File encryption system and method
First Claim
Patent Images
1. A file encryption system, comprising:
- a storage system storing a test file;
at least one processor; and
a file encryption unit being executable by the at least one processor, the file encryption unit comprising;
a receiving module to receive a login request of a user from a client computer to encrypt the test file;
a determination module to determine if a certificate authority (CA) certificate of the user obtained from a CA server is valid;
a conversion module to convert the test file into a compressed file having a specific format by a file encryption server, in response to a determination that the CA certificate of the user is valid;
an obtaining module to send a search request to the CA server to obtain a public key of the CA certificate of the user;
a generation module to generate a random key using a random function; and
an encryption module to symmetrically encrypt the compressed file using the random key, asymmetrically encrypt the random key using the public key to generate an asymmetric encryption key, and attach the asymmetric encryption key and data length of the asymmetric encryption key to a header of the compressed file.
1 Assignment
0 Petitions
Accused Products
Abstract
An electronic document comparison system and method converts a test file into a compressed file having a specific format. A public key of the CA certificate of a user is obtained and a random key is generated using a random function. Furthermore, the compressed file is symmetrically encrypted using the random key, and the random key is asymmetrically encrypted using the public key to generate an asymmetric encryption key. A header of the compressed file is attached with the asymmetric encryption key and data length of the asymmetric encryption key.
-
Citations
20 Claims
-
1. A file encryption system, comprising:
-
a storage system storing a test file; at least one processor; and a file encryption unit being executable by the at least one processor, the file encryption unit comprising; a receiving module to receive a login request of a user from a client computer to encrypt the test file; a determination module to determine if a certificate authority (CA) certificate of the user obtained from a CA server is valid; a conversion module to convert the test file into a compressed file having a specific format by a file encryption server, in response to a determination that the CA certificate of the user is valid; an obtaining module to send a search request to the CA server to obtain a public key of the CA certificate of the user; a generation module to generate a random key using a random function; and an encryption module to symmetrically encrypt the compressed file using the random key, asymmetrically encrypt the random key using the public key to generate an asymmetric encryption key, and attach the asymmetric encryption key and data length of the asymmetric encryption key to a header of the compressed file. - View Dependent Claims (2, 3, 4)
-
-
5. A file encryption method implemented by a computerized device, the method comprising:
-
receiving a login request of a user to encrypt a test file; determining if a certificate authority (CA) certificate of the user is valid; converting the test file into a compressed file having a specific format in response to a determination that the CA certificate of the user is valid; sending a search request to a CA server to obtain a public key of the CA certificate of the user; generating a random key using a random function; symmetrically encrypting the compressed file using the random key; asymmetrically encrypting the random key using the public key to generate an asymmetric encryption key; and attaching the asymmetric encryption key and data length of the asymmetric encryption key to a header of the compressed file. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium having stored thereon instructions that, when executed by a computing device, causing the computing device to perform a file encryption method, the method comprising:
-
receiving a login request of a user to encrypt a test file; determining if a certificate authority (CA) certificate of the user is valid; converting the test file into a compressed file having a specific format in response to a determination that the CA certificate of the user is valid; sending a search request to a CA server to obtain a public key of the CA certificate of the user; generating a random key using a random function; symmetrically encrypting the compressed file using the random key; asymmetrically encrypting the random key using the public key to generate an asymmetric encryption key; and attaching the asymmetric encryption key and data length of the asymmetric encryption key to a header of the compressed file. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification