Signed-document encrypting and safety browsing device and method thereof

A technology for document verification and encryption algorithm, applied in computer security devices, instruments, electronic digital data processing, etc., can solve problems such as unfavorable document security, poor user experience, ignorance of documents, etc., to achieve high user experience and protection. Enhancement, high experience effect

Inactive Publication Date: 2017-02-22
EVERGRANDE SMART TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the encryption of the documents in the computer is generally done manually by the user, which requires the user to judge whether the document needs to be encrypted, which is inconvenient in practical applications; and the user sometimes forgets to encrypt the document, which is not conducive to the security of the document ; and after the document uploaded to the computer is encrypted, when other trusted users need to consult the document, the document cannot be consulted because they do not know the key of the document; the actual use ability of the document is reduced, and the user's browsing experience Difference

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signed-document encrypting and safety browsing device and method thereof
  • Signed-document encrypting and safety browsing device and method thereof
  • Signed-document encrypting and safety browsing device and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0036] Such as figure 1 As shown, it is a schematic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a signed-document encrypting and safety browsing device and a method thereof, and relates to the field of electronic document transmission. The signed-document encrypting and safety browsing device and the method thereof have the advantages that a secret key is generated when an encryption identification of a signed document is identified, the signed document is encrypted according to the secret key and an encryption algorithm to generate an encrypted document, manual encryption of users is not needed, and accordingly, user experience is good; the secret key and the encrypted document are sent to a second client side when verification information sent by each third client side is received; when a user not knowing the secret key wants to browse the encrypted signed document, the signed document and the secret key can be received by the second client side after verification of each responsible person related to the signed document, so that the content of the signed document is protected to some extent, practical document application capability is improved, and users' browsing experience is good.

Description

technical field [0001] The invention relates to the field of electronic document transmission, in particular to a device and method for signing off document encryption and safe browsing. Background technique [0002] Electronic documents refer to written materials formed by people in social activities, with chemical magnetic materials such as computer disks, magnetic disks, and optical disks as carriers. It relies on computer system access and can be transmitted on the communication network. It mainly includes electronic documents, electronic letters, electronic reports, electronic drawings, etc. However, in order to prevent some confidential or privacy-related electronic documents from being illegally obtained and leaked by others during transmission, it is necessary to encrypt the electronic documents before the electronic documents are transmitted. [0003] In the prior art, the encryption of the documents in the computer is generally done manually by the user, which req...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/62G06F21/6209
Inventor 曹海
Owner EVERGRANDE SMART TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products