Intelligent document encryption computer software realizing method
A software implementation, computer technology, applied in the computer field, can solve the problems of chaotic database structure, difficult data acquisition and data exchange, and low database compatibility.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0009] The present invention will be further described below in conjunction with accompanying drawing.
[0010] Reference attached figure 1 A computer software implementation method for intelligent document encryption. These include system servers, databases, peripheral clients.
[0011] First, a system server is installed on the computer, which is the first step of intelligent document encryption. This system server can perform a preliminary optimization of the chaotic structure of documents on the existing computer. Then submit the questions and related data in these documents to the database. Secondly, establish a database to collect, exchange, verify and manage the data submitted by the system server. These verified data are then transmitted to peripheral clients. After the client receives the data, it will feed back the data to the system server in time. Check if the computer is functioning normally.
[0012] The system server 1 is a system server established on a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 