Enciphering method of computer electronic documents

A technology of electronic document, encryption method, applied in computer field

Inactive Publication Date: 2006-08-16
WANXIANGQIANCHAO CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the intranet contains a large amount of important confidential data of the enterprise, if the data is leaked, it may cause extremely serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Below in conjunction with example the present invention is further introduced: this encryption method for computer electronic document, main steps are as follows: 1), create a unique key pair for every legal identity personnel; 2), use AES symmetric encryption algorithm Encrypt the confidential document, and use the personal public key provided by the legal reader of the document to encrypt, that is, the key used for document encryption using the RSA asymmetric encryption algorithm; 3), the document reader obtains the encrypted document and the encrypted document password After obtaining the key, first use the individual's private key to decrypt the document key, and then use the document key to decrypt the document.

[0020] 1. Online file encryption / decryption

[0021] The file encryption process of the client is fully integrated in the operating system. Select the file or folder to be encrypted in the resource manager, and select "encrypt file" from the right-click m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes: 1) building a unique key pair for each person with legal ID; 2) AES symmetry cryptographic algorithm is used to encrypt the secret document, and the said secret document is also encrypted by using public key provided by legal reader of the said document, namely using a cipher key adopting RAS asymmetry encryption algorithm; 3) after the reader gets the encrypted document and document key, he first decrypts document key by using private key, and then decrypts the document by using document key.

Description

technical field [0001] The invention relates to the encryption and decryption methods of all electronic documents in the computer field, mainly an encryption method for computer electronic documents. Background technique [0002] The 21st century is an information century, and the rapid development of network technology has further improved the degree of information sharing. The network has become an indispensable basic environment for most enterprise work. With the help of the Internet, people have greatly improved their work efficiency, and at the same time quietly changed our traditional work and life style. It is the interconnectivity and versatility of the network, while people enjoy the convenience brought by the network, the problem of data security has become more and more prominent. Governments, enterprises and institutions have also begun to attach great importance to network security issues. Some units have invested heavily and introduced some network security ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 黄建根宁连利
Owner WANXIANGQIANCHAO CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products