Cloud document encryption and decryption method, encryption and decryption device, and processing system

An encryption method and encryption device technology, applied in the direction of encryption devices with shift registers/memory, transmission systems, digital transmission systems, etc., can solve problems such as inaccessibility of documents, loss of centralized storage information, etc.

Active Publication Date: 2020-06-05
INDUSTRIAL AND COMMERCIAL BANK OF CHINA +1
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, with the rise of mobile devices such as smart phones, the demand for cross-terminal synchronization and access of documents is becoming increasingly strong. Cloud documents have become the main solution for enterprises to meet the above needs. After the introduction of cloud documents, how to ensure that documents are available on the client and server? Consistent security protection poses new challenges for enterprises
[0004] Traditional document security products focus on the encryption and authority control of document entities, and adopt the management method of centralized key storage, which solves the document security access control of traditional terminals well. However, the current document key and authority are stored in a centralized The risk of all documents being inaccessible due to the loss of stored information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud document encryption and decryption method, encryption and decryption device, and processing system
  • Cloud document encryption and decryption method, encryption and decryption device, and processing system
  • Cloud document encryption and decryption method, encryption and decryption device, and processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0105] In view of the current centralized storage of document keys and permissions, there is a risk that all documents cannot be accessed normally due to the loss of centralized storage information. Embodiments of the present invention provide a cloud document encryption and decryption method, encryption and decryption device, and processing system. After the document encryption key encrypts the document, the document encryption key is encrypted with the produc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud document encryption method and device, a cloud document decryption method and device, and a processing system. The cloud document encryption method comprises the steps of encrypting a document body by selecting a corresponding document encryption key based on preset document permission information; encrypting the document encryption key by respectively adopting a product protection key and a mechanism protection key so as to generate a product document encryption key and a mechanism document encryption key, and storing the encryption keys in a document head of a document; calculating based on information stored in the document head to obtain a first Hash value, and storing the first Hash value into the encrypted document body, wherein the document head and the encrypted document body compose an encrypted document, and the information of the document head comprises the product document encryption key, the mechanism document encryption key and the document permission information; and transmitting the encrypted document to a server. The cloud document encryption method realizes scattered storage of document keys, can optimize the storage structure of the document and solves risks in centralized storage of the document keys.

Description

technical field [0001] The present invention relates to the technical field of information security protection, in particular to a cloud document encryption and decryption method, an encryption and decryption device, and a processing system. Background technique [0002] With the development of information technology, electronic documents gradually replace paper documents and become an important carrier of enterprise information. In addition, various application systems within enterprises (especially the banking industry) also provide employees with various electronic documents containing sensitive information for download at any time, and information, as the core asset of most enterprises, is the key security protection object. Therefore, document security It has naturally become an indispensable and important part of enterprise security, and has gradually become the focus of enterprise security. [0003] At the same time, with the rise of mobile devices such as smart phon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/06H04L9/32H04L29/08
CPCH04L9/0643H04L9/0822H04L9/3236H04L63/045H04L63/062H04L63/10H04L67/06
Inventor 陈锦祥王辉赵春闫玲
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products