Data security system and method suitable for sharing encrypted files and recovering keys
A technology for encrypting files and data security, which is applied in the field of data security systems for sharing encrypted files and recovering keys. It can solve the problems of encrypted file key cracking, complicated encryption/decryption procedures, etc., and achieve the effect of key recovery
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] see figure 1 , which is a block diagram of the data security system of the present invention. Such as figure 1 As shown, the data security system 1 suitable for sharing encrypted files and recovering keys is composed of a processing unit 10 connected to an input unit 11 , an encryption module 12 and a storage unit 13 . Wherein, the input unit 11 can include a keyboard, a mouse, a card reader, a fingerprint recognition device or a face recognition device; the storage unit 13 is used to store and input a manager key (Master Key) and a user key (User Key), and the storage unit 13 includes a key storage area (Key Store) 14, and the storage unit 13 can be a built-in hard disk, an external hard disk, a flash drive or a memory card.
[0062] Please also refer to Figure 2 to Figure 4 , which is a block diagram for generating a random key, a block diagram for generating a first hash value, and a schematic diagram of a key storage area of the data security system of the pre...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com