是, 在实际匹配过程中, 也可以先匹配隐私信息, 再匹配非隐私信息, 也可以同时匹配 非隐私信息和隐私信息, 对此本实施例不进行限制。
[291】步骤 615 : 用户 C的用户终端将获得的 URL发送给云服务器。
[292】步骤 616 : 云服务器根据接收到的 URL查找对应关系, 获得与该 URL对应的加密文 件。 [293】步骤 617 : 云服务器将查找到的加密文件返回给用户 C的用户终端。
[294】步骤 618 :用户 C的用户终端根据该加密文件的共享密钥 1对该加密文件进行解密。
[295】由上述实施例可见, 由于在进行信息检索过程中引入了信任服务器, 从而使得用户 终端上传到云服务器的加密文件能够被受信任的第三方用户终端进行检索, 在保证了用 户文件安全性的同时, 由于受信任的第三方用户终端可以通过检索从云服务器获得需要 的信息, 因此可以充分利用云服务器的性能, 提高互联网中信息共享的方便性以及使用 云服务器的用户间共享文件的灵活性。
[296】与本发明信息处理方法和信息检索方法的实施例相对应, 本发明还提供了用户终 端、 云服务器和信任服务器的实施例。
[297】参见图 7, 为本发明信息处理装置的一个实施例框图, 该信息处理装置可以设置在 用户终端内:
[298】该信息处理装置包括: 生成单元 710、 加密单元 720、 上传单元 730、 接收单元 740 和传输单元 750。
[299】其中, 生成单元 710, 用于根据文件的摘要信息生成隐私信息和非隐私信息;
[300】加密单元 720, 用于通过信任服务器下发的共享密钥对所述文件进行加密得到加密 文件;
[301】上传单元 730, 用于向云服务器上传加密文件和所述非隐私信息;
[302】接收单元 740, 用于接收云服务器返回的保存所述加密文件的地址信息; [303】传输单元 750, 用于将所述加密文件的地址信息传输给信任服务器, 以使所述信任 服务器保存所述地址信息。
[304】在一个具体的实现方式中:
[305】所述传输单元 750, 还用于将所述隐私信息传输给所述信任服务器, 以使所述信任服务 器保存所述隐私信息与所述地址信息的对应关系。 [306】在另一个具体的实现方式中:
[307】所述加密单元 720, 具体用于通过信任服务器下发的第一共享密钥对所述文件进行 加密得到加密文件;
[308】所述加密单元 720, 还用于通过信任服务器下发的第二共享密钥对所述隐私信息进 行加密得到加密隐私信息; [309】所述上传单元 730, 还用于向所述云服务器上传所述加密隐私信息。
[310】参见图 8, 为本发明信息处理装置的另一个实施例框图, 该信息处理装置可以设置 在云服务器内:
[311】该信息处理装置包括: 获得单元 810、 保存单元 820和下发单元 830。
[312】其中, 获得单元 810, 用于获得用户终端上传的加密文件和非隐私信息, 所述加密 文件为所述用户终端通过信任服务器下发的共享密钥对文件进行加密后得到的加密文 件, 所述非隐私信息为所述用户终端根据所述文件的摘要信息生成的非隐私信息;
[313】保存单元 820, 用于保存所述加密文件与所述非隐私信息的对应关系;
[314】下发单元 830, 用于向所述用户终端下发保存所述加密文件的地址信息, 以使所述 用户终端将所述加密文件的地址信息传输给所述信任服务器后, 由所述信任服务器保存 所述地址信息。 [315】在一个具体的实现方式中:
[316】所述获得单元 810获取的加密文件具体为所述用户终端通过信任服务器下发的第一 共享密钥对文件进行加密后得到的加密文件;
[317】所述获得单元 810, 还用于获得所述用户终端上传的加密隐私信息, 所述加密隐私 信息为所述用户终端通过信任服务器下发的第二共享密钥对隐私信息进行加密后得到的 加密隐私信息, 所述隐私信息为用户终端根据所述文件的摘要信息生成的隐私信息。
[318】参见图 9, 为本发明信息处理装置的另一个实施例框图, 该信息处理装置可以设置 在信任服务器内:
[319】该信息处理装置包括: 下发单元 910、 接收单元 920和保存单元 930。
[320】其中, 下发单元 910, 用于向用户终端下发共享密钥, 以使所述用户终端根据所述 共享密钥对文件进行加密得到加密文件后, 向云服务器上传所述加密文件以及根据所述 文件的摘要信息生成的非隐私信息;
[321】接收单元 920, 用于接收所述用户终端发送的所述加密文件的地址信息, 所述地址 信息为所述云服务器向所述用户终端返回的保存所述加密文件的地址信息;
[322】保存单元 930, 用于保存所述地址信息。 [323】在一个具体的实现方式中:
[324】所述接收单元 920, 还可以用于接收所述用户终端传输的根据所述文件的摘要信息 生成的隐私信息;
[325】所述保存单元 930, 还可以用于保存所述隐私信息与所述地址信息的对应关系。 [326】在另一个具体的实现方式中:
[327】所述下发单元 910, 可以具体用于向用户终端下发第一共享密钥, 以使所述用户终端 根据所述第一共享密钥对文件进行加密, 得到加密文件后, 向云服务器上传所述加密文件以 及根据所述文件的摘要信息生成的非隐私信息;
[328】所述下发单元 910, 还可以用于向用户终端下发第二共享密钥, 以使所述用户终端根据 所述第二共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密,得到加密隐私信息, 并向所述云服务器上传所述加密隐私信息。 [329】参见图 10, 为本发明信息检索装置的一个实施例框图, 该信息检索装置可以设置在 第一用户终端侧;
[330】该信息检索装置包括: 接收单元 1010、 获取单元 1020、 检索单元 1030和解密单元 1040。
[331】其中, 接收单元 1010, 用于接收第二用户终端发送的用于保存所述第二用户终端的 加密文件的地址信息,所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件 和非隐私信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件 为所述第二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件, 所述 非隐私信息为所述第二用户终端根据所述文件的摘要信息生成;
[332】获取单元 1020, 用于从所述云服务器上和所述信任服务器上获取与所述地址信息对应 的非隐私信息、 隐私信息及共享密钥, 所述隐私信息为所述第二用户终端根据所述文件的摘 要信息生成;
[333】检索单元 1030,用于通过检索所述隐私信息和非隐私信息获得待访问文件的地址信 息;
[334】所述获取单元 1020,还用于从所述云服务器获取与所述待访问文件的地址信息对应 的第一加密文件;
[335】解密单元 1040, 用于通过所述共享密钥解密所述第一加密文件获得所述待访问文 件。 [336】在第一个具体的实现方式中:
[337】获取单元 1020可以包括 (图 10中未示出):
[338】第一地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
[339】第一信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的隐私 信息和共享密钥;
[340】所述第一地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息;
[341】所述第一信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息。
[342】在第二个具体的实现方式中:
[343】获取单元 1020可以包括 (图 10中未示出):
[344】第二地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
[345】第二信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的第一 共享密钥和第二共享密钥;
[346】所述第二地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息;
[347】所述第二信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息和加密隐私信息;
[348】第二信息解密子单元, 用于通过所述第二共享密钥对所述加密隐私信息进行解密得 到隐私信息;
[349】所述解密单元 1040,可以具体用于通过所述第一共享密钥解密所述第一加密文件获 得所述待访问文件。
[350】在第三个具体的实现方式中:
[351】获取单元 1020可以包括 (图 10中未示出): [352】第三地址发送子单元, 用于向所述云服务器发送所述待访问文件的地址信息;
[353】第三文件接收子单元, 用于接收所述云服务器查找保存的地址信息与加密文件的对 应关系后, 发送的与所述待访问文件的地址信息对应的第一加密文件。
[354】在第四个具体的实现方式中: [355】检索单元 1030可以包括 (图 10中未示出):
[356】信息匹配子单元, 用于将每个地址信息对应的隐私信息和非隐私信息分别与检索条 件进行匹配;
[357】结果获得子单元, 用于根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私 信息; [358】地址确定子单元, 用于将符合所述检索条件的隐私信息和非隐私信息对应的地址信 息确定为待访问文件的地址信息。
[359】参见图 11, 为本发明用户终端的一个实施例框图, 该用户终端为具有信息处理功能 的终端:
[360】该终端包括:总线 1 110,以及通过所述总线 1 110连接的网络接口 1120、处理器 1130 及存储器 1 140。
[361】其中, 所述网络接口 1120, 用于与信任服务器和云服务器形成网络连接;
[362】所述处理器 1130, 用于根据文件的摘要信息生成隐私信息和非隐私信息, 通过信任 服务器下发的共享密钥对所述文件进行加密得到加密文件,通过所述网络接口 1120向云 服务器上传加密文件和所述非隐私信息, 以及接收云服务器返回的保存所述加密文件的 地址信息, 并将所述加密文件的地址信息通过所述网络接口 1120传输给信任服务器, 以 使所述信任服务器保存所述加密文件的地址信息;
[363】所述存储器 1140, 用于保存所述加密文件的地址信息。
[364】在一个具体的实现方式中: 所述处理器 1130, 还可以通过所述网络接口 1120将所 述隐私信息传输给所述信任服务器, 以使所述信任服务器保存所述隐私信息与所述地址 信息的对应关系。
[365】在另一个具体的实现方式中: 所述处理器 1130, 还可以用于通过信任服务器下发的 第一共享密钥对所述文件进行加密得到加密文件, 以及通过信任服务器下发的第二共享 密钥对所述隐私信息进行加密得到加密隐私信息,并通过所述网络接口 1120向云服务器 上传加密文件和所述非隐私信息的同时, 上传所述加密隐私信息。
[366】参见图 12, 为本发明云服务器的实施例框图:
[367】该云服务器包括: 总线 1210, 以及通过所述总线 1210连接的网络接口 1220、 处理 器 1230及存储器 1240。
[368】其中, 所述网络接口 1220, 用于与用户终端形成网络连接;
[369】所述处理器 1230, 用于通过所述网络接口 1220获得用户终端上传的加密文件和非 隐私信息, 所述加密文件为所述用户终端通过信任服务器下发的共享密钥对文件进行加 密后得到的加密文件, 所述非隐私信息为所述用户终端根据所述文件的摘要信息生成的 非隐私信息;
[370】所述存储器 1240, 用于保存所述加密文件与所述非隐私信息的对应关系;
[371】所述处理器 1230, 还用于通过所述网络接口 1220 向所述用户终端下发保存所述加 密文件的地址信息, 以使所述用户终端将所述加密文件的地址信息传输给所述信任服务 器后, 由所述信任服务器保存所述地址信息。 [372】在一个具体的实现方式中:
[373】所述处理器 1230 通过所述网络接口获得的用户终端上传的加密文件具体为所述用 户终端通过信任服务器下发的第一共享密钥对文件进行加密后得到的加密文件;
[374】所述处理器 1230,还可以用于在通过所述网络接口获得用户终端上传的加密文件和 非隐私信息的同时获得所述用户终端上传的加密隐私信息, 所述加密隐私信息为所述用 户终端通过信任服务器下发的第二共享密钥对隐私信息进行加密后得到的加密隐私信 息, 所述隐私信息为用户终端根据所述文件的摘要信息生成的隐私信息。
[375】参见图 13, 为本发明信任服务器的实施例框图:
[376】该信任服务器包括: 总线 1310, 以及通过所述总线 1310连接的网络接口 1320、 处 理器 1330和存储器 1340。
[377】其中, 所述网络接口 1320, 用于与用户终端形成网络连接;
[378】所述处理器 1330, 用于通过所述网络接口 1320 向用户终端下发共享密钥, 以使所 述用户终端根据所述共享密钥对文件进行加密得到加密文件后, 向云服务器上传所述加 密文件以及根据所述文件的摘要信息生成的非隐私信息, 以及通过所述网络接口 1320接 收所述用户终端发送的所述加密文件的地址信息, 所述地址信息为所述云服务器向所述 用户终端返回的保存所述加密文件的地址信息;
[379】所述存储器 1340, 用于保存所述地址信息。 [380】在一个具体的实现方式中:
[381】所述处理器 1330, 还可以用于通过所述网络接口 1320接收所述用户终端传输的根 据所述文件的摘要信息生成的隐私信息;
[382】所述存储器 1340, 还可以用于保存所述隐私信息与所述地址信息的对应关系。 [383】在另一个具体的实现方式中: [384】所述处理器 1330, 可以具体用于通过所述网络接口 1320向用户终端下发第一共享密 钥, 以使所述用户终端根据所述第一共享密钥对文件进行加密, 得到加密文件后, 向云服务 器上传所述加密文件以及根据所述文件的摘要信息生成的非隐私信息;
[385】所述处理器 1330, 还可以用于通过所述网络接口 1320向用户终端下发第二共享密钥, 以使所述用户终端根据所述第二共享密钥对根据所述文件的摘要信息生成的隐私信息进行加 密, 得到加密隐私信息, 并向所述云服务器上传所述加密隐私信息。
[386】参见图 14, 为本发明用户终端的另一个实施例框图, 该用户终端可以作为第一用户 终端, 当图 11中示出的用户终端为第二用户终端时, 该第一用户终端可以作为第二用户 终端授权的第三方用户终端, 对第二用户终端的信息进行检索:
[387】该用户终端包括: 总线 1410, 以及通过所述总线 1410连接的网络接口 1420及处理 器 1430。
[388】其中, 所述网络接口 1420, 用于与第二用户终端、 云服务器及信任服务器形成网络 连接;
[389】所述处理器 1430,用于接收第二用户终端发送的用于保存所述第二用户终端的加密 文件的地址信息,所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非 隐私信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为所 述第二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件, 所述非隐 私信息为所述第二用户终端根据所述文件的摘要信息生成, 以及通过所述网络接口 1420从 所述云服务器上和所述信任服务器上获取与所述地址信息对应的非隐私信息、 隐私信息及共 享密钥, 所述隐私信息为所述第二用户终端根据所述文件的摘要信息生成, 通过检索所述隐 私信息和所述非隐私信息获得待访问文件的地址信息,通过所述网络接口 1420从所述云 服务器获取与所述待访问文件的地址信息对应的第一加密文件, 通过所述共享密钥解密 所述第一加密文件获得所述待访问文件。 [390】在第一个具体的实现方式中: 所述处理器 1430, 可以具体用于通过所述网络接口 1420向所述信任服务器发送所述用于保存所述第二用户终端的加密文件的地址信息, 并 接收所述信任服务器返回的与所述地址信息对应的隐私信息和共享密钥, 以及通过所述 网络接口 1420 向所述云服务器发送所述用于保存所述第二用户终端的加密文件的地址 信息, 并接收所述云服务器返回的与所述地址信息对应的非隐私信息。 [391】在第二个具体的实现方式中: 所述处理器 1430, 可以具体用于通过所述网络接口 1420向所述信任服务器发送所述用于保存所述第二用户终端的加密文件的地址信息, 并 接收所述信任服务器返回的与所述地址信息对应的第一共享密钥和第二共享密钥, 向所 述云服务器发送所述用于保存所述第二用户终端的加密文件的地址信息, 并接收所述云 服务器返回的与所述地址信息对应的非隐私信息和加密隐私信息, 以及通过所述第二共 享密钥对所述加密隐私信息进行解密得到隐私信息, 并通过所述第一共享密钥解密所述 第一加密文件获得所述待访问文件。
[392】在第三个具体的实现方式中: 所述处理器 1430, 可以具体用于将每个地址信息对应 的隐私信息和非隐私信息分别与检索条件进行匹配, 根据匹配结果, 获得符合所述检索 条件的隐私信息和非隐私信息, 将符合所述检索条件的隐私信息和非隐私信息对应的地 址信息确定为待访问文件的地址信息。
