Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File security management system applied to network and management method thereof

A technology of security management and management method, which is applied in the field of file security management and information encryption and decryption to achieve the effect of ensuring safe use and overcoming potential security risks.

Inactive Publication Date: 2010-08-25
强敏
View PDF1 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Therefore, there are more or less defects in the existing security protection mechanisms, which need to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File security management system applied to network and management method thereof
  • File security management system applied to network and management method thereof
  • File security management system applied to network and management method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The invention will be further explained below in conjunction with the drawings.

[0046] The structure of the management system of the present invention is shown in Figure 1, including a server end and a user end connected via a network. The server end is composed of multiple servers, and each server is provided with a file encryption device and a user biometric receiving device. The client stores and sends a file encrypted with the user's biometrics as a key to the client. The client is provided with a user's biometrics collection device and a file decryption device. The client uses the user's biometrics to decrypt the file transmitted by the server.

[0047] The management method of the present invention includes the following steps:

[0048] 1) The processing steps on the server side specifically include accepting user registration and authentication operations, receiving and registering user biometric operations, encrypting files with user biometrics, and transmitting encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file security management system applied to a network, which comprises server and a user which are connected through the network, wherein the server is provided with file encryption equipment and user biological characteristic receiving equipment; the server stores and transmits files encrypted by using user biological characteristics as keys to the user; the user is provided with user biological characteristic acquisition equipment and file decryption equipment; and the user decrypts the files transmitted by the server by adopting the user biological characteristics. The file security management system effectively solves the security management problem of the files in the network.

Description

Technical field [0001] The invention belongs to the field of file safety management and information encryption and decryption, and particularly relates to a file safety management system applied to a network and a management method thereof. Background technique [0002] At present, in the field of file security management, encryption and decryption mechanisms are mostly used. That is, the server encrypts and protects files through symmetric encryption or asymmetric encryption algorithms, while the user uses the corresponding key for decryption. The disadvantage is the security management of the key. Once the key is stolen, there is no security at all, and even if the key is not stolen, after others intercept the ciphertext, they can also obtain plaintext information through brute force cracking, which poses a greater security risk. [0003] Further, the prior art also introduces a verification mechanism, that is, the file is stored on the server. When the user wants to obtain the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/00
Inventor 强敏
Owner 强敏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products