Sign In to Follow Application
View All Documents & Correspondence

A System For Multi Layer File Sharing Through A Network And Method Thereof

Abstract: ABSTRACT: Title: A System for Multi-Layer File Sharing Through a Network and Method Thereof The present disclosure proposes a system (100) for protecting critical industrial control system data and software integrity using cryptographic security techniques. The system (100) comprises a computing device (102), a network (126), an application server (128), a database (130) and one or more user devices (132). The system (100) implements secure file sharing through a network communication, web development, and advanced cryptography techniques for greater security in file sharing. The system (100) provides a higher level of security, such as a one-time password (OTP) for public and private domains during file sharing. The system (100) for secure file sharing for authorised users with file encryption and decryption process and along with OTP authentication process.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 July 2023
Publication Number
35/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Andhra University
Andhra University, Waltair, Visakhapatnam-530003, Andhra Pradesh, India

Inventors

1. CH. S. S. Balaji
Student, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
2. Dr. M. Satya Anuradha
Professor, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
3. Dr. T. Roopa Rechal
Guest Faculty, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
4. K. Pavan Kumar Reddy
Student, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
5. D. Deepthi
Student, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
6. Kuna Sharath
Student, Department of Electronics & Communication, Andhra university, Waltair, Visakhapatnam-530003, Andhra Pradesh, India.
7. B. Hari Geetika
Student, Department of Computer Science, Gayatri Vidya Parishad College of Engineering, Madhurawada, Visakhapatnam-530048, Andhra Pradesh, India.

Specification

Description:DESCRIPTION:
Field of the invention:
[0001] The present disclosure generally relates to the technical field of security software for transfer files, and specific relates to a system and method for multi-layer secure file sharing over communication networks using cryptography techniques and a dual OTP authentication system to enhance the level of security further.

Background of the invention:
[0002] Secure file sharing is the practice of transferring digital files between two or more systems while maintaining the confidentiality, integrity, and availability of the data being shared. The current data transmission gateway can only realise the transparent transmission characteristic of data, and the security of the data is dependent on the processing of the terminal equipment. To maintain the security of data transmission, terminal equipment makers use a predetermined secret key to encrypt the system, and the processor on the board is used for encrypting and decrypting data individually.

[0003] Currently, there are several approaches to achieving a secure data transmission system available on the market. Encryption file sharing is the process of encrypting data for transmission from one device to another. Several methods for encrypting data are used, including the advanced encryption standard (AES) for security and the secure hash algorithm used for hashing the transmission data and certification files. A password protection method to ensure secure file sharing has to start with a password to be accessed. The password protection method involves using a proximity-based communication interface to transfer a private key from the user's device. Secure file sharing platform to transmit the data privately to one or more user devices. The sharing platform allows files to be shared between different users or organisations within a protected mode to protect them from intruders and unauthorised users.

[0004] One-time passwords (OTP) are two forms of identification used in communication to access a system or service. It is a temporary password security code generated for the registered mobile number to access the confirmation for file sharing. Biometric authentication verifies the user's unique biological traits. The Biometric system stores this information in order to verify a user's identity when that user accesses their file sharing. Virtual private networks (VPN) are a secure way to access file sharing by encrypting the data being transferred between two or more parties over the internet. This type of encryption is designed to be highly secure and suitable for a variety of applications, including media streaming, VPN services, large file transfers, and block chain technologies. However, the existing secure data transmission system does not provide advanced cryptography techniques to enhance the level of security via authorised login, cryptographic key, one-time password through the web, or one-time password through mobile.

[0005] In the prior art, a system and method for sharing a plurality of files are disclosed. The system includes a file-sharing server, a network, and one or more user devices. Initially, the user granted permission based on another user's request to allow file sharing. The processor is a security implementation that allows the user to assign attributes to one or more files on the network. The user grants permission to assign file sharing and maintains control of the file even after the share is imitated. Further, the user can modify those usage permissions at any time after the share has been initiated. The network is transmitting the file from one device to one or more user devices, as in a public or private share.