[393】在第四个具体的实现方式中: 所述处理器 1430, 可以具体用于通过所述网络接口 1420向所述云服务器发送所述待访问文件的地址信息, 并接收所述云服务器查找保存的 地址信息与加密文件的对应关系后, 发送的与所述待访问文件的地址信息对应的第一加 密文件。 [394】由上述实施例可见, 在进行信息处理时, 用户终端根据文件的摘要信息生成隐私信 息和非隐私信息, 通过信任服务器下发的共享密钥对所述文件进行加密得到加密文件, 向云服务器上传加密文件和非隐私信息,接收云服务器返回的保存加密文件的地址信息, 并将该加密文件的地址信息传输给信任服务器, 由信任服务器保存加密文件的地址信息; 应用本发明实施例, 由于通过云服务器保存加密文件和非隐私信息, 以及通过信任服务 器保存加密文件的地址信息, 使得任意第三方用户终端无法直接从云服务器上获得隐私 信息,而是只有受信任的第三方用户终端才能从信任服务器上获得加密文件的地址信息, 并按照该地址信息对隐私信息进行访问, 从而使得受信任的第三方用户终端可以对隐私 信息和非隐私信息进行检索, 在保证了用户文件安全性的同时, 可以使得受信任的第三 方用户终端对加密文件进行访问。 在进行信息检索时, 第一用户终端接收第二用户终端 发送的用于保存第二用户终端的加密文件的地址信息, 从云服务器上和信任服务器上获 取与该地址信息对应的隐私信息、 非隐私信息及共享密钥, 通过检索隐私信息和非隐私 信息获得待访问文件的地址信息, 从云服务器获取与待访问文件的地址信息对应的第一 加密文件, 并通过共享密钥解密该第一加密文件获得待访问文件。 应用本发明实施例, 由于在进行信息检索过程中引入了信任服务器, 从而使得用户终端上传到云服务器的加 密文件能够被受信任的第三方用户终端进行检索, 在保证了用户文件安全性的同时, 由 于受信任的第三方用户终端可以通过检索从云服务器获得需要的信息, 因此可以充分利 用云服务器的性能, 提高互联网中信息共享的方便性以及使用云服务器的用户间共享文 件的灵活性。
[395】本领域的技术人员可以清楚地了解到本发明实施例中的技术可借助软件加必需的 通用硬件平台的方式来实现。 基于这样的理解, 本发明实施例中的技术方案本质上或者 说对现有技术做出贡献的部分可以以软件产品的形式体现出来, 该计算机软件产品可以 存储在存储介质中, 如 R0M/RAM、 磁碟、 光盘等, 包括若干指令用以使得一台计算机设 备 (可以是个人计算机, 服务器, 或者网络设备等) 执行本发明各个实施例或者实施例 的某些部分所述的方法。
[396】本说明书中的各个实施例均采用递进的方式描述, 各个实施例之间相同相似的部分 互相参见即可, 每个实施例重点说明的都是与其他实施例的不同之处。 尤其, 对于系统 实施例而言, 由于其基本相似于方法实施例, 所以描述的比较简单, 相关之处参见方法 实施例的部分说明即可。
[397】以上所述的本发明实施方式, 并不构成对本发明保护范围的限定。 任何在本发明的 精神和原则之内所作的修改、 等同替换和改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求
1、 一种信息处理方法, 其特征在于, 所述方法包括:
根据文件的摘要信息生成隐私信息和非隐私信息;
通过信任服务器下发的共享密钥对所述文件进行加密得到加密文件;
向云服务器上传加密文件和所述非隐私信息;
接收云服务器返回的保存所述加密文件的地址信息;
将所述加密文件的地址信息传输给信任服务器, 以使所述信任服务器保存所述地址 信息。
2、 根据权利要求 1所述的方法, 其特征在于, 所述方法还包括:
将所述隐私信息传输给所述信任服务器, 以使所述信任服务器保存所述隐私信息与 所述地址信息的对应关系。
3、 根据权利要求 1所述的方法, 其特征在于, 所述通过信任服务器下发的共享密 钥对所述文件进行加密得到加密文件具体为: 通过所述信任服务器下发的第一共享密钥 对所述文件进行加密得到所述加密文件;
所述方法还包括: 通过所述信任服务器下发的第二共享密钥对所述隐私信息进行加 密得到加密隐私信息;
向所述云服务器上传所述加密隐私信息。
4、 一种信息处理方法, 其特征在于, 所述方法包括:
获得用户终端上传的加密文件和非隐私信息, 所述加密文件为所述用户终端通过信 任服务器下发的共享密钥对文件进行加密后得到的所述加密文件,所述非隐私信息为所 述用户终端根据所述文件的摘要信息生成的所述非隐私信息;
保存所述加密文件与所述非隐私信息的对应关系;
向所述用户终端下发保存所述加密文件的地址信息, 以使所述用户终端将所述加密 文件的地址信息传输给所述信任服务器后, 由所述信任服务器保存所述地址信息。
5、 根据权利要求 4所述的方法, 其特征在于, 所述加密文件具体为所述用户终端 通过所述信任服务器下发的第一共享密钥对文件进行加密后得到的所述加密文件; 所述方法还包括:
获得所述用户终端上传的加密隐私信息, 所述加密隐私信息为所述用户终端通过所 述信任服务器下发的第二共享密钥对隐私信息进行加密后得到的所述加密隐私信息,所 述隐私信息为用户终端根据所述文件的摘要信息生成的所述隐私信息。
6、 一种信息处理方法, 其特征在于, 所述方法包括:
向用户终端下发共享密钥, 以使所述用户终端根据所述共享密钥对文件进行加密得 到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘要信息生成的非隐 私信息;
接收所述用户终端发送的所述加密文件的地址信息, 所述地址信息为所述云服务器 向所述用户终端返回的保存所述加密文件的地址信息;
保存所述地址信息。
7、 根据权利要求 6所述的方法, 其特征在于, 所述方法还包括:
接收所述用户终端传输的根据所述文件的摘要信息生成的隐私信息;
保存所述隐私信息与所述地址信息的对应关系。
8、 根据权利要求 6所述的方法, 其特征在于, 所述向用户终端下发共享密钥, 以 使所述用户终端根据所述共享密钥对文件进行加密得到加密文件具体为: 向用户终端下 发第一共享密钥, 以使所述用户终端根据所述第一共享密钥对文件进行加密, 得到加密 文件;
