Document encryption and decryption method, device and system

A technology for encrypting keys and documents, applied in the field of information security, can solve the problems of low security performance and achieve high security performance

Inactive Publication Date: 2013-07-24
FUJIAN ETIM INFORMATION & TECH
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the above-mentioned method for preventing the leakage of electronic documents only sets the access authority to the electronic document for the user. After the user with the access authority downloads the electronic document,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document encryption and decryption method, device and system
  • Document encryption and decryption method, device and system
  • Document encryption and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0078] Example one

[0079] figure 1 This is a schematic flowchart of Embodiment 1 of a method for document encryption according to the present invention, including:

[0080] Step 101: Receive an electronic document download request sent by a client, where the electronic document download request includes user information and a document identifier.

[0081] When a user needs to read an electronic document, the client sends an electronic document download request to the server. User information includes the user's login name and login password. The document identifier may be any one or more of document label, document name, and document type. The electronic document can be a PDF document, a WORD document, a TEXT document, etc.

[0082] Step 102: Generate an encryption key, and use the encryption key to encrypt the content of the document corresponding to the document identifier to generate an encrypted document.

[0083] The encryption key is an encryption key randomly generated when ...

Example Embodiment

[0092] Example two

[0093] figure 2 This is a flowchart of Embodiment 2 of a method for document encryption of the present invention. Compared with Embodiment 1, Embodiment 2 also includes registration and authentication, which specifically includes:

[0094] Step 201: Receive a user registration request sent by the client, where the user registration request includes user information.

[0095] The user can send a user registration request to the server through the client according to actual needs.

[0096] Step 202: The user information is authenticated, and when the authentication is passed, the user public key and the user private key are randomly allocated.

[0097] The server performs authentication and can perform authentication based on user information such as user login name and login password. When the user has the registration authority, the PKI technology is used to allocate a set of user public key and user private key to the user.

[0098] Step 203: correspondingly store...

Example Embodiment

[0113] Example three

[0114] image 3 This is a schematic flowchart of Embodiment 3 of a method for document decryption according to the present invention, including:

[0115] Step 301: Receive an encrypted document sent by the server.

[0116] Step 302: Send a key information request to the server, where the key information request includes the document identifier of the encrypted document.

[0117] After receiving the encrypted document, the client sends a request to the server to obtain the key information of the encrypted document. The server stores the document identification of the electronic document and its corresponding key information.

[0118] Step 303: Receive key information corresponding to the document identifier sent by the server.

[0119] The server finds the key information corresponding to the document ID according to the document ID and sends it to the client.

[0120] Step 304: Obtain the user private key from the certificate device, and use the user private key to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a document encryption and decryption method, device and system. The document encryption and decryption method comprises the steps of receiving an electronic document downloading request sent by a client side; generating an encryption secret key, encrypting file content corresponding to a document identifier by utilization of the encryption secret key, and generating an encrypted document; reading a stored user public key according to user information, and encrypting the encryption secret key to generate secret key information by utilization of the user public key; correspondingly storing the document identifier and the secret key information; and sending the encrypted document to the client side. An electronic document after being downloaded by a user is the encrypted document, the encryption secret key is obtained through the fact that a user private key in certificated equipment needs to be used for decrypting the secret key information stored in a server, and then the encryption secret key is used for decrypting the encrypted document to obtain the electronic document. Even the encrypted document after being downloaded is divulged, due to the fact that the certificated equipment is unavailable to be connected to the server to conduct decryption on the downloaded encrypted document, the content of the electronic document can not be read, and due to the fact that the electronic document is stored in an internal memory and can not be copied directly, safety performance is high.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device and system for document encryption and decryption. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein may include concepts that could be explored, but not necessarily concepts that have been previously thought of or explored. Therefore, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section. [0003] With the development of information technology, most of the data storage methods have gradually transitioned from the original paper documents to electronic documents. Electronic documents are mainly based on chemical, magnetic and physical materials such as computer disk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30G06F21/62
Inventor 许元进吴慧明洪跃强陈勇川陈元
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products