Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and encryption system for electronic documents

A technology for electronic documents and encryption methods, applied in the computer field, can solve problems such as hidden dangers, high procurement costs, multi-professional knowledge, etc., to achieve the effect of security guarantee, guarantee security, and solve the speed of encryption and decryption

Inactive Publication Date: 2012-04-04
哈尔滨朗威电子技术开发有限公司
View PDF2 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first method uses plaintext transmission in terms of transmission, and the content can be intercepted and read through simple data packets, which has serious security risks; while the currently used Https encrypted communication only solves the requirements for encrypted data transmission, because only access passwords are used, It is impossible to ensure the correspondence between passwords and users, and to resist password guessing attacks; it is also impossible to identify and uniquely guarantee identity through usernames and passwords
[0003] The security communication widely used in banking, securities and other financial industries is generally an encryption machine. As an encryption communication device, the encryption machine can effectively ensure the security of data transmission and the validity of user identity. However, the purchase cost of such equipment is high, and the encryption machine is currently only available Supports TCP / IP Socket data packet communication mode, the secondary development is difficult, requires more professional knowledge, only supports a few programming languages, and cannot adapt to the diversified enterprise software system in the e-commerce environment, so it cannot be used by small and medium customers Promote the use of encryption machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and encryption system for electronic documents
  • Encryption method and encryption system for electronic documents
  • Encryption method and encryption system for electronic documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to better understand the shape, structure and characteristics of the present invention, preferred embodiments will be listed below and described in detail with reference to the accompanying drawings.

[0024] refer to figure 1 Shown the present invention provides a kind of encryption method of electronic document, its step comprises:

[0025] Step 1: use a random algorithm to generate a 32-bit long random key 11;

[0026] Step 2: use the asymmetric encryption algorithm of the document reader's digital certificate public key to encrypt the random key to form the encryption key 12;

[0027] Step 3: Encrypt the confidential document using the AES symmetric encryption algorithm and the encryption key to generate ciphertext 13;

[0028] Step 4: form a data packet with the ciphertext and the encryption key and store it in the encrypted file 14;

[0029] Step 5: After obtaining the ciphertext, the document reader decrypts the ciphertext with the encryption key to o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption system for electronic documents. The encryption system comprises a random secret key generating module, an encryption secret key generating module, a ciphertext generating module, a packeting module and a plain text decryption module, wherein the random secret key generating module generates a 32-bit random secret key by using a random algorithm; the encryption secret key generating module encrypts the random secret key by using an asymmetrical encryption algorithm of a digital certificate public key of a document reader so as to form the encryption secret key; the ciphertext generating module encrypts a confidential document by using a symmetrical encryption algorithm and the encryption secret key so as to generate a ciphertext; the packeting module packets the ciphertext and the encryption secret key into a packet and stores the packet in an encryption document; and after obtaining the ciphertext, a reader of the document uses the plain text decryption module to decrypt the ciphertext by the encryption secret key so as to obtain a plain text.

Description

technical field [0001] The invention relates to the encryption and decryption methods of all electronic documents in the computer field, mainly an encryption method for computer electronic documents. Background technique [0002] At present, data transmission includes two ways: one is the plaintext transmission based on the user password, and the other is the encrypted connection based on Https. The first method uses plaintext transmission in terms of transmission, and the content can be intercepted and read through simple data packets, which has serious security risks; while the currently used Https encrypted communication only solves the requirements for encrypted data transmission, because only access passwords are used, It is impossible to ensure the correspondence between the password and the user, and to resist the attack of password guessing; it is also impossible to realize the identification and uniqueness of the user name and password. [0003] The security commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06F21/24G06F21/62
Inventor 陈晓兵陈小平张松岩
Owner 哈尔滨朗威电子技术开发有限公司