所述方法还包括: 向用户终端下发第二共享密钥, 以使所述用户终端根据所述第二 共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密, 得到加密隐私信息, 并 向所述云服务器上传所述加密隐私信息。
9、 一种信息检索方法, 其特征在于, 所述方法包括:
第一用户终端接收第二用户终端发送的用于保存所述第二用户终端的加密文件的 地址信息,所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非隐 私信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为 所述第二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件,所 述非隐私信息为所述第二用户终端根据所述文件的摘要信息生成;
所述第一用户终端从所述云服务器上和所述信任服务器上获取与所述地址信息对 应的非隐私信息、 隐私信息及共享密钥, 所述隐私信息为所述第二用户终端根据所述文 件的摘要信息生成;
所述第一用户终端通过检索所述隐私信息和所述非隐私信息获得待访问文件的地 址信息;
所述第一用户终端从所述云服务器获取与所述待访问文件的地址信息对应的第一 加密文件;
所述第一用户终端通过所述共享密钥解密所述第一加密文件获得所述待访问文件。
10、 根据权利要求 9所述的方法, 其特征在于, 所述第一用户终端从所述云服务器 上和所述信任服务器上获取与所述地址信息对应的非隐私信息、隐私信息及共享密钥包 括:
所述第一用户终端向所述信任服务器发送所述用于保存所述第二用户终端的加密 文件的地址信息;
所述第一用户终端接收所述信任服务器返回的与所述地址信息对应的隐私信息和 共享密钥;
所述第一用户终端向所述云服务器发送所述用于保存所述第二用户终端的加密文 件的地址信息;
所述第一用户终端接收所述云服务器返回的与所述地址信息对应的非隐私信息。
11、 根据权利要求 9所述的方法, 其特征在于, 所述第一用户终端从所述云服务器 上和所述信任服务器上获取与所述地址信息对应的非隐私信息、隐私信息及共享密钥包 括:
所述第一用户终端向所述信任服务器发送所述用于保存所述第二用户终端的加密 文件的地址信息;
所述第一用户终端接收所述信任服务器返回的与所述地址信息对应的第一共享密 钥和第二共享密钥;
所述第一用户终端向所述云服务器发送所述用于保存所述第二用户终端的加密文 件的地址信息;
所述第一用户终端接收所述云服务器返回的与所述地址信息对应的非隐私信息和 加密隐私信息;
所述第一用户终端通过所述第二共享密钥对所述加密隐私信息进行解密得到隐私 信息;
所述第一用户终端通过所述共享密钥解密所述第一加密文件获得所述待访问文件 具体为: 所述第一用户终端通过所述第一共享密钥解密所述第一加密文件获得所述待访 问文件。
12、 根据权利要求 9至 11任意一项所述的方法, 其特征在于, 所述第一用户终端 通过检索所述隐私信息和非隐私信息获得待访问文件的地址信息包括:
所述第一用户终端将每个地址信息对应的隐私信息和非隐私信息分别与检索条件 进行匹配;
所述第一用户终端根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私信 息;
所述第一用户终端将符合所述检索条件的隐私信息和非隐私信息对应的地址信息 确定为待访问文件的地址信息。
13、 根据权利要求 9至 12任意一项所述的方法, 其特征在于, 所述第一用户终端 从所述云服务器获取与所述待访问文件的地址信息对应的第一加密文件包括:
所述第一用户终端向所述云服务器发送所述待访问文件的地址信息;
所述第一用户终端接收所述云服务器查找保存的地址信息与加密文件的对应关系 后, 发送的与所述待访问文件的地址信息对应的第一加密文件。
14、 一种信息处理装置, 其特征在于, 所述装置包括:
生成单元, 用于根据文件的摘要信息生成隐私信息和非隐私信息;
加密单元, 用于通过信任服务器下发的共享密钥对所述文件进行加密得到加密文 件;
上传单元, 用于向云服务器上传加密文件和所述非隐私信息;
接收单元, 用于接收云服务器返回的保存所述加密文件的地址信息;
传输单元, 用于将所述加密文件的地址信息传输给信任服务器, 以使所述信任服务 器保存所述地址信息。
15、 根据权利要求 14所述的装置, 其特征在于,
所述传输单元, 还用于将所述隐私信息传输给所述信任服务器, 以使所述信任服务 器保存所述隐私信息与所述地址信息的对应关系。
16、 根据权利要求 14所述的装置, 其特征在于,
所述加密单元, 具体用于通过所述信任服务器下发的第一共享密钥对所述文件进行 加密得到加密文件;
所述加密单元, 还用于通过所述信任服务器下发的第二共享密钥对所述隐私信息进 行加密得到加密隐私信息;
所述上传单元, 还用于向所述云服务器上传所述加密隐私信息。
17、 一种信息处理装置, 其特征在于, 所述装置包括:
获得单元, 用于获得用户终端上传的加密文件和非隐私信息, 所述加密文件为所述 用户终端通过信任服务器下发的共享密钥对文件进行加密后得到的所述加密文件,所述 非隐私信息为所述用户终端根据所述文件的摘要信息生成的所述非隐私信息;
保存单元, 用于保存所述加密文件与所述非隐私信息的对应关系;
下发单元, 用于向所述用户终端下发保存所述加密文件的地址信息, 以使所述用户 终端将所述加密文件的地址信息传输给所述信任服务器后, 由所述信任服务器保存所述 地址信息。
18、 根据权利要求 17所述的装置, 其特征在于, 所述获得单元获取的所述加密文 件具体为所述用户终端通过信任服务器下发的第一共享密钥对文件进行加密后得到的 所述加密文件;
所述获得单元, 还用于获得所述用户终端上传的加密隐私信息, 所述加密隐私信息 为所述用户终端通过所述信任服务器下发的第二共享密钥对隐私信息进行加密后得到 的所述加密隐私信息,所述隐私信息为用户终端根据所述文件的摘要信息生成的所述隐 私信息。
19、 一种信息处理装置, 其特征在于, 所述装置包括:
下发单元, 用于向用户终端下发共享密钥, 以使所述用户终端根据所述共享密钥对 文件进行加密得到加密文件后, 向云服务器上传所述加密文件以及根据所述文件的摘要 信息生成的非隐私信息;
接收单元, 用于接收所述用户终端发送的所述加密文件的地址信息, 所述地址信息 为所述云服务器向所述用户终端返回的保存所述加密文件的地址信息;
保存单元, 用于保存所述地址信息。
20、 根据权利要求 19所述的装置, 其特征在于,
所述接收单元, 还用于接收所述用户终端传输的根据所述文件的摘要信息生成的隐 私信息;
所述保存单元, 还用于保存所述隐私信息与所述地址信息的对应关系。
21、 根据权利要求 19所述的装置, 其特征在于,
所述下发单元, 具体用于向用户终端下发第一共享密钥, 以使所述用户终端根据所 述第一共享密钥对文件进行加密, 得到加密文件后, 向云服务器上传所述加密文件以及 根据所述文件的摘要信息生成的非隐私信息;
所述下发单元, 还用于向用户终端下发第二共享密钥, 以使所述用户终端根据所述 第二共享密钥对根据所述文件的摘要信息生成的隐私信息进行加密, 得到加密隐私信 息, 并向所述云服务器上传所述加密隐私信息。
22、 一种信息检索装置, 其特征在于, 所述装置包括:
接收单元, 用于接收第二用户终端发送的用于保存所述第二用户终端的加密文件的 地址信息,所述地址信息为所述云服务器获得所述第二用户终端上传的加密文件和非隐 私信息后, 向所述第二用户终端下发的保存所述加密文件的地址信息, 所述加密文件为 所述第二用户终端根据信任服务器下发的共享密钥对文件进行加密得到的加密文件,所 述非隐私信息为所述第二用户终端根据所述文件的摘要信息生成;
获取单元, 用于从所述云服务器上和所述信任服务器上获取与所述地址信息对应的 非隐私信息、 隐私信息及共享密钥, 所述隐私信息为所述第二用户终端根据所述文件的 摘要信息生成;
检索单元, 用于通过检索所述隐私信息和所述非隐私信息获得待访问文件的地址信 息;
所述获取单元, 还用于从所述云服务器获取与所述待访问文件的地址信息对应的第 一加密文件;
解密单元, 用于通过所述共享密钥解密所述第一加密文件获得所述待访问文件。
23、 根据权利要求 22所述的装置, 其特征在于, 所述获取单元包括:
第一地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
第一信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的隐私 信息和共享密钥;
所述第一地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息;
所述第一信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息。
24、 根据权利要求 22所述的装置, 其特征在于, 所述获取单元包括:
第二地址发送子单元, 用于向所述信任服务器发送所述用于保存所述第二用户终端 的加密文件的地址信息;
第二信息接收子单元, 用于接收所述信任服务器返回的与所述地址信息对应的第一 共享密钥和第二共享密钥;
所述第二地址发送子单元, 还用于向所述云服务器发送所述用于保存所述第二用户 终端的加密文件的地址信息; 所述第二信息接收子单元, 还用于接收所述云服务器返回的与所述地址信息对应的 非隐私信息和加密隐私信息;
第二信息解密子单元, 用于通过所述第二共享密钥对所述加密隐私信息进行解密得 到隐私信息;
所述解密单元, 具体用于通过所述第一共享密钥解密所述第一加密文件获得所述待 访问文件。
25、根据权利要求 22至 24任意一项所述的装置,其特征在于,所述检索单元包括: 信息匹配子单元, 用于将每个地址信息对应的隐私信息和非隐私信息分别与检索条 件进行匹配;
结果获得子单元, 用于根据匹配结果, 获得符合所述检索条件的隐私信息和非隐私 信息;
地址确定子单元, 用于将符合所述检索条件的隐私信息和非隐私信息对应的地址信 息确定为待访问文件的地址信息。
26、根据权利要求 22至 25任意一项所述的装置,其特征在于,所述获取单元包括: 第三地址发送子单元, 用于向所述云服务器发送所述待访问文件的地址信息; 第三文件接收子单元, 用于接收所述云服务器查找保存的地址信息与加密文件的对 应关系后, 发送的与所述待访问文件的地址信息对应的第一加密文件。
PCT/CN2014/073872 2013-03-21 2014-03-21 信息处理方法、检索方法、装置、用户终端及服务 WO2014146607A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP14768769.3A EP2940959B1 (en) 2013-03-21 2014-03-21 Apparatuses and system for the privacy and security of user files stored at a cloud server
US14/833,747 US20150363609A1 (en) 2013-03-21 2015-08-24 Information Processing Method and Apparatus, Information Retrieval Method and Apparatus, User Terminal, and Server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310091474.7A CN104065680B (zh) 2013-03-21 2013-03-21 信息处理方法、检索方法、装置、用户终端及服务器
CN201310091474.7 2013-03-21

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/833,747 Continuation US20150363609A1 (en) 2013-03-21 2015-08-24 Information Processing Method and Apparatus, Information Retrieval Method and Apparatus, User Terminal, and Server

Publications (1)

Publication Number Publication Date
WO2014146607A1 true WO2014146607A1 (zh) 2014-09-25

Family

ID=51553211

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/073872 WO2014146607A1 (zh) 2013-03-21 2014-03-21 信息处理方法、检索方法、装置、用户终端及服务

Country Status (4)

Country Link
US (1) US20150363609A1 (zh)
EP (1) EP2940959B1 (zh)
CN (1) CN104065680B (zh)
WO (1) WO2014146607A1 (zh)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11082490B2 (en) 2012-11-28 2021-08-03 Nvidia Corporation Method and apparatus for execution of applications in a cloud system
CN103442059B (zh) 2013-08-27 2017-02-01 华为终端有限公司 一种文件共享方法及装置
CN104699852A (zh) * 2015-04-08 2015-06-10 苏州大学张家港工业技术研究院 一种跨平台文档管理方法和装置
CN104994072B (zh) * 2015-05-28 2018-06-08 北京椒图科技有限公司 网站管理平台的访问方法及装置
US9590958B1 (en) * 2016-04-14 2017-03-07 Wickr Inc. Secure file transfer
CN105681365B (zh) * 2016-04-18 2019-05-14 北京小米移动软件有限公司 用于文件传输的方法和装置
CN106685932B (zh) * 2016-12-08 2019-11-15 努比亚技术有限公司 一种基于云服务的文件访问系统和方法
CN107943969B (zh) * 2017-11-28 2020-06-23 平安养老保险股份有限公司 年金数据文件发送方法、装置、计算机设备及存储介质
CN109347826B (zh) * 2018-10-22 2021-06-22 上海七牛信息技术有限公司 一种验证方法以及系统
CN109951378B (zh) * 2019-03-22 2021-08-24 西安电子科技大学 一种即时通信中的文件加密传输与共享方法
CN110532792B (zh) * 2019-08-29 2022-03-15 冷杉云(北京)科技股份有限公司 一种隐私信息的查看方法及系统
JP7287207B2 (ja) * 2019-09-13 2023-06-06 富士通株式会社 情報処理装置、制御プログラムおよび制御方法
US11916913B2 (en) * 2019-11-22 2024-02-27 International Business Machines Corporation Secure audio transcription
US11334529B2 (en) * 2020-01-28 2022-05-17 Citrix Systems, Inc. Recommending files for file sharing system
US20210365576A1 (en) * 2020-05-19 2021-11-25 T-Mobile Usa, Inc. Multistage database security
CN114726643B (zh) * 2022-04-27 2024-04-16 中国银行股份有限公司 云平台上的数据存储、访问方法及装置
CN117544622A (zh) * 2023-11-07 2024-02-09 翼健(上海)信息科技有限公司 一种用户可控的隐私数据授权共享方法、系统和介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102024054A (zh) * 2010-12-10 2011-04-20 中国科学院软件研究所 一种面向密文云存储的文档检索方法与系统
CN102075542A (zh) * 2011-01-26 2011-05-25 中国科学院软件研究所 一种云计算数据安全支撑平台
CN102687133A (zh) * 2009-11-16 2012-09-19 微软公司 用于可信计算和数据服务的无容器数据
WO2012167094A1 (en) * 2011-06-01 2012-12-06 Security First Corp. Systems and methods for secure distributed storage

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5940507A (en) * 1997-02-11 1999-08-17 Connected Corporation Secure file archive through encryption key management
JP2002007749A (ja) * 2000-06-27 2002-01-11 Hitachi Ltd サーバ振り分け装置、サービス提供システム及びサービス提供方法
US7146499B2 (en) * 2002-09-30 2006-12-05 International Business Machines Corporation Security system for replicated storage devices on computer networks
CN100464549C (zh) * 2005-10-28 2009-02-25 广东省电信有限公司研究院 一种数据安全存储业务的实现方法
US8676810B2 (en) * 2006-07-31 2014-03-18 Ricoh Co., Ltd. Multiple index mixed media reality recognition using unequal priority indexes
US8799322B2 (en) * 2009-07-24 2014-08-05 Cisco Technology, Inc. Policy driven cloud storage management and cloud storage policy router
US8621220B2 (en) * 2010-03-11 2013-12-31 Ebay Inc. Systems and methods for identity encapsulated cryptography
US8949252B2 (en) * 2010-03-29 2015-02-03 Ebay Inc. Product category optimization for image similarity searching of image-based listings in a network-based publication system
US8880905B2 (en) * 2010-10-27 2014-11-04 Apple Inc. Methods for processing private metadata
TW201227395A (en) * 2010-12-22 2012-07-01 Hon Hai Prec Ind Co Ltd Cloud data security controlling system and method
JP5621675B2 (ja) * 2011-03-18 2014-11-12 富士通株式会社 署名装置、署名方法、および署名プログラム
EP2695101B1 (en) * 2011-04-04 2022-11-09 Nextlabs, Inc. Protecting information using policies and encryption
US8943096B2 (en) * 2011-06-22 2015-01-27 Stone Vault, LLC Method and apparatus for storing, sharing, and/or organizing personal information
KR101819556B1 (ko) * 2011-08-18 2018-01-18 삼성전자주식회사 클라우드 컴퓨팅 시스템에서 패밀리 클라우드를 지원하기 위한 장치 및 방법
US8189225B1 (en) * 2011-10-04 2012-05-29 Google Inc. Printing to a cloud printer via NFC
US9264499B2 (en) * 2012-12-14 2016-02-16 Intel Corporation Cloud data storage location monitoring

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102687133A (zh) * 2009-11-16 2012-09-19 微软公司 用于可信计算和数据服务的无容器数据
CN102024054A (zh) * 2010-12-10 2011-04-20 中国科学院软件研究所 一种面向密文云存储的文档检索方法与系统
CN102075542A (zh) * 2011-01-26 2011-05-25 中国科学院软件研究所 一种云计算数据安全支撑平台
WO2012167094A1 (en) * 2011-06-01 2012-12-06 Security First Corp. Systems and methods for secure distributed storage

Also Published As

Publication number Publication date
CN104065680B (zh) 2017-03-08
EP2940959B1 (en) 2018-09-12
EP2940959A1 (en) 2015-11-04
EP2940959A4 (en) 2016-03-30
CN104065680A (zh) 2014-09-24
US20150363609A1 (en) 2015-12-17

Similar Documents

Publication Publication Date Title
WO2014146607A1 (zh) 信息处理方法、检索方法、装置、用户终端及服务
US9923877B2 (en) External indexing and search for a secure cloud collaboration system
US10389689B2 (en) Systems and methods for securely streaming media content
US9129125B2 (en) Data sharing method and device
CN110049016B (zh) 区块链的数据查询方法、装置、系统、设备及存储介质
US10742407B2 (en) Method of hybrid searchable encryption and system using the same
JP2016510962A (ja) 暗号化ネットワークストレージスペース
US11122122B2 (en) Restricting access to a data storage system on a local network
EP3039811B1 (en) Method, content owner device, computer program, and computer program product for distributing content items to authorized users
CN109525388B (zh) 一种密钥分离的组合加密方法及系统
CN112597523B (zh) 文件处理方法、文件转换加密机、终端、服务器及介质
EP2942899B1 (en) Information processing method, trust server and cloud server
JP2022542095A (ja) 強化された安全な暗号化及び復号化システム
KR20210058313A (ko) 클라우드 환경에서 안전하고 효율적인 데이터 공유를 위한 속성기반 암호를 활용한 데이터 접근 제어 방법 및 시스템
JP2024501326A (ja) アクセス制御方法、装置、ネットワーク側機器、端末及びブロックチェーンノード
CN116709325B (zh) 一种基于高速加密算法的移动设备安全认证方法
CN107919958B (zh) 一种数据加密的处理方法、装置及设备
Manjunath An Efficient, Secure De duplication Data Storing in Cloud Storage Environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14768769

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2014768769

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE