An information security method and procedure

A technology of information security and procedures, applied in digital data protection, instruments, electrical digital data processing, etc., can solve problems that are not easy to implement, unable to deal with, helpless to cover up input information, etc.

Inactive Publication Date: 2009-09-16
杨筑平
View PDF1 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention emphasizes the flexibility of selection, but there are two disadvantages: first, the operation efficiency is low, and after the selection, it needs to be marked and a password is set;
If this method is extended to timely communication, there will be embarrassment of slow chat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security method and procedure
  • An information security method and procedure
  • An information security method and procedure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Compiled a utility program of Windows dialog box structure named "Information Confidentiality Program". The main interface structure of the program, such as image 3 shown. The program integrates a cryptographic device product with a USB interface called "Password Golden Armor", loads its supporting API dynamic link library, and calls its programming interface functions to realize encryption and decryption functions. The program responds to the device change message, automatically detects the access and removal of the cryptographic device, and provides the availability criterion of the cryptographic device for encryption and decryption operations. During program initialization, set and register encryption hotkeys and decryption hotkeys. The program then automatically avoids conflicts and completes the update registration for the user's operation of changing the hotkey. In order to respond to hotkey messages, the program distinguishes between encryption hotkeys and de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An information security method and procedure relates to the field of computer software, network communications and information security technology, especially used for information security of instant messaging, e-mail and other edited texts. By cipher algorithm procedure and/or by cipher device hardware, complete or selective instant encrypt or instant decipher is performed to text message in the current editing text, so as to instantly replace it from plaintext to ciphertext or from ciphertext to plaintext and present in the same window; when the cursor is stopped at the read-only ciphertext, it can be instant read and the corresponding plaintext can be presented; furthermore, it can be driven by a same shortcut operation, so that the encryption and decryption can be alternately performed, plaintext and ciphertext can be alternately replaced and displayed; a practical information security program is also designed, which is used in synergy with the object program and runs independently, to realize real-time encryption and decryption to information. The invention is general-purpose, convenient, flexible and efficient, and has universality because of its informality in the device hardware and no limitation to the application software.

Description

technical field [0001] The invention relates to the technical fields of computer software, network communication and information security. Background technique [0002] Information often involves the confidentiality, privacy and property of organizations and individuals; in the network environment, especially in the Internet environment, these important information are easily stolen and leaked, resulting in irreparable losses. Therefore, information confidentiality has become a common concern of people. The basic technical idea of ​​information security is to use a certain cryptographic algorithm combined with a key to encrypt the plaintext of the information that needs to be kept secret to generate garbled ciphertext. There are many kinds of current practical cryptographic algorithms, some of which have already become technical standards, such as DES, AES, RSA, DSA and so on. Information is most likely to be leaked in the input, storage and transmission links, and the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/58G06F21/24G06F21/60
Inventor 赵芦生杨霄杨筑平周跃平
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products