Movatterモバイル変換


[0]ホーム

URL:


CN107395612A - Realize the System and method for of network disk data safety - Google Patents

Realize the System and method for of network disk data safety
Download PDF

Info

Publication number
CN107395612A
CN107395612ACN201710670947.7ACN201710670947ACN107395612ACN 107395612 ACN107395612 ACN 107395612ACN 201710670947 ACN201710670947 ACN 201710670947ACN 107395612 ACN107395612 ACN 107395612A
Authority
CN
China
Prior art keywords
encryption
file
dropbox
network disk
disk data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710670947.7A
Other languages
Chinese (zh)
Inventor
刘剑飞
常清雪
肖建
李成东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Electric Co Ltd
Original Assignee
Sichuan Changhong Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Electric Co LtdfiledCriticalSichuan Changhong Electric Co Ltd
Priority to CN201710670947.7ApriorityCriticalpatent/CN107395612A/en
Publication of CN107395612ApublicationCriticalpatent/CN107395612A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of System and method for for realizing network disk data safety, it is intended to protects network disk data, the safety of information and privacy, the sensitive data that need to be passed to Dropbox preservation is encrypted by installing the terminal applies of the system, terminal applies in terminal by user.After the completion of encryption, then incoming Dropbox is preserved.When user needs to extract data, former encryption data is first downloaded from Dropbox, then encryption data is decrypted by terminal applies and is reduced to former data file.So that to be stored in the sensitive data in Dropbox, there is provided a kind of security mechanism and service.

Description

Realize the System and method for of network disk data safety
Technical field
The present invention relates to Dropbox security technology area, and in particular to a kind of System and method for for realizing network disk data safety.
Background technology
With the development of internet, Dropbox is with more and more common.Have personal Dropbox, enterprise's Dropbox, have free Dropbox andCharge Dropbox, the space of Dropbox are also increasing.Increasing people stores the texts such as video, audio, text, picture with DropboxPart, the source code of exploitation is even transferred to Dropbox storage backup by application developer, while Dropbox may also be used for friend pointEnjoy the content being stored in Dropbox.Dropbox is that data message exchange storage provides a great convenience.But there is also one for DropboxFixed potential safety hazard.Such as provide that the server of Dropbox service is obtained by a hacker, the sensitive data of storage can be provided Dropbox clothesThe third company of business, and possess keeper's acquisition of high authority.So it is stored in sensitivity in Dropbox, private data is presentCompromised risk.
The content of the invention
Instant invention overcomes the deficiencies in the prior art, there is provided a kind of System and method for for realizing network disk data safety, it is intended toTo be stored in the sensitive data in Dropbox, there is provided a kind of security mechanism and service.
In view of the above mentioned problem of prior art, according to one side disclosed by the invention, the present invention uses following technologyScheme:
A kind of method for realizing network disk data safety, its ciphering process include:
According to the cipher mode that User Defined selects to being used to be uploaded to before third party's Dropbox on application terminalFile is encrypted, and generates encryption and decryption key at random by server;
Server preserves encryption and decryption key and recording of encrypted fileinfo;
Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
In order to which the present invention is better achieved, further technical scheme is:
According to one embodiment of the invention, before to file encryption, the file for bytecode format is translated the file into.
According to another embodiment of the invention, the symmetric encipherment algorithm of the User Defined selection encryption file.
According to another embodiment of the invention, after file encryption, the encryption file of .rar forms is generated.
According to another embodiment of the invention, the title or terminal applies of User Defined encryption file are ordered automaticallyName.
According to another embodiment of the invention, the encryption fileinfo includes the filename and original text of encryption filePart name.
According to another embodiment of the invention, the cipher mode of the User Defined selection is calculated using symmetric cryptographyMethod.
According to another embodiment of the invention, in addition to:
Terminal applies carry out Hash operation to encryption file, and server obtains and preserves Hash operation value.
According to another embodiment of the invention, decrypting process includes:
It is close to obtain the encryption and decryption for encrypting file according to the encryption file to be decrypted of selection from server for application terminalKey, Hash operation value and encryption fileinfo;
The Hash operation value of file to be decrypted on application terminal is contrasted with the Hash operation value obtained from server,It is determined that in the case that the two is consistent, then the file of explanation preservation third party's Dropbox is not modified;
Corresponding AES and key are called in application terminal, and encryption file is decrypted.
The present invention can also be:
A kind of system for realizing network disk data safety, including:
It is corresponding for realizing the cipher mode selected according to User Defined and generating encryption and decryption key at random by serverWith the device being encrypted for the file before being uploaded to third party's Dropbox in terminal;And
Realize by encryption situation of the described device to server feedback, encryption and decryption key and recording of encrypted are preserved by serverFileinfo;Encryption file on application terminal after the completion of encryption is used to be uploaded in third party's Dropbox to preserve.
Compared with prior art, one of beneficial effects of the present invention are:
A kind of System and method for for realizing network disk data safety of the present invention, server download terminal of the user from the systemUsing, you can the file for preparing encryption is encrypted.Then the file after encryption is uploaded into Dropbox to be preserved.So protectHaving demonstrate,proved after the file being stored in Dropbox is stolen to be read, while key is not together preservation with encryption file, ensure thatEncryption file is not easy to be cracked.The server of the system provides download terminal application, preserves the function such as key, user's login.WithFamily changes terminal or when being in strange land, can also obtain the encryption file for uploading or downloading Dropbox, and encryption and decryption file.So makeThe system of obtaining has good applicability and versatility.
Brief description of the drawings
, below will be to embodiment for clearer explanation present specification embodiment or technical scheme of the prior artOr the required accompanying drawing used is briefly described in the description of prior art, it should be apparent that, drawings in the following description are onlyIt is the reference to some embodiments in present specification, for those skilled in the art, is not paying creative workIn the case of, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the file encryption schematic flow sheet according to the network disk data encryption system of one embodiment of the invention.
Fig. 2 is the file decryption schematic flow sheet according to the network disk data encryption system of one embodiment of the invention.
Embodiment
The present invention is described in further detail with reference to embodiment, but the implementation of the present invention is not limited to this.
The system of this Dropbox data safety is mainly made up of server and the part of application terminal two, and its major function includes:
Server is responsible for downloading application terminal, manages user data, enciphering and deciphering algorithm, the file name of recording of encrypted, lifeDeposit and preserve the functions such as encryption and decryption key.
Application terminal need to be arranged in the terminal that user uses, such as PC, smart mobile phone etc..Major function is responsible forEncryption and decryption file, encryption and decryption key is obtained to server, managing encrypted algorithm, obtains the functions such as user data.
As shown in figure 1, Fig. 1 shows the file encryption stream of network disk data encryption system according to an embodiment of the inventionJourney, its idiographic flow are:
1st, user accesses network disk data encryption system server, downloads and installs network disk data encryption system terminal.
2nd, user starts installation network disk data encryption system terminal, is registered by terminal interface and is passed to user to serverThe information such as name, password, E-mail address, phone.
3rd, the file that user need to be encrypted by the selection of terminal applies dialog box, such as text, audio file, video textPart, picture file, compressed file etc., translate the file into the file for bytecode format.
4th, user can customize the symmetric encipherment algorithm of selection encryption file, and algorithm is supplied to from small to large by Cipher StrengthUser, symmetric encipherment algorithm include TEA, BLOWFISH, AES.Default encryption algorithm is BLOWFISH.Encryption key is by serverRandom generation, and preserve in the server.There are 32 according to customer option key length, 64,128, default key lengthFor 64.When User Defined selects AES, intensity is stronger, and corresponding key is also longer.
5th, after file encryption, the encryption file of .rar forms is generated.Encrypt file filename user can oneself definition orNamed automatically by terminal applies.Terminal applies carry out MD5 Hash operations to encryption file again, obtain the MD5 cryptographic Hash of ciphertext withFilename, the old file name of encryption file together preserve in the server.After the filename preservation for completing MD5 and encryption file,Application terminal can prompt the filename that user not change encryption file arbitrarily again.Such as need to change, need to be by terminal applies, will be newThe filename of change is updated into server.
6th, user is obtained after encrypting file, and encryption file is uploaded in third party's Dropbox and preserved.
As shown in Fig. 2 Fig. 2 shows the file decryption stream of network disk data encryption system according to an embodiment of the inventionJourney, its idiographic flow are:
1st, user logs in third party's Dropbox by encryption file download to user terminal, such as PC, intelligent terminal etc..
2nd, the application terminal of network disk data encryption system is started on the subscriber terminal, such as user leads in other place reasonsChanges terminal is caused, then needs to access network disk data encryption system server download application terminal, in new terminal.
3rd, user logs in application terminal, starts application terminal decryption dialog box, selects the encryption file that need to be decrypted.Using endEnd obtains the letter such as AES and key, MD5 values, old file name of the encryption file according to user name, filename from serverBreath.
4th, application terminal obtains the MD5 values contrast that the MD5 values of file to be decrypted obtain with server first, it is determined that unanimously,The file for illustrating to have third party's Dropbox is without any change.
5th, corresponding AES and key are finally called in application terminal, and encryption file is decrypted.Obtained after decryptionThe file of bytecode format.
6th, the file of bytecode format is finally converted to by original according to the suffix of old file name.
To sum up, the present invention can protect network disk data, the safety of information and privacy, and user in terminal by installing the systemTerminal applies, the sensitive data that need to be passed to Dropbox preservation is encrypted terminal applies, and after the completion of encryption, then incoming Dropbox is carried outPreserve.When user needs to extract data, former encryption data is first downloaded from Dropbox, then by terminal applies to encrypting numberFormer data file is reduced to according to being decrypted, so as to be the sensitive data being stored in Dropbox, there is provided a kind of safe and secret machineSystem and service.
Scheme disclosed by the invention can be applied to 360 cloud disks, Baidu's cloud Dropbox, 115 Dropbox, association's enterprise disk,MediaFire etc., preserve sensitive data and sensitive document.To preserving secret privacy information, prevent third party, hacker from obtaining, usurpingChange and play good safeguard protection effect.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be with it is otherThe difference of embodiment, identical similar portion cross-reference between each embodiment.
" one embodiment " for being spoken of in this manual, " another embodiment ", " embodiment ", etc., refer to tyingSpecific features, structure or the feature for closing embodiment description are included at least one embodiment of the application generality descriptionIn.It is not necessarily to refer to same embodiment that statement of the same race, which occur, in multiple places in the description.Appoint furthermore, it is understood that combiningWhen one embodiment describes a specific features, structure or feature, what is advocated is this to realize with reference to other embodimentFeature, structure or feature are also fallen within the scope of the present invention.
Although reference be made herein to invention has been described for multiple explanatory embodiments of the invention, however, it is to be understood thatThose skilled in the art can be designed that a lot of other modifications and embodiment, and these modifications and embodiment will fall in this ShenPlease be within disclosed spirit and spirit.More specifically, can be to master in the range of disclosure and claimThe building block and/or layout for inscribing composite configuration carry out a variety of variations and modifications.Except what is carried out to building block and/or layoutOutside variations and modifications, to those skilled in the art, other purposes also will be apparent.

Claims (10)

CN201710670947.7A2017-08-082017-08-08Realize the System and method for of network disk data safetyPendingCN107395612A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710670947.7ACN107395612A (en)2017-08-082017-08-08Realize the System and method for of network disk data safety

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710670947.7ACN107395612A (en)2017-08-082017-08-08Realize the System and method for of network disk data safety

Publications (1)

Publication NumberPublication Date
CN107395612Atrue CN107395612A (en)2017-11-24

Family

ID=60354953

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710670947.7APendingCN107395612A (en)2017-08-082017-08-08Realize the System and method for of network disk data safety

Country Status (1)

CountryLink
CN (1)CN107395612A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108259609A (en)*2018-01-202018-07-06福建省数字福建云计算运营有限公司The management method and Cloud Server of a kind of family high in the clouds data

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102123143A (en)*2011-01-212011-07-13宁波市胜源技术转移有限公司Method for storing data in network safely
CN102685148A (en)*2012-05-312012-09-19清华大学Method for realizing secure network backup system under cloud storage environment
CN103595793A (en)*2013-11-132014-02-19华中科技大学Cloud data safe deleting system and method without support of trusted third party
CN103617401A (en)*2013-11-252014-03-05北京深思数盾科技有限公司Method and device for protecting data files
US20140372750A1 (en)*2013-05-082014-12-18Intermedia.net. Inc.Client-side encryption
CN106254324A (en)*2016-07-262016-12-21杭州文签网络技术有限公司A kind of encryption method storing file and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102123143A (en)*2011-01-212011-07-13宁波市胜源技术转移有限公司Method for storing data in network safely
CN102685148A (en)*2012-05-312012-09-19清华大学Method for realizing secure network backup system under cloud storage environment
US20140372750A1 (en)*2013-05-082014-12-18Intermedia.net. Inc.Client-side encryption
CN103595793A (en)*2013-11-132014-02-19华中科技大学Cloud data safe deleting system and method without support of trusted third party
CN103617401A (en)*2013-11-252014-03-05北京深思数盾科技有限公司Method and device for protecting data files
CN106254324A (en)*2016-07-262016-12-21杭州文签网络技术有限公司A kind of encryption method storing file and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108259609A (en)*2018-01-202018-07-06福建省数字福建云计算运营有限公司The management method and Cloud Server of a kind of family high in the clouds data
CN108259609B (en)*2018-01-202020-10-16福建省数字福建云计算运营有限公司Family cloud data management method and cloud server

Similar Documents

PublicationPublication DateTitle
JP6383019B2 (en) Multiple permission data security and access
US9537864B2 (en)Encryption system using web browsers and untrusted web servers
CN104917759B (en) Third-party-based secure file storage and sharing system and method
US9070112B2 (en)Method and system for securing documents on a remote shared storage resource
CN102915263B (en)A kind of data back up method, system and equipment
JP5033916B2 (en) Digital copyright management method for compressed files
CN103731395B (en)The processing method and system of file
US9608822B2 (en)Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
CN107368747A (en)A kind of mobile office method, service end, client and system
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
KR20220039779A (en) Enhanced security encryption and decryption system
CN105072134A (en)Cloud disk system file secure transmission method based on three-level key
CN103078959A (en)Encryption and decryption method for protecting safety of cloud storage data
CN105827574A (en)File access system, file access method and file access device
CN103312690A (en)System and method for key management of cloud computing platform
CN110572454A (en) Advertisement delivery system that guarantees the safety of the advertisement delivery process
CN108933758A (en)Cloud storage encipher-decipher method, device and system can be shared
CN116233158A (en) A data storage method, device, equipment and storage medium
CN108494724B (en)Cloud storage encryption system based on multi-authority attribute encryption algorithm
CN111031352A (en)Audio and video encryption method, security processing method, device and storage medium
CN115102694A (en) A method and system for sharing sensitive information based on centralized storage
CN112995204B (en)Method, device, equipment and storage medium for safely reading Protonmail encrypted mail
US10380352B2 (en)Document security in enterprise content management systems
CN107395612A (en)Realize the System and method for of network disk data safety
CN108768616B (en)Model data leakage prevention method in equipment management platform

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20171124


[8]ページ先頭

©2009-2025 Movatter.jp