Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for destroying electronic documents regularly

A technology of electronic documents and system parameters, applied in electronic digital data processing, instruments, calculations, etc., can solve problems such as complex management, achieve the effects of ensuring confidentiality, convenient user operation, and simple implementation methods

Active Publication Date: 2012-12-26
JILIN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for regularly destroying electronic official documents, which overcomes the defect of destroying special files in the existing government intranet, that is, the timing destroying of confidential files stored in computers. At present, the methods in this regard are as follows: Artificially determine the confidentiality period of files and delete them, use special computer settings to delete files at regular intervals, etc.
And there are deficiencies such as complex management in the existing technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for destroying electronic documents regularly
  • Method and system for destroying electronic documents regularly
  • Method and system for destroying electronic documents regularly

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0123] see figure 1 , the electronic document timing destruction system in the present embodiment can be divided into four layers as a whole, including system client 11, system server 12, data processing layer 13 and database 14; Wherein:

[0124] The system client 11 includes a user login module 111, a private key acquisition module 112, a secret directory creation module 113 and a secret file encryption module 114; the system client 11 is embodied as an application software, which provides a login interface and additional functions of the right button for ordinary users , the login interface provides the user with a visual interface to connect to the system server 12, which requires the user to input the user account number and protection password; the additional functions of the right button include primary encryption, secondary encryption, tertiary encryption and decryption; when selecting a After clicking the right button of the electronic document, you can select level 1...

Embodiment 2

[0129] see figure 2 , the electronic official document timing destruction method server system initialization process of the present invention, concrete steps are as follows:

[0130] (1) Select the system parameter T S =(p,a,b,G,P pub ,q,h,H,I,H 1 , I 1 ), the parameter selection process is as follows:

[0131] a) Choose a prime number finite field F p , select domain elements a, b∈F p Satisfy the equation: E:y 2 ≡x 3 +a·x+b(modp). where 4·a 3 +27·b 2 ≠0(modp);

[0132] b) on curve E(F p ) to select a base point G=(x G ,y G ), and calculate the order q of point G, h=#E(F p ) / q. These parameters satisfy the following constraints: #E(F p )≠p; p B ≠1(mod q), where 1≤B<20; h≤4; p, q must also satisfy p=2mod3 and p=6q-1;

[0133] c) generate a random number s is the master key of the system, and calculate P pub =s·G;

[0134] d) Choose four hash functions: I: {0, 1} * → F p , H 1 :{0, 1} n × {0, 1} n → F q , I 1 :{0, 1} n → {0, 1} n ;

[0135] (...

Embodiment 3

[0142] see image 3 , the user identity verification and the user private key distribution process of the method for regularly destroying electronic documents according to the present invention, the specific steps are as follows:

[0143] (1) Internal users of the organization enter the user account ID through the login interface of the client software U And protect the password pwd and submit;

[0144] (2) The client software uses the identification ID of the system server S Encrypt the following information: M=ID U ||pwd, where || means connection, ID U Represents the user account, that is, the user ID; pwd represents the protection password, that is, the user password; the encryption process is as follows:

[0145] a) Set the server ID to S Mapped to the elliptic curve E(F p ) on a point P of order q S ;

[0146] b) Choose a random string σ, set r=H 1 (σ,M);

[0147] c) Calculate the ciphertext C = rP , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for destroying electronic documents regularly, belonging to a method for destroying electronic documents. The method includes the processes as follows: initialization of a service end system, setting of user account number and password, verification of user identity and issuing of a user private key, encryption of confidential documents, and the destroying-replacing of the user private key. The system for destroying electronic documents regularly comprises a system client side, a system service end, a data processing layer and a database. The method and the system is applicable to national senior agencies needing to destroy confidential electronic documents in personal computers regularly; and compared with the traditional method for destroying confidential electronic documents, the method provided by the invention has the advantages of having high efficiency and a function of automatically destroying the electronic documents.

Description

technical field [0001] The invention relates to a method for destroying electronic official documents, in particular to a technology for regularly destroying electronic official documents under a high-level organization network, especially a method and system for regularly destroying confidential electronic official documents in personal computers under government agencies. It can be widely used in high-level national institutions that need to regularly destroy confidential electronic documents. Background technique [0002] A large number of important, top-secret, and confidential electronic documents are stored in the computers of employees on the intranet of government departments, and these important, top-secret, and confidential electronic documents usually need to be destroyed within a period of time to be permanently kept secret. However, many existing high-level institutions The confidential electronic documents in the employees' computers cannot be guaranteed to be ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/60
Inventor 胡亮初剑峰林海群袁巍李宏图
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products