Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method for module

A technology for encryption, decryption and identification modules, which is applied in the field of encryption and decryption, can solve the problems of many restrictions on use, poor scalability, no access control, unified troubleshooting, etc., and achieve the effect of high system maintainability

Inactive Publication Date: 2014-05-14
SHANGHAI FRONTIER COMP TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The encryption and decryption method based on the user identity in the prior art is based on the user identity, so the scope of use is narrow and the use is more restricted
[0007] 2. The code of the encryption and decryption method based on the user ID in this prior art has low readability and maintainability, and poor stability
[0008] 3. This prior art encryption and decryption method based on user identity identification has poor scalability for new application formats, and has no functions such as access control and unified troubleshooting.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method for module
  • Encryption and decryption method for module
  • Encryption and decryption method for module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Please see attached Figure 4 As shown, the module encryption and decryption method of the present invention includes a multi-channel interface module 1, an application process identification module 2, a unified error reporting processing module 3, a temporary directory, a file management module 4, a Microsoft ApiHook library 5, an AES encryption and decryption library 6, and data verification Module 7 , authority control module 8 , copy authority control module 9 , file drag and drop control module 10 , multi-document control assignment module 11 , multi-document module 12 and security protection module 13 .

[0048] Please see attached figure 1 As shown, the steps of the module encryption and decryption method of the present invention are as follows:

[0049] Step 1, the user attempts to load all newly launched applications in the form of a dynamic link library (DLL) through the system registry key:

[0050] In step 1.1, the Attach processing determines whether cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and decryption method for a module, which comprises the following steps of: attempting to load all the newly started applications in a dynamic link library (DLL) way through a system registry key by a user; 2, identifying the current application to determine the type of the application; 3, communicating with a collaboration service to determine whether the current application is a security application or not; 4, if the current application is the security application, then determining whether the current application has a mapping plaintext file or not; 5, using the ciphertext; 6, checking whether the ciphertext is in a list or not when the plaintext Handle is closed; and 7, exiting the program. The encryption and decryption method for the module of the invention has higher scalability on a new application format and can support the transparent decryption of the ciphertext to determine the working way as manual encryption or automatic encryption, cooperate with modules such as a multi-document module, and the like to carry out content access control, uniformly misarrange, reduce the customized number of the current code and transfer the customized items of a project to other peripheral modules to the greatest extent. The encryption and decryption method for the module has high maintainability.

Description

technical field [0001] The invention relates to an encryption and decryption method, in particular to a module encryption and decryption method. Background technique [0002] At present, a shared key generation method in the prior art includes generating a random seed group, randomly taking two of them as edge random seeds, representing the two sides of a triangle; taking the other as an angle random seed, representing the Angle; use the length of the third side of the triangle formed by the above random seed as the shared key. This prior art also includes an encryption method, including generating a side random seed, representing two sides of a triangle; generating an angle random seed, representing an angle between the two sides; mapping the plaintext into an angle set, the angle represented by each element in the set Represents the angle between two sides, and calculates the length of the third side of the encrypted triangle formed by each angle in the angle set and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06G06F17/30
Inventor 张承祚张延昌
Owner SHANGHAI FRONTIER COMP TECH