File sharing method and apparatus
First Claim
Patent Images
1. A file sharing method, comprising:
- encrypting, by a first terminal, a first file by using a first shared key to obtain a first encrypted file;
encrypting, by the first terminal, a second file by using a second shared key to obtain a second encrypted file;
uploading, by the first terminal, the first encrypted file and the second encrypted file to a server;
receiving, by the first terminal, a first uniform resource locator (URL) corresponds to a location for saving the first encrypted file and a second URL corresponds to a location for saving the second encrypted file from the server;
generating, by the first terminal, a key package of a file to be shared, wherein the file to be shared comprises at least one of the first encrypted file and the second encrypted file, and wherein the key package comprises a shared key and a URL that correspond to the file to be shared; and
providing, by the first terminal, the key package for a second terminal, comprising;
encrypting, by the first terminal, the key package by using a public key of the first terminal to obtain an encrypted key package;
acquiring, by the first terminal, a public key of the second terminal;
generating, by the first terminal, a proxy key according to a private key of the first terminal and the public key of the second terminal; and
uploading, by the first terminal, the encrypted key package and the proxy key to the server, so that the server performs proxy re-encryption on the encrypted key package by using the proxy key, and provides, for the second terminal, the key package on which the proxy re-encryption has been performed.
3 Assignments
0 Petitions
Accused Products
Abstract
A file sharing method and apparatus. The method includes uploading, by a first terminal, each encrypted file to a server for saving, and receiving a uniform resource locator (URL) that is returned by the server and corresponds to a location for saving each encrypted file, generating a key package that includes a shared key and a URL that correspond to a file to be shared, and providing the key package for a second terminal, so that the second terminal acquires a corresponding encrypted file by using the URL in the key package, and decrypts the acquired encrypted file by using the shared key in the key package.
9 Citations
10 Claims
-
1. A file sharing method, comprising:
-
encrypting, by a first terminal, a first file by using a first shared key to obtain a first encrypted file; encrypting, by the first terminal, a second file by using a second shared key to obtain a second encrypted file; uploading, by the first terminal, the first encrypted file and the second encrypted file to a server; receiving, by the first terminal, a first uniform resource locator (URL) corresponds to a location for saving the first encrypted file and a second URL corresponds to a location for saving the second encrypted file from the server; generating, by the first terminal, a key package of a file to be shared, wherein the file to be shared comprises at least one of the first encrypted file and the second encrypted file, and wherein the key package comprises a shared key and a URL that correspond to the file to be shared; and providing, by the first terminal, the key package for a second terminal, comprising; encrypting, by the first terminal, the key package by using a public key of the first terminal to obtain an encrypted key package; acquiring, by the first terminal, a public key of the second terminal; generating, by the first terminal, a proxy key according to a private key of the first terminal and the public key of the second terminal; and uploading, by the first terminal, the encrypted key package and the proxy key to the server, so that the server performs proxy re-encryption on the encrypted key package by using the proxy key, and provides, for the second terminal, the key package on which the proxy re-encryption has been performed. - View Dependent Claims (2, 3, 4)
-
-
5. A file sharing method, comprising:
-
receiving, by a cloud server, a first encrypted file and a second encrypted file uploaded by a first terminal; saving, by the cloud server, the first encrypted file and the second encrypted file; returning, by the cloud server to the first terminal, a first uniform resource locator (URL) corresponds to a first location for saving the first encrypted file and a second URL corresponds to a second location for saving the second encrypted file; receiving, by the cloud server, a key package of a file to be shared, which is uploaded by the first terminal and encrypted by using a public key of the first terminal, wherein the file to be shared comprises at least one of the first encrypted file and the second encrypted file, and wherein the key package comprises a shared key and a URL that correspond to the file to be shared; receiving, by the cloud server, a proxy key uploaded by the first terminal, wherein the proxy key is generated by the first terminal according to a private key of the first terminal and a public key of the second terminal, wherein providing, by the cloud server, the key package for the second terminal comprises; performing, by the cloud server, proxy re-encryption on the key package by using the proxy key; and providing, by the cloud server, the key package on which the proxy re-encryption has been performed for the second terminal; and providing, by the cloud server, the key package for a second terminal.
-
-
6. A file sharing apparatus, wherein the file sharing apparatus is comprised in a first terminal, the file sharing apparatus comprising:
-
a memory storing executable instructions; a processor coupled to the memory and configured to; encrypt a first file by using a first shared key to obtain a first encrypted file; and encrypt a second file by using a second shared key to obtain a second encrypted file; a transmitter coupled to the processor and configured to; upload the first encrypted file and the second encrypted file to a server; and receive a first uniform resource locator (URL) corresponds to a first location for saving the first encrypted file and a second URL corresponds to a second location for saving the second encrypted file from the server, wherein the processor is further configured to; generate a key package of a file to be shared, wherein the file to be shared comprises at least one of the first encrypted file and the second encrypted file, and wherein the key package comprises a shared key and a URL that correspond to the file to be shared; provide the key package for a second terminal; encrypt the key package by using a public key of the first terminal to obtain an encrypted key package; acquire a public key of the second terminal; generate a proxy key according to a private key of the first terminal and the public key of the second terminal; and upload the encrypted key package and the proxy key to the server, so that the server performs proxy re-encryption on the encrypted key package by using the proxy key, and provides, for the second terminal, the key package on which the proxy re-encryption has been performed. - View Dependent Claims (7, 8, 9)
-
-
10. A file sharing apparatus, comprising:
-
a first receiver configured to receive and save a first encrypted file and a second encrypted file uploaded by a first terminal; a transmitter configured to return, to the first terminal, a first uniform resource locator (URL) corresponds to a first location for saving the first encrypted file and a second URL corresponds to a second location for saving the second encrypted file; a second receiver configured to; receive a key package of a file to be shared uploaded by the first terminal and encrypted by using a public key of the first terminal, wherein the file to be shared comprises at least one of the first encrypted file and the second encrypted file, and wherein the key package comprises a shared key and a URL that correspond to the file to be shared; and receive a proxy key uploaded by the first terminal, wherein the proxy key is generated by the first terminal according to a private key of the first terminal and a public key of the second terminal; and a processor coupled to the first receiver, the second receiver, and the transmitter and configured to; provide the key package for a second terminal; perform proxy re-encryption on the key package by using the proxy key; and provide, for the second terminal, the key package on which the proxy re-encryption has been performed.
-
Specification