A static data encryption protection method and system

A static data and data key technology, applied in the direction of digital data protection, digital transmission system, transmission system, etc., can solve the problems of low security, encrypted file leakage, inconvenient use, etc., to improve security and key safety effect

Active Publication Date: 2021-07-23
山东三未信安信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are various problems in the above methods: the terminal file encryption product is deployed on the user terminal system in the form of software, and the user needs to manually decrypt the file when accessing the encrypted file, which is inconvenient to use; the encryption of the transmitted file cannot solve the security of the file storage Problem; Full Disk Encryption encrypts data at the disk level, but cannot encrypt only specific files
[0004] At the same time, when the above products encrypt files, the encryption keys are all stored on the disk, which is less secure
Once the key is lost or leaked, the encrypted file will be leaked or damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A static data encryption protection method and system
  • A static data encryption protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0023] figure 1 It is a schematic flowchart of a static data encryption protection method provided by an embodiment of the present invention. like figure 1 As shown, the method includes:

[0024] S1, register the server host information where the client is located to the server;

[0025] S2, at the server end, assign a master key to the directory or file of the server host where the client needs to be encrypted, and generate an encryption control strategy according to the assigned master key, and issue the encryption control strategy to the corresponding client end;

[0026] S3, the client obtains and stores a corresponding master key from the server through a secure channel according to the received encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a static data encryption protection method and system. The method includes: registering the information of the server host where the client is located to the server; assigning a master key to the directory or file of the server host at the server, generating an encryption control strategy and downloading Send to the corresponding client; the client obtains the corresponding master key from the server according to the encryption control strategy; when writing data to the encrypted directory or file, a data key is randomly generated, and the directory or file is encrypted using the data key. Encrypt to obtain an encrypted file; use the master key to encrypt the data key to obtain the key ciphertext, and write the key ciphertext to the header of the encrypted file to complete the data writing. In the present invention, the client performs encryption and decryption operations of files, and the server implements server host management, key management, and control strategy management, etc., realizes transparent access to encrypted files, unified management of keys and strategies, and separates file management and use rights, improving file protection security.

Description

technical field [0001] The invention relates to the technical field of file security protection, in particular to a static data encryption protection method and system. Background technique [0002] With the continuous development of information technology, people's awareness of information security is getting stronger and stronger. How to ensure that the confidential data of enterprises will not be stolen is a problem that people are more and more concerned about. Sensitive data stored on enterprise servers includes various documents, pictures, audio and video files, database files, and other types of data, which may be subject to leakage risks from inside or outside the enterprise. [0003] Among the file security protection technologies, there are mainly terminal file encryption, transfer file encryption, and full disk encryption. There are various problems in the above methods: the terminal file encryption product is deployed on the user terminal system in the form of s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60H04L9/08H04L29/06
CPCG06F21/602G06F21/604G06F2221/2107G06F2221/2141H04L9/0822H04L9/0869H04L63/062
Inventor 张森张建树董坤朋鹿淑煜王腾帅
Owner 山东三未信安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products