CN102096789A - Electronic document security device - Google Patents

Electronic document security device Download PDF

Info

Publication number
CN102096789A
CN102096789A CN2011100427041A CN201110042704A CN102096789A CN 102096789 A CN102096789 A CN 102096789A CN 2011100427041 A CN2011100427041 A CN 2011100427041A CN 201110042704 A CN201110042704 A CN 201110042704A CN 102096789 A CN102096789 A CN 102096789A
Authority
CN
China
Prior art keywords
code
module
scrambled
coding
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100427041A
Other languages
Chinese (zh)
Inventor
顾晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI DIAIBI CHEMICAL TECHNOLOGY Co Ltd
Original Assignee
SHANGHAI DIAIBI CHEMICAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI DIAIBI CHEMICAL TECHNOLOGY Co Ltd filed Critical SHANGHAI DIAIBI CHEMICAL TECHNOLOGY Co Ltd
Priority to CN2011100427041A priority Critical patent/CN102096789A/en
Publication of CN102096789A publication Critical patent/CN102096789A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an electronic document security device. The device comprises a code generation module, an encryption/decryption module, a code loading module, a code storage module, and a computer with an editing device, wherein the code storage module can store more than one encrypted code table; each encrypted code table is generated previously or immediately by the code generation module according to character codes in a universal code table; and the encrypted code table is irregular, i.e., the coding codes in the encrypted code table have no mathematical rule with the character codes. The electronic document security device has the advantages of extremely high security, safety, convenience and generality.

Description

The privacy device of electronic document
Technical field
The present invention relates to electronic document, particularly a kind of privacy device of electronic document.
Background technology
Document package contains a large amount of spoken and written languages symbols, or claims " char ".Illegally do not known for the content of protection plaintext document, need be encrypted the character in the document.Traditional cryptographic means can be divided into two big classes: regular class and random class.Regular class cryptographic means is exactly according to certain rule or rule, and the character in the plaintext is carried out conversion obtain ciphertext, thus the purpose that realization is encrypted.The shortcoming of this kind method maximum is that any in theory cryptographic means clocklike can be cracked by mathematical operation.
Random class cryptographic means is the encryption method of replacing another character with a code, and the corresponding relation of code substitute character does not have inherent mathematical law.The document of corresponding relation is called code book between record character and the code.The advantage of this encryption method is safe, shortcoming is that the conversion between code and the character needs bigger operand, and the data volume of code book is difficult for safe storage more greatly, in case code book is leaked, then all rely on the document that this code book encrypts and are all cracked.
A part of the supposing code book table 1 that thes contents are as follows
Table 1
Character Code Character Code Character Code Character Code
A 65 H 72 O 79 V 86
B 66 I 73 P 80 W 87
C 67 J 74 Q 81 X 88
D 68 K 75 R 82 Y 89
E 69 L 76 S 83 Z 90
F 70 M 77 T 84 \ 92
G 71 N 78 U 85 _ 95
To encrypt " I_LOVE_U " this section plaintext character, then, can be converted to code " 7395767986699585 " to " I_LOVE_U ", then this section code be preserved, obtain the ciphertext document according to the corresponding relation of character and code in the last table 1.The content isolog character of ciphertext document is inequality fully, has played the effect of encrypting.When deciphering,,, then " 7395767986699585 " this section ciphertext can be reduced to " I_LOVE_U ", play the effect of deciphering according to the corresponding relation of code in the code book and character with the content in the ciphertext document at the ciphertext document.
Electronic document refers to each character that will be comprised in the spoken and written languages content, and (characters symbol) is converted to the code (code) that computer system can be discerned, and all codes are kept at the document (Document) that forms in the storer.
Described storer is the equipment that storage chip, PC, the webserver, e-book or the mobile phone etc. of CD, floppy disk, portable hard drive, USB flash disk, SD card, integrated circuit (IC) chip, mobile phone have the store electrons file function.
The corresponding relation of character and code forms coding schedule, present international coding schedule has " UTF-8 coding schedule ", and " unicode coding schedule " etc., domestic universal coding table has " GBK coding schedule ", different coding schedules such as " GB2312 coding schedules ", the code in the coding schedule is called character code.For the ease of identification, usually adopting the numeral of one 16 scale or 10 scales in coding schedule is the character code name.Above-mentioned universal coding table is stored with the form of electronic document usually and is used.The editing device that includes computer system can be connected with coding schedule, and can character be carried out two-way mutual conversion with character code according to the corresponding relation of character of being put down in writing in the coding schedule and character code; Or, the code of different code system is changed mutually according to the corresponding relation between A code system of being put down in writing in the coding schedule and the B-code system.Described computer system refers to and has the various device that reads or edit or preserve the electronic document function, includes but not limited to single-chip microcomputer, PC, server, mobile phone, home game machine, e-book etc.
The encryption and decryption process of electronic document can be finished by the converse routine of computer system.At present carry out the cryptographic means that regular class is generally adopted in encryption and decryption, seldom adopt random class cryptographic means for electronic document.And the shortcoming of regular class methods maximum is that confidentiality is strong inadequately, as long as the enough fast computing machine of arithmetic speed is arranged in theory, any cryptographic means clocklike can be cracked by the computing of computing machine.In addition, if the language environment of the employed computer system of encryption and decryption coding schedule inequality or that encipherer and deciphering person adopted is inconsistent, the situation that the document after may occurring deciphering can't normally show.For example at one section Chinese expressly, adopt the (SuSE) Linux OS of Chinese edition to obtain ciphertext during encryption, what adopt during deciphering is the windows system of the Japanese edition, can't normally show the situation of former plaintext after then may occurring deciphering.
Summary of the invention
Fundamental purpose of the present invention is to overcome the defective of above-mentioned prior art, and a kind of electronic document privacy device based on random class cryptographic means is provided.The scrambled table that is used for encryption and decryption does not have inherent regularity, can't crack via computing, analysis or checking, and the encryption method that makes the present invention has high confidentiality, security, convenience and versatility.
Technical solution of the present invention is as follows:
A kind of privacy device of electronic document, comprise a coding generation module, an encrypting-decrypting module, a coding load-on module, a code storage module, an editing device and one " universal coding table ", its characteristics are: have the scrambled table more than 1 in the described code storage module, each scrambled table system is generated according to the character code content in the universal coding table in advance or immediately by described coding generation module, described scrambled table is random, promptly the code in the scrambled table with character code each other without any mathematical law.
Described coding generation module includes an editing device, can generate a plurality of described code, and the code that is generated is inserted in " universal coding table ", make each different code corresponding to a character code, but each character code can have a plurality of different code corresponding with it, and the coding schedule after the insertion code is saved as " scrambled table ";
Described encrypting-decrypting module includes an editing device, this editing device is used to read the content of described " scrambled table ", and can be according to the character code of being put down in writing in " the scrambled table " that read and the corresponding relation of code, character code and code are carried out bi-directional conversion, and the code storage after will changing is an electronic document.
Described code storage module is included in coding load-on module inside, or described code storage module is independent of outside the described coding load-on module, or all or part of of code storage module separates with described coding load-on module.
