Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security system and method suitable for sharing encrypted files and recovering keys

A technology for encrypting files and data security, which is applied in the field of data security systems for sharing encrypted files and recovering keys. It can solve the problems of encrypted file key cracking, complicated encryption/decryption procedures, etc., and achieve the effect of key recovery

Active Publication Date: 2011-12-21
EGIS TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above-mentioned problems in the prior art, the object of the present invention is to provide a data security system and method suitable for sharing encrypted files and recovering the key, so as to solve the problem of using a single key in the prior art to encrypt multiple files. The problem of the key; also solve the danger that the manager key of the encrypted file is cracked by using two keys in the previous technology, and the problem of complicated encryption / decryption procedures caused by the replacement of the manager key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security system and method suitable for sharing encrypted files and recovering keys
  • Data security system and method suitable for sharing encrypted files and recovering keys
  • Data security system and method suitable for sharing encrypted files and recovering keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] see figure 1 , which is a block diagram of the data security system of the present invention. Such as figure 1 As shown, the data security system 1 suitable for sharing encrypted files and recovering keys is composed of a processing unit 10 connected to an input unit 11 , an encryption module 12 and a storage unit 13 . Wherein, the input unit 11 can include a keyboard, a mouse, a card reader, a fingerprint recognition device or a face recognition device; the storage unit 13 is used to store and input a manager key (Master Key) and a user key (User Key), and the storage unit 13 includes a key storage area (Key Store) 14, and the storage unit 13 can be a built-in hard disk, an external hard disk, a flash drive or a memory card.

[0062] Please also refer to Figure 2 to Figure 4 , which is a block diagram for generating a random key, a block diagram for generating a first hash value, and a schematic diagram of a key storage area of ​​the data security system of the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data security system applicable to sharing an encrypted file and recovering a secrete key and a method thereof, which are used for converting a source file into the encrypted file, wherein an administrator secrete key and a user secrete key are input through an input unit; a random secrete key is generated through a processing unit with a random derivation function according to the administrator secrete key; and a secrete key storage area is provided for storing the random secrete key and the user secrete key, which are encrypted and protected through the administrator secrete key. In the encryption process, an encryption module randomly generates a session secrete key so that the content of the source file is encrypted into encrypted data; the session secrete key is encrypted through the administrator secrete key or the user secrete key so that an encrypted session secrete key is generated; and the encrypted session secrete key and the encrypted data are packed into the encrypted file. Thereby, the encrypted file only has one encrypted session secrete key so that the safety strength of the encrypted file can be ensured. In the decryption process, the administration secrete key can be used by an administrator to decrypt the secrete key storage area, and consequently the random secrete key and the user secrete key are taken out to decrypt the encrypted file.

Description

technical field [0001] The present invention relates to a data security system and its method, and in particular to a data security system and method suitable for sharing encrypted files and key recovery. Background technique [0002] In the process of continuous innovation and change of science and technology, people have entered a new era where they can freely send and receive information, but what follows is that people's living space and personal privacy have been threatened and challenged unprecedentedly. Therefore, when data is shared or in order to prevent data from being easily used by others, many data encryption / decryption systems and methods thereof have been developed, for example, encrypting a file to be shared with a key. [0003] When the administrator wants to share the file with the user and does not want to inform the administrator of the key to the user, the file must be encrypted with the user key. If you want to have different user keys for encrypted fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/14
Inventor 江元麟
Owner EGIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products