[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN105025019A - Data safety sharing method - Google Patents

Data safety sharing method Download PDF

Info

Publication number
CN105025019A
CN105025019A CN201510390936.4A CN201510390936A CN105025019A CN 105025019 A CN105025019 A CN 105025019A CN 201510390936 A CN201510390936 A CN 201510390936A CN 105025019 A CN105025019 A CN 105025019A
Authority
CN
China
Prior art keywords
data
url
cloud server
sharing
recipient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510390936.4A
Other languages
Chinese (zh)
Other versions
CN105025019B (en
Inventor
蔡先勇
吴福印
程朝辉
但波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Ao Lian Information Security Technology Co Ltd
Original Assignee
Shenzhen Ao Lian Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ao Lian Information Security Technology Co Ltd filed Critical Shenzhen Ao Lian Information Security Technology Co Ltd
Priority to CN201510390936.4A priority Critical patent/CN105025019B/en
Publication of CN105025019A publication Critical patent/CN105025019A/en
Application granted granted Critical
Publication of CN105025019B publication Critical patent/CN105025019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a data safety sharing method. In the method, a data provider enables to-be-shared data to be transmitted to a cloud side, and the to-be-shared data is stored at the cloud side. The URL storing the data is returned to the data provider, and the data provider carries out the data encryption of the URL and then transmits the URL through the addresses of other data providers to a data receiver. The data receiver obtains the URL through decryption, then visits cloud data, and obtains the to-be-shared data. When the to-be-shared data is transmitted to the cloud side through the data provider, or is stored at the cloud side, the to-be-shared data can be encrypted, the data receiver also can carry out decryption when receiving the encrypted data, or the data is decrypted by the cloud side and then is received. The method is simple.

