Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

File multi-encryption two-dimensional code electronic encryption and decryption management system and method

A multi-encryption, encryption and decryption technology, applied in electronic digital data processing, computer parts, record carriers used by machines, etc., can solve problems such as loss and disorderly dissemination of classified electronic files, and improve management capabilities and management effectiveness. Effect

Pending Publication Date: 2020-05-19
玉溪市电子政务内网信息技术中心
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the secret-related documents are disseminated, the sovereign will completely lose the right to control them, and cannot perform operations such as retraction or destruction of electronic documents in traditional media, which objectively results in the disorderly dissemination of secret-related electronic documents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File multi-encryption two-dimensional code electronic encryption and decryption management system and method
  • File multi-encryption two-dimensional code electronic encryption and decryption management system and method
  • File multi-encryption two-dimensional code electronic encryption and decryption management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention. see figure 1 , figure 2 , image 3 .

[0031] Embodiment 1: A two-dimensional code electronic encryption and decryption management system for multiple encryption of files, including: a file acquisition and encryption module, used to obtain a file to be encrypted, and convert it into a ciphertext file according to an encryption protocol; a ciphertext splitting module , which is used to obtain the bytecode of the ciphert...

Embodiment 2

[0039] A two-dimensional code electronic encryption and decryption method for multiple file encryption, comprising the following steps:

[0040] S1. Obtain the file to be encrypted, and convert it into a ciphertext file according to the encryption protocol;

[0041] S2. Obtain the bytecode of the ciphertext file, divide the bytecode into several bytecode segments according to the number of bytes, and perform data encoding in sequence to obtain the corresponding bytecode for each bytecode segment Encoded data including sequence number and byte code content; the data is encoded as JSON data encoding, and is encoded in segments within 900 bytes per segment, or 900-1500 bytes; the data encoding also includes each segment The number of the corresponding row number of the byte code segment arranged in order, where the number of the last byte code segment also includes the termination character

[0042] S3. Generate a plurality of two-dimensional code graphic information correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file multi-encryption two-dimensional code electronic encryption and decryption management system and method, which apply a multi-information encryption two-dimensional codeanti-counterfeiting technology to realize electronic anti-counterfeiting of secret-related files and solve the security problem of storage and transmission of the secret-related files. A public key encryption and private key decryption mode is established, and the private key encryption and public key combination mode forms a complete anti-counterfeiting and identification system. The secret-related file is subjected to asymmetric encryption, the encrypted file is analyzed, decomposed and recoded through the file byte code processing technology, the two-dimensional code serves as a carrier, electronic anti-counterfeiting of the secret-related file is achieved, and the safety problem of storage and transmission of the secret-related file is solved. By constructing a matched management application system, a management mode of manual and technical integration, transceiving management of secret-related files, operation and maintenance management of a secret-related information system and the like are realized, innovation is realized on thinking, ideas and methods, and the management capability and the management effect of the secret-related files of the institutions are further improved.

Description

technical field [0001] The invention relates to the technical field of system application of file encryption and decryption, in particular to a two-dimensional code electronic encryption and decryption management system and method for multiple encryption of files. Background technique [0002] At present, with the rapid development of information technology and the rapid development and integration of various networks, information and data are showing an explosive growth trend. How to effectively protect the security of confidential documents and reduce the risks caused by data leakage is an important task for every job. severe test that the reader has to face. Since confidential electronic documents are easy to copy and transmit, sovereignty control has always been a difficult problem to solve. Once secret-related documents are disseminated, the sovereign completely loses the right to control them, and cannot perform operations such as retraction or destruction of electron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06K19/06
CPCG06F21/602G06F21/6209G06K19/06037G06F2221/2107
Inventor 李德弦艾泓宇代家佳褚凯丽宋侯良
Owner 玉溪市电子政务内网信息技术中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products