A method for encrypting and decrypting electronic government affairs
An e-government and coding technology, which is applied to electrical components and key distribution, can solve problems such as the inability to achieve single sign-on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] figure 1 Shown is a flowchart of a method for encrypting e-government affairs according to an embodiment of the present invention, and the method includes steps:
[0052] S101, presetting the self-built system authentication code and user encryption code;
[0053] The self-built system refers to the system built by each government department, which is the decryption terminal of the present invention;
[0054] In the e-government unified identity authentication system, the encryption end is generally placed in the government service network, and the decryption end is placed in the self-built system;
[0055] The government service network (that is, the encryption terminal) gathers all government service items, and each government service item corresponds to a different self-built system. By logging into the government service network, the user selects the self-built system where the government service item needs to be handled, and Enter the corresponding user name and ...
Embodiment 2
[0090] figure 2 Shown is a flow chart of a method for decrypting e-government affairs of the present invention, said method comprising steps:
[0091] S201, presetting the self-built system authentication code and user decryption code;
[0092] In the e-government unified identity authentication system, the encryption end is generally placed in the government service network, and the decryption end is placed in the self-built system;
[0093] The self-built system refers to the system built by each government department, which is the decryption terminal of the present invention;
[0094] The government service network gathers all government service items, and each government service item corresponds to a different self-built system. Users log in to the government service network, select the self-built system where the government service item needs to be handled, and enter the corresponding user name and Password and authentication, the authentication process is divided into...
PUM
![No PUM](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap