CN107995195A - A kind of document security reading method and system based on mobile equipment - Google Patents
A kind of document security reading method and system based on mobile equipment Download PDFInfo
- Publication number
- CN107995195A CN107995195A CN201711255261.8A CN201711255261A CN107995195A CN 107995195 A CN107995195 A CN 107995195A CN 201711255261 A CN201711255261 A CN 201711255261A CN 107995195 A CN107995195 A CN 107995195A
- Authority
- CN
- China
- Prior art keywords
- document
- reader
- module
- server
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of document security reading method based on mobile equipment and system, this method to comprise the following steps:Mobile equipment receives document to be read;Reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;Judge whether the document is encrypted document, whether can be matched if judging the level of confidentiality of the document with the level of confidentiality in the subscriber policy, if successful match, utilize secret key decryption the document in system strategy;Successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows.With this solution, convenience and the security that document is read, edits, sharing are improved.
Description
Technical field
The present invention relates to data security arts, and in particular to a kind of document security reading method based on mobile equipment and is
System.
Background technology
With the arrival of information age, people become rich and varied to the mode of acquisition of information, and the reading of document is by tradition
The mode for being read to obtain using newpapers and periodicals, books, be progressively changed into electronic reading, but due to the factor such as be busy with one's work
Limitation, most of user can not carry PC whenever and wherever possible and carry out document information reading, so the electronic reading in mobile equipment exists
Solve the problems, such as that people spend reading comfort to a greater extent, this comfort level is not only easy to carry, more can be anywhere or anytime
Read, just because of this easily mode, the safety problem of data message leakage also more and more emerges, with society
The development of the platforms such as friendship, for enterprises document, individual privacy document, there is the security risk for being transmitted leakage, for existing
The problem of shape, document information is read safely, is urgently to be resolved hurrily.
There is a kind of technology " a kind of reading system and method for encrypting file " in the prior art, which includes " main service
Device ", " region server ", " reader ", realizes encrypted document read function.The strategy control that the technology is issued based on server
System, realizes a kind of ciphertext reader for carrying out document encryption and decryption functions.
The specific implementation of the technology is as follows:
1. each region server is communicated to connect with master server, also it is connected with more than one reader communication;
2. the region server that reader is connected to it sends the application information for reading encryption file, the regional service is utilized
Encryption file is decrypted in the authorization message that device returns, and opens the obtained decryption file of decryption;
3. region server judges that received application information is then by this application whether from the reader itself authorized
Information is sent to master server, and the authorization message that master server is returned is sent to the reader, otherwise, this application is not believed
Breath is sent to master server;
4. master server judges that received application information is Ze Xianggai areas whether from the region server itself authorized
Domain server sends authorization message, otherwise, does not send authorization message to the region server.
The prior art has the following disadvantages:
1. the reader can only decrypt the ciphertext that corresponding server issues, cause reader data source single;
2. the reader cannot set logon account, it is impossible to by the strategy that server issues to corresponding logon account,
It can not achieve the control for carrying out point-to-point document decryption;
3. the reader cannot carry out documents editing, and the document of editor is carried out corresponding encryption, pass through social platform
The document data transfer function of safety is carried out, it is single to cause reader functionality.
Nowadays in the epoch of network rapid development, while bringing benefit, drawback is also obvious all the more.With the quick of network
Development, the propagation platform of data message is abundant all the more, and more quickly, but private data information is transmitted the safety of leakage and asks at the same time
Topic, is also increasingly taken seriously.
The content of the invention
In order to solve the above technical problems, the present invention provides a kind of document security reading method based on mobile equipment, should
Method comprises the following steps:
1) mobile equipment receives document to be read;
2) reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;
3) judge whether the document is encrypted document, if it is, step 4) is jumped to, if it is not, then jumping to step
It is rapid 5);
4) whether judge the level of confidentiality of the document can match with the level of confidentiality in the subscriber policy, if successful match,
Using secret key decryption the document in system strategy, step 6) is otherwise jumped to;
5) successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows;
6) terminate.
According to an embodiment of the invention, it is preferred that need to create reader logon account in server end, and to the account
Level of confidentiality and key are generated, reader is handed down to by subscriber policy and system strategy respectively.
According to an embodiment of the invention, it is preferred that in the step 1), mobile equipment, which receives, passes through third party's social platform
Or the document that mail is shared.
According to an embodiment of the invention, it is preferred that, can be to this article after being shown in the step 5) to document progress plaintext
Shelves share third party's social platform into edlin after the document after to editor is encrypted;
The encryption key comes from system strategy.
According to an embodiment of the invention, it is preferred that in the step 2), if logged on success, then server returns to user
Strategy and system strategy, otherwise jump to step 6).
In order to solve the above technical problems, the present invention provides a kind of document security reading system, it is characterised in that the system
Including server, mobile equipment;
The server includes account management module, policy management module;
The movement equipment is provided with a reader, and the reader includes account authentication module, tactful acquisition module, document
Encryption/decryption module, file display module;
The reader receives document to be read;
The reader initiates logging request, the account management module pair of server by account authentication module to server
Logon account certification returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from
The system strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to decryption failure
Document carries out ciphertext and shows.
According to an embodiment of the invention, it is preferred that server end creates reader logon account by account management module,
And level of confidentiality and key are generated to the account, reader is handed down to by subscriber policy and system strategy respectively.
According to an embodiment of the invention, it is preferred that the system further includes:Document Editing module and sharing files module;
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social activity
Platform.
According to an embodiment of the invention, it is preferred that for the logging request of reader, server passes through account management module
To logon account certification success, then subscriber policy and system strategy are returned to, otherwise the result of return authentication failure.
In order to solve the above technical problems, the present invention provides a kind of mobile equipment, it includes computer-readable recording medium
And computer processor unit, the media storage have computer program, which is performed by the computer processor unit
Sequence realizes one of above-mentioned method.
By technical scheme, following technique effect is achieved:
(1. can receive the document information shared from various social platforms, no matter the document data of ciphertext or plaintext
It can carry out access by this reader to go forward side by side edlin, data source is rich and varied;
2. can communicate with server, logon account is set, it is real for the logon account, server distributing policy
Existing point-to-point document encryption and decryption control;
3. documents editing can be carried out, and document is encrypted using corresponding level of confidentiality, is pacified by social platform
Full document data transfer function, enjoying, network by now is fast-developing, not only so that data information transfer is quicker, but also protects
Safety problem of the private data information in transmitting procedure is demonstrate,proved.
Brief description of the drawings
Fig. 1 is the system architecture diagram of the prior art.
Fig. 2 is the method flow diagram of the prior art.
Fig. 3 is the system architecture diagram of the present invention.
The safety that Fig. 4 is the present invention reads key technology flow chart.
Fig. 5 is the safe reading method flow chart of the present invention.
Embodiment
In the present invention, mobile equipment refers to refer in particular to smart mobile phone or tablet computer in this document;Reader, is a kind of people
Quick, the practical document reading software or program of mobile reading are carried out, (this program or software can on the mobile apparatus for operation
Freely to read document content, a variety of file formats are supported, while can carry out edit and storage to file, the function such as share);Visitor
The reader in mobile equipment is refered in particular at family end, and in the present invention, client is reader.
<Protected view system framework>
Such as Fig. 3, the system integrally includes client and server
Client is divided into:Be divided into account authentication module, tactful acquisition module, document encryption/decryption module, documents editing module,
Document sharing module, has five modules altogether.As needed, a file display module (being not shown) can also be increased
The reader receives document to be read;
The reader initiates logging request, the account management module pair of server by account authentication module to server
Logon account certification returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from
The system strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to decryption failure
Document carries out ciphertext and shows.
Server end creates reader logon account by account management module, and generates level of confidentiality and key to the account,
Reader is handed down to by subscriber policy and system strategy respectively.
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social activity
Platform.
As shown in figure 4, server is successful to logon account certification by account management module, then subscriber policy is returned with being
The result of system strategy, otherwise return authentication failure.
Created an account in server console, and carry out tactful establishment, setting will carry out document the level of confidentiality of encryption and decryption, clothes
Business device oneself generation key, issues level of confidentiality, system strategy issues the mode of key to destiny account, and sets life with subscriber policy
Effect, equally in console, it is also possible that the corresponding strategy fails of the user;
, it is necessary to be logged in using the account that console creates after client terminal start-up, and the strategy that server issues is updated,
It is saved in local;
Client has document encryption and decryption functions, if encrypted document is obtained from other sources, can pass through social activity
The more of platform apply opening function or sharing function, have directly adjusted ciphertext reader, cryptograph files are passed in reader;
Reader obtains level of confidentiality present in ciphertext, and it is corresponding close that the level of confidentiality is matched in the subscriber policy locally preserved
Key, carries out document decryption and checks;
If document decryption failure is locally still shown without corresponding level of confidentiality, document with ciphertext, if there is right
The level of confidentiality answered, then using corresponding key, be decrypted, accomplish it is point-to-point between document encryption and decryption functions;
, can be to document into edlin in reader, or create new document, can be by more after editor
More applications are opened, and are shared in the movement equipment, are supported that the application of the reader sharing function is inner, but before sharing, text
Shelves can be equally encrypted, even if being transmitted by people's malice, also be can only see ciphertext, be ensure that security of the document in transmitting procedure
Problem.
Wherein the system realizes that the innovative point included is:
1. console can add account, and encryption and decryption strategy is created to the account, server generation counterpart keys, issue
To specified user;
2. during client terminal start-up, being interacted with server, obtain or update relative strategy, be saved in local, be required for taking
Business device responds;
3. reader is supported to share with being shared third-party application social platform function;
4. reader supports document creation editting function, before editor's completion is shared, the operation of automated execution file encryption.
<Safe reading method>
Such as Fig. 5, the present invention provides a kind of safety moving method based on mobile equipment, this method comprises the following steps:
1. console creates an account, and issues the account corresponding file encryption-decryption strategy, level of confidentiality and key are generated, is led to
Cross subscriber policy and system strategy issues;
2. file is shared to ciphertext reader by third party's social platform or mail, the number as the ciphertext reader
According to source;
3. entering ciphertext reader, interacted with server, there is the certification login process of complete set;
4. after logining successfully, being interacted with server, subscriber policy and system strategy that server issues are obtained;
5. the document data shared using third party, determines whether encryption data, if encryption data, then text is obtained
Corresponding level of confidentiality in shelves, matches the secret level in local user's strategy, if non-encrypted data, directly carries out content and shows;
7. if after matching the level of confidentiality in subscriber policy, counterpart keys are obtained from system strategy, carry out document solution
Close operation, if level of confidentiality can not be matched in subscriber policy, proves that the account haves no right that ciphertext is decrypted, and accomplishes a little pair
Document encryption and decryption control between point;
8. if successful decryption, carries out plaintext and shows, if decryption failure, is shown with ciphertext form;
9. if, can also be social flat by sharing third party to the document into after the completion of edlin or new document
Platform, but the file shared away is encrypted by corresponding key, is shared with ciphertext form before sharing operation is performed
Transmission, ensures the security of data information transfer.
By technical scheme, following technique effect can be obtained:
1. the file for the social platform that third party's support is shared can be received, data source is more abundant;
2. controlled by console distributing policy, accomplish it is point-to-point between the control of document encryption and decryption;
3. reader can not only carry out document preview, while can carry out documents editing and share, before sharing, meeting
Automatically operation is encrypted in document, ensures security of the file in network transmission process, prevent personal or company's privacy
The risk of information leakage.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Within the spirit and principles in the present invention, any modification, equivalent substitution and improvement for being made etc., should all protect the guarantor in the present invention
Within the scope of shield.
Claims (10)
1. a kind of document security reading method based on mobile equipment, it is characterised in that this method comprises the following steps:
1) mobile equipment receives document to be read;
2) reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;
3) judge whether the document is encrypted document, if it is, step 4) is jumped to, if it is not, then jumping to step 5);
4) whether can with level of confidentiality in the subscriber policy match, if successful match, utilize if judging the level of confidentiality of the document
Secret key decryption the document in system strategy, otherwise jumps to step 6);
5) successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows;
6) terminate.
2. according to the method described in claim 1, it is necessary to which creating reader in server end logs in account before the step 1)
Family, and level of confidentiality and key are generated to the account, reader is handed down to by subscriber policy and system strategy respectively.
3. according to the method described in claim 1, in the step 1), mobile equipment receive by third party's social platform or
The document that mail is shared.
4. according to the method described in claim 1, carried out in the step 5) to document after plaintext shows, can to the document into
Edlin, shares third party's social platform after the document after to editor is encrypted;
The encryption key comes from system strategy.
5. according to the method described in claim 1, in the step 2), if logged on success, then server returns to subscriber policy
With system strategy, step 6) is otherwise jumped to.
6. a kind of document security reading system, it is characterised in that the system includes server, mobile equipment;
The server includes account management module, policy management module;
The movement equipment is provided with a reader, and the reader includes account authentication module, tactful acquisition module, document and adds solution
Close module, file display module;
The reader receives document to be read;
The reader initiates logging request by account authentication module to server, and the account management module of server is to logging in
Account authentication returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from described
System strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to the document of decryption failure
Ciphertext is carried out to show.
7. system according to claim 6, server end creates reader logon account by account management module, and right
The account generates level of confidentiality and key, is handed down to reader by subscriber policy and system strategy respectively.
