Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document encryption and decryption method, device and system

A technology for encrypting keys and documents, applied in the field of information security, can solve the problems of low security performance and achieve high security performance

Inactive Publication Date: 2013-07-24
FUJIAN ETIM INFORMATION & TECH
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the above-mentioned method for preventing the leakage of electronic documents only sets the access authority to the electronic document for the user. After the user with the access authority downloads the electronic document, he can leak the downloaded electronic document to the outside of the enterprise, and the others do not have access Users of the enterprise's server can also see the information in the electronic document, and the security performance is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document encryption and decryption method, device and system
  • Document encryption and decryption method, device and system
  • Document encryption and decryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] figure 1 It is a schematic flow chart of Embodiment 1 of a document encryption method of the present invention, including:

[0080] Step 101: Receive an electronic document download request sent by a client, where the electronic document download request includes user information and a document identifier.

[0081] When the user needs to read the electronic document, the client sends an electronic document download request to the server. The user information includes the user's login name and login password. The document identifier can be any one or more of document label, document name and document type. Electronic documents can be PDF documents, WORD documents and TEXT documents, etc.

[0082] Step 102: Generate an encryption key, use the encryption key to encrypt the content of the document corresponding to the document identifier, and generate an encrypted document.

[0083] The encryption key is an encryption key randomly generated when the server receives an e...

Embodiment 2

[0093] figure 2 It is a flow chart of Embodiment 2 of a document encryption method of the present invention. Compared with Embodiment 1, Embodiment 2 also includes registration and authentication, specifically including:

[0094] Step 201: Receive a user registration request sent by a client, where the user registration request includes user information.

[0095] The user can send a user registration request to the server through the client according to actual needs.

[0096] Step 202: Authenticate the user information, and randomly distribute the user public key and the user private key when the authentication is passed.

[0097] The server performs authentication, which may be performed according to user information such as user login name and login password. When the user has registration authority, use PKI technology to assign a set of user public key and user private key to the user.

[0098] Step 203: store the user information and the user public key correspondingly...

Embodiment 3

[0114] image 3 It is a schematic flow chart of Embodiment 3 of a document decryption method of the present invention, including:

[0115] Step 301: Receive the encrypted document sent by the server.

[0116] Step 302: Send a key information request to the server, where the key information request includes the document identifier of the encrypted document.

[0117] After receiving the encrypted document, the client sends a request to the server for obtaining key information of the encrypted document. The server stores the document identification of the electronic document and its corresponding key information.

[0118] Step 303: Receive the key information corresponding to the document identifier sent by the server.

[0119] The server searches for the key information corresponding to the document identifier according to the document identifier and sends it to the client.

[0120] Step 304: Obtain the user's private key from the certificate device, and use the user's priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a document encryption and decryption method, device and system. The document encryption and decryption method comprises the steps of receiving an electronic document downloading request sent by a client side; generating an encryption secret key, encrypting file content corresponding to a document identifier by utilization of the encryption secret key, and generating an encrypted document; reading a stored user public key according to user information, and encrypting the encryption secret key to generate secret key information by utilization of the user public key; correspondingly storing the document identifier and the secret key information; and sending the encrypted document to the client side. An electronic document after being downloaded by a user is the encrypted document, the encryption secret key is obtained through the fact that a user private key in certificated equipment needs to be used for decrypting the secret key information stored in a server, and then the encryption secret key is used for decrypting the encrypted document to obtain the electronic document. Even the encrypted document after being downloaded is divulged, due to the fact that the certificated equipment is unavailable to be connected to the server to conduct decryption on the downloaded encrypted document, the content of the electronic document can not be read, and due to the fact that the electronic document is stored in an internal memory and can not be copied directly, safety performance is high.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device and system for document encryption and decryption. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein may include concepts that could be explored, but not necessarily concepts that have been previously thought of or explored. Therefore, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section. [0003] With the development of information technology, most of the data storage methods have gradually transitioned from the original paper documents to electronic documents. Electronic documents are mainly based on chemical, magnetic and physical materials such as computer disk...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/30G06F21/62
Inventor 许元进吴慧明洪跃强陈勇川陈元
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products