[0006] The user can access the file only by logging directly into the system. If the private share is allowed to access the file sharing without an account to sign in. However, the system and method for sharing a plurality of files do not provide the passwords to allow the specific user to share files and to create free access for the user to the file sharing system. The system for sharing a plurality of files eliminates the level of protection for private sharing systems. The system does not require passwords or other types of file protection that are inconvenient and easier to defeat.

[0007] By addressing all the above-mentioned problems, there is a need for a system that implements secure file sharing through network communication, web development, and advanced cryptography techniques for greater security in file sharing. There is also a need for a system that enhances the level of security through OTP during file sharing. There is also a need for a system that implements three layers of network security during file sharing: authorised login, cryptographic key, one-time password (OTP) through the web, and one-time password (OTP) through mobile. There is also a need for a system where users get access only through an authorized person permits, even after the sign-in process. There is also a need for a system that uses hybrid encryption techniques for secure data transmission.
Objectives of the invention:
[0008] The primary objective of the invention is to provide a system that implements secure file sharing through network communication, web development, and advanced cryptography techniques for greater security in file sharing.

[0009] Another objective of the invention is to provide a system that provides a higher level of security, such as a one-time password (OTP) for public and private domains during file sharing.

[0010] The other objective of the invention is to provide a system that uses a third-party application for OTP generation and authentication through an authorised login process.

[0011] The other objective of the invention is to provide a system that gives every user individual access to upload and download files.

[0012] The other objective of the invention is to provide a system that uses secure file sharing for authorised individuals with file encryption and decryption along with a security environment.

[0013] Yet another objective of the invention is to provide a system that uses multi-level encryption techniques for secure data transmission.

[0014] Further objective of the invention is to provide a system that implements multiple layers of network security during file sharing via authorised login, cryptographic key, one-time password through the web, and one-time password through mobile.

Summary of the invention:
[0015] The present disclosure proposes a system for multi-layer file sharing through a network and method thereof. The following presents a simplified summary in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview. It is not intended to identify key/critical elements or to delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.

[0016] In order to overcome the above deficiencies of the prior art, the present disclosure is to solve the technical problem to provide a system for protecting critical industrial control system data and software integrity using cryptographic security techniques.

[0017] According to one aspect, the invention provides a system for multi-layer secure file sharing using cryptographic security techniques. The system comprises a computing device, a network, an application server, a database and one or more user devices.

[0018] In one embodiment, the computing device having a processor and a memory for storing one or more instructions executable by the processor. The computing device is connected to the application server via the network. The computing device is in communication with one or more user devices through the network for enabling multi-layer secure file sharing using plurality of modules. The database is in communication with the application server configured to store data related to the files and plurality of modules executable by the processor. The computing device and the one or more user devices include a computer, a laptop, a smart phone, and a tablet. The network includes Wi-Fi, WLAN, WMAN, WPAN, and WWAN. The user interface is configured to display the plurality of modules of the application when the computing device is in communication with the application server and the one or more user devices through the network. The plurality of modules of the application comprises a browsing module, a registration module, an authentication module, an encryption module, an uploading widget, a verification module and a decryption module.

[0019] In one embodiment, the registration module is configured to allow users to register with the system by entering credentials using the user devices upon browsing the web URL of the application in the browsing module. The credentials of the registration module includes user name, password and other personal details. The authentication module is configured to authenticate the users by an authorized person for permitting to access the system, thereby enabling the users to create a profile.

[0020] In one embodiment, the encryption module is configured to encrypt data related to files upon entering encryption data by the user based on a domain and security level. The encryption module generates a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm. The encryption module generates a private key using a SHA256 algorithm for achieving multi-layer security to share the files with the application server. The encrypted data includes the private key and the selected file. The private key is shared between the two users if the file sharing is in a private domain.

