Secure file management system and method capable of achieving read/write splitting
A technology that separates secure files from reading and writing. It is applied in the field of network information security. It can solve problems such as inability to resist files and inconvenience, and achieve the effect of clear functional responsibilities.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] 1. Reference figure 1 , the secure file management system supporting read-write separation of the present invention is composed of a trusted authority TA, a service provider, a file owner, a file approver, and a file reader;
[0055] The trusted authority TA has a system initialization module, a key management module and an identity information management module. The system initialization module is used to initialize the system, generate public parameters and master keys, and send the master keys to The key management module saves; the key management module uses the system master key to generate and distribute key pairs for the file owner and the file approver; the identity information management module processes the registration request, examines the identity information, and provides key management Modules and service providers provide information on file owners and file approvers;
[0056] The service provider is used to provide storage services, request processing ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com