Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A file and business secret technology, applied to electrical components, transmission systems, etc., can solve problems such as hacker cracking and interception, information leakage, and low file security
Inactive Publication Date: 2018-05-04
CGN POWER CO LTD +1
View PDF4 Cites 3 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] However, the transmission of business secret files through the network also has a certain risk of information leakage, such as sending files through emails in plain text, sen...
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0015] The exchange method of business confidential documents, including:
[0016] Step 101, file upload, file upload includes randomly extracting business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;
[0017] Step 102, file downloading, file downloading includes using multi-factor authentication to verify the download identity, and connecting the client to the server through the application program to download the file;
[0018] Step 103, file transfer, file transfer includes encrypting the interaction information between the server and the client using encryption security policy.
[0019] Among them, the server adopts the SFTP server of the LINUX operating system, installs the digital certificate issued by the internationally recognized CA organization, and encrypts the digital certificate by more than 128-256 bits. Server and client exchange information...
Embodiment 2
[0027] The exchange method of business confidential documents, including:
[0028] Step 201, using multi-factor authentication to verify the upload identity;
[0029] Step 201, file upload, file upload includes random extraction of business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;
[0030] Step 203, file downloading, file downloading includes using multi-factor authentication to verify the downloading identity, and connecting the client to the server through the application program to download the file;
[0031] Step 204 , file transfer, the file transfer includes encrypting the interaction information between the server and the client using an encryption security policy.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention provides a business secret file exchange method. The method comprises the following steps: randomly extracting a business secret algorithm and a random key to encrypt the file, and thenuploading the encrypted file to a server connected to a public network through an application program; verifying the downloading identity by using multi-factor authentication, and downloading the fileon the client through an application program connection server; and encrypting the interaction information between the server and the client by using an encryption security strategy. As the file is uploaded and downloaded through the application program, the downloading path cannot be directly obtained from the outside; the uploaded file is encrypted by randomly extracting the business secret algorithm and the random key, so that the information in the file cannot be easily obtained even if the file is intercepted in a transmission process; the downloading identity is checked by using the multi-factor authentication, so that the downloading security can be greatly improved; and in addition, the file is encrypted by the encryption security strategy during the transmission, so that the information security in the file transmission process is improved.
Description
technical field [0001] This application relates to a method for exchanging business secret documents. Background technique [0002] A large amount of business confidential documents need to be exchanged between the main body and external suppliers, partners, etc. In the past, commercial confidential documents were mostly transmitted by media such as CDs and paper, which was inefficient and unable to be managed centrally, and there was a certain risk of leakage. Realizing the paperless transmission of commercial confidential documents through the network has a positive effect on shortening the document transmission cycle, improving work efficiency, reducing transmission costs, and promoting environmental protection. [0003] However, the transmission of commercial confidential documents through the network also has a certain risk of information leakage, such as sending files through emails in plain text, sending files through instant messaging software, downloading through U...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.