8. according to the method described in claim 6, the system further includes:Document Editing module and sharing files module;
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social platform.
9. system according to claim 6, for the logging request of reader, server is by account management module to stepping on
Account authentication success is recorded, then returns to subscriber policy and system strategy, otherwise the result of return authentication failure.
10. a kind of mobile equipment, it includes computer-readable recording medium and computer processor unit, which has calculating
Machine program, performs the computer program by the computer processor unit and realizes such as the method for one of claim 1-5.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711255261.8A CN107995195A (en) | 2017-12-02 | 2017-12-02 | A kind of document security reading method and system based on mobile equipment |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711255261.8A CN107995195A (en) | 2017-12-02 | 2017-12-02 | A kind of document security reading method and system based on mobile equipment |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107995195A true CN107995195A (en) | 2018-05-04 |
Family
ID=62035197
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711255261.8A Pending CN107995195A (en) | 2017-12-02 | 2017-12-02 | A kind of document security reading method and system based on mobile equipment |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107995195A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109597976A (en) * | 2018-10-11 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of document edit method and device |
| CN111340459A (en) * | 2020-03-25 | 2020-06-26 | 江苏安泰信息科技发展有限公司 | Evaluation report management system and operation method for safety production and occupational health |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
| CN101877692A (en) * | 2009-04-30 | 2010-11-03 | 深圳市汉拓科技有限公司 | Method and system for encryption-decryption and security management for file |
| CN102611732A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework |
| CN103679050A (en) * | 2013-12-31 | 2014-03-26 | 中国电子科技集团公司第三研究所 | Security management method for enterprise-level electronic documents |
| US20170264432A1 (en) * | 2015-09-25 | 2017-09-14 | Eliot Horowitz | Systems and methods for hierarchical key management in encrypted distributed databases |
-
2017
- 2017-12-02 CN CN201711255261.8A patent/CN107995195A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
| CN101877692A (en) * | 2009-04-30 | 2010-11-03 | 深圳市汉拓科技有限公司 | Method and system for encryption-decryption and security management for file |
| CN102611732A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework |
| CN103679050A (en) * | 2013-12-31 | 2014-03-26 | 中国电子科技集团公司第三研究所 | Security management method for enterprise-level electronic documents |
| US20170264432A1 (en) * | 2015-09-25 | 2017-09-14 | Eliot Horowitz | Systems and methods for hierarchical key management in encrypted distributed databases |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109597976A (en) * | 2018-10-11 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of document edit method and device |
| CN111340459A (en) * | 2020-03-25 | 2020-06-26 | 江苏安泰信息科技发展有限公司 | Evaluation report management system and operation method for safety production and occupational health |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6185308B1 (en) | Key recovery system | |
| CN104113534B (en) | The login system and method for application APP | |
| US20080097923A1 (en) | Method and apparatus for providing digital rights management content and license, and method and apparatus for using digital rights management content | |
| IL159295A0 (en) | Authentication of a user across communication sessions | |
| CN104917807A (en) | Resource transfer method, apparatus and system | |
| CN105956496A (en) | Security and secrecy method for sharing storage files | |
| CN107918731A (en) | Method and apparatus for controlling the authority to access to open interface | |
| CN115514523B (en) | A data security access system, method, device and medium based on zero trust system | |
| CN115442030B (en) | A network transmission method and device for encryption and decryption | |
| CN114500069A (en) | Method and system for storing and sharing electronic contract | |
| CN114006736A (en) | Instant communication message protection system and method based on hardware password equipment | |
| CN117640078A (en) | Secure communication method, device and system based on quantum random numbers | |
| CN111181905A (en) | File encryption method and device | |
| JP2008199496A (en) | Key distribution method and system | |
| CN112651049B (en) | Privacy data sharing method and system based on block chain | |
| CN115694808B (en) | Cloud cooperation system based on blockchain | |
| CN107995195A (en) | A kind of document security reading method and system based on mobile equipment | |
| CN109067700A (en) | A kind of cross-platform information input output protection system | |
| KR20200037508A (en) | System and method of providing anonymity message service using block chain | |
| CN116546500B (en) | Terminal capability identification method, system, electronic equipment and medium | |
| US11949800B2 (en) | Systems and methods for providing enhanced security features in a virtual reality (VR) onboarding session | |
| CN115001703B (en) | Fort security improvement method based on national cryptographic machine | |
| CN113676468B (en) | Three-party enhanced authentication system design method based on message verification technology | |
| CN109274690A (en) | Group's data ciphering method | |
| CN117834142A (en) | Data generation method, processing method, transmission method, communication system, electronic terminal, and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |