Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Document decryption method and document decryption device

A document and target document technology, applied in user identity/authority verification, digital data protection, electrical components, etc., can solve the problems affecting the efficiency of document decryption, cumbersome process, slow search speed, etc.

Active Publication Date: 2016-06-22
ZHUHAI KINGSOFT OFFICE SOFTWARE +2
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in order to prevent the document decryption password from being forgotten, users usually save the decryption password in the form of electronic text or handwritten text. Document decryption; however, when operating electronic or handwritten texts, due to some human factors (for example, accidental deletion of documents, etc.), the decryption password may be lost. Of course, if the text storage is large, in the When looking for the decryption password, the search speed will be slow and the process will be cumbersome, which will ultimately affect the user's efficiency in decrypting the document

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document decryption method and document decryption device
  • Document decryption method and document decryption device
  • Document decryption method and document decryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0082] In order to improve the user's efficiency in decrypting the document under the premise of ensuring the data security of the encrypted document, the embodiment of the present invention provides a method and device for decrypting the document.

[0083] For the sake of clarity, a method for decrypting a document provided by an embodiment of the present invention is firstly introduced below.

[0084] First, from the perspective of a first terminal installed with...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a document decryption method and a document decryption device. The method comprises the following steps: when an encrypted target document is decrypted manually, a first terminal acquires a target user account, a target document identifier and target decryption information; the first terminal constructs and sends to a server a password saving instruction carrying the acquired information so the server responds to the password saving instruction; when receiving an opening instruction for the target document, the first terminal constructs and sends to the server a document decryption request so the server generates and feeds back a graphic identification code carrying a random authentication code; the graphic identification code and prompt information which is used for instructing a user to scan the graphic identification code through a document management application in a second terminal are output so the server feeds back a target request result corresponding to the target decryption information after judging that the user requesting to open the target document is a user with the target user account based on the graphic identification code; and the target document is decrypted automatically after the target request result is received. Through the scheme, the effectiveness of document decryption can be improved for users.

Description

technical field [0001] The invention relates to the field of document processing, in particular to a document decryption method and device. Background technique [0002] In recent years, document management applications installed on terminals have been widely adopted by users, and in order to prevent documents from being leaked, documents managed by document management applications are often encrypted, especially for desktops where users do not have strong privacy. It is more common for files on terminals (desktop computers, laptop computers, etc.) to be encrypted. Since the document is encrypted, when the user tries to open the encrypted document, a decryption interface will pop up first to instruct the user to decrypt the document. [0003] At present, in order to prevent the document decryption password from being forgotten, users usually save the decryption password in the form of electronic text or handwritten text. Document decryption; however, when operating electro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06F21/62
Inventor 晁云曈方婷刘欢赵孔胜彭伟林
Owner ZHUHAI KINGSOFT OFFICE SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products