A method for encrypting and decrypting electronic government affairs

An e-government and coding technology, which is applied to electrical components and key distribution, can solve problems such as the inability to achieve single sign-on

Active Publication Date: 2021-06-15
中电万维信息技术有限责任公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiments of the present invention is to propose a method for encrypting and decrypting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for encrypting and decrypting electronic government affairs
  • A method for encrypting and decrypting electronic government affairs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 1 Shown is a flowchart of a method for encrypting e-government affairs according to an embodiment of the present invention, and the method includes steps:

[0052] S101, presetting the self-built system authentication code and user encryption code;

[0053] The self-built system refers to the system built by each government department, which is the decryption terminal of the present invention;

[0054] In the e-government unified identity authentication system, the encryption end is generally placed in the government service network, and the decryption end is placed in the self-built system;

[0055] The government service network (that is, the encryption terminal) gathers all government service items, and each government service item corresponds to a different self-built system. By logging into the government service network, the user selects the self-built system where the government service item needs to be handled, and Enter the corresponding user name and ...

Embodiment 2

[0090] figure 2 Shown is a flow chart of a method for decrypting e-government affairs of the present invention, said method comprising steps:

[0091] S201, presetting the self-built system authentication code and user decryption code;

[0092] In the e-government unified identity authentication system, the encryption end is generally placed in the government service network, and the decryption end is placed in the self-built system;

[0093] The self-built system refers to the system built by each government department, which is the decryption terminal of the present invention;

[0094] The government service network gathers all government service items, and each government service item corresponds to a different self-built system. Users log in to the government service network, select the self-built system where the government service item needs to be handled, and enter the corresponding user name and Password and authentication, the authentication process is divided into...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting and decrypting e-government affairs. In the invention, by presetting self-built system authentication codes, user encryption codes and user decryption codes, the self-built system authentication is performed first, and then user authentication is performed. Only double authentication is passed. After that, users are allowed to access the self-built system, realizing the single sign-on government service network and self-built system while ensuring the security of the system, saving login time, improving the efficiency of users in handling government services, and improving user satisfaction The self-built system is constrained by the self-built system authentication code. When there is a problem with the self-built system, the government service network can unilaterally reject the self-built system by modifying the self-built system authentication code. input, can efficiently resolve the disputes between the two docking; also through the specific time code, song name code and music characters to make the self-built system authentication code more specific, more innovative, to avoid being decrypted by other systems.

Description

technical field [0001] The invention relates to the field of information systems, in particular to the field of electronic government identity authentication. Background technique [0002] With the development of e-government affairs, different e-government affairs need to log in to different government affairs systems, and the individualization and differences of multiple government affairs systems are not very different. It is easy to cause users to cycle and get confused in several wrong government affairs systems. [0003] At present, the country has launched a "one network" for government service matters. "One network" refers to the collection of all government service matters in the province into one website for processing. There is an entrance for unified acceptance on the Internet, and business processing is still a business system built by each department. [0004] However, in the existing technology, after the user logs in to the "one network" platform, the ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0861H04L9/0872H04L63/0428H04L63/0815
Inventor 李保印刘涛张宝玉王坤
Owner 中电万维信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products