CN106156654B - File encryption apparatus and method - Google Patents
File encryption apparatus and method Download PDFInfo
- Publication number
- CN106156654B CN106156654B CN201610778091.0A CN201610778091A CN106156654B CN 106156654 B CN106156654 B CN 106156654B CN 201610778091 A CN201610778091 A CN 201610778091A CN 106156654 B CN106156654 B CN 106156654B
- Authority
- CN
- China
- Prior art keywords
- picture element
- element matrix
- key
- document
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of file enciphering method and devices, are related to electronic document transmission field.The document encryption method and device are by converting document image information for the electronic document of upload in advance, and picture element matrix is converted by document image information, and the first key obtained according to resume image encodes the picture element matrix and carries out first time encryption, since the first key generated using resume image can generate non-linear key space at random, the encryption of the document encryption method is uniformly and more safe and reliable.
Description
Technical field
The present invention relates to electronic document transmission fields, in particular to a kind of file enciphering method and device.
Background technique
Electronic document (Electronic document) refers to what people were formed in social activities, with computer disc,
The chemistry magnetic material such as disk and CD is the written material of carrier.Computer system is relied on to access and can pass on a communication network
Defeated, it mainly includes electronic document, electronic mail, electronic report forms, electronic drawing etc..But it is related to machine more in order to prevent
Content is caused to reveal close or privacy electronic document by other people illegal obtain during transmission, it is therefore desirable in electronics text
Electronic document is encrypted before shelves transmission.
It is usually in the prior art the side such as symmetric cryptography, asymmetric encryption and irreversible encryption to file encryption mode
Method, the above method are all made of the method for realizing a set of or a few set public key and private key that generate and are encrypted and decrypted, generating
Above-mentioned encryption method is all made of linear order realization when key, is being transmitted using the above-mentioned encrypted electronic document of encryption method
During still be easy cracked by criminal, safety is low.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of file enciphering method and device, it is above-mentioned to improve
The problem of.
In a first aspect, the embodiment of the invention provides a kind of file encryption device, the file encryption device includes:
Document Creator unit, for receiving the electronic document of client upload;
Image conversion unit, for the electronic document of upload to be converted to document image information;
Image processing unit extracts the picture element matrix and to institute for converting picture element matrix for document image information
It states picture element matrix to be handled, so that the summation of every column element in the picture element matrix remains 1;
First encryption unit, for obtaining first key according to resume image, and according to the first key got
The picture element matrix is encoded and carries out first time encryption;
Described image processing unit is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to number
Word image information.
Second aspect, the embodiment of the invention also provides a kind of file enciphering method, the file enciphering method includes:
Receive the electronic document of client upload;
The electronic document of upload is converted into document image information;
Convert picture element matrix for document image information, extract the picture element matrix and to the picture element matrix at
Reason, so that the summation of every column element in the picture element matrix remains 1;
First key is obtained according to resume image, and the picture element matrix is encoded according to the first key got
And carry out first time encryption;
By the coding and carries out encrypted picture element matrix for the first time and be converted to digital image information.
Compared with prior art, a kind of file enciphering method and device provided in an embodiment of the present invention, by advance will be upper
The electronic document of biography is converted into document image information, and converts picture element matrix for document image information, and according to image encryption
The first key that algorithm obtains encodes the picture element matrix and carries out first time encryption, due to what is generated using resume image
First key can generate non-linear key space at random, therefore the encryption of the document encryption method is uniformly and more safe and reliable.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.The present invention being usually described and illustrated herein in the accompanying drawings is implemented
The component of example can be arranged and be designed with a variety of different configurations.Therefore, below to the reality of the invention provided in the accompanying drawings
The detailed description for applying example is not intended to limit the range of claimed invention, but is merely representative of selected implementation of the invention
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
Every other embodiment, shall fall within the protection scope of the present invention.
Fig. 1 is the interaction schematic diagram of server provided in an embodiment of the present invention and client;
Fig. 2 is the structural block diagram of server provided in an embodiment of the present invention;
Fig. 3 is the functional unit schematic diagram of file encryption device provided in an embodiment of the present invention;
Fig. 4 is the flow chart of file enciphering method provided in an embodiment of the present invention.
Wherein, the corresponding relationship between appended drawing reference and component names is as follows: client 101, server 102, storage
Device 103, storage control 104, processor 105, Peripheral Interface 106, Document Creator list 301, image conversion unit
302, image processing unit 303, the first encryption unit 304, the second Key generating unit 305, the second encryption unit 306,
Information transmitting unit 307.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
As shown in Figure 1, being the server 102 that present pre-ferred embodiments provide and the signal that client 101 interacts
Figure.The server 102 is communicatively coupled by network or data/address bus with one or more clients, to carry out data
Communication or interaction.The server 102 can be network server, database server etc..The server can be individual
Computer (personal computer, PC), tablet computer, smart phone, personal digital assistant (personal digital
Assistant, PDA) server.
As shown in Fig. 2, being the block diagram of the server 102.The server 102 includes file encryption device
100, memory 103, storage control 104, processor 105, Peripheral Interface 106.
The memory 103, storage control 104, processor 105, each element of Peripheral Interface 106 between each other directly or
It is electrically connected indirectly, to realize the transmission or interaction of data.For example, these elements between each other can be logical by one or more
It interrogates bus or signal wire is realized and is electrically connected.The file encryption device 100 includes at least one can be with software or firmware
(firmware) form is stored in the memory 103 or is solidificated in the operating system of the server 102
Software function module in (operating system, OS).The processor 105 is used to execute to store in memory 103
Executable module, such as software function module or computer program that the file encryption device 100 includes.
Wherein, memory 103 may be, but not limited to, random access memory (Random Access Memory,
RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only
Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM),
Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Wherein, memory 103 is for storing program, and the processor 105 executes described program after receiving and executing instruction, aforementioned
Method performed by the server 102 that the stream process that any embodiment of the embodiment of the present invention discloses defines can be applied to processor
In 105, or realized by processor 105.
Processor 105 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 105 can
To be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit
(Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), specific integrated circuit (ASIC),
Ready-made programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard
Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.General processor
It can be microprocessor or the processor 105 be also possible to any conventional processor 105 etc..It should be noted that this hair
The function of processor 105 provided by a kind of file encryption system that bright embodiment provides, can also be led to by software realization
The hardware realization (for example, the integrated circuit (IC) by processor 105 realizes above-mentioned function) for crossing entity, does not limit herein
System.
Various input/output devices are couple processor 105 and memory 103 by the Peripheral Interface 106.Some
In embodiment, Peripheral Interface 106, processor 105 and storage control 104 can be realized in one single chip.Other one
In a little examples, they can be realized by independent chip respectively.
Referring to Fig. 3, the file encryption device 100 is answered the embodiment of the invention provides a kind of file encryption device 100
For the server 101.The file encryption device 100 includes Document Creator list 301, image conversion unit 302302, figure
As processing unit 303303, the first encryption unit 304304, the second Key generating unit 305305, the second encryption unit 306306
And information transmitting unit 307307.
The Document Creator unit 301 is used to receive the electronic document of a client 102 upload, subscriber identity information, end
Hold identity information and document markup information.
In the present embodiment, subscriber identity information is using user name, terminal identity information collecting computer name, document markup letter
Breath uses Document Title.
Specifically, user can open browser in a client 102, and input account page info, can be obtained browsing
Electronic document in device uploads the page.Specific operating procedure can be such that 1. click electronic documents upload " opening literary for the page
Shelves " button, browser prompts user selects local file to open at this time, loads the electronic document of selection, and user can click
Document preview button, the electronic document that can be selected in browser online browse.And " saving document " button can be also clicked, by this
Electronic document function separately exists under selected path.In preview electronic document and after confirming that electronic document is errorless, user at this time
" sending document " button can be clicked in browser page, the electronic document that user uploads is sent to server by browser at this time
101, so as to subsequent operation.
Described image converting unit 302 is used to the electronic document of upload being converted to document image information.
Described image processing unit 303 is used to convert picture element matrix for document image information, extracts the picture element matrix
And the picture element matrix is handled, so that the summation of every column element in the picture element matrix remains 1.
Specifically, image processing unit 303 described in the present embodiment is used to convert picture element matrix for document image information,
And each column greatest measure qj of the picture element matrix is extracted, according to formula mij*=(qj-mij)/∑I=qj-mijIt will be in picture element matrix
The greatest member of every column element and this column make the difference, and calculate ratio so that the summation of every column element in the picture element matrix is protected
Hold is 1, wherein mij is the element in picture element matrix.
First encryption unit 304 is used to obtain first key according to resume image, and according to the got
Picture element matrix described in one key pair encodes and carries out first time encryption.
In the present embodiment, resume image uses scattered date Encryption Algorithm, and scattered date Encryption Algorithm produces non-
Linear order is to generate the first key of digital picture.
Second Key generating unit 305 is used for according to the subscriber identity information, terminal identity information and document
Mark information generates the second key.
If in view of the key of an electronic document is only for a user, and the user can use the key not
Digital document is repeatedly downloaded in same client 102, there is no limit so as to cause electricity for the download time and downloading place to user
The equity loss of the supplier or copyright owner of subdocument are serious, therefore according to the subscriber identity information, terminal identity
Information and document markup information, which generate the second key, may make the primary downloading dynamic of electronic document that can all generate a key,
To realize each user in different times, place need obtain a new key, document could be downloaded.
Second encryption unit 306 be used for using the second key pair for getting for the first time encrypted picture element matrix,
The first key and decryption side communication mode carry out second and encrypt.
Specifically, second Key generating unit 305 be used for according to the subscriber identity information, terminal identity information with
And the character of document markup information composition generates the second key.
By that can lead to encrypted picture element matrix, the first key and decryption side for the first time to using the second key
Letter mode carries out second of encryption, can be encrypted twice to electronic document, easy to operate, highly-safe.
In the present embodiment, decryption communication mode includes in the telephone number, mailbox and immediate communication tool of decryption side.
The information transmitting unit 307 is used to send described second to decryption side according to the decryption side communication mode close
Key.
Described image processing unit 303 is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to
Digital image information.
Referring to Fig. 4, the present invention implements a kind of file enciphering method provided, it should be noted that the embodiment of the present invention
The technical effect of provided file enciphering method, basic principle and generation is identical with above-described embodiment, to briefly describe, this
Embodiment part does not refer to place, can refer to corresponding contents in the above embodiments.The file enciphering method includes:
Step S401: electronic document, subscriber identity information, terminal identity information and text that client 102 uploads are received
Shelves mark information.
Step S402: the electronic document of upload is converted into document image information.
Step S403: converting picture element matrix for document image information, extracts the picture element matrix and to the pixel square
Battle array is handled, so that the summation of every column element in the picture element matrix remains 1.
Specifically, step S403 includes converting document image information to picture element matrix, and extract the picture element matrix
Each column greatest measure qj, according to formula mij*=(qj-mij)/ΣI=qj-mijMost with this column by every column element in picture element matrix
Big element makes the difference, and calculates ratio so that the summation of every column element in the picture element matrix remains 1, wherein mij is pixel
Element in matrix.
Step S404: first key is obtained according to resume image, and according to the first key got to the picture
Prime matrix encodes and carries out first time encryption.
Step S405: it is close that second is generated according to the subscriber identity information, terminal identity information and document markup information
Key.
Specifically, step S405 can be for using according to the subscriber identity information, terminal identity information and document mark
Remember that the character of information composition generates the second key.
Step S406: using the second key pair for getting for the first time encrypted picture element matrix, the first key with
And decryption side communication mode carries out second and encrypts.
Step S407: second key is sent to decryption side according to the decryption side communication mode.
Step S408: it by the coding and carries out encrypted picture element matrix for the first time and is converted to digital image information.
To sum up, the embodiment of the invention provides a kind of file enciphering method and devices, by advance by the electronics of upload
Document is converted into document image information, and converts picture element matrix for document image information, and obtain according to resume image
First key to the picture element matrix encode carry out first time encryption, due to using resume image generate first key
Non-linear key space can be generated at random, therefore the encryption of the document encryption method is uniformly and more safe and reliable;Other second
Electronic document after layer encryption includes corresponding decryption communication mode, so that even if receiving different electronic documents,
It is sent to different decryption sides with corresponding communication mode by the second key, that is, may make decryption side according to receiving the second key
When used communication mode be sent to different decryption sides, decryption side is according to communication party used when receiving the second key
The corresponding relationship of the communication mode of the decryption side carried in formula and file by second encryption is decrypted, and decryption side with
Outer user due to not having the corresponding relationship of above-mentioned communication mode, also just can not deciphering electric document file, to realize specified
File is decrypted in user, further enhances the secret protection to electronic document.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Claims (8)
1. a kind of file encryption device, which is characterized in that the file encryption device includes:
Document Creator unit, for receiving the electronic document of client upload;
Image conversion unit, for the electronic document of upload to be converted to document image information;
Image processing unit extracts the picture element matrix and to the picture for converting picture element matrix for document image information
Prime matrix is handled, so that the summation of every column element in the picture element matrix remains 1;
First encryption unit, for obtaining first key according to resume image, and according to the first key got to institute
Picture element matrix is stated to encode and carry out first time encryption;
Described image processing unit is also used to the coding and carries out encrypted picture element matrix for the first time and be converted to digitized map
As information;
Second encryption unit, for utilizing the second key pair for getting encrypted picture element matrix, described first close for the first time
Key and decryption side communication mode carry out second and encrypt;
Information transmitting unit, for sending second key to decryption side according to the decryption side communication mode.
2. file encryption device according to claim 1, which is characterized in that the Document Creator unit is for receiving a visitor
Electronic document, subscriber identity information, terminal identity information and the document markup information that family end uploads;
The file encryption device further include:
Second Key generating unit, for raw according to the subscriber identity information, terminal identity information and document markup information
At the second key.
3. file encryption device according to claim 2, which is characterized in that second Key generating unit is used for foundation
The character of the subscriber identity information, terminal identity information and document markup information composition generates the second key.
4. file encryption device according to claim 1, which is characterized in that described image processing unit is used for document map
As information is converted into picture element matrix, and each column greatest measure qj of the picture element matrix is extracted, according to formula mij*=(qj-
mij)/∑I=qj-mijThe greatest member of every column element and this column in picture element matrix is made the difference, and calculates ratio so that the pixel
The summation of every column element in matrix remains 1, wherein mij is the element in picture element matrix.
5. a kind of file enciphering method, which is characterized in that the file enciphering method includes:
Receive the electronic document of client upload;
The electronic document of upload is converted into document image information;
Picture element matrix is converted by document image information, extract the picture element matrix and the picture element matrix is handled, with
The summation of every column element in the picture element matrix is set to remain 1;
First key is obtained according to resume image, and is gone forward side by side according to the first key got to picture element matrix coding
Row encrypts for the first time;
By the coding and carries out encrypted picture element matrix for the first time and be converted to digital image information;
Described by the coding and before carrying out the step of encrypted picture element matrix is converted to digital image information for the first time,
The file enciphering method further include:
Utilize the second key pair first time encrypted picture element matrix, the first key and the decryption side communication party got
Formula carries out second and encrypts;
Second key is sent to decryption side according to the decryption side communication mode.
6. file enciphering method according to claim 5, which is characterized in that the electronics text for receiving a client and uploading
The step of shelves includes: that the Document Creator unit is used to receive the electronic document of client upload, subscriber identity information, terminal
Identity information and document markup information;
In the second key pair first time encrypted picture element matrix, the first key and the decryption side that the utilization is got
Before the step of communication mode encrypt for second, the method also includes: according to the subscriber identity information, terminal identity
Information and document markup information generate the second key.
7. file enciphering method according to claim 6, which is characterized in that described according to the subscriber identity information, end
The step of holding identity information and document markup information to generate the second key includes: according to the subscriber identity information, terminal body
The character of part information and document markup information composition generates the second key.
8. file enciphering method according to claim 5, which is characterized in that described to convert pixel for document image information
Matrix extracts the picture element matrix and handles the picture element matrix, so that every column element in the picture element matrix
The step of summation remains 1 includes: to convert picture element matrix for document image information, and extract each column of the picture element matrix most
Big numerical value qj, according to formula mij*=(qj-mij)/∑I=qj-mijBy the greatest member of every column element and this column in picture element matrix
It makes the difference, and calculates ratio so that the summation of every column element in the picture element matrix remains 1, wherein mij is in picture element matrix
Element.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610778091.0A CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610778091.0A CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106156654A CN106156654A (en) | 2016-11-23 |
CN106156654B true CN106156654B (en) | 2019-06-11 |
Family
ID=57344438
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610778091.0A Active CN106156654B (en) | 2016-08-30 | 2016-08-30 | File encryption apparatus and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156654B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483432A (en) * | 2017-08-10 | 2017-12-15 | 广州杰之良软件有限公司 | File encryption processing method and processing device |
CN108154354A (en) * | 2018-03-13 | 2018-06-12 | 南京审计大学 | Rural area three provides audit and supervision system |
CN108133416A (en) * | 2018-03-13 | 2018-06-08 | 南京审计大学 | Audit negotiating system |
EP3920165A4 (en) * | 2019-01-30 | 2022-02-23 | Sony Group Corporation | Sensor device and encryption method |
CN111444525B (en) * | 2020-03-27 | 2020-11-10 | 南宁职业技术学院 | Document encryption method based on cloud computing |
CN112948857A (en) * | 2021-03-03 | 2021-06-11 | 珠海金山办公软件有限公司 | Document processing method and device |
CN113132080A (en) * | 2021-04-19 | 2021-07-16 | 青岛冠成软件有限公司 | Image processing method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101344960A (en) * | 2008-08-20 | 2009-01-14 | 回静 | Chaos digital image encryption method |
CN101540823A (en) * | 2008-03-21 | 2009-09-23 | 富士通株式会社 | Image processing apparatus and image processing system and method |
CN102415087A (en) * | 2009-05-11 | 2012-04-11 | 富士通株式会社 | Image encryption/decoding device, method, and program |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8886942B2 (en) * | 2012-12-07 | 2014-11-11 | At&T Intellectual Property I, L.P. | Augmented reality based privacy and decryption |
-
2016
- 2016-08-30 CN CN201610778091.0A patent/CN106156654B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101540823A (en) * | 2008-03-21 | 2009-09-23 | 富士通株式会社 | Image processing apparatus and image processing system and method |
CN101344960A (en) * | 2008-08-20 | 2009-01-14 | 回静 | Chaos digital image encryption method |
CN102415087A (en) * | 2009-05-11 | 2012-04-11 | 富士通株式会社 | Image encryption/decoding device, method, and program |
CN105488426A (en) * | 2015-11-30 | 2016-04-13 | 西安闻泰电子科技有限公司 | Mobile platform image encryption method |
Also Published As
Publication number | Publication date |
---|---|
CN106156654A (en) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106156654B (en) | File encryption apparatus and method | |
US10506428B2 (en) | Wireless network connection method, apparatus, and system | |
US8572369B2 (en) | Security for collaboration services | |
CN113364760A (en) | Data encryption processing method and device, computer equipment and storage medium | |
US20140281520A1 (en) | Secure cloud data sharing | |
CN108009440A (en) | Date storage method, querying method, device, storage medium and computer equipment | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
CN105450395A (en) | Information encryption and decryption processing method and system | |
CN102684877A (en) | Method and device for carrying out user information processing | |
CN105323064A (en) | System and method for on-line adding of instant file dynamic label and on-line encryption | |
CN106022035A (en) | Method and system for electronic signature | |
CN102833244A (en) | Communication method for authentication by fingerprint information | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN111131282B (en) | Request encryption method and device, electronic equipment and storage medium | |
CN105450413A (en) | Password-setting method, device, and system | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN110912682A (en) | Data processing method, device and system | |
CA3066701A1 (en) | Controlling access to data | |
CN109039997B (en) | Secret key obtaining method, device and system | |
Tandon et al. | QR Code based secure OTP distribution scheme for Authentication in Net-Banking | |
CN109005196A (en) | Data transmission method, data decryption method, device and electronic equipment | |
CN115081540A (en) | Data privacy protectable classification method and system based on integrated decision learning | |
CN106411888B (en) | Signature document encryption device and method | |
CN102238150A (en) | Form registration method and server | |
CN103532958A (en) | Method for encrypting website resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |