Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Static data encryption protection method and system

A static data and data key technology, applied in digital data protection, digital transmission systems, transmission systems, etc., can solve problems such as low security, encrypted file leakage, and inconvenient use, so as to improve key security and improve safety effect

Active Publication Date: 2020-04-10
山东三未信安信息科技有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are various problems in the above methods: the terminal file encryption product is deployed on the user terminal system in the form of software, and the user needs to manually decrypt the file when accessing the encrypted file, which is inconvenient to use; the encryption of the transmitted file cannot solve the security of the file storage Problem; Full Disk Encryption encrypts data at the disk level, but cannot encrypt only specific files
[0004] At the same time, when the above products encrypt files, the encryption keys are all stored on the disk, which is less secure
Once the key is lost or leaked, the encrypted file will be leaked or damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static data encryption protection method and system
  • Static data encryption protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0023] figure 1 It is a schematic flowchart of a static data encryption protection method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes:

[0024] S1, register the server host information where the client is located to the server;

[0025] S2, at the server end, assign a master key to the directory or file of the server host where the client needs to be encrypted, and generate an encryption control strategy according to the assigned master key, and issue the encryption control strategy to the corresponding client end;

[0026] S3, the client obtains and stores a corresponding master key from the server through a secure channel according to the received encrypti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a static data encryption protection method and system. The static data encryption protection method comprises the steps of: registering information of a server host where a client is located to a server; distributing a master key for a directory or a file of the server host at the server, generating an encryption control strategy and issuing the encryption control strategyto a corresponding client; allowing the client to acquire a corresponding master key from the server according to the encryption control strategy; when data is written into the encrypted directory orfile, randomly generating a data key, and encrypting the directory or file by using the data key so as to obtain an encrypted file; and encrypting the data key by using the master key so as to obtaina key ciphertext, and writing the key ciphertext into the head of the encrypted file so as to finish data writing. According to the invention, the client executes encryption and decryption operationof the file, and the server achieves server host management, secret key management, control strategy management and the like, so encrypted file transparent access and key and strategy unified management are achieved; file management and use permission are separated; and the safety of file protection is improved.

Description

technical field [0001] The invention relates to the technical field of file security protection, in particular to a static data encryption protection method and system. Background technique [0002] With the continuous development of information technology, people's awareness of information security is getting stronger and stronger. How to ensure that the confidential data of enterprises will not be stolen is a problem that people are more and more concerned about. Sensitive data stored on enterprise servers includes various documents, pictures, audio and video files, database files, and other types of data, which may be subject to leakage risks from inside or outside the enterprise. [0003] Among the file security protection technologies, there are mainly terminal file encryption, transfer file encryption, and full disk encryption. There are various problems in the above methods: the terminal file encryption product is deployed on the user terminal system in the form of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60H04L9/08H04L29/06
CPCG06F21/602G06F21/604G06F2221/2107G06F2221/2141H04L9/0822H04L9/0869H04L63/062
Inventor 张森张建树董坤朋鹿淑煜王腾帅
Owner 山东三未信安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products