Document encryption and decryption method, device and system
A technology for encrypting keys and documents, applied in the field of information security, can solve the problems of low security performance and achieve high security performance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0078] Example one
[0079] figure 1 This is a schematic flowchart of Embodiment 1 of a method for document encryption according to the present invention, including:
[0080] Step 101: Receive an electronic document download request sent by a client, where the electronic document download request includes user information and a document identifier.
[0081] When a user needs to read an electronic document, the client sends an electronic document download request to the server. User information includes the user's login name and login password. The document identifier may be any one or more of document label, document name, and document type. The electronic document can be a PDF document, a WORD document, a TEXT document, etc.
[0082] Step 102: Generate an encryption key, and use the encryption key to encrypt the content of the document corresponding to the document identifier to generate an encrypted document.
[0083] The encryption key is an encryption key randomly generated when ...
Example Embodiment
[0092] Example two
[0093] figure 2 This is a flowchart of Embodiment 2 of a method for document encryption of the present invention. Compared with Embodiment 1, Embodiment 2 also includes registration and authentication, which specifically includes:
[0094] Step 201: Receive a user registration request sent by the client, where the user registration request includes user information.
[0095] The user can send a user registration request to the server through the client according to actual needs.
[0096] Step 202: The user information is authenticated, and when the authentication is passed, the user public key and the user private key are randomly allocated.
[0097] The server performs authentication and can perform authentication based on user information such as user login name and login password. When the user has the registration authority, the PKI technology is used to allocate a set of user public key and user private key to the user.
[0098] Step 203: correspondingly store...
Example Embodiment
[0113] Example three
[0114] image 3 This is a schematic flowchart of Embodiment 3 of a method for document decryption according to the present invention, including:
[0115] Step 301: Receive an encrypted document sent by the server.
[0116] Step 302: Send a key information request to the server, where the key information request includes the document identifier of the encrypted document.
[0117] After receiving the encrypted document, the client sends a request to the server to obtain the key information of the encrypted document. The server stores the document identification of the electronic document and its corresponding key information.
[0118] Step 303: Receive key information corresponding to the document identifier sent by the server.
[0119] The server finds the key information corresponding to the document ID according to the document ID and sends it to the client.
[0120] Step 304: Obtain the user private key from the certificate device, and use the user private key to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap