Burn-after-reading method based on complete offline
A post-reading and offline technology, applied in the field of data security, can solve the problems of insufficient user-friendly operation experience and low security, and achieve the effect of good market prospects and high security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples.
[0031] In order to describe the method of the present invention in detail, it will be further elaborated in conjunction with the accompanying drawings: a completely offline-based method of burning after reading, including the following steps:
[0032] 1. The file sender selects the file to be sent;
[0033] 2. Set the reading password;
[0034] 3. Use the AES256 encryption standard to encrypt file data through functional algorithm operations such as byte replacement, row shift, column mixing, round key addition, key scheduling, reverse byte replacement, reverse row shift, and reverse column mixing. ;Write the read password verification information and decryption password information into the file header;
[0035] 4. Generate encrypted documents that w...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com