Electronic document safe sharing system and method thereof
An electronic file and sharing system technology, applied in the field of information security, to achieve the effect of high efficiency, authenticity, flexible and convenient use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0046] Combined public key algorithm (Combined Public Key, CPK) is a public key algorithm based on identification, and its key management center generates private key calculation parameters (private key calculation base) and public key calculation parameters (public key calculation base) corresponding to each other; According to the identification provided by the first user, use the private key calculation parameters to calculate the private key of the first user, and provide the generated private key to the first user; and publish the public key calculation parameters, so that the second user After the identification of the first user is obtained, the public key of the first user can be calculated by using the public key calculation parameter according to the identification of the first user.
[0047] On the basis of proposing the CPK algorithm, a CPK chip is also provided. The CPK chip has a CPK algorithm function unit and a verification protocol unit, which is specifically i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap