Electronic document safe sharing system and method thereof

An electronic file and sharing system technology, applied in the field of information security, to achieve the effect of high efficiency, authenticity, flexible and convenient use

Inactive Publication Date: 2011-03-23
BEIJING E HENXEN AUTHENTICATION TECH +1
View PDF6 Cites 109 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it is contradictory to maximize the full sharing of information and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic document safe sharing system and method thereof
  • Electronic document safe sharing system and method thereof
  • Electronic document safe sharing system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0046] Combined public key algorithm (Combined Public Key, CPK) is a public key algorithm based on identification, and its key management center generates private key calculation parameters (private key calculation base) and public key calculation parameters (public key calculation base) corresponding to each other; According to the identification provided by the first user, use the private key calculation parameters to calculate the private key of the first user, and provide the generated private key to the first user; and publish the public key calculation parameters, so that the second user After the identification of the first user is obtained, the public key of the first user can be calculated by using the public key calculation parameter according to the identification of the first user.

[0047] On the basis of proposing the CPK algorithm, a CPK chip is also provided. The CPK chip has a CPK algorithm function unit and a verification protocol unit, which is specifically i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic document safe sharing system which can realize safe storage and fully sharing of secret document. The electronic document safe sharing system comprises a document encrypting module and a document decrypting module; wherein the document encrypting module utilizes a session key to symmetrically encrypt electronic document data, receiver identification (public key) is utilized to asymmetrically encrypt the session key, and finally the encrypted symmetric key and encrypted electronic document data are packed into a digital envelop; and the document decrypting module utilizes an own private key to decrypt the digital envelop. The electronic document safe sharing method of the invention takes CPK combined public key or CPK compound public key technology as the basis, flexible digital signature and secret key exchange capacity thereof are utilized, and a confidential document management system which is from a server to a client, contains information storage and transmission to each use link and is integrated with document data encryption, access control, authorization management, dynamic key exchange and process audit trail into a whole is constructed.

Description

technical field [0001] The invention provides identification-based authentication technology, in particular to a system and method for sharing electronic files (including data types such as documents, pictures, audio and video) based on CPK combined public key algorithm or CPK composite public key algorithm, which belongs to information security technology field. Background technique [0002] At present, information technology has penetrated into all aspects of the daily operation of the government and enterprises, and data and information have become the basic elements of the operation of the government and enterprises. The application of information technology has greatly improved work efficiency, but it has also increased security risks. Confidential data, business secrets and personal privacy are lost and leaked due to network attacks, Trojan horse virus attacks or poor storage media storage, as well as frequent incidents of theft and tampering of data files transmitted...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 赵建国李维刚
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products