Described code storage module comprises more than one storer, is made up of the storer of identical type, or is made up of the storer of variety classes and varying number.
Described coding load-on module connects each storer in the described code storage module respectively, the coding schedule data that read wherein to be stored.
Described scrambled table can be divided into a plurality of parts, is stored in respectively in a plurality of storeies of code storage module, and described coding load-on module can become the scrambled table pack that is divided into a plurality of parts a scrambled table.
Described connection comprises that the direct connection, the circuit that carry out data transmission connect, communication network connects, wireless network connects.
Technique effect of the present invention:
1, the user can work out " the scrambled table " that is used for encryption and decryption arbitrarily, and a character code permission is corresponding with it by a plurality of code in this scrambled table, but each code can only corresponding character code.During encryption, the encrypting-decrypting module of described by being connected to " scrambled table " is converted to code one by one according to each character code of connect " scrambled table " general content expressly, subsequently code is saved as the encrypted electronic document.When deciphering, " the scrambled table " that encrypting-decrypting module connected need include the transformational relation between employed all code of encrypted document and the character code, code in the encrypted electronic document could be converted to correct character code, thereby realize deciphering.If encrypting-decrypting module is not connected to accordingly " scrambled table ", then the encrypted electronic document can't be converted to correct character code, played the effect of maintaining secrecy.Because the form of presentation of user's establishment " scrambled table " does not have logicality, and can adopt a plurality of code to come corresponding character code, can't verify the result who cracks by mathematical operation, therefore can not adopt the method for exhaustion that the document that adopts the present invention to encrypt is cracked in present technical merit.User for using different " scrambled table " is not influenced all the other users' ciphertext safety even some users " scrambled table " leaks or crack yet.So make the present invention's encryption method have high confidentiality.
2, described code storage module is made up of the storer that can be separated from each other more than 1, and the code storage module can be separated with the coding load-on module.What the scrambled table was complete is stored in the coded stack, or the scrambled table is divided into several parts is stored in respectively in a plurality of storeies of code storage module, or a plurality of coding schedules are stored in the code storage module.When carrying out file encryption or deciphering, the coding load-on module connects the code storage module, makes the scrambled table of storing in the code storage module be connected to encrypting-decrypting module.When document is deciphered, if be not connected to the code storage module that stores the respective encrypted coding schedule, the coding load-on module can't connect described scrambled table, cause and can't the electronic document that adopt described scrambled table to encrypt be decrypted, so make the present invention's encryption method have high security.
3, the user does not need additionally to expend time in ciphering process and carries out complicated cryptographic calculation; The user can utilize means of communication to connect " the scrambled table " that is stored in the long-range code storage module, and needn't be at one's side " scrambled table " band constantly; An encryption/decryption device can be deciphered the document that different " scrambled table " encrypted simultaneously; These characteristics have further facilitated user's use.Therefore the present invention has higher convenience.
Description of drawings
Fig. 1 is the block schematic diagram of the privacy device of electronic document of the present invention.
Fig. 2 is the block schematic diagram of electronic document decryption system of the present invention, and 301 is that the first scrambled table, 302 is that the second scrambled table, 30N are n scrambled tables.
Fig. 3 is the schematic flow sheet of electronic document encryption method of the present invention.
Fig. 4 is the schematic flow sheet of electronic document decryption method of the present invention.
Embodiment
For making purpose of the present invention, structure, feature and function thereof there are further understanding, below cooperate embodiment and accompanying drawing to be described in detail as follows:
Consult Fig. 1 earlier, Fig. 1 is the block schematic diagram of the privacy device of electronic document of the present invention.As seen from the figure, the privacy device of electronic document of the present invention, comprise a coding generation module 40, an encrypting-decrypting module 10, a coding load-on module 20, code storage module 30 and have the computing machine of editing device, its characteristics are: described code storage module 30 stores the more than one scrambled table that is used for encryption and decryption, each scrambled souvenir is loaded with character code of system separately and code one to one or a character code and the corresponding relation of a plurality of code, described scrambled table is random, and the corresponding relation of promptly described code and described character code does not have inherent mathematical law.And no matter described code is identical or different with the form (as figure place, numerical value interval, length etc.) of described character code, does not all influence effect of the present invention.
Editing device 101 in character 011 of the present invention, code, electronic document, universal coding table 11, computing machine and the computing machine etc., equal identical with described in the background technology, no longer repeat specification.
Key of the present invention comprises:
One, generates the scrambled table
The scrambled table that is used for encryption and decryption of the present invention can produce via any method, and the present invention is not limited the generation type of scrambled table.But each scrambled souvenir has carried the full content of universal coding table of institute's foundation and the character code in the universal coding table and code only one-to-one correspondence or a character code and the corresponding relation of a plurality of code, described scrambled table is random, and the corresponding relation of promptly described code and described character code does not have inherent mathematical law.Yet with regard to present prior art, the mode that generates the scrambled table that is used for encryption and decryption comprises following mode at least:
The user submits to usually employed " universal coding table " 11; Perhaps submit one section electronic document that in the current computer system, can normally show and edit to, analyze, determine the employed universal coding of user table 11 by the document that 40 couples of users of coding generation module submit to; Described coding generation module 40 is according to the content of normally used " the universal coding table " 11 of user, generate the scrambled table, this scrambled table includes character 011 and the corresponding relation of character code and the corresponding relation of character code and code in described " universal coding table ".
For reaching better secret effect, the user also can repeat above-mentioned step and generate many cover scrambled tables, as the first scrambled table, the second scrambled table etc.
The user is stored in code storage module 30 with an above scrambled table that is generated, and selects more than one scrambled table to issue the deciphering person who has the right to encrypted document, alternately or simultaneously uses.
Two, encrypt
Ciphering process among the present invention is summarized as follows, and detailed mode of operation, will be in follow-up detailed description:
The user starts the encryption and decryption system: be that coding load-on module 20 is connected code storage module 30, connect the stored scrambled table that is used for encryption and decryption from code storage module 30, as " the first scrambled table ".If store in the code storage module 30 when overlapping the scrambled table, the coding schedule that can therefrom select at least one cover to use is as " the first scrambled table " more.This scrambled table is connected to encrypting-decrypting module 10.
Be connected at encrypting-decrypting module 10 under the state of this first scrambled table, the user can and obtain encrypted encrypted document 02 with the conversion of plaintext electronic document, finishes encryption.
Three, deciphering
Must depend on the scrambled table that adopted when encrypting as " the first scrambled table " to the deciphering of encrypted document 02.
The user starts electronic document encryption and decryption system: be that coding load-on module 20 is connected code storage modules 30, select from code storage module 30 and connect corresponding scrambled table, as " the first scrambled table ".After encrypting-decrypting module 10 is connected to " the first scrambled table ", the code in the encrypted document 02 can be converted to original character code.Editing device 101 is connected to the coding load-on module, and character code is converted to character 011, thereby reaches the effect of deciphering.
Four, maintain secrecy
If encrypting-decrypting module 10 can't be connected to this first scrambled table, for example when do not start coding load-on module 20 or do not connect code storage module 30 or code storage module 30 in not during the store electronic documents encrypting storing during employed this first scrambled table, then encrypting-decrypting module 10 can't be converted to the code in the encrypted document 02 original character code, has reached the effect of maintaining secrecy.
Encipherer and deciphering person answer safekeeping to be used for the scrambled table of encryption and decryption or store the coding schedule memory module 30 of scrambled table, and all or part of content of guaranteeing this scrambled table is not that the 3rd people obtains.Even encrypted document is obtained by the 3rd people, if the 3rd people does not obtain corresponding scrambled table, also the code content of encrypted document 02 can't be converted to correct character code, played the effect of maintaining secrecy.
Embodiment
Embodiment 1, to the electronic document encryption and decryption.
At first, please refer to the 1st figure, Fig. 1 is the block schematic diagram of electronic document encryption system of the present invention.As shown in Figure 1, the present invention's electronic document encryption and decryption system comprises an encrypting-decrypting module 10 at least; And code storage module 30, store the scrambled table that is used for encryption and decryption more than, as " the first scrambled table " 301, and this " first scrambled table " 301 includes a plurality of first code and with the corresponding character code of each first code; And a coding load-on module 20, the one end is connected with encrypting-decrypting module 10, and the other end is connected with code storage module 30, makes it can read, select and connect the scrambled table of being stored in the code storage module 30 that is used for encryption and decryption.
Encrypting-decrypting module 10 reads expressly document 01, character codes all in the plaintext document 01 is converted to code one by one according to the corresponding relation of being put down in writing in " the first scrambled table " 301, makes all character codes save as encrypted document 02 according to the code of " the first scrambled table ".Detailed process is as follows:
For example, suppose that user's normally used " universal coding table " is " ASCII coding schedule ".The corresponding relation such as the following table 2 that include character 011 and character code in " universal coding table ".
Table 2
Character Code Character Code Character Code Character Code
A 65 H 72 O 79 V 86
B 66 I 73 P 80 W 87
C 67 J 74 Q 81 X 88
D 68 K 75 R 82 Y 89
E 69 L 76 S 83 Z 90
F 70 M 77 T 84 \ 92
G 71 N 78 U 85 _ 95
Simultaneously, suppose that " the first scrambled table " 301 is the content of coding generation module 40 according to " universal coding table " (table 2), adopt the code identical as code with the form (figure place, numerical value interval, length etc.) of character code, corresponding each character code is inserted a code, generate by " the first scrambled table ", and " the first scrambled table " that this generates in advance is stored in code storage module 30; The corresponding relation such as the following table 3 that include character 011, character code and code in described " the first scrambled table " 301.
Table 3
Figure BDA0000047584170000081
Figure BDA0000047584170000091
Editing device 101 is converted to expressly document with character content " I_LOVE_U ".According to the corresponding relation of the character in " universal coding table " (table 2) 011 and character code as can be known, this expressly the character code content in document be " 73 95 76 79 86 69 95 85 ".
Start the coding load-on module, make encrypting-decrypting module 10 to be connected to " the first scrambled table of being stored in the code storage module 30 " 301 by coding load-on module 20; Encrypting-decrypting module 10 is according to the character code of being put down in writing in " the first scrambled table " 301 (tables 3) and the corresponding relation of code subsequently, character code " 73 95 76 79 86 69 95 85 " in the above-mentioned plaintext document is converted to code " 87 65 90 72 65 8,365 78 ", generate encrypted document, finish encryption " I_LOVE_U " this section character 011.
Fig. 2 is the block schematic diagram of electronic document decryption system of the present invention.
Start decryption system, encrypting-decrypting module 10 is connected to " the first scrambled table " 301 in the code storage module 30 by coding load-on module 20, encrypting-decrypting module 10 is according to the code of being put down in writing in " the first scrambled table " 301 (tables 3) and the corresponding relation of character code, code in the encrypted document 02 " 87 65 90 72 65 83 65 78 " is converted to character code " 73 95 76 79 86 69 95 85 ", generates expressly document 01.Editing device 101 is connected to " the first scrambled table " 301 by coding load-on module 20, and according to the character code of being put down in writing in " the first scrambled table " 301 and the corresponding relation of character 011, described plaintext document 01 is converted to character 011 " I_LOVE_U ", has finished deciphering described encrypted document.
If decryption system is not connected to described " the first scrambled table " 301, suppose that editing device 101 is connected to " universal coding table " (table 2), editing device 101 is converted to character 011 " WAXHASAN " according to the character code of record in " universal coding table " and the corresponding relation of character 011 with the code in the encrypted document 02 " 87 65 90 72 65 83 65 78 ".Clearly, character 011 content of editing device 101 conversions and the original text meaning are not inconsistent fully, have reached the effect of maintaining secrecy.
Embodiment 2, use the encryption and decryption of the computer system of a plurality of " scrambled tables ".
When encrypted document 02 is transferred to another encrypting-decrypting module 10, if above-mentioned another encrypting-decrypting module 10 is to be connected to other coding schedule, suppose that this other coding schedule is " the second scrambled table ", it includes the corresponding relation such as the following table 4 of character 011, character code and code
Table 4
Figure BDA0000047584170000101
According to embodiment 1, the A encrypting-decrypting module uses " the first scrambled table " 301 that " I_LOVE_U " this section character 011 is converted to code " 87 65 90 72 65 83 65 78 " according to " the first scrambled table " 301 and saves as encrypted document.Subsequently, above-mentioned encrypted document is transferred to B encrypting-decrypting module 10; If B encrypting-decrypting module 10 is connected to " the second scrambled table " this moment, when attempting to decipher above-mentioned encrypted document; At this moment, the editing device 101 that the B encrypting-decrypting module connected can be character 011 " PDSADXDG " with code " 87 65 90 72 65 83 65 78 " deciphering according to " the second scrambled table "; Clearly, use the document content of " the second scrambled table " deciphering and the meaning of use " the first scrambled table " 301 original texts of being encrypted not to be inconsistent fully, reached the effect of encrypting.If after B encrypting-decrypting module 10 is connected to " the first scrambled table " 301, decipher above-mentioned encrypted document again, code " 87 65 90 72 65 83 65 78 " is " I_LOVE_U " according to " the first scrambled table " 301 deciphering.With the aggregatio mentium of the original text of being encrypted, played the effect of deciphering.
Embodiment 3, and the internal electron document maintains secrecy in the same group.
When the different user in the same group all uses same " scrambled table ".From above-mentioned the 1st embodiment and the 2nd embodiment as can be known, the encrypted document of using identical " scrambled table " to obtain, other in the same group is with deciphering per family.Other user then can't implement deciphering to the electronic document that this group member encrypts owing to can't obtain same " scrambled table ", has reached inner secret effect.
4, one users of embodiment decipher the document that different scrambled tables are encrypted respectively.
A group member uses " the first scrambled table ", and B group member uses " the second scrambled table ", and employed code is inequality fully in the above-mentioned different coding table, and two group members can not obtain the other side's coding schedule mutually.The coding load-on module of higher level C can be connected respectively to " the first scrambled table " or " the second scrambled table ".
According to embodiment 1~3 as can be known, because A group member uses different " scrambled table " respectively with B group member, and do not obtain the other side's scrambled table mutually.Electronic document after then the arbitrary member of A group encrypts, the member between the A group can normally decipher, the member beyond the A group comprise the member of B group because can't obtain " the scrambled table " that A group uses thus can not normally decipher.In like manner, the electronic document after the arbitrary member of B group encrypts, the member between the B group can normally decipher, the member beyond the B group comprise the member of A group because can't obtain " the scrambled table " that B group uses thus can not normally decipher.
Can determine that encrypt file is that the coding load-on module 20 of C can correctly be selected this encrypted document employed " scrambled table " under the situation by A group or the little group encryption of B; By embodiment 1~3 as can be known, owing to selected correct " scrambled table ", encrypt file can be deciphered by the encrypting-decrypting module of C.Played the effect that a user deciphers difference " scrambled table " encrypted document respectively.
5, one users of embodiment decipher the document that difference " scrambled table " is encrypted simultaneously.
A group member uses " the first scrambled table ", and B group member uses " the second scrambled table ", and employed code is inequality fully in the above-mentioned different coding table, and two group members can not obtain the other side's coding schedule mutually." the 3rd scrambled table " that C uses includes the full content of " the first scrambled table " and " the second scrambled table ".
Suppose partial content such as following table 5 that " the first scrambled table " that the A of group uses comprises:
Table 5
Character A B C D E F G
Character code 65 66 67 68 69 70 71
Code A 72 73 74 75 76 77 78
Suppose partial content such as following table 6 that " the second scrambled table " that the B of group uses comprises:
Table 6
Character A B C D E F G
Character code 65 66 67 68 69 70 71
Code B 79 80 81 82 83 84 85
" the 3rd scrambled table " that C uses is that the content that comprises according to " the first scrambled table " and " the second scrambled table " is formed by stacking.Its partial content such as following table 7:
Table 7
Character A B C D E F G
Character code 65 66 67 68 69 70 71
First code 72 73 74 75 76 77 78
Second code 79 80 81 82 83 84 85
In table 7, the unique corresponding character 011 of code " 75 " " D ", not corresponding any other character of character code " 75 " except character 011 " D ".The unique corresponding character 011 of code " 82 " " D ", not corresponding any other character 011 of code " 82 " except character 011 " D ".Character 011 " D " has " 65 " and a plurality of code such as " 82 " corresponding with it.
It is via little group encryption of A or the little group encryption of B that the editing device 101 of C need not clear and definite encrypted document.By embodiment 1~3 as can be known, no matter character 011 " D " is the code " 82 " that the code " 75 " that obtains after A group encrypts still obtains after the encryption of B group, by all can correctly decryptedly being character 011 " D " in the decryption system of C.Played an effect that editing device 101 is deciphered the document of different " scrambled table " encryption simultaneously.
What need further specify is, adopt the code identical as code in the foregoing description with the form (figure place, numerical value interval, length etc.) of character code, also can adopt form (as figure place, numerical value interval, the length etc.) code inequality with " universal coding table " character code to generate " the first scrambled table " 301 in the above-described embodiments as code, for example use 3 bit digital, perhaps the code of 4 bit digital all can reach same encryption, deciphering and secret effect.
Secondly, deciphering and decipher " the scrambled table " that necessary step is that encrypting-decrypting module 10 is connected to and is used to encrypt or decipher among the present invention, the annexation between its equipment can be various multi-form.The load-on module 20 of for example encoding can be that to be disposed at outside the encrypting-decrypting module 10 also can be to be disposed in the encrypting-decrypting module 10; Code storage module 30 can be independent of outside the coding load-on module 20, also can be to be configured in the coding load-on module 20; Coding load-on module 20 can connect one simultaneously and also can connect a plurality of code storage modules 30 simultaneously; The coding load-on module can be simultaneously or is successively loaded many covers " scrambled table " and be connected to encrypting-decrypting module 10 with " the scrambled table " that form stack and with " the scrambled table " of this stack; To this, the present invention is not limited.
Moreover, though the literal of various countries, the whole world be not quite similar, if after forming it " scrambled table " via the present invention's coded system, all applicable to the present invention's device and method; Be the explanation of embodiment only in the foregoing description with English character 011, but do not represent that the present invention is only applicable to the encryption and decryption of English character 011, hold the electronic document of editing or reading or preserve via computer system applicable to any language and character 011 within the present invention.
In addition, the code storage module 30 that stores " the scrambled table " that be used for encrypting and decrypting is separated with coding load-on module 20 and keep properly, will be of value to and strengthen the effect of maintaining secrecy; Code storage module 30 is made up of a plurality of storeies, the complete coding schedule of one cover is divided into a plurality of parts, be stored in respectively in the different storeies, and storer can be separated from each other and be kept at different places respectively, more above-mentioned a plurality of storeies being reconfigured during use becomes complete code storage module 30; Be of value to the effect that further enhancing is maintained secrecy.
At last, computer system of the present invention refers to the various device that can read or edit or preserve electronic document, includes but not limited to PC, server, mobile phone, home game machine, e-book etc.The present invention does not limit the encipherer and whether uses identical equipment with deciphering person.Encipherer's computer system can be above-mentioned any equipment, and deciphering person can use the equipment identical with the encipherer also can use different equipment.
All be the different application of the embodiment of the invention below, to this, the present invention is not limited.
According to above-mentioned explanation, the present invention further discloses a kind of method of encryption, please refer to Fig. 3, is the schematic flow sheet of encryption method of the present invention.At first, provide an editing device 101; Secondly, editing device 101 is converted to character code according to " the built-in coding schedule " that connected with character 011, generates expressly document; Then, provide a coding load-on module 20, code storage module 30, encrypting-decrypting module 10 successively; Then, start coding load-on module 20, make encrypting-decrypting module 10 be connected to code storage module 30 by coding load-on module 20;
Judge whether to need to generate new " scrambled table ":
When storing more than one " scrambled table " and decision use described " scrambled table " in the code storage module, judge whether a plurality of scrambled tables are arranged in the code storage module;
In the code storage module, do not store " scrambled table ",, provide a coding generation module 40, " a universal coding table " 11 though perhaps store " scrambled table " operator when determining to use a new scrambled table; Coding generation module 40 is according to the content newly-generated " scrambled table " of " universal coding table " 11; The generation module 40 of will encoding is connected to code storage module 30, and described newly-generated " scrambled table " is stored in code storage module 30; Judge whether a plurality of scrambled tables are arranged in the code storage module;
Judge whether a plurality of scrambled tables arranged in the code storage module:
When having only the scrambled table of storage (for example " the first scrambled table " 301) in the coding load-on module 20 judgement code storage modules 30, the coding load-on module connection together of then selected this coding schedule,
When coding load-on module 20 judges that 30 kinds of code storage modules have a plurality of scrambled table, then manual selected or connect (step 352) with the coding load-on module by selected automatically at least one coding schedule of coding load-on module 20 by the operator;
Then, encrypting-decrypting module is connected to " the first scrambled table " 301 by the coding load-on module; Encrypting-decrypting module replaces with code according to the corresponding relation of record in " the first scrambled table " 301 that is connected with character code; At last, resulting code is preserved electronic document after obtaining encrypting.
Moreover the present invention discloses a kind of method of deciphering, please refer to Fig. 4, and it is the schematic flow sheet of decryption method of the present invention.At first, provide an encrypted electronic document; Secondly, provide an encrypting and decrypting module 10, coding load-on module 20, code storage module 30 successively, store in this code storage module 30 with encrypted document and encrypt identical " the scrambled table " of employed " the first scrambled table " 301 contents; Then, start coding load-on module 20, make encrypting-decrypting module 10 be connected to code storage module 30 by coding load-on module 20;
Subsequently, judge whether store a plurality of " scrambled tables " in the code storage module 30 by coding load-on module 20:
Judge to have only in the code storage modules 30 when storing one " scrambled table " when coding load-on module 20, then selected should " scrambled table ";
When coding load-on module 20 judges in the code storage module 30 that a plurality of " scrambled tables " are arranged, then selected by hand or selected automatically with encrypted document encryption employed " scrambled table " identical " scrambled table " by the coding load-on module by the operator;
Then, the coding load-on module is connected to encrypting-decrypting module 10 with selected coding schedule; Encrypting-decrypting module 10 is converted to corresponding character code to the code in the encrypted document according to the corresponding relation of " the scrambled table " that connected, finishes deciphering; At last, character code is saved as expressly document, any editing device 101 that has connected " universal coding table " 11 or " the first scrambled table " 301 all can be converted to character 011 to this plaintext document.
Though the present invention discloses as above with aforesaid preferred embodiment; but be not in order to limit the present invention; right and have the knack of correlation technique person; without departing from the spirit and scope of the present invention; when can doing a little change and retouching, therefore scope of patent protection of the present invention must be looked being as the criterion that the appended claim scope of this instructions defined.

Claims (7)

1. the privacy device of an electronic document, comprise a coding generation module, an encrypting-decrypting module, a coding load-on module, code storage module and have the computing machine of editing device, it is characterized in that: the scrambled table of storage more than 1 in the described code storage module, each scrambled table system is generated according to the character code content in the universal coding table in advance or immediately by described coding generation module, described scrambled table is random, promptly the code in the encrypted code table with character code each other without any mathematical law.
2. electronic document encryption and decryption according to claim 1 system is characterized in that described encrypting-decrypting module is used to read, changes and stores document.
3. the privacy device of electronic document according to claim 1, it is characterized in that described code storage module is included in coding load-on module inside, or described code storage module is independent of outside the described coding load-on module, or all or part of of code storage module separates with described coding load-on module.
4. the privacy device of electronic document according to claim 1, it is characterized in that described code storage module comprises more than one storer, storer by identical type is formed, or formed by the storer of variety classes and varying number, described coding load-on module is connected respectively to each storer in the described code storage module, and the data that read wherein to be stored.
5. the privacy device of electronic document according to claim 4 is characterized in that described storer is the equipment that has the store electrons file function in storage chip, PC, the webserver or the e-book of CD, floppy disk, portable hard drive, USB flash disk, SD card, integrated circuit (IC) chip, mobile phone.
6. the privacy device of electronic document according to claim 4, it is characterized in that described scrambled table is divided into a plurality of parts, be stored in respectively in a plurality of storeies of code storage module, the scrambled table pack that described coding load-on module will be divided into a plurality of parts becomes a scrambled table.
7. the privacy device of electronic document according to claim 4 is characterized in that described connection, comprises that the direct connection, the circuit that carry out data transmission connect, communication network connects, wireless network connects.
CN2011100427041A 2011-02-23 2011-02-23 Electronic document security device Pending CN102096789A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100427041A CN102096789A (en) 2011-02-23 2011-02-23 Electronic document security device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100427041A CN102096789A (en) 2011-02-23 2011-02-23 Electronic document security device

Publications (1)

Publication Number Publication Date
CN102096789A true CN102096789A (en) 2011-06-15

Family

ID=44129879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100427041A Pending CN102096789A (en) 2011-02-23 2011-02-23 Electronic document security device

Country Status (1)

Country Link
CN (1) CN102096789A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN103873250A (en) * 2012-12-18 2014-06-18 中国移动通信集团河南有限公司 Ciphertext generation method, ciphertext decryption method and encryption/ decryption device
CN105187192A (en) * 2015-09-08 2015-12-23 广州六米网络科技有限公司 Three-dimensional secret code encryption algorithm
CN114499850A (en) * 2022-02-03 2022-05-13 宁云亭 Automatic receiving, transmitting and decoding system for cipher radio telegram

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030016821A1 (en) * 2000-03-29 2003-01-23 Vadium Technology, Inc. One-time-pad encryption with keyable characters
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN101840483A (en) * 2009-03-17 2010-09-22 北大方正集团有限公司 Method and system for protecting computer document contents

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030016821A1 (en) * 2000-03-29 2003-01-23 Vadium Technology, Inc. One-time-pad encryption with keyable characters
CN1542628A (en) * 2003-05-04 2004-11-03 江南机器(集团)有限公司 Electronic file characters internal code transformation encryption method
CN101840483A (en) * 2009-03-17 2010-09-22 北大方正集团有限公司 Method and system for protecting computer document contents

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073831A (en) * 2011-02-23 2011-05-25 上海帝埃碧化学科技有限公司 System and method for encrypting and decrypting electronic documents
CN103873250A (en) * 2012-12-18 2014-06-18 中国移动通信集团河南有限公司 Ciphertext generation method, ciphertext decryption method and encryption/ decryption device
CN103873250B (en) * 2012-12-18 2017-06-20 中国移动通信集团河南有限公司 A kind of ciphertext generation method, ciphertext decryption method and encrypting and decrypting device
CN105187192A (en) * 2015-09-08 2015-12-23 广州六米网络科技有限公司 Three-dimensional secret code encryption algorithm
CN105187192B (en) * 2015-09-08 2018-11-13 广州六米网络科技有限公司 The method for improving data transmission security in a computer network
CN114499850A (en) * 2022-02-03 2022-05-13 宁云亭 Automatic receiving, transmitting and decoding system for cipher radio telegram

Similar Documents

Publication Publication Date Title
CN102073831A (en) System and method for encrypting and decrypting electronic documents
JP5412414B2 (en) Searchable cryptographic processing system
US10282448B2 (en) System and method for searching a symmetrically encrypted database for conjunctive keywords
CN106610995B (en) Method, device and system for creating ciphertext index
CN101685425A (en) Mobile storage device and method of encrypting same
CN101295343A (en) Two-dimensional code multi-enciphering anti-fake printing method
CN102750497A (en) Method and device for deciphering private information
CN101784045A (en) Method and device for generating secrete key and method and device for loading secrete key
CN107786331A (en) Data processing method, device, system and computer-readable recording medium
CN104657670A (en) Data encryption based safety use method of configuration file
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN104424409A (en) Application unlocking method and device
CN111010266B (en) Message encryption and decryption, reading and writing method and device, computer equipment and storage medium
CN106101150A (en) The method and system of AES
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN104732159A (en) File processing method and file processing device
CN102096789A (en) Electronic document security device
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
CN201590091U (en) Encryption type memory card read/write device based on password authentication
CN201518127U (en) Encrypted mobile memory based on password authentication
CN1941694A (en) Apparatus and method for generating data for detecting false alteration of encrypted data during processing
CN101887713A (en) Encryption method and device for font library
CN102612025B (en) Protective system and protective method for mobile phone documents
CN103646121B (en) A kind of identification code and using method and device
CN105279447A (en) Method and device for data encryption, and method and device for data decryption

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110615