[0021] In one embodiment, the uploading widget is configured to allow the users to upload data related to one or more files include classified files, encrypted files, unencrypted files and public files to the application server, thereby enabling to securely share the data related to one or more files between the users. Every user is the owner of the individual uploaded data. The uploaded data includes the file name, description, mobile number, email ID and selected file. The uploaded file is featured with a file editing option, which is accessed by the uploaded file owner and the authorized person.

[0022] In one embodiment, the verification module is configured first and second one-time passwords (OTPs), which are entered by the user through the user interface of the one or more user devices. The first and second one-time passwords (OTPs) are generated by an OTP generation system when the users attempted to download the data related to the files from the application server using the one or more user devices. The first and second OTP authentication includes the web based OTP authentication and the mobile based OTP authentication, which are supported by python libraries.

[0023] The first and second one-time password authentication is generated by using SMTP for email-based OTP and FAST2SMS for mobile-based OTP. In one embodiment, the decryption module is configured to decrypt the data related to the file downloaded by the user upon entering a private key received by the user. The system enables multi-layer secure file sharing between the users over the network.

[0024] According to another aspect, the invention provides a method for multi-layer secure file sharing using a system. At one step, the computing device is in communication with the one or more user devices through the network for enabling multi-layer secure file sharing using plurality of modules, thereby communicating with an application server. At one step, the registration module allows the users to register with the system by entering credentials using the user devices upon browsing the web URL of the application in the browsing module.

[0025] At one step, the authentication module authenticates the users by the authorized person for permitting to access the system, thereby enabling the users to create a profile. At one step, the encryption module encrypts encrypt data related to files upon entering encryption data by the user based on a domain and security level, thereby generating a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm, and generating a private key using a SHA256 algorithm. At one step, the upload widget allows the users to upload data related to one or more files to the application server, thereby enabling to securely share the data related to one or more files between the users.

[0026] At one step, the verification module verifies the first and second one-time password (OTPs), which are entered by the user through the user interface of the user device. At one step, the decryption module decrypts the data related to the file downloaded by the user upon entering a private key received by the user, thereby the system enables multi-layer secure file sharing between the users over the network.

[0027] Further, objects and advantages of the present invention will be apparent from a study of the following portion of the specification, the claims, and the attached drawings.
Detailed description of drawings:
[0028] The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate an embodiment of the invention, and, together with the description, explain the principles of the invention.

[0029] FIG.1 illustrates a block diagram of a system, in accordance to an exemplary embodiment of the invention.

[0030] FIG. 2 illustrates an architectural view of the system, in accordance to an exemplary embodiment of the invention.

[0031] FIG. 3 illustrates a flowchart of file sharing mechanisms in a system, in accordance to an exemplary embodiment of the invention.

[0032] FIG. 4 illustrates an example flowchart for a method for multi-layer secure file sharing using a system, in accordance to an exemplary embodiment of the invention.
Detailed invention disclosure:
[0033] Various embodiments of the present invention will be described in reference to the accompanying drawings. Wherever possible, same or similar reference numerals are used in the drawings and the description to refer to the same or like parts or steps.

[0034] The present disclosure has been made with a view towards solving the problem with the prior art described above, and it is an object of the present invention to provide a system for protecting critical industrial control system data and software integrity using cryptographic security techniques.

[0035] According to one exemplary embodiment of the invention, FIG. 1 refers to a block diagram of a system 100 for multi-layer file sharing using cryptographic security techniques. The system 100 implements secure file sharing through network communication, web development, and advanced cryptography techniques for greater security in file sharing. The system 100 provides a higher level of security, such as a one-time password (OTP) for public and private domains during file sharing. The system 100 for multi-layer secure file sharing comprises a computing device 102, a network 126, an application server 128, a database 130 and one or more user devices 132.

[0036] In one embodiment herein, the computing device 102 having a processor 104 and a memory 106 to for storing one or more instructions executable by the processor 104. The computing device 102 is connected to an application server 128 via the network 126. The computing device 102 is in communication with the one or more user devices 132 through the network 126 for enabling multi-layer secure file sharing using plurality of modules 110. The database 130 is in communication with the application server 128 configured to store data related to the files and plurality of modules 110 executable by the processor 104. The computing device 102 and the one or more user devices 132 include a computer, a laptop, a smart phone and a tablet. The network 126 includes Wi-Fi, WLAN, WMAN, WPAN and WWAN. The files are shared in the private domain, where a particular individual can access the files, and the public domain, where every individual can access the files. The computing device 102 and the one or more user devices 132 comprises a user interface 108.

[0037] In one embodiment herein, the user interface 108 is configured to display the plurality of modules 110 of the application on the computing device 102 and the one or more user devices 132 are in communication with the application server 128 through the network 126. The plurality of modules 110 of the application comprises a browsing module 112, a registration module 114, an authentication module 116, an encryption module 118, an uploading widget 120, a verification module 122 and a decryption module 124.

[0038] In one embodiment herein, the registration module 114 is configured to allow the users to register with the system 100 by entering credentials using the user devices 132 upon browsing the web URL of the application in the browsing module 112. The the credentials of the registration module 114 includes a user name, password, and other personal details. The authentication module 116 is configured to authenticate the users by an authorized person for permitting to access the system 100, thereby enabling the users to create a profile for the application login purpose.

[0039] In one embodiment herein, the encryption module 118 is configured to encrypt data related to files upon entering encryption data by the user based on a domain and security level. The encryption module 118 generates a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm. The encryption module 118 generates a private key using the SHA256 algorithm for achieving multi-layer security to share the files with the application server 128. The encrypted data includes the private key and the selected file. The uploading widget 120 is configured to allow the users to upload data related to one or more files include classified files, encrypted files, unencrypted files and public files to the application server 128, thereby enabling to securely share the data related to one or more files between the users. Every user is the owner of the individual uploaded files.

[0040] The uploaded data includes the file name, description, mobile number, email ID and selected file. The uploaded file is featured with a file editing option, which is accessed by the uploaded file owner and the authorized person. The uploaded files are displayed on the home page of the application and are visible to every registered user. The uploaded files are downloaded based on the uploaded data. The classified files can be uploaded in two ways, either for a particular individual to access or for every individual to access.

[0041] In one embodiment herein, the verification module 122 is configured to verify first and second one-time passwords (OTPs), which are entered by the user through the user interface 108 of the one or more user devices 132. The first and second one-time passwords (OTPs) are generated by an OTP generation system when the users attempted to download the data related to the files from the application server 128 using the one or more user devices 132. The first and second OTP authentication includes the web based OTP authentication and the mobile based OTP authentication, which are supported by python libraries.

[0042] In one example embodiment herein, the first and second one-time password authentication is generated by using SMTP for email-based OTP and FAST2SMS for mobile-based OTP. The file Management and sharing platform are created based on the need to share confidential files. A highly secured gate to access files is provided through web based and mobile based dual OTP authentication.

[0043] In one embodiment herein, the decryption module 124 is configured to decrypt the data related to the file downloaded by the user upon entering a private key received by the user. A particular individual can access the uploaded files through the decryption module 124. The system 100 enables multi-layer secure file sharing between the users over the network 126.

[0044] According to another exemplary embodiment of the invention, FIG. 2 refers to an architectural view of the system 100 for multi-layer file sharing. The system 100 of secured file sharing is appropriate for the level of sensitivity of the data being shared. The users involved in the registration process of registration module 114 are aware of and follow proper security protocols to minimise the risk of data breaches and other security incidents.

[0045] In one example embodiment herein, a system 100 is created with different end users using one or more user devices 132. The system 100 comprises a finite number of users. All the users need to be connected through the network 126, i.e., single hotspot connectivity, using one or more user devices 132. The system 100 is carried out on the DJANGO platform. This system 100 can support file sharing in the public or private domain. The computing device 102 is in communication the one or more user devices 132 through the network 126, thereby connected with an application server 128 through the network 126 for multi-layer secure file sharing using plurality of modules 110. The computing device 102 is used by the individual user for uploading the files in the database 130 through the application server 128. The one or more user devices 132 are used by the users for accessing and downloading the uploaded files in the database 130 through the application server 128. The computing device 102 and the one or more user devices 132 comprise a user interface 108.

[0046] According to another exemplary embodiment of the invention, FIG. 3 refers to a flowchart of file sharing mechanisms in the system 100. The files can be uploaded to the database 130 through the application server 128 and can only be modified by the individual who uploaded the file. The system 100 provides secure file sharing for authorised users with file encryption and decryption processes and an OTP authentication process.

[0047] In one example embodiment herein, a system 100 is created with different end users using one or more user devices 132. The system 100 comprises a finite number of users. All the users need to be connected through the network 126, i.e., single hotspot connectivity, using one or more user devices 132. The system 100 is carried out on the DJANGO platform. This system 100 can support file sharing in the public or private domain. The computing device 102 and the one or more user devices 132 are connected through the network 126, thereby communicating with an application server 128 through the network 126 for multi-layer secure file sharing using plurality of modules 110. The computing device 102 is used by the individual user for uploading the files in the database 130 through the application server 128. The one or more user devices 132 are used by the users for accessing and downloading the uploaded files in the database 130 through the application server 128. The computing device 102 and the one or more user devices 132 comprise a user interface 108.

[0048] In one embodiment herein, the user interface 108 is configured to display the plurality of modules 110 of the application on the computing device 102 and the one or more user devices 132 are in communication with the application server 128 through the network 126. The plurality of modules 110 of the application comprises the browsing module 112, the registration module 114, the authentication module 116, the encryption module 118, the uploading widget 120, the verification module 122 and the decryption module 124.

[0049] In one example embodiment herein, all the users have to register through the registration module 114 to be a part of the network 126. The registration process is achieved using the sign-up page in the application provided after browsing the web URL in the browsing module 112. The sign-up page is created in HTML. The DJANGO platform is used for web development and design. After signing in, users get access only when the authorized person permits it through the authentication module 116. The user authentication feature is an in-built function of the DJANGO platform.

[0050] In one embodiment herein, the registered users can now share files in the public and private domains without any encryption process. One-to-one file sharing is involved in the private domain, where more security is needed, so encryption is applied through the encryption module 118. In the encryption process, after generating a cryptographic mask over the data using the AES algorithm and a robust private key generation with the SHA256 algorithm for authentication in the decryption module 124, the private key is shared between the two users.

[0051] In one embodiment herein, the verification module 122 incorporates another level of security with encrypted and unencrypted files through the OTP generation during file access. This OTP is shared on two platforms one is through the web and the mobile network. Unique OTPs are produced for each network. This OTP generation process is supported by python libraries like SMTP for email-based OTP and third-party apps like FAST2SMS for mobile based OTP. Another feature is that only the owner can edit the files whenever the need arises. The edit option is denied for other users in both public and private domains.

[0052] In one embodiment herein, the file sharing in both the public and private domains having eight cases. In the eight cases, one belongs to the public domain, and the remaining seven belong to the private domain. The public domain file is visible to all the users registered on a particular network 126, and every user has read-only access to the file. Whereas in the private domain, authentication is verified through a cryptographic key and a one-time password.

[0053] In one example embodiment herein, the first case relates to the public domain. In the first case, the files are uploaded and viewed by any of the registered users. The mobile number and email are not linked in the uploading data with the file sharing process. The files are displayed in the upload panel, which provides editing options to the uploaded user. The files are available for all registered users on the home page of the application. Since no OTP is linked, the files are downloaded readily by clicking the download file option.

