CN106156654A - File encryption apparatus and method - Google Patents
File encryption apparatus and method Download PDFInfo
- Publication number
- CN106156654A CN106156654A CN201610778091.0A CN201610778091A CN106156654A CN 106156654 A CN106156654 A CN 106156654A CN 201610778091 A CN201610778091 A CN 201610778091A CN 106156654 A CN106156654 A CN 106156654A
- Authority
- CN
- China
- Prior art keywords
- picture element
- element matrix
- key
- document
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 239000011159 matrix material Substances 0.000 claims abstract description 72
- 238000004891 communication Methods 0.000 claims description 19
- 238000012545 processing Methods 0.000 claims description 13
- 239000000284 extract Substances 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 11
- 239000000203 mixture Substances 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 abstract description 7
- 230000006870 function Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 8
- 230000002093 peripheral effect Effects 0.000 description 5
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 239000000696 magnetic material Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a kind of file enciphering method and device, relate to electronic document transmission field.The document encryption method and device are by being converted into document image information by the electronic document uploaded in advance, and document image information is converted into picture element matrix, and carry out encrypting for the first time according to picture element matrix coding described in the first double secret key of resume image acquisition, due to the first key non-linear key space of energy stochastic generation utilizing resume image to generate, therefore the encryption of the document encryption method is uniform and more safe and reliable.
Description
Technical field
The present invention relates to electronic document transmission field, in particular to a kind of file enciphering method and device.
Background technology
Electronic document (Electronic document) refers to what people were formed in social activity, with computer disc,
The chemistry magnetic material such as disk and CD is the written material of carrier.Rely on computer system access and can pass on a communication network
Defeated, it mainly includes electronic document, electronic mail, electronic report forms, electronic drawing etc..But, in order to prevent some from relating to machine
Close or privacy electronic document content during transmission is illegally obtained by other people and causes revealing, it is therefore desirable at electronics literary composition
Before shelves transmission, electronic document is encrypted.
File encryption mode is usually the sides such as symmetric cryptography, asymmetric encryption and irreversible encryption by prior art
Method, said method all uses the method realizing a set of or a few set PKI and the private key generated to encrypt and decrypt, is generating
During key, above-mentioned encryption method all uses linear order to realize, and utilizes the electronic document after above-mentioned encryption method encryption in transmission
During the most easily cracked by lawless person, safety is low.
Summary of the invention
In view of this, the purpose of the embodiment of the present invention is to provide a kind of file enciphering method and device, above-mentioned to improve
Problem.
First aspect, embodiments provides a kind of file encryption device, and described file encryption device includes:
Document Creator unit, for receiving the electronic document of a client upload;
Image conversion unit, for being converted to document image information by the electronic document uploaded;
Graphics processing unit, for document image information is converted into picture element matrix, extracts described picture element matrix and to institute
State picture element matrix to process, so that the summation of the every column element in described picture element matrix remains 1;
First ciphering unit, for obtaining the first key according to resume image, and according to the first key got
Described picture element matrix is encoded and carries out encrypting for the first time;
Described graphics processing unit is additionally operable to described coding and carries out the picture element matrix after encrypting for the first time and be converted to number
Word image information.
Second aspect, the embodiment of the present invention additionally provides a kind of file enciphering method, and described file enciphering method includes:
Receive the electronic document of a client upload;
The electronic document uploaded is converted to document image information;
Document image information is converted into picture element matrix, extract described picture element matrix and to described picture element matrix at
Reason, so that the summation of the every column element in described picture element matrix remains 1;
The first key is obtained according to resume image, and according to picture element matrix coding described in the first double secret key got
And carry out encrypting for the first time;
By described coding and carry out the picture element matrix after encrypting for the first time and be converted to digital image information.
Compared with prior art, a kind of file enciphering method of embodiment of the present invention offer and device, by advance by upper
The electronic document passed is converted into document image information, and document image information is converted into picture element matrix, and according to image encryption
Picture element matrix coding described in the first double secret key that algorithm obtains carries out encrypting, owing to utilizing resume image to generate for the first time
The first key non-linear key space of energy stochastic generation, therefore the encryption of the document encryption method is uniform and more safe and reliable.
For making the above-mentioned purpose of the present invention, feature and advantage to become apparent, preferred embodiment cited below particularly, and coordinate
Appended accompanying drawing, is described in detail below.
Accompanying drawing explanation
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
The a part of embodiment of the present invention rather than whole embodiments.Generally implement with the present invention illustrated described in accompanying drawing herein
The assembly of example can be arranged with various different configurations and design.Therefore, reality to the present invention provided in the accompanying drawings below
The detailed description executing example is not intended to limit the scope of claimed invention, but is merely representative of the selected enforcement of the present invention
Example.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
Every other embodiment, broadly falls into the scope of protection of the invention.
The server that Fig. 1 provides for the embodiment of the present invention and the mutual schematic diagram of client;
The structured flowchart of the server that Fig. 2 provides for the embodiment of the present invention;
The functional unit schematic diagram of the file encryption device that Fig. 3 provides for the embodiment of the present invention;
The flow chart of the file enciphering method that Fig. 4 provides for the embodiment of the present invention.
Wherein, the corresponding relation between reference and component names is as follows: client 101, server 102, storage
Device 103, storage control 104, processor 105, Peripheral Interface 106, Document Creator list 301, image conversion unit
302, graphics processing unit 303, the first ciphering unit 304, the second Key generating unit 305, the second ciphering unit 306,
Information transmitting unit 307.
Detailed description of the invention
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Generally exist
Can arrange and design with various different configurations with the assembly of the embodiment of the present invention that illustrates described in accompanying drawing herein.Cause
This, be not intended to limit claimed invention to the detailed description of the embodiments of the invention provided in the accompanying drawings below
Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing
The every other embodiment obtained on the premise of going out creative work, broadly falls into the scope of protection of the invention.
As it is shown in figure 1, be the signal that interacts with client 101 of server 102 that provides of present pre-ferred embodiments
Figure.Described server 102 is communicatively coupled with one or more clients by network or data/address bus, to carry out data
Communication or mutual.Described server 102 can be the webserver, database server etc..Described server can be individual
Computer (personal computer, PC), panel computer, smart mobile phone, personal digital assistant (personal digital
Assistant, PDA) server.
As in figure 2 it is shown, be the block diagram of described server 102.Described server 102 includes file encryption device
100, memorizer 103, storage control 104, processor 105, Peripheral Interface 106.
Described memorizer 103, storage control 104, processor 105, each element of Peripheral Interface 106 each other directly or
Indirectly it is electrically connected with, to realize the transmission of data or mutual.Such as, these elements can lead to by one or more each other
News bus or holding wire realize being electrically connected with.Described file encryption device 100 includes that at least one can be with software or firmware
(firmware) form is stored in described memorizer 103 or is solidificated in the operating system of described server 102
Software function module in (operating system, OS).Described processor 105 is for performing storage in memorizer 103
Executable module, software function module that the most described file encryption device 100 includes or computer program.
Wherein, memorizer 103 may be, but not limited to, random access memory (Random Access Memory,
RAM), read only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only
Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM),
Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Wherein, memorizer 103 is used for storing program, and described processor 105, after receiving execution instruction, performs described program, aforementioned
The method performed by server 102 flowing through Cheng Dingyi that embodiment of the present invention any embodiment discloses can apply to processor
In 105, or realized by processor 105.
Processor 105 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned processor 105 can
To be general processor, including central processing unit (Central Processing Unit is called for short CPU), network processing unit
(Network Processor is called for short NP) etc.;Can also is that digital signal processor (DSP), special IC (ASIC),
Ready-made programmable gate array (FPGA) or other PLDs, discrete gate or transistor logic, discrete firmly
Part assembly.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor
Can be microprocessor or this processor 105 can also be the processor 105 etc. of any routine.It should be noted that this
The function of the processor 105 that a kind of file encryption system that bright embodiment provides is provided, can realize leading to by software
The hardware crossing entity realizes (such as, realize above-mentioned function by the integrated circuit (IC) of processor 105), does not limits at this
System.
Various input/output devices are coupled to processor 105 and memorizer 103 by described Peripheral Interface 106.At some
In embodiment, Peripheral Interface 106, processor 105 and storage control 104 can realize in one single chip.Other one
In a little examples, they can be realized by independent chip respectively.
Referring to Fig. 3, embodiments provide a kind of file encryption device 100, described file encryption device 100 should
For described server 101.Described file encryption device 100 includes Document Creator list 301, image conversion unit 302302, figure
As processing unit the 303303, first ciphering unit the 304304, second Key generating unit the 305305, second ciphering unit 306306
And information transmitting unit 307307.
Electronic document that described Document Creator unit 301 is uploaded for receiving a client 102, subscriber identity information, end
End identity information and document markup information.
In the present embodiment, subscriber identity information uses user name, terminal identity information collecting computer name, document markup letter
Breath uses Document Title.
Specifically, user can open browser in a client 102, and inputs account page info, can obtain and browse
Electronic document in device uploads the page.Concrete operating procedure can be such that what 1. click electronic documents uploaded the page " opens literary composition
Shelves " button, now browser prompts user selects local file to open, and loads the electronic document selected, and user can click on
Document preview button, the electronic document that can select at browser online browse.And also " preservation document " button can be clicked on, should
Electronic document function separately exists under selected path.At preview electronic document and after confirming that electronic document is errorless, now user
Can click on " transmission document " button at browser page, the electronic document that now user is uploaded by browser sends to server
101, in order to follow-up operation.
Described image conversion unit 302 is for being converted to document image information by the electronic document uploaded.
Described graphics processing unit 303, for document image information is converted into picture element matrix, extracts described picture element matrix
And process described picture element matrix, so that the summation of the every column element in described picture element matrix remains 1.
Specifically, graphics processing unit 303 described in the present embodiment is used for document image information is converted into picture element matrix,
And extract each column greatest measure qj of described picture element matrix, according to formula mij*=(qj-mij)/∑I=qj-mijBy in picture element matrix
The greatest member of every column element and these row do difference, and calculate ratio so that the summation guarantor of every column element in described picture element matrix
Holding is 1, and wherein, mij is the element in picture element matrix.
Described first ciphering unit 304 is for obtaining the first key according to resume image, and according to the got
Picture element matrix described in one double secret key encodes and carries out encrypting for the first time.
In the present embodiment, resume image uses scattered date AES, and scattered date AES can generate non-
Linear order thus generate the first key of digital picture.
Described second Key generating unit 305 is for according to described subscriber identity information, terminal identity information and document
Label information generates the second key.
If the key in view of an electronic document is only for a user, and this user can utilize this key not
Repeatedly download digital document in same client 102, the download time of user is not limited with downloading place, thus causes electricity
The supplier of subdocument or the rights and interests loss of copyright owner are serious, therefore according to described subscriber identity information, terminal identity
Information and document markup information generate the second key and the once download of electronic document can be made the most all to generate a key,
Thus realize each user and need to obtain a new key in different time, place, document could be downloaded.
Described second ciphering unit 306 picture element matrix after utilizing the second double secret key got encryption for the first time,
Described first key and decryption side communication mode carry out second time and encrypt.
Specifically, described second Key generating unit 305 for according to described subscriber identity information, terminal identity information with
And the character of document markup information composition generates the second key.
By to the picture element matrix after utilizing the second key can first time be encrypted, described first key and deciphering square tube
Letter mode carries out second time and encrypts, and electronic document can be carried out twice encryption, simple to operate, and safety is high.
In the present embodiment, deciphering communication mode includes in the telephone number of decryption side, mailbox and immediate communication tool.
Described information transmitting unit 307 for sending described second close according to described decryption side communication mode to decryption side
Key.
Described graphics processing unit 303 is additionally operable to described coding and carries out the picture element matrix after encrypting for the first time and be converted to
Digital image information.
Referring to Fig. 4, the present invention implements a kind of file enciphering method provided, it should be noted that the embodiment of the present invention
The file enciphering method provided, the technique effect of its ultimate principle and generation is identical with above-described embodiment, for briefly describing, this
The not mentioned part of embodiment part, refers to corresponding contents in the above embodiments.Described file enciphering method includes:
Step S401: receive electronic document, subscriber identity information, terminal identity information and literary composition that client 102 is uploaded
Shelves label information.
Step S402: the electronic document uploaded is converted to document image information.
Step S403: document image information is converted into picture element matrix, extracts described picture element matrix and to described pixel square
Battle array processes, so that the summation of the every column element in described picture element matrix remains 1.
Specifically, step S403 includes being converted into document image information picture element matrix, and extracts described picture element matrix
Each column greatest measure qj, according to formula mij*=(qj-mij)/ΣI=qj-mijBy the every column element in picture element matrix and these row
Big element does difference, and calculates ratio so that the summation of every column element in described picture element matrix remains 1, and wherein, mij is pixel
Element in matrix.
Step S404: obtain the first key according to resume image, and according to picture described in the first double secret key got
Prime matrix encodes and carries out encrypting for the first time.
Step S405: generate second according to described subscriber identity information, terminal identity information and document markup information close
Key.
Specifically, step S405 can be to utilize according to described subscriber identity information, terminal identity information and document mark
The character of note information composition generates the second key.
Step S406: utilize the picture element matrix after the second double secret key got for the first time encryption, described first key with
And decryption side communication mode carries out second time and encrypts.
Step S407: send described second key to decryption side according to described decryption side communication mode.
Step S408: by described coding and carry out the picture element matrix after encrypting for the first time and be converted to digital image information.
To sum up, a kind of file enciphering method and device are embodiments provided, by the electronics will uploaded in advance
Document is converted into document image information, and document image information is converted into picture element matrix, and obtains according to resume image
The first double secret key described in picture element matrix coding carry out encrypting, due to the first key utilizing resume image to generate for the first time
The energy non-linear key space of stochastic generation, therefore the encryption of the document encryption method is uniform and more safe and reliable;Other second
Electronic document after layer encryption includes the deciphering communication mode of correspondence, even if so that receive different electronic documents,
It is sent to different decryption side by the second key with corresponding communication mode, decryption side can be made according to receiving the second key
Time the communication mode that used be sent to different decryption side, decryption side is according to the communication party used when receiving the second key
Formula and the corresponding relation of the communication mode of decryption side carried in the file of second time encryption are decrypted, and decryption side with
Outer user owing to not possessing the corresponding relation of above-mentioned communication mode, the most just cannot deciphering electric document file, it is achieved thereby that specify
File is decrypted by user, further enhances the secret protection to electronic document.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, it is also possible to pass through
Other mode realizes.Device embodiment described above is only schematically, such as, and the flow chart in accompanying drawing and block diagram
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this, each square frame in flow chart or block diagram can represent a module, program segment or the one of code
Part, a part for described module, program segment or code comprises holding of one or more logic function for realizing regulation
Row instruction.It should also be noted that at some as in the implementation replaced, the function marked in square frame can also be to be different from
The order marked in accompanying drawing occurs.Such as, two continuous print square frames can essentially perform substantially in parallel, and they are the most also
Can perform in the opposite order, this is depending on involved function.It is also noted that every in block diagram and/or flow chart
The combination of the square frame in individual square frame and block diagram and/or flow chart, can be with function or the special base of action performing regulation
System in hardware realizes, or can realize with the combination of specialized hardware with computer instruction.
It addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation
Point, it is also possible to it is modules individualism, it is also possible to two or more modules are integrated to form an independent part.
If described function is using the form realization of software function module and as independent production marketing or use, permissible
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words
The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter
Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual
People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.
And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.Need
Illustrate, in this article, the relational terms of such as first and second or the like be used merely to by an entity or operation with
Another entity or operating space separate, and there is any this reality between not necessarily requiring or imply these entities or operating
The relation on border or order.And, term " includes ", " comprising " or its any other variant are intended to the bag of nonexcludability
Contain, so that include that the process of a series of key element, method, article or equipment not only include those key elements, but also include
Other key elements being not expressly set out, or also include the key element intrinsic for this process, method, article or equipment.
In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that including described key element
Process, method, article or equipment in there is also other identical element.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies
Change, equivalent, improvement etc., should be included within the scope of the present invention.It should also be noted that similar label and letter exist
Figure below represents similar terms, therefore, the most a certain Xiang Yi accompanying drawing is defined, is then not required in accompanying drawing subsequently
It is defined further and explains.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, and any
Those familiar with the art, in the technical scope that the invention discloses, can readily occur in change or replace, should contain
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.
It should be noted that in this article, the relational terms of such as first and second or the like is used merely to a reality
Body or operation separate with another entity or operating space, and deposit between not necessarily requiring or imply these entities or operating
Relation or order in any this reality.And, term " includes ", " comprising " or its any other variant are intended to
Comprising of nonexcludability, so that include that the process of a series of key element, method, article or equipment not only include that those are wanted
Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment
Intrinsic key element.In the case of there is no more restriction, statement " including ... " key element limited, it is not excluded that
Including process, method, article or the equipment of described key element there is also other identical element.
Claims (10)
1. a file encryption device, it is characterised in that described file encryption device includes:
Document Creator unit, for receiving the electronic document of a client upload;
Image conversion unit, for being converted to document image information by the electronic document uploaded;
Graphics processing unit, for document image information is converted into picture element matrix, extracts described picture element matrix and to described picture
Prime matrix processes, so that the summation of the every column element in described picture element matrix remains 1;
First ciphering unit, for obtaining the first key according to resume image, and according to the first double secret key institute got
State picture element matrix encode and carry out encrypting for the first time;
Described graphics processing unit is additionally operable to described coding and carries out the picture element matrix after encrypting for the first time and be converted to digitized map
As information.
File encryption device the most according to claim 1, it is characterised in that described file encryption device also includes:
Second ciphering unit, picture element matrix after utilizing the second double secret key got for the first time encryption, described first close
Key and decryption side communication mode carry out second time and encrypt;
Information transmitting unit, for sending described second key according to described decryption side communication mode to decryption side.
File encryption device the most according to claim 1, it is characterised in that described Document Creator unit is for receiving a visitor
Electronic document, subscriber identity information, terminal identity information and the document markup information that family end is uploaded;
Described file encryption device also includes:
Second Key generating unit, for raw according to described subscriber identity information, terminal identity information and document markup information
Become the second key.
File encryption device the most according to claim 3, it is characterised in that described second Key generating unit is used for foundation
The character of described subscriber identity information, terminal identity information and document markup information composition generates the second key.
File encryption device the most according to claim 1, it is characterised in that described graphics processing unit is for by document map
As information is converted into picture element matrix, and extract each column greatest measure qj of described picture element matrix, according to formula mij*=(qj-
mij)/∑I=qj-mijThe greatest member of the every column element in picture element matrix Yu these row is done difference, and calculates ratio so that described pixel
The summation of the every column element in matrix remains 1, and wherein, mij is the element in picture element matrix.
6. a file enciphering method, it is characterised in that described file enciphering method includes:
Receive the electronic document of a client upload;
The electronic document uploaded is converted to document image information;
Document image information is converted into picture element matrix, extracts described picture element matrix and described picture element matrix is processed, with
The summation making the every column element in described picture element matrix remains 1;
Obtain the first key according to resume image, and go forward side by side according to picture element matrix coding described in the first double secret key got
Row encryption for the first time;
By described coding and carry out the picture element matrix after encrypting for the first time and be converted to digital image information.
File enciphering method the most according to claim 6, it is characterised in that described by described coding and carry out for the first time
Before picture element matrix after encryption is converted to the step of digital image information, described file enciphering method also includes:
Utilize picture element matrix, described first key and the decryption side communication party after the second double secret key got encryption for the first time
Formula carries out second time and encrypts;
Described second key is sent to decryption side according to described decryption side communication mode.
File enciphering method the most according to claim 6, it is characterised in that the electronics literary composition of described reception one client upload
The step of shelves includes: described Document Creator unit is for receiving the electronic document of a client upload, subscriber identity information, terminal
Identity information and document markup information;
Picture element matrix, described first key and decryption side after the second double secret key encryption for the first time that described utilization gets
Before communication mode carries out the step that second time is encrypted, described method also includes: according to described subscriber identity information, terminal identity
Information and document markup information generate the second key.
File enciphering method the most according to claim 8, it is characterised in that described according to described subscriber identity information, end
End identity information and document markup information generate the step of the second key and include: according to described subscriber identity information, terminal body
The character of part information and document markup information composition generates the second key.
File enciphering method the most according to claim 6, it is characterised in that described document image information is converted into picture
Prime matrix, extracts described picture element matrix and processes described picture element matrix, so that the every column element in described picture element matrix
Summation remain the step of 1 and include: document image information is converted into picture element matrix, and extracts each column of described picture element matrix
Greatest measure qj, according to formula mij*=(qj-mij)/∑I=qj-mijGreastest element by the every column element in picture element matrix Yu these row
Element does difference, and calculates ratio so that the summation of every column element in described picture element matrix remains 1, and wherein, mij is picture element matrix
In element.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610778091.0A CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610778091.0A CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106156654A true CN106156654A (en) | 2016-11-23 |
