Method for carrying out secret communication by using word document

A technology for confidential communication and documents, applied in the field of confidential communication using word documents, can solve the problems of inapplicable confidential letters, easy leakage of character passwords, etc., and achieves the effect of saving software costs, not easy to leak, and having good versatility

Inactive Publication Date: 2015-01-21
XIAN UNIV OF SCI & TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this encryption function is a simple character encryption, and its character password is easy to leak (especially easy to leak verbally), so it is not suitable for transmitting important confidential letters
So far, there is no secure communication method with higher security, good versatility, and easy operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out secret communication by using word document
  • Method for carrying out secret communication by using word document
  • Method for carrying out secret communication by using word document

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] 1. Assume that the confidential content to be transmitted is: "Lanjun transfer at 8 o'clock tonight", the specific operation steps are as follows:

[0032] (1) Use the TrueType word-making program to make confidential characters and generate keys: open the TrueType word-making program attached to the windows operating system, click "Choose Code" in the "Edit" drop-down menu, and a code box will appear, choose one arbitrarily Code (assuming aaa1 is selected), press Enter, and an edit box appears, select a tool in the "Tool" drop-down menu, and write the first secret character "lan" in the edit box, or first write the first secret character of the electronic version "Lan" is copied on the office clipboard, and then after the above edit box appears, select "Copy Character" in the "Edit" drop-down menu. After the dialog box appears, follow the prompts to paste the characters in the office clipboard into the edit box , and then click "Save Characters" in the "Edit" drop-down...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for carrying out secret communication by using a word document. The method mainly comprises the following three steps of: manufacturing secret characters by using a True Type character-formation program and generating a secret key; embedding the secret characters into the word document; and extracting the secret characters by using the secret key. According to the method disclosed by the invention, the True Type character-formation program in the conventional general windows operation system, display characters of a window word base and certain functions of word character processing software are designed and integrated so as to realize a function of performing the secret communication by using the word document. The method disclosed by the invention has the advantages of smart conception, simple method, low cost, good commonality and easiness of operation. Therefore, the method can be accessibly used by any operator familiar with windows.

Description

technical field [0001] The invention relates to a secure communication method, in particular to a method for secure communication using a word document. Background technique [0002] With the widespread application of network communication, especially Internet communication, ordinary end users also hope to perform confidential communication on the network, such as: sending a bank card password or sending a private message. An encryption function is provided in the existing word processing software, that is, the user can select the "Security" tab in the "Options" menu under the "Tools" menu bar, and then set an open password. If the opening password is set, if any party does not have the opening password, the word document cannot be opened, thereby playing a role in keeping secrets. But this encryption function is a kind of simple character encryption, and its character password is easy to reveal secrets (especially easily oral secrets), and is not suitable for transmitting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60
Inventor 张释如杨金才姚展孟晓春
Owner XIAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products