Description

A kind of data security sharing method
Technical field
The present invention relates to data security arts, after particularly using encryption method will be stored into cloud server after sharing data encryption, resource access positional information is encrypted and is sent to recipient, and then realize data security and share.
Background technology
Data security is shared and is had extensive use.Such as enterprise employees needs the working result of oneself to share with colleague, such as, send a technical scheme data.Usual way is that data is directly sent to the other side, or by after files passe to cloud server, tells that the other side one accesses and connect and extraction code.Such process does not have security guarantee.Commonly carry out sharing method by after data encryption, it is very complicated again that it shares process.
Summary of the invention
Object of the present invention at present, the information security issue that data sharing brings and a kind of data security sharing method is provided.
The present invention for the technical scheme reaching its goal of the invention and adopt is: a kind of method that data security is shared, and data providing sends data file to data receiver, and data receiver's received data file, comprises the following steps:
Data to be shared are submitted to cloud server by step 1, data providing;
Step 2, cloud server receive after the data shared, and store, return a URL that can access these data to data providing;
After step 3, data providing receive URL, URL encryption is sent to data receiver;
After step 4, data receiver receive URL encrypted cipher text, deciphering, obtains URL;
The URL of acquisition is submitted to cloud server by step 5, data receiver;
After step 6, cloud server checking data recipient submit the legitimacy of URL to, the sharing data of correspondence is sent to data receiver.
By data to be shared are saved in high in the clouds in the present invention, the URL of sharing data is treated in the relevant preservation utilizing high in the clouds to be supplied to data receiver, makes data sharing very safe.
The present invention designs a kind of new data security sharing method; take full advantage of the generality of the data channel such as note; utilize encryption mechanism to carry out safeguard protection to the storage of sharing data on Cloud Server and resource location access process thereof simultaneously; both the distributing data position visit information quickly and easily such as the data channel that utilizes note had been achieved; overcome again the shortcoming that the data channel such as note cannot hold large data, and then achieve the walk away safety distribution procedure of Various types of data on quick passage.
Following optimal way is also had in the present invention:
In described step 1, data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
Can ensure that the source of data to be shared is no problem by authentication.
In addition, in described step 1, data providing uses recipient's user ID and id password system parameters to carry out forming sharing data encrypted cipher text to described data encryption to be shared before submitting data to be shared to cloud server.
Or in described step 2, cloud server stores after the data shared use recipient's user ID and id password system parameters is encrypted.
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient.
Or also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
Data to be shared are at data providing or be sent to high in the clouds and be encrypted, and be decrypted, more ensure that data security at receiving terminal or cloud server end.
In described step or step 2, ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.
In addition, data to be shared and URL recipient's user ID and id password system parameters are carried out data encryption by data providing; The identity private key that data receiver uses self identification corresponding and id password system parameters carry out data deciphering.The URL that cloud server provides shares path and the access control information of encrypt data except comprising access.Described access control information comprises the file extraction code that cloud server produces at random, and when data receiver uses URL extraction document, cloud server is by the correctness of verification URL file extraction code.In step 4, the data channel that URL encrypted cipher text passes through includes but not limited to by data providing, note, mail, micro-letter.
The validity of data receiver can be ensured by an approach.
Below in conjunction with specific embodiment, further instruction is more carried out to the present invention.
Accompanying drawing explanation
Fig. 1 is flow process of the present invention.
Embodiment
Embodiment 1, as shown in Figure 1, the present embodiment is a kind of data security sharing method, and in the method, some users form a data sharing group, and in this group, each user has a phone number.Data sharing system is made up of Cloud Server, private subscribers client.System user have registered service in an id password system, has the identity private key that id password system parameters is corresponding with oneself phone number.When there being data providing to think sharing data to some group members in group, data security can being completed by following steps and sharing.
1, the private subscribers client of data providing is by data to be shared and system public information, as system domain name and current year, use digital digest algorithm as SHA256, the digest value of the data of generation system public information+share, as contents encryption key CEK.
2, the private subscribers client of data providing uses id password system parameters and the mark encryption algorithm of specifying, and using each recipient's phone number as PKI, is encrypted CEK, generating content encryption keys ciphertext.
3, the private subscribers client of data providing uses CEK according to the symmetric encipherment algorithm of specifying as sharing contents is treated in AES-CBC encryption.
4, the data in step 2 and 3 are merged formation sharing data encrypt file according to certain coding rule by the private subscribers client of data providing.Sharing data encrypt file is submitted to Cloud Server.Now, can sign to sharing data encrypt file, data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
5, after cloud server sharing data encrypt file, generate the access URL of this file and the file extraction code of stochastic generation 32, return the complete URL comprised using file extraction code as parameter.
UR(Uniform Resource Locator, URLL URL(uniform resource locator)) be a kind of expression succinctly of position to the resource that can obtain from the Internet and access method, be the address of standard resource on the Internet.Each file on the Internet has a unique URL, and the information that it comprises points out how the position of file and browser should process it.
On History of the Internet, the invention of URL is a very basic step.The grammer of URL(uniform resource locator) is general, extendible, and it uses a part for American Standard Code for Information Interchange to represent the address of internet.The opening flag of general URL the procotol that a computer network uses.
6, after the private subscribers client of data providing receives URL, the mark encryption algorithm using id password system parameters and specify, using each recipient's phone number as PKI, is encrypted URL, generates URL ciphertext.After each URL ciphertext is encoded according to messaging format, be sent to the phone number of corresponding recipient with short message mode.
7, the private subscribers client of a data receiver is after receiving the note that step 6 sends, and uses identity private key corresponding to oneself phone number according to the algorithm deciphering short message content of specifying, obtains the URL of include file extraction code.
8, the URL of include file extraction code is submitted to Cloud Server by the private subscribers client of data receiver, request extraction document.
9, after Cloud Server has verified the correctness of URL and file extraction code, sharing data encrypt file is sent to data receiver.
10, the private subscribers client of data receiver is after receiving sharing data encryption, uses identity private key corresponding to oneself phone number to decipher CEK encrypted cipher text section corresponding to oneself phone number according to the algorithm of specifying, obtains CEK.
11, the private subscribers client of data receiver uses CEK according to the algorithm deciphering sharing contents data of specifying.
Embodiment 2, the present embodiment is identical with embodiment 1 main thought, has following difference:
A, data providing are by when the data shared are sent to high in the clouds, and data providing additionally provides recipient's list to cloud server.
B, cloud server store after the data shared use recipient's user ID and id password system parameters is encrypted.
C, data receiver require cloud server deciphering sharing data when URL being submitted to cloud server; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient.
Embodiment 3, the present embodiment embodiment 2 main thought is identical, and having when following difference is deciphering is that data receiver uses one's own private key to decipher sharing data ciphertext, obtains final sharing data.
In a word, in the present invention, data to be shared are encrypted and decrypted and can have with under type:
1. transmit leg local cipher, the deciphering of recipient this locality.
2. transmit leg high in the clouds encryption, the deciphering of recipient this locality.
3. transmit leg local cipher, when recipient has an identity certification, high in the clouds is deciphered.
4. transmit leg high in the clouds encryption, when recipient has an identity certification, high in the clouds is deciphered.
As for the pin mode that encryption and decryption adopt, can be common asymmetric encryption, also can be the standard compliant cipher mode that any security performances such as mark encryption are good.When adopt mark encryption mode treat the data shared be encrypted time, comprise the following steps:
Sharing data ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for described derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.

Claims (9)

1. a data security sharing method, data providing sends data file to data receiver, and data receiver's received data file, is characterized in that: comprise the following steps:
Data to be shared are submitted to cloud server by step 1, data providing;
Step 2, cloud server receive after the data shared, and store, return a URL that can access these data to data providing;
After step 3, data providing receive URL, URL encryption is sent to data receiver;
After step 4, data receiver receive URL encrypted cipher text, deciphering, obtains URL;
The URL of acquisition is submitted to cloud server by step 5, data receiver;
After step 6, cloud server checking data recipient submit the legitimacy of URL to, the sharing data of correspondence is sent to data receiver.
2. data security sharing method according to claim 1, is characterized in that: in described step 1, and data providing has carried out the authentication based on self identification and private key before submitting data to be shared to cloud server.
3. data security sharing method according to claim 1, it is characterized in that: in described step 1, data providing uses recipient's user ID and id password system parameters to carry out forming sharing data encrypted cipher text to described data encryption to be shared before submitting data to be shared to cloud server;
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient;
Or
Also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
4. data security sharing method according to claim 1, is characterized in that: in described step 1, and data providing additionally provides recipient's list to cloud server;
In described step 2, cloud server stores after the data shared use recipient's user ID and id password system parameters is encrypted;
In described step 7, when URL is submitted to cloud server by data receiver, require cloud server deciphering sharing data; Cloud server, after the legitimacy of verification URL, uses the private key decrypting ciphertext of recipient, and sharing data is expressly sent to recipient;
Or
Also comprise step 8, data receiver uses one's own private key to decipher sharing data ciphertext, obtain final sharing data.
5. the data security sharing method according to claim 3 or 4, is characterized in that: in described step 1 or step 2, ciphering process is as follows:
Step 1, encryption side are by by sharing data and open system information derived contents encryption key; The essential characteristic of the method for derived contents encryption key is: when sharing data and open system information constant, the contents encryption key derived from is constant, when in sharing data and open system information, any part changes, the contents encryption key of derivation changes;
Step 2, use recipient PKI are according to specifying cryptographic algorithm encrypted content encryption key, generating content encryption key ciphertext;
Step 3, use contents encryption key encrypt sharing data, generating content encrypted cipher text according to appointment symmetric encipherment algorithm;
Step 4, merge content encryption key ciphertext and content-encrypt ciphertext generating content encrypt data.
6. data security sharing method according to claim 1, is characterized in that: URL recipient's user ID and id password system parameters are carried out data encryption by data providing; The identity private key that data receiver uses self identification corresponding and id password system parameters carry out data deciphering.
7. data security sharing method according to claim 1, is characterized in that: the URL that cloud server provides shares path and the access control information of encrypt data except comprising access.
8. data security sharing method according to claim 7, it is characterized in that: described access control information comprises the file extraction code that cloud server produces at random, when data receiver uses URL extraction document, cloud server is by the correctness of verification URL file extraction code.
9. data security sharing method according to claim 1, is characterized in that: in step 4, and the data channel that URL encrypted cipher text passes through includes but not limited to by data providing, note, mail, micro-letter.
CN201510390936.4A 2015-07-07 2015-07-07 A kind of data safety sharing method Active CN105025019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510390936.4A CN105025019B (en) 2015-07-07 2015-07-07 A kind of data safety sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510390936.4A CN105025019B (en) 2015-07-07 2015-07-07 A kind of data safety sharing method

Publications (2)

Publication Number Publication Date
CN105025019A true CN105025019A (en) 2015-11-04
CN105025019B CN105025019B (en) 2018-09-28

Family

ID=54414724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510390936.4A Active CN105025019B (en) 2015-07-07 2015-07-07 A kind of data safety sharing method

Country Status (1)

Country Link
CN (1) CN105025019B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681365A (en) * 2016-04-18 2016-06-15 北京小米移动软件有限公司 File transmission method and device
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN106572074A (en) * 2016-08-03 2017-04-19 青岛海信移动通信技术股份有限公司 Method and device for verifying identifying code
CN108475373A (en) * 2016-01-11 2018-08-31 万事达卡国际股份有限公司 It generates and sends between computing devices and encrypted payment data message to realize that fund shifts
CN108882182A (en) * 2017-05-11 2018-11-23 展讯通信(上海)有限公司 Short message ciphering and deciphering device
CN109120576A (en) * 2017-06-23 2019-01-01 腾讯科技(深圳)有限公司 Data sharing method and device, computer equipment and storage medium
CN109379194A (en) * 2018-12-11 2019-02-22 西安慧博习兆信息技术有限公司 With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file
CN110071863A (en) * 2016-12-08 2019-07-30 深圳奥联信息安全技术有限公司 A kind of instant communication users group's encryption method based on id password
CN110166403A (en) * 2018-01-23 2019-08-23 广东七洲科技股份有限公司 A kind of safety method of key and ciphertext separated transmission
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment
CN111464838A (en) * 2020-05-26 2020-07-28 厦门理工学院 Information interaction device and method applied to new media
CN113127881A (en) * 2021-04-20 2021-07-16 重庆电子工程职业学院 Data security processing method based on big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
US20120331088A1 (en) * 2011-06-01 2012-12-27 Security First Corp. Systems and methods for secure distributed storage
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103973736A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Data sharing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331088A1 (en) * 2011-06-01 2012-12-27 Security First Corp. Systems and methods for secure distributed storage
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN103516516A (en) * 2012-06-28 2014-01-15 中国电信股份有限公司 File safe sharing method, system and terminal
CN103973736A (en) * 2013-01-30 2014-08-06 华为终端有限公司 Data sharing method and device

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108475373A (en) * 2016-01-11 2018-08-31 万事达卡国际股份有限公司 It generates and sends between computing devices and encrypted payment data message to realize that fund shifts
CN105681365B (en) * 2016-04-18 2019-05-14 北京小米移动软件有限公司 Method and apparatus for file transmission
CN105681365A (en) * 2016-04-18 2016-06-15 北京小米移动软件有限公司 File transmission method and device
CN106572074A (en) * 2016-08-03 2017-04-19 青岛海信移动通信技术股份有限公司 Method and device for verifying identifying code
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN106534324B (en) * 2016-11-18 2019-07-26 Oppo广东移动通信有限公司 A kind of data sharing method and Cloud Server
CN110071863A (en) * 2016-12-08 2019-07-30 深圳奥联信息安全技术有限公司 A kind of instant communication users group's encryption method based on id password
CN108882182A (en) * 2017-05-11 2018-11-23 展讯通信(上海)有限公司 Short message ciphering and deciphering device
CN108882182B (en) * 2017-05-11 2021-06-18 展讯通信(上海)有限公司 Short message encryption and decryption device
CN109120576A (en) * 2017-06-23 2019-01-01 腾讯科技(深圳)有限公司 Data sharing method and device, computer equipment and storage medium
CN109120576B (en) * 2017-06-23 2020-11-03 腾讯科技(深圳)有限公司 Data sharing method and device, computer equipment and storage medium
CN110166403A (en) * 2018-01-23 2019-08-23 广东七洲科技股份有限公司 A kind of safety method of key and ciphertext separated transmission
CN109379194A (en) * 2018-12-11 2019-02-22 西安慧博习兆信息技术有限公司 With the safe encryption and decryption of tagged keys, signature, the network system for transmitting file
CN110266683A (en) * 2019-06-18 2019-09-20 北京阿尔山区块链联盟科技有限公司 Digital asset sharing method, device and electronic equipment
CN111464838A (en) * 2020-05-26 2020-07-28 厦门理工学院 Information interaction device and method applied to new media
CN113127881A (en) * 2021-04-20 2021-07-16 重庆电子工程职业学院 Data security processing method based on big data

Also Published As

Publication number Publication date
CN105025019B (en) 2018-09-28

Similar Documents

Publication Publication Date Title
CN105025019A (en) Data safety sharing method
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
RU2718689C2 (en) Confidential communication control
KR101508360B1 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CN103051628B (en) Obtain the method and system of authentication token based on server
US11930103B2 (en) Method, user device, management device, storage medium and computer program product for key management
CN103516516B (en) file security sharing method, system
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103812871A (en) Development method and system based on mobile terminal application program security application
CN104917759A (en) Third-party-based safety file storage and sharing system and method
JPWO2010150813A1 (en) Encryption key distribution system
CN101466079A (en) Method, system and WAPI terminal for transmitting e-mail
CN103684766A (en) Private key protection method and system for terminal user
CN108809633B (en) Identity authentication method, device and system
CN102404337A (en) Data encryption method and device
CN108964896B (en) Kerberos identity authentication system and method based on group key pool
CN104200154A (en) Identity based installation package signing method and identity based installation package signing device
WO2018220693A1 (en) Information processing device, verification device, information processing system, information processing method, and recording medium
KR100721522B1 (en) Method for providing location based service using location token
CN104243439A (en) File transfer processing method and system and terminals
CN104486087A (en) Digital signature method based on remote hardware security modules
US10404451B2 (en) Apparatus and method for message communication
CN102694650A (en) Secret key generating method based on identity encryption
CN107749854B (en) Single sign-on method and system based on client

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant