Business secret file exchange method

A file and business secret technology, applied to electrical components, transmission systems, etc., can solve problems such as hacker cracking and interception, information leakage, and low file security

Inactive Publication Date: 2018-05-04
CGN POWER CO LTD +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the transmission of business secret files through the network also has a certain risk of information leakage, such as sending files through emails in plain text, sen...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] The exchange method of business confidential documents, including:

[0016] Step 101, file upload, file upload includes randomly extracting business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;

[0017] Step 102, file downloading, file downloading includes using multi-factor authentication to verify the download identity, and connecting the client to the server through the application program to download the file;

[0018] Step 103, file transfer, file transfer includes encrypting the interaction information between the server and the client using encryption security policy.

[0019] Among them, the server adopts the SFTP server of the LINUX operating system, installs the digital certificate issued by the internationally recognized CA organization, and encrypts the digital certificate by more than 128-256 bits. Server and client exchange information...

Embodiment 2

[0027] The exchange method of business confidential documents, including:

[0028] Step 201, using multi-factor authentication to verify the upload identity;

[0029] Step 201, file upload, file upload includes random extraction of business secret algorithm and random key to encrypt the file, and then upload the encrypted file to the server connected to the public network through the application program;

[0030] Step 203, file downloading, file downloading includes using multi-factor authentication to verify the downloading identity, and connecting the client to the server through the application program to download the file;

[0031] Step 204 , file transfer, the file transfer includes encrypting the interaction information between the server and the client using an encryption security policy.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a business secret file exchange method. The method comprises the following steps: randomly extracting a business secret algorithm and a random key to encrypt the file, and thenuploading the encrypted file to a server connected to a public network through an application program; verifying the downloading identity by using multi-factor authentication, and downloading the fileon the client through an application program connection server; and encrypting the interaction information between the server and the client by using an encryption security strategy. As the file is uploaded and downloaded through the application program, the downloading path cannot be directly obtained from the outside; the uploaded file is encrypted by randomly extracting the business secret algorithm and the random key, so that the information in the file cannot be easily obtained even if the file is intercepted in a transmission process; the downloading identity is checked by using the multi-factor authentication, so that the downloading security can be greatly improved; and in addition, the file is encrypted by the encryption security strategy during the transmission, so that the information security in the file transmission process is improved.

Description

technical field [0001] This application relates to a method for exchanging business secret documents. Background technique [0002] A large amount of business confidential documents need to be exchanged between the main body and external suppliers, partners, etc. In the past, commercial confidential documents were mostly transmitted by media such as CDs and paper, which was inefficient and unable to be managed centrally, and there was a certain risk of leakage. Realizing the paperless transmission of commercial confidential documents through the network has a positive effect on shortening the document transmission cycle, improving work efficiency, reducing transmission costs, and promoting environmental protection. [0003] However, the transmission of commercial confidential documents through the network also has a certain risk of information leakage, such as sending files through emails in plain text, sending files through instant messaging software, downloading through U...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0442H04L63/08H04L63/083H04L63/0838H04L67/06
Inventor 姚全兵陈龙闪烁黄天武
Owner CGN POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products