[0054] In one example embodiment herein, the second, third and fourth cases are related to the private domain. In the second, third and fourth cases, the files are uploaded without encryption. In the second, third and fourth cases, the files are uploaded and viewed by only authorised users. While uploading the files, the user enters the uploaded data in the uploading widget 120. In the second case, the uploaded data is linked with the mobile number. The uploaded data is linked with the email in the third case. The uploaded data is linked with the both mobile number and email in the fourth case. The files are visible to all the registered users on the home page of the application. Whenever any user tries to download the file, the OTP will be sent to the linked mobile number in the second case. In the third case, the OTP will be sent by email. In the fourth case, the OTP will be sent to both the mobile number and email. Now the user enters the received OTP. If the entered OTP is correct, which is verified by the verification module 122, then the page is redirected to the download page. The user clicks the download option, and the file is downloaded.

[0055] In one example embodiment herein, the fifth case relates to the private domain. In the fifth case, the files are encrypted before uploading without any OTP authentication. The file is encrypted in the encrypted page of the encryption module 118 by generating a cryptographic mask over the data using the AES algorithm and robust private key generation with the SHA256 algorithm for authentication in the decryption module 124. The encrypted files are uploaded directly without any OTP authentication process. The encrypted files can be downloaded and viewed by any registered user. The encrypted files are decrypted in the decryption module 124 using a private key password, and the original files are accessible to the users.

[0056] In one example embodiment herein, the sixth, seventh and eighth cases are related to the private domain. In the sixth, seventh and eighth cases, the files are uploaded and viewed with encryption and an OTP authentication process. In the sixth, seventh and eighth cases, the files are encrypted on the encrypted page of the encryption module 118 by generating a cryptographic mask over the data using the AES algorithm. The robust private key generation with the SHA256 algorithm for authentication is part of the decryption module 124. In the sixth, seventh and eighth cases, the files are uploaded and viewed by only authorised users. The encrypted files are uploaded with the OTP authentication process. While uploading the encrypted files, the user enters the uploaded data in the uploading widget 120. The uploaded data is linked with the mobile number in the sixth case. The uploaded data is linked with the email in the seventh case. The uploaded data is linked with the both mobile number and email in the eighth case. Now the user enters the received OTP. If the entered OTP is correct, which is verified by the verification module 122, then the page is redirected to the download page. The user clicks the download option, and then the encrypted files are downloaded. The encrypted files can be downloaded and viewed by any registered user. The encrypted files are decrypted in the decryption module 124 using a private key password, and the original files are accessible to the users.

[0057] According to another exemplary embodiment of the invention, FIG. 4 refers to an example flowchart 400 of a method for multi-layer secure file sharing using a system 100. At step 402, the computing device 102 is in communication with the one or more user devices 132 through the network 126, thereby communicating with the application server 128 through the network 126 for multi-layer secure file sharing. At step 404, the registration module 114 allows the users to register with the system 100 by entering credentials using the user devices 132 upon browsing the web URL of the application in a browsing module 112. At step 406, the authentication module 116 authenticates the users by the authorized person for permitting to access the system 100, thereby enabling the users to create the profile, thereby signing up for the application.

[0058] At step 408, the encryption module 118 encrypt data related to files upon entering encryption data by the user based on a domain and security level, thereby generating a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm, and generating a private key using a SHA256 algorithm. At step 410, the upload widget 120 allows the users to upload data related to one or more files to the application server 128, thereby enabling to securely share the data related to one or more files between the users. At step 410, the verification module 122 verifies the first and second one-time password (OTPs), which are entered by the user through the user interface 108 of the user device, thereby downloading the uploaded files from the upload list by the user based on the uploaded data. At step 412, the decryption module 124 decrypts the data related to the file downloaded by the user upon entering a private key received by the user, thereby the system 100 enables multi-layer secure file sharing between the users over the network 126.

[0059] Numerous advantages of the present disclosure may be apparent from the discussion above. In accordance with the present disclosure a system 100 for multi-layer file sharing through a network 126 and method thereof is disclosed. The proposed invention provides the system 100 that implements secure file sharing through network communication, web development, and advanced cryptography techniques for greater security in file sharing. The system 100 provides a higher level of security, such as a one-time password (OTP) for public and private domains during file sharing. The system 100 uses secure file sharing for authorised individuals with file encryption and decryption along with a security environment.

[0060] The proposed invention provides the system 100 uses multi-level encryption techniques for secure data transmission. The system 100 implements multi layers of network security during file sharing is provided via authorised login, cryptographic key, one-time password through the web and one-time password through mobile.

[0061] It will readily be apparent that numerous modifications and alterations can be made to the processes described in the foregoing examples without departing from the principles underlying the invention, and all such modifications and alterations are intended to be embraced by this application.
, Claims:CLAIMS:
I/We Claim:
1. A system (100) for multi-layer secure file sharing, comprising:
a computing device (102) having a processor (104) and a memory (106) for storing one or more instructions executable by the processor (104), wherein the computing device (102) is connected to an application server (128) via a network (126),
wherein the computing device (102) is in communication with one or more user devices (132) through the network (126) for enabling multi-layer secure file sharing using plurality of modules (110);
a database (130) in communication with the application server (128) configured to store data related to the files and plurality of modules (110) executable by the processor (104),
wherein the plurality of modules (110) includes:
a registration module (114) configured to allow users to register with the system (100) by entering credentials using the user devices (132) upon browsing the web URL of the application in a browsing module (112);
an authentication module (116) configured to authenticate the users by an authorized person for permitting to access the system (100), thereby enabling the users to create a profile;
an encryption module (118) configured to encrypt data related to files upon entering encryption data by the user based on a domain and security level, wherein the encryption module (118) generates a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm,
wherein the encryption module (118) generates a private key using a SHA256 algorithm for achieving multi-layer security to share the files with the application server (128);
an upload widget (120) configured to allow the users to upload data related to one or more files include classified files, encrypted files, unencrypted files and public files to the application server (128), thereby enabling to securely share the data related to one or more files between the users;
a verification module (122) configured to verify first and second one-time passwords (OTPs), which are entered by the user through the user interface (108) of the one or more user devices (132), wherein the first and second one-time passwords (OTPs) are generated by an OTP generation system when the users attempted to download the data related to the files from the application server (128) using the one or more user devices (132); and
a decryption module (124) configured to decrypt the data related to the file downloaded by the user upon entering a private key received by the user,
whereby the system (100) enables multi-layer secure file sharing between the users over the network (126).
2. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the private key is shared between the two users if the file sharing is in a private domain.
3. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the files are shared in the private domain, where a particular individual can access the files and the public domain, where every individual can access files.
4. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the credentials of the registration module (114) includes user name, password and other personal details.
5. The system (100) for multi-layer file sharing as claimed in claim 1, wherein the system (100) includes a user interface (108) to display the plurality of modules of the application when the computing device (102) is in communication with the application server (128) and one or more user devices (132) through the network (126).
6. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the uploaded data includes file name, description, mobile number, email ID and selected file, wherein every user is the owner of the individual uploaded data, wherein The uploaded file is featured with a file editing option, which is accessed by the uploaded file owner and the authorized person.
7. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the encryption data includes the private key and the selected file, and the private key is generated by using the SHA256 algorithm.
8. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the first and second one-time password authentication is generated by using SMTP for email-based OTP and FAST2SMS for mobile-based OTP.
9. The system (100) for multi-layer secure file sharing as claimed in claim 1, wherein the computing device (102) and the one or more user devices (132) include a computer, a laptop, a smart phone, a tab, and the network (126) includes Wi-Fi, WLAN, WMAN, WPAN and WWAN.
10. A method for multi-layer secure file sharing using a system (100), comprising:
communicating, by a computing device (102), with one or more user devices (132) through a network (126) for enabling multi-layer secure file sharing using plurality of modules (110), thereby communicating with an application server (128);
allowing, by a registration module (114), users to register with the system (100) by entering credentials using the user devices (132) upon browsing the web URL of the application in a browsing module (112);
authenticating, by an authentication module (116), the users by an authorized person for permitting to access the system (100), thereby enabling the users to create a profile;
encrypting, by an encryption module (118), encrypt data related to files upon entering encryption data by the user based on a domain and security level, thereby generating a cryptographic mask over the data related to the files using an advanced encryption standard (AES) algorithm, and generating a private key using a SHA256 algorithm;
allowing, by an upload widget (120), the users to upload data related to one or more files to the application server (128), thereby enabling to securely share the data related to one or more files between the users;
verifying, by a verification module (122), the first and second one-time password (OTPs), which are entered by the user through the user interface (108) of the user device; and
decrypting, by a decryption module (124), the data related to the file downloaded by the user upon entering a private key received by the user, thereby the system (100) enables multi-layer secure file sharing between the users over the network (126).

Documents

Application Documents

# Name Date
1 202341050867-STATEMENT OF UNDERTAKING (FORM 3) [28-07-2023(online)].pdf 2023-07-28
2 202341050867-REQUEST FOR EXAMINATION (FORM-18) [28-07-2023(online)].pdf 2023-07-28
3 202341050867-REQUEST FOR EARLY PUBLICATION(FORM-9) [28-07-2023(online)].pdf 2023-07-28
4 202341050867-POWER OF AUTHORITY [28-07-2023(online)].pdf 2023-07-28
5 202341050867-FORM-9 [28-07-2023(online)].pdf 2023-07-28
6 202341050867-FORM FOR SMALL ENTITY(FORM-28) [28-07-2023(online)].pdf 2023-07-28
7 202341050867-FORM 18 [28-07-2023(online)].pdf 2023-07-28
8 202341050867-FORM 1 [28-07-2023(online)].pdf 2023-07-28
9 202341050867-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [28-07-2023(online)].pdf 2023-07-28
10 202341050867-EVIDENCE FOR REGISTRATION UNDER SSI [28-07-2023(online)].pdf 2023-07-28
11 202341050867-EDUCATIONAL INSTITUTION(S) [28-07-2023(online)].pdf 2023-07-28
12 202341050867-DRAWINGS [28-07-2023(online)].pdf 2023-07-28
13 202341050867-DECLARATION OF INVENTORSHIP (FORM 5) [28-07-2023(online)].pdf 2023-07-28
14 202341050867-COMPLETE SPECIFICATION [28-07-2023(online)].pdf 2023-07-28
15 202341050867-FER.pdf 2025-03-11
16 202341050867-Proof of Right [29-04-2025(online)].pdf 2025-04-29
17 202341050867-OTHERS [29-04-2025(online)].pdf 2025-04-29
18 202341050867-FORM-5 [29-04-2025(online)].pdf 2025-04-29
19 202341050867-FORM-26 [29-04-2025(online)].pdf 2025-04-29
20 202341050867-FORM 3 [29-04-2025(online)].pdf 2025-04-29
21 202341050867-FER_SER_REPLY [29-04-2025(online)].pdf 2025-04-29
22 202341050867-ENDORSEMENT BY INVENTORS [29-04-2025(online)].pdf 2025-04-29
23 202341050867-DRAWING [29-04-2025(online)].pdf 2025-04-29
24 202341050867-COMPLETE SPECIFICATION [29-04-2025(online)].pdf 2025-04-29
25 202341050867-CLAIMS [29-04-2025(online)].pdf 2025-04-29
26 202341050867-ABSTRACT [29-04-2025(online)].pdf 2025-04-29

Search Strategy

1 202341050867E_29-08-2024.pdf