Method for carrying out secret communication by using word document

A technology for secure communication and documents, which is applied in the field of secure communication with word documents, which can solve the problems of easy leakage of character passwords and inapplicability of confidential letters, etc., and achieve the effects of not easy leakage, saving software costs, and wide application range

Inactive Publication Date: 2012-06-13
XIAN UNIV OF SCI & TECH
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this encryption function is a simple character encryption, and its character password is easy to leak (especially easy to leak verbally), so it is not s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out secret communication by using word document
  • Method for carrying out secret communication by using word document
  • Method for carrying out secret communication by using word document

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] 1. Assuming that the confidential content to be transmitted is: "The Lan Army is transferred tonight at 8 o'clock", the specific steps are as follows:

[0032] (1) Use the TrueType word-making program to make secret characters and generate a key: open the TrueType word-making program attached to the windows operating system, and click "Select Code" in the "Edit" drop-down menu, and a code box appears, choose any one Code (assuming you select aaa1), press Enter, an edit box appears, select a tool from the "Tools" drop-down menu, and write the first secret character "lan" in the edit box, or the first secret character of the electronic version Copy "Lan" on the office clipboard, and then when the above edit box appears, select "Copy Characters" in the "Edit" drop-down menu. After the dialog box appears, follow the prompts to paste the characters in the office clipboard into the edit box , And then click "Save Characters" in the "Edit" drop-down menu, the TrueType word maker ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for carrying out secret communication by using a word document. The method mainly comprises the following three steps of: manufacturing secret characters by using a True Type character-formation program and generating a secret key; embedding the secret characters into the word document; and extracting the secret characters by using the secret key. According to the method disclosed by the invention, the True Type character-formation program in the conventional general windows operation system, display characters of a window word base and certain functions of word character processing software are designed and integrated so as to realize a function of performing the secret communication by using the word document. The method disclosed by the invention has the advantages of smart conception, simple method, low cost, good commonality and easiness of operation. Therefore, the method can be accessibly used by any operator familiar with windows.

Description

technical field [0001] The invention relates to a secure communication method, in particular to a method for secure communication using a word document. Background technique [0002] With the widespread application of network communication, especially Internet communication, ordinary end users also hope to perform confidential communication on the network, such as: sending a bank card password or sending a private message. An encryption function is provided in the existing word processing software, that is, the user can select the "Security" tab in the "Options" menu under the "Tools" menu bar, and then set an open password. If the opening password is set, if any party does not have the opening password, the word document cannot be opened, thereby playing a role in keeping secrets. But this encryption function is a kind of simple character encryption, and its character password is easy to reveal secrets (especially easily oral secrets), and is not suitable for transmitting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/24G06F21/60
Inventor 张释如杨金才姚展孟晓春
Owner XIAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products