Enciphering method of computer electronic documents
A technology of electronic document, encryption method, applied in computer field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0019] Below in conjunction with example the present invention is further introduced: this encryption method for computer electronic document, main steps are as follows: 1), create a unique key pair for every legal identity personnel; 2), use AES symmetric encryption algorithm Encrypt the confidential document, and use the personal public key provided by the legal reader of the document to encrypt, that is, the key used for document encryption using the RSA asymmetric encryption algorithm; 3), the document reader obtains the encrypted document and the encrypted document password After obtaining the key, first use the individual's private key to decrypt the document key, and then use the document key to decrypt the document.
[0020] 1. Online file encryption / decryption
[0021] The file encryption process of the client is fully integrated in the operating system. Select the file or folder to be encrypted in the resource manager, and select "encrypt file" from the right-click m...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com