Ciphering and deciphering method and device for printed written files

A written document and print version technology, applied in the direction of public key for secure communication, user identity/authority verification, etc., to achieve the effect of strong security, convenient operation and low cost

Inactive Publication Date: 2011-08-24
WUHAN UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to solve the problem of content protection of printed documents in order to solve the problem of content protection of printed documents, and to provide an encryption and decryption method and device for printed documents.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ciphering and deciphering method and device for printed written files
  • Ciphering and deciphering method and device for printed written files
  • Ciphering and deciphering method and device for printed written files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] The background of this embodiment is assuming that user A needs to encrypt and protect key clauses in a printed commercial procurement contract, so that these key clauses can only be viewed by the other party B of the contract, so as to achieve the purpose of protecting commercial secrets. It can be seen from the description of the content of the present invention that this embodiment consists of three stages: key generation, encryption protection and decryption reading.

[0050] In the present embodiment, the selected one is the elliptic curve cryptosystem, and its cryptosystem parameters are as follows:

[0051] Randomly select a 192-bit large prime number p, the elliptic curve E(GF(p)):y 2 =x 3 +ax+b(mod p) is a secure elliptic curve defined on the finite field GF(p), on which the base point randomly selected is G=(x, y), and the order of the elliptic curve E is n=#E( GF(p)), r is a large prime factor of n.

[0052] in,

[0053] p=62771017353866807638357894232076...

Embodiment 2

[0088] The background of this embodiment is assuming that user A needs to make a copy as attached Figure 5 The structure, size, processing method and technical requirements of the key components in the mechanical drawings shown are encrypted and protected, so that these key information can only be viewed by legitimate users B, so as to achieve the purpose of protecting technical secrets and intellectual property rights. Similarly, this embodiment consists of three stages: key generation, encryption protection and decryption reading, and the parameters of the selected elliptic curve cryptosystem are the same as those in Embodiment 1.

[0089] Key generation stage: the purpose is to cooperate with the key issuing agency and the user to generate a decryption private key SK that only the user knows, and an encryption public key PK that can be made public, consisting of identity information SI and public key parameters PI. To complete the registration process, proceed as follows: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an enciphering and deciphering method and a device aiming at printing edition written documents, the method thereof comprises the three steps of key generating, enciphering protection and deciphering reading, wherein the key generating step is characterized by generating a deciphering private key which is only known by a user-self through the cooperation of a key-issuing mechanism and a user and is composed of identify recognition information and the public key parameter, wherein the enciphering public key capable of being opened, which steps can be carried out duringthe register of the user, the enciphering protection step is characterized by enabling the user to carry out the enciphering protection to key areas of specific documents and to print and output the documents, and the deciphering reading step is characterized by enabling a legal user to read the printing-edition written documents which are received and are processed after the enciphering protection. The device of the invention comprises a key management unit, a data enciphering unit, a data deciphering unit and an operation management unit. The invention has the advantages of low cost, strongsafety, high efficiency, easy to use, convenient operation and the like, and the method and the device combine the advantages of the existing cryptography and have a good prospect of application.

Description

technical field [0001] The invention belongs to the fields of electronic information technology and computer information security, and specifically relates to an encryption and decryption method and device for printed documents. Background technique [0002] In real life, cryptographic protection of the content of paper-based written documents has always been a problem of great significance. In order to protect the content of written documents, various content protection methods for written documents have emerged. These methods mainly fall into three categories: the first type of method is based on traditional The content of the file is replaced by words, phrases, and shifted to realize the encryption protection of the content of the written file. Because such methods are based on traditional cryptographic techniques, their security is not strong, their efficiency is low, their methods are cumbersome, and their applications are extremely narrow. The second type of method i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 肖攸安刘泉周祖德李方敏
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products