Method for security encryption and signing based on identity file

A security encryption and file technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as low safety factor, inconvenience in life, study and work, modification and theft by others, etc.

Inactive Publication Date: 2012-10-03
SUZHOU UNIV
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] This year, with the rapid development of the Internet, people began to understand and learn Internet knowledge more and more deeply. While the Internet provides people with convenience, there are many security risks. The files and information people send It is often leaked and stolen, which brings great inconvenience to people's life, study and work
[0003] Although there are many ways to encrypt and decrypt files at present, the safety factor of these methods is not high, and there is still the possibility of being modified and stolen when transferring files on an insecure channel, so people need a price that meets the requirements more Encryption and decryption system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for security encryption and signing based on identity file
  • Method for security encryption and signing based on identity file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0036] refer to figure 1 , figure 1 It is a structural diagram of a preferred embodiment of the security encryption and signature method based on the identity file of the present invention.

[0037] A secure encryption and signature method based on an identity file, the steps of which include: obtaining the configuration information of the basic settings of the client and the configuration information of the Advanced Encryption Standard setting; registering and applying for an identity file suitable for a mailbox at the server; downloading the And obtain the data information of the identity file; obtain the type information of the task selected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for security encryption and signing based on an identity file. The method includes: obtaining configuration information of basic setting of a client and configuration information of advanced encryption standard setting of the client; registering and applying the identity file applicable to a mailbox at a server end; downloading data information of the identity file through the client; obtaining type information of a task to be executed selected by the client; and performing encryption and decryption to files through the client according to the identity file. By the method, important data of a user can be protected from being viewed or modified, safe communication on an originally unsafe channel can be achieved, and denial behaviors after using the user's identity to receive and transmit information can be avoided.

Description

technical field [0001] The invention relates to a software system, in particular to a security encryption and signature method based on an identity file. Background technique [0002] This year, with the rapid development of the Internet, people began to understand and learn Internet knowledge more and more deeply. While the Internet provides people with convenience, there are many security risks. The files and information people send It is often leaked and stolen, which brings great inconvenience to people's life, study and work. [0003] Although there are many ways to encrypt and decrypt files at present, the safety factor of these methods is not high, and there is still the possibility of being modified and stolen when transferring files on an insecure channel, so people need a price that meets the requirements more Encryption and decryption system. Contents of the invention [0004] The invention mainly aims at the deficiencies of the prior art, and provides a secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 罗喜召
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products