Unlock instant, AI-driven research and patent intelligence for your innovation.

Office file transparent encryption and decryption method and system

A transparent encryption and decryption and file technology, which is applied in the direction of instruments, electronic digital data processing, digital data protection, etc., can solve the problems of inconvenient operation and use, inability to perform different encryption and decryption operations, and low security guarantee of files, so as to achieve convenient operation and use Effect

Active Publication Date: 2019-04-19
FUJIAN YIRONG INFORMATION TECH +2
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing office business system mainly has the following defects when performing the transparent encryption and decryption operations of office documents: 1. It is necessary to uniformly convert office documents into specified types of files (for example, all documents that need to be encrypted and decrypted will be converted uniformly) PDF documents), but can not take different encryption and decryption operations according to different types of files, which has brought a lot of inconvenience to the actual operation and use; 2, most of the existing office business systems just use conventional Encryption and decryption algorithms are used to encrypt and decrypt files, such as document watermarks, screen watermarks, etc., but cannot effectively prevent documents and programs from being maliciously tampered with. Therefore, the security of files is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Office file transparent encryption and decryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] see figure 1 As shown, a transparent encryption and decryption method for office documents, the method includes the following steps:

[0053] Step S1, adding a transparent encryption and decryption process and a daemon process in the terminal program, and making the transparent encryption and decryption process and the daemon process monitor each other;

[0054] In the step S1, the mutual monitoring of the transparent encryption and decryption process and the daemon process is specifically:

[0055] Monitor the transparent encryption and decryption process and the specified interface of the transparent encryption and decryption process through the daemon process, and judge whether the transparent encryption and decryption process is running normally, and if yes, keep monitoring; if not, trigger Restart the transparent encryption and decryption process;

[0056] Monitor the daemon process and the designated interface of the daemon process through the transparent encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an office file transparent encryption and decryption method, which comprises the following steps of: adding a transparent encryption and decryption process and a daemon processin a terminal program, and mutually monitoring the transparent encryption and decryption process and the daemon process; Reading the certificate information in the Key into a process memory through the daemon process; When a terminal user opens a controlled file, a file flow is captured through a hook technology, a transparent encryption and decryption process calls a corresponding decryption program according to the file type of the file flow, and certificate information in a process memory is used for decrypting the file flow; And when the terminal user stores the controlled file, calling acorresponding encryption program by the transparent encryption and decryption process according to the file type of the file flow, and encrypting the file flow by using the certificate information inthe process memory. The method has the advantages that different encryption and decryption operations can be carried out on different types of files, documents, programs and the like can be effectively prevented from being maliciously tampered, and the safety of the files and the data on the terminal can be effectively guaranteed.

Description

technical field [0001] The invention relates to the field of document encryption and decryption, in particular to a method and system for transparent encryption and decryption of office documents. Background technique [0002] At present, the office business systems of various companies use their own security control methods to encrypt and decrypt office files to prevent the leakage of confidential documents and information. For example, some office business systems use watermarks to prevent data Leakage; as another example, some office business systems realize the security protection of files by means of file encryption. [0003] Since office documents are open to insiders, office documents are usually encrypted and decrypted using transparent encryption and decryption technology. The so-called transparency means that the encryption and decryption process will not be noticed by the user in the process of operating the file, and the entire encryption and decryption operatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/64
CPCG06F21/6209G06F21/64G06F2221/2107
Inventor 林振天陈又咏叶李东蔡清远白海滨袁宝峰
Owner FUJIAN YIRONG INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More