CN106156654B CN106156654B (en) | 2019-06-11 |
Family
ID=57344438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610778091.0A Expired - Fee Related CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156654B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483432A (en) * | 2017-08-10 | 2017-12-15 | 广州杰之良软件有限公司 | File encryption processing method and processing device |
CN108133416A (en) * | 2018-03-13 | 2018-06-08 | 南京审计大学 | Audit negotiating system |
CN108154354A (en) * | 2018-03-13 | 2018-06-12 | 南京审计大学 | Rural area three provides audit and supervision system |
CN111444525A (en) * | 2020-03-27 | 2020-07-24 | 南宁职业技术学院 | Document encryption method based on cloud computing |
CN112948857A (en) * | 2021-03-03 | 2021-06-11 | 珠海金山办公软件有限公司 | Document processing method and device |
CN113132080A (en) * | 2021-04-19 | 2021-07-16 | 青岛冠成软件有限公司 | Image processing method and device, electronic equipment and storage medium |
CN113330499A (en) * | 2019-01-30 | 2021-08-31 | 索尼集团公司 | Sensor device and encryption method |
CN112948857B (en) * | 2021-03-03 | 2024-11-08 | 珠海金山办公软件有限公司 | Document processing method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101344960A (en) * | 2008-08-20 | 2009-01-14 | 回静 | Chaos digital image encryption method |
CN101540823A (en) * | 2008-03-21 | 2009-09-23 | 富士通株式会社 | Image processing apparatus and image processing system and method |
CN102415087A (en) * | 2009-05-11 | 2012-04-11 | 富士通株式会社 | Image encryption/decoding device, method, and program |
US20140164772A1 (en) * | 2012-12-07 | 2014-06-12 | At&T Intellectual Property I, L.P. | Augmented reality based privacy and decryption |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
-
2016
- 2016-08-30 CN CN201610778091.0A patent/CN106156654B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540823A (en) * | 2008-03-21 | 2009-09-23 | 富士通株式会社 | Image processing apparatus and image processing system and method |
CN101344960A (en) * | 2008-08-20 | 2009-01-14 | 回静 | Chaos digital image encryption method |
CN102415087A (en) * | 2009-05-11 | 2012-04-11 | 富士通株式会社 | Image encryption/decoding device, method, and program |
US20140164772A1 (en) * | 2012-12-07 | 2014-06-12 | At&T Intellectual Property I, L.P. | Augmented reality based privacy and decryption |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483432A (en) * | 2017-08-10 | 2017-12-15 | 广州杰之良软件有限公司 | File encryption processing method and processing device |
CN108133416A (en) * | 2018-03-13 | 2018-06-08 | 南京审计大学 | Audit negotiating system |
CN108154354A (en) * | 2018-03-13 | 2018-06-12 | 南京审计大学 | Rural area three provides audit and supervision system |
CN113330499A (en) * | 2019-01-30 | 2021-08-31 | 索尼集团公司 | Sensor device and encryption method |
CN113330499B (en) * | 2019-01-30 | 2024-05-24 | 索尼集团公司 | Sensor device and encryption method |
CN111444525A (en) * | 2020-03-27 | 2020-07-24 | 南宁职业技术学院 | Document encryption method based on cloud computing |
CN112948857A (en) * | 2021-03-03 | 2021-06-11 | 珠海金山办公软件有限公司 | Document processing method and device |
CN112948857B (en) * | 2021-03-03 | 2024-11-08 | 珠海金山办公软件有限公司 | Document processing method and device |
CN113132080A (en) * | 2021-04-19 | 2021-07-16 | 青岛冠成软件有限公司 | Image processing method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106156654B (en) | 2019-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106156654A (en) | File encryption apparatus and method | |
Yu et al. | A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings | |
CN101789865B (en) | Dedicated server used for encryption and encryption method | |
CN103327002B (en) | Based on the cloud memory access control system of attribute | |
CN104243149B (en) | Encrypt and Decrypt method, device and server | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
CN107196926A (en) | A kind of cloud outsourcing privacy set comparative approach and device | |
CN102684877A (en) | Method and device for carrying out user information processing | |
CN103152362B (en) | Based on the large data files encrypted transmission method of cloud computing | |
CN103456050B (en) | Electronic affirmation method and system | |
CN111259435A (en) | Contract encryption and decryption method and device and computer readable storage medium | |
CN107483432A (en) | File encryption processing method and processing device | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN107070856A (en) | Encryption/decryption speed improvement method of encryption is applied compoundly | |
CN112307503B (en) | Signature management method and device and electronic equipment | |
CN105721148A (en) | Data file encryption method and system based on double random numbers | |
CN104598800A (en) | Authentication method and authentication system for identity information of grain depot and terminal equipment | |
CN111245771A (en) | Instant message encryption and decryption method, device, equipment and storage medium | |
CN109005196A (en) | Data transmission method, data decryption method, device and electronic equipment | |
CN103916834A (en) | Short message encryption method and system allowing user to have exclusive secret key | |
CN105530089A (en) | Attribute base encryption method and device | |
CN106411888A (en) | Sign-off document encryption device and method | |
CN102238150A (en) | Form registration method and server | |
CN102387181A (en) | Login method and device | |
CN103929722A (en) | Short message encryption method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190611 |
|
CF01 | Termination of patent right due to non-payment of annual fee |