Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital document encryption method

A digital document and encryption method technology, applied in the field of network information security, can solve the problems of digital document providers and copyright owners who copy digital documents at will

Active Publication Date: 2015-07-15
厦门润丰投资有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, there are always many deficiencies in the existing digital document encryption methods, so that the problem that digital documents can be copied at will has been puzzling digital document providers and copyright owners.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital document encryption method
  • Digital document encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] figure 1 It is a flow chart of a digital document encryption method in the embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0031] Step 101, when a user requests to download a specified digital file, generate a key according to the user's inherent information, the inherent information of the client used by the user, and the inherent information of the specified digital file.

[0032] In this step, specifically, the characters composed of the user's inherent information, the inherent information of the client used by the user, and the inherent information of the designated digital document may be encrypted by an encryption algorithm to obtain a fixed-digit key.

[0033] In an embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital document encryption method, which comprises the following steps that: when a user requests to download a designated digital document, a secret key is generated according to inherent information of the user, inherent information of a client end and inherent information of the designated digital document; the designated digital document is encrypted according to the generated secret key; and after the encrypted digital document is downloaded by the client end used by the user, the digital document is decrypted according to the secrete key and a corresponding decryption process. By adopting the technical scheme, a secret key can be generated dynamically when the digital document is downloaded once, and the true purposes of one person, one machine and one digital document can be realized.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a digital document encryption method. Background technique [0002] In the current Internet information age, people's demand for information is increasing. As a carrier of digital information, digital documents have also become an indispensable part of modern people's reading habits. [0003] However, there are always many deficiencies in the existing digital document encryption methods, and the problem that the digital document can be copied at will has been puzzling the provider and copyright owner of the digital document. For example, the key of a general digital document is for a certain user, and the user can use the key to download the digital document multiple times on different clients after obtaining the key. Contents of the invention [0004] The invention provides a digital file encryption method, which can dynamically generate a key for each d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32G06F21/62
Inventor 黄金旭
Owner 厦门润丰投资有限公司