CN105025019A - Data safety sharing method - Google Patents
Data safety sharing method Download PDFInfo
- Publication number
- CN105025019A CN105025019A CN201510390936.4A CN201510390936A CN105025019A CN 105025019 A CN105025019 A CN 105025019A CN 201510390936 A CN201510390936 A CN 201510390936A CN 105025019 A CN105025019 A CN 105025019A
- Authority
- CN
- China
- Prior art keywords
- data
- url
- cloud server
- sharing
- recipient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a data safety sharing method. In the method, a data provider enables to-be-shared data to be transmitted to a cloud side, and the to-be-shared data is stored at the cloud side. The URL storing the data is returned to the data provider, and the data provider carries out the data encryption of the URL and then transmits the URL through the addresses of other data providers to a data receiver. The data receiver obtains the URL through decryption, then visits cloud data, and obtains the to-be-shared data. When the to-be-shared data is transmitted to the cloud side through the data provider, or is stored at the cloud side, the to-be-shared data can be encrypted, the data receiver also can carry out decryption when receiving the encrypted data, or the data is decrypted by the cloud side and then is received. The method is simple.
Description
Technical field
The present invention relates to data security arts, after particularly using encryption method will be stored into cloud server after sharing data encryption, resource access positional information is encrypted and is sent to recipient, and then realize data security and share.
Background technology
Data security is shared and is had extensive use.Such as enterprise employees needs the working result of oneself to share with colleague, such as, send a technical scheme data.Usual way is that data is directly sent to the other side, or by after files passe to cloud server, tells that the other side one accesses and connect and extraction code.Such process does not have security guarantee.Commonly carry out sharing method by after data encryption, it is very complicated again that it shares process.
Summary of the invention
Object of the present invention at present, the information security issue that data sharing brings and a kind of data security sharing method is provided.
The present invention for the technical scheme reaching its goal of the invention and adopt is: a kind of method that data security is shared, and data providing sends data file to data receiver, and data receiver's received data file, comprises the following steps:
Data to be shared are submitted to cloud server by step 1, data providing;
Step 2, cloud server receive after the data shared, and store, return a URL that can access these data to data providing;
After step 3, data providing receive URL, URL encryption is sent to data receiver;
After step 4, data receiver receive URL encrypted cipher text, deciphering, obtains URL;
The URL of acquisition is submitted to cloud server by step 5, data receiver;
After step 6, cloud server checking data recipient submit the legitimacy of URL to, the sharing data of correspondence is sent to data receiver.
By data to be shared are saved in high in the clouds in the present invention, the URL of sharing data is treated in the relevant preservation utilizing high in the clouds to be supplied to data receiver, makes data sharing very safe.
The present invention designs a kind of new data security sharing method; take full advantage of the generality of the data channel such as note; utilize encryption mechanism to carry out safeguard protection to the storage of sharing data on Cloud Server and resource location access process thereof simultaneously; both the distributing data position visit information quickly and easily such as the data channel that utilizes note had been achieved; overcome again the shortcoming that the data channel such as note cannot hold large data, and then achieve the walk away safety distribution procedure of Various types of data on quick passage.
Following optimal way is also had in the present invention:
In described step 1, data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
Can ensure that the source of data to be shared is no problem by authentication.
In addition, in described step 1, data providing uses recipient's user ID and id password system parameters to carry out forming sharing data encrypted cipher text to described data encryption to be shared before submitting data to be shared to cloud server.
Or in described step 2, cloud server stores after the data shared use recipient's user ID and id password system parameters is encrypted.
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient.
Or also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
Data to be shared are at data providing or be sent to high in the clouds and be encrypted, and be decrypted, more ensure that data security at receiving terminal or cloud server end.
In described step or step 2, ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.
In addition, data to be shared and URL recipient's user ID and id password system parameters are carried out data encryption by data providing; The identity private key that data receiver uses self identification corresponding and id password system parameters carry out data deciphering.The URL that cloud server provides shares path and the access control information of encrypt data except comprising access.Described access control information comprises the file extraction code that cloud server produces at random, and when data receiver uses URL extraction document, cloud server is by the correctness of verification URL file extraction code.In step 4, the data channel that URL encrypted cipher text passes through includes but not limited to by data providing, note, mail, micro-letter.
The validity of data receiver can be ensured by an approach.
Below in conjunction with specific embodiment, further instruction is more carried out to the present invention.
Accompanying drawing explanation
Fig. 1 is flow process of the present invention.
Embodiment
Embodiment 1, as shown in Figure 1, the present embodiment is a kind of data security sharing method, and in the method, some users form a data sharing group, and in this group, each user has a phone number.Data sharing system is made up of Cloud Server, private subscribers client.System user have registered service in an id password system, has the identity private key that id password system parameters is corresponding with oneself phone number.When there being data providing to think sharing data to some group members in group, data security can being completed by following steps and sharing.
1, the private subscribers client of data providing is by data to be shared and system public information, as system domain name and current year, use digital digest algorithm as SHA256, the digest value of the data of generation system public information+share, as contents encryption key CEK.
2, the private subscribers client of data providing uses id password system parameters and the mark encryption algorithm of specifying, and using each recipient's phone number as PKI, is encrypted CEK, generating content encryption keys ciphertext.
3, the private subscribers client of data providing uses CEK according to the symmetric encipherment algorithm of specifying as sharing contents is treated in AES-CBC encryption.
4, the data in step 2 and 3 are merged formation sharing data encrypt file according to certain coding rule by the private subscribers client of data providing.Sharing data encrypt file is submitted to Cloud Server.Now, can sign to sharing data encrypt file, data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
5, after cloud server sharing data encrypt file, generate the access URL of this file and the file extraction code of stochastic generation 32, return the complete URL comprised using file extraction code as parameter.
UR(Uniform Resource Locator, URLL URL(uniform resource locator)) be a kind of expression succinctly of position to the resource that can obtain from the Internet and access method, be the address of standard resource on the Internet.Each file on the Internet has a unique URL, and the information that it comprises points out how the position of file and browser should process it.
On History of the Internet, the invention of URL is a very basic step.The grammer of URL(uniform resource locator) is general, extendible, and it uses a part for American Standard Code for Information Interchange to represent the address of internet.The opening flag of general URL the procotol that a computer network uses.
6, after the private subscribers client of data providing receives URL, the mark encryption algorithm using id password system parameters and specify, using each recipient's phone number as PKI, is encrypted URL, generates URL ciphertext.After each URL ciphertext is encoded according to messaging format, be sent to the phone number of corresponding recipient with short message mode.
7, the private subscribers client of a data receiver is after receiving the note that step 6 sends, and uses identity private key corresponding to oneself phone number according to the algorithm deciphering short message content of specifying, obtains the URL of include file extraction code.
8, the URL of include file extraction code is submitted to Cloud Server by the private subscribers client of data receiver, request extraction document.
9, after Cloud Server has verified the correctness of URL and file extraction code, sharing data encrypt file is sent to data receiver.
10, the private subscribers client of data receiver is after receiving sharing data encryption, uses identity private key corresponding to oneself phone number to decipher CEK encrypted cipher text section corresponding to oneself phone number according to the algorithm of specifying, obtains CEK.
11, the private subscribers client of data receiver uses CEK according to the algorithm deciphering sharing contents data of specifying.
Embodiment 2, the present embodiment is identical with embodiment 1 main thought, has following difference:
A, data providing are by when the data shared are sent to high in the clouds, and data providing additionally provides recipient's list to cloud server.
B, cloud server store after the data shared use recipient's user ID and id password system parameters is encrypted.
C, data receiver require cloud server deciphering sharing data when URL being submitted to cloud server; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient.
Embodiment 3, the present embodiment embodiment 2 main thought is identical, and having when following difference is deciphering is that data receiver uses one's own private key to decipher sharing data ciphertext, obtains final sharing data.
In a word, in the present invention, data to be shared are encrypted and decrypted and can have with under type:
1. transmit leg local cipher, the deciphering of recipient this locality.
2. transmit leg high in the clouds encryption, the deciphering of recipient this locality.
3. transmit leg local cipher, when recipient has an identity certification, high in the clouds is deciphered.
4. transmit leg high in the clouds encryption, when recipient has an identity certification, high in the clouds is deciphered.
As for the pin mode that encryption and decryption adopt, can be common asymmetric encryption, also can be the standard compliant cipher mode that any security performances such as mark encryption are good.When adopt mark encryption mode treat the data shared be encrypted time, comprise the following steps:
Sharing data ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for described derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.
Claims (9)
1. a data security sharing method, data providing sends data file to data receiver, and data receiver's received data file, is characterized in that: comprise the following steps:
Data to be shared are submitted to cloud server by step 1, data providing;
Step 2, cloud server receive after the data shared, and store, return a URL that can access these data to data providing;
After step 3, data providing receive URL, URL encryption is sent to data receiver;
After step 4, data receiver receive URL encrypted cipher text, deciphering, obtains URL;
The URL of acquisition is submitted to cloud server by step 5, data receiver;
After step 6, cloud server checking data recipient submit the legitimacy of URL to, the sharing data of correspondence is sent to data receiver.
2. data security sharing method according to claim 1, is characterized in that: in described step 1, and data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
3. data security sharing method according to claim 1, it is characterized in that: in described step 1, data providing uses recipient's user ID and id password system parameters to carry out forming sharing data encrypted cipher text to described data encryption to be shared before submitting data to be shared to cloud server;
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient;
Or
Also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
4. data security sharing method according to claim 1, is characterized in that: in described step 1, and data providing additionally provides recipient's list to cloud server;
In described step 2, cloud server stores after the data shared use recipient's user ID and id password system parameters is encrypted;
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient;
Or
Also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
5. the data security sharing method according to claim 3 or 4, is characterized in that: in described step 1 or step 2, ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.
6. data security sharing method according to claim 1, is characterized in that: URL recipient's user ID and id password system parameters are carried out data encryption by data providing; The identity private key that data receiver uses self identification corresponding and id password system parameters carry out data deciphering.
7. data security sharing method according to claim 1, is characterized in that: the URL that cloud server provides shares path and the access control information of encrypt data except comprising access.
8. data security sharing method according to claim 7, it is characterized in that: described access control information comprises the file extraction code that cloud server produces at random, when data receiver uses URL extraction document, cloud server is by the correctness of verification URL file extraction code.
9. data security sharing method according to claim 1, is characterized in that: in step 4, and the data channel that URL encrypted cipher text passes through includes but not limited to by data providing, note, mail, micro-letter.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510390936.4A CN105025019B (en) | 2015-07-07 | 2015-07-07 | A kind of data safety sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510390936.4A CN105025019B (en) | 2015-07-07 | 2015-07-07 | A kind of data safety sharing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105025019A true CN105025019A (en) | 2015-11-04 |
CN105025019B CN105025019B (en) | 2018-09-28 |
Family
ID=54414724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510390936.4A Active CN105025019B (en) | 2015-07-07 | 2015-07-07 | A kind of data safety sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105025019B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105681365A (en) * | 2016-04-18 | 2016-06-15 | 北京小米移动软件有限公司 | File transmission method and device |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
CN106572074A (en) * | 2016-08-03 | 2017-04-19 | 青岛海信移动通信技术股份有限公司 | Method and device for verifying identifying code |
CN108475373A (en) * | 2016-01-11 | 2018-08-31 | 万事达卡国际股份有限公司 | It generates and sends between computing devices and encrypted payment data message to realize that fund shifts |
CN108882182A (en) * | 2017-05-11 | 2018-11-23 | 展讯通信(上海)有限公司 | Short message ciphering and deciphering device |
CN109120576A (en) * | 2017-06-23 | 2019-01-01 | 腾讯科技(深圳)有限公司 | Data sharing method and device, computer equipment and storage medium |
CN109379194A (en) * | 2018-12-11 | 2019-02-22 | 西安慧博习兆信息技术有限公司 | With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file |
CN110071863A (en) * | 2016-12-08 | 2019-07-30 | 深圳奥联信息安全技术有限公司 | A kind of instant communication users group's encryption method based on id password |
CN110166403A (en) * | 2018-01-23 | 2019-08-23 | 广东七洲科技股份有限公司 | A kind of safety method of key and ciphertext separated transmission |
CN110266683A (en) * | 2019-06-18 | 2019-09-20 | 北京阿尔山区块链联盟科技有限公司 | Digital asset sharing method, device and electronic equipment |
CN111464838A (en) * | 2020-05-26 | 2020-07-28 | 厦门理工学院 | Information interaction device and method applied to new media |
CN113127881A (en) * | 2021-04-20 | 2021-07-16 | 重庆电子工程职业学院 | Data security processing method based on big data |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
US20120331088A1 (en) * | 2011-06-01 | 2012-12-27 | Security First Corp. | Systems and methods for secure distributed storage |
CN103516516A (en) * | 2012-06-28 | 2014-01-15 | 中国电信股份有限公司 | File safe sharing method, system and terminal |
CN103973736A (en) * | 2013-01-30 | 2014-08-06 | 华为终端有限公司 | Data sharing method and device |
-
2015
- 2015-07-07 CN CN201510390936.4A patent/CN105025019B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120331088A1 (en) * | 2011-06-01 | 2012-12-27 | Security First Corp. | Systems and methods for secure distributed storage |
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
CN103516516A (en) * | 2012-06-28 | 2014-01-15 | 中国电信股份有限公司 | File safe sharing method, system and terminal |
CN103973736A (en) * | 2013-01-30 | 2014-08-06 | 华为终端有限公司 | Data sharing method and device |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108475373A (en) * | 2016-01-11 | 2018-08-31 | 万事达卡国际股份有限公司 | It generates and sends between computing devices and encrypted payment data message to realize that fund shifts |
CN105681365B (en) * | 2016-04-18 | 2019-05-14 | 北京小米移动软件有限公司 | Method and apparatus for file transmission |
CN105681365A (en) * | 2016-04-18 | 2016-06-15 | 北京小米移动软件有限公司 | File transmission method and device |
CN106572074A (en) * | 2016-08-03 | 2017-04-19 | 青岛海信移动通信技术股份有限公司 | Method and device for verifying identifying code |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
CN106534324B (en) * | 2016-11-18 | 2019-07-26 | Oppo广东移动通信有限公司 | A kind of data sharing method and Cloud Server |
CN110071863A (en) * | 2016-12-08 | 2019-07-30 | 深圳奥联信息安全技术有限公司 | A kind of instant communication users group's encryption method based on id password |
CN108882182A (en) * | 2017-05-11 | 2018-11-23 | 展讯通信(上海)有限公司 | Short message ciphering and deciphering device |
CN108882182B (en) * | 2017-05-11 | 2021-06-18 | 展讯通信(上海)有限公司 | Short message encryption and decryption device |
CN109120576A (en) * | 2017-06-23 | 2019-01-01 | 腾讯科技(深圳)有限公司 | Data sharing method and device, computer equipment and storage medium |
CN109120576B (en) * | 2017-06-23 | 2020-11-03 | 腾讯科技(深圳)有限公司 | Data sharing method and device, computer equipment and storage medium |
CN110166403A (en) * | 2018-01-23 | 2019-08-23 | 广东七洲科技股份有限公司 | A kind of safety method of key and ciphertext separated transmission |
CN109379194A (en) * | 2018-12-11 | 2019-02-22 | 西安慧博习兆信息技术有限公司 | With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file |
CN110266683A (en) * | 2019-06-18 | 2019-09-20 | 北京阿尔山区块链联盟科技有限公司 | Digital asset sharing method, device and electronic equipment |
CN111464838A (en) * | 2020-05-26 | 2020-07-28 | 厦门理工学院 | Information interaction device and method applied to new media |
CN113127881A (en) * | 2021-04-20 | 2021-07-16 | 重庆电子工程职业学院 | Data security processing method based on big data |
Also Published As
Publication number | Publication date |
---|---|
CN105025019B (en) | 2018-09-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105025019A (en) | Data safety sharing method | |
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
RU2718689C2 (en) | Confidential communication control | |
KR101508360B1 (en) | Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer | |
CN103051628B (en) | Obtain the method and system of authentication token based on server | |
US11930103B2 (en) | Method, user device, management device, storage medium and computer program product for key management | |
CN103516516B (en) | file security sharing method, system | |
CN104158827B (en) | Ciphertext data sharing method, device, inquiry server and upload data client | |
CN101720071B (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN103812871A (en) | Development method and system based on mobile terminal application program security application | |
CN104917759A (en) | Third-party-based safety file storage and sharing system and method | |
JPWO2010150813A1 (en) | Encryption key distribution system | |
CN101466079A (en) | Method, system and WAPI terminal for transmitting e-mail | |
CN103684766A (en) | Private key protection method and system for terminal user | |
CN108809633B (en) | Identity authentication method, device and system | |
CN102404337A (en) | Data encryption method and device | |
CN108964896B (en) | Kerberos identity authentication system and method based on group key pool | |
CN104200154A (en) | Identity based installation package signing method and identity based installation package signing device | |
WO2018220693A1 (en) | Information processing device, verification device, information processing system, information processing method, and recording medium | |
KR100721522B1 (en) | Method for providing location based service using location token | |
CN104243439A (en) | File transfer processing method and system and terminals | |
CN104486087A (en) | Digital signature method based on remote hardware security modules | |
US10404451B2 (en) | Apparatus and method for message communication | |
CN102694650A (en) | Secret key generating method based on identity encryption | |
CN107749854B (en) | Single sign-on method and system based on client |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |