Office document encryption method and decryption method

文档序号:1864721 发布日期:2021-11-19 浏览:3次 中文

阅读说明:本技术 一种Office文档加密方法和解密方法 (Office document encryption method and decryption method ) 是由 梁勇 王文宇 李晋 吕永胜 吴生东 苑海彬 李佳兴 张英剑 于 2020-05-14 设计创作,主要内容包括:本发明公开了一种Office文档加密方法和解密方法,包括:将加密插件置入计算机设备,操作所述计算机设备运行所述加密插件,所述加密插件在所述计算机设备的系统环境内对Office文档进行加密处理,所述加密处理是在所述Office文档中植入验证协议,当所述Office文档通过网络被分享时,通过所述验证协议的文档接收者才能打开所述Office文档;所述加密插件具有解密模块、解密模块和SM4算法模块,所述加密模块和解密模块均通过SM4算法模块将加密程序和解密程序转化为与Office文档一致的程序语言,从而对所述Office文档进行加密和解密。(The invention discloses an Office document encryption method and a decryption method, which comprise the following steps: putting an encryption plug-in into computer equipment, operating the computer equipment to run the encryption plug-in, wherein the encryption plug-in carries out encryption processing on an Office document in a system environment of the computer equipment, the encryption processing is to implant an authentication protocol into the Office document, and when the Office document is shared through a network, a document receiver passing through the authentication protocol can open the Office document; the encryption plug-in is provided with a decryption module, a decryption module and an SM4 algorithm module, wherein the encryption module and the decryption module convert an encryption program and a decryption program into a program language consistent with an Office document through the SM4 algorithm module, so that the Office document is encrypted and decrypted.)

1. An Office document encryption method is characterized by comprising the following steps:

putting an encryption plug-in into computer equipment, operating the computer equipment to run the encryption plug-in, wherein the encryption plug-in carries out encryption processing on an Office document in a system environment of the computer equipment, the encryption processing is to implant an authentication protocol into the Office document,

when the Office document is shared over a network, a document recipient that passes the authentication protocol can open the Office document.

2. The encryption method of claim 1, wherein the encryption plug-in is compliant with a native security architecture of office software,

and combining the national cipher administration commercial cipher standard, the cipher system of the secret administration and the cipher system of the military to manufacture the encryption plug-in.

3. The encryption method according to claim 2, wherein the encryption plug-in has an encryption module for inputting an encryption program into an SM4 algorithm module, and an SM4 algorithm module, the SM4 algorithm module converts the encryption program into a program language consistent with the Office document, and the SM4 algorithm module encrypts the Office document using the converted program language.

4. The encryption method of claim 1, wherein the authentication protocol comprises a cryptographic protocol, an authentication protocol, a multidimensional crypto protocol, and a rights management protocol.

5. The encryption method of claim 4, wherein the verification protocol is used in conjunction with virtualization, authentication, and hardware binding techniques.

6. An Office document decryption method is characterized in that an encryption plug-in is operated in computer equipment, the encryption plug-in is provided with a decryption module and an SM4 algorithm module, the decryption module inputs a decryption program into the SM4 algorithm module, the SM4 algorithm module converts the decryption program into a program language consistent with an Office document, and the SM4 algorithm module decrypts the Office document by using the converted program language.

Technical Field

The invention relates to an Office document encryption method and a decryption method, in particular to an Office document encryption method and a decryption method based on a domestic encryption algorithm.

Background

With the rapid development of informatization, the demand of people on information security is met, talent competition, market competition, financial crisis, hostile institutions and the like bring huge risks to the development of enterprises and public institutions, internal secret stealing means such as internal secret stealing, hacker attack, unconscious secret disclosure and the like become potential safety hazards between people, between enterprises and between countries, and between enterprises, and the demand of information encryption in the information age is very slow.

The information transparency makes the importance of information protection more prominent, digital equipment such as computers, mobile phones and the like is popularized, information transmission is easy, but for enterprises and individuals, the privacy protection of important information becomes more important, but how to realize information sharing in a small range and ensure that other people cannot acquire the information still cannot play a good role in solving the problem in the prior art.

Therefore, a new technical solution is needed to solve the above problems.

Disclosure of Invention

The invention aims to solve the problems in the prior art and provides an Office document encryption method and a decryption method, and the technical scheme is as follows:

an Office document encryption method comprises the following steps:

putting an encryption plug-in into computer equipment, operating the computer equipment to run the encryption plug-in, wherein the encryption plug-in carries out encryption processing on an Office document in a system environment of the computer equipment, the encryption processing is to implant an authentication protocol into the Office document,

when the Office document is shared over a network, a document recipient that passes the authentication protocol can open the Office document.

Further, the encryption plug-in is adapted to the native security architecture of office software,

furthermore, the encryption plug-in is manufactured and obtained by combining the national cipher administration commercial cipher standard, the secret administration cipher system and the military cipher system.

Further, the encryption plug-in has an encryption module and an SM4 algorithm module, the encryption module is used for inputting an encryption program into the SM4 algorithm module, the SM4 algorithm module converts the encryption program into a program language consistent with the Office document, and the SM4 algorithm module encrypts the Office document by using the converted program language.

Further, the verification protocol comprises a password protocol, an identity authentication protocol, a multidimensional secret protocol and a right management protocol.

Further, the verification protocol is used in cooperation with virtualization technology, identity authentication technology and hardware binding technology.

The invention also provides an Office document decryption method, wherein an encryption plug-in is operated in computer equipment, the encryption plug-in is provided with a decryption module and an SM4 algorithm module, the decryption module inputs a decryption program into the SM4 algorithm module, the SM4 algorithm module converts the decryption program into a program language consistent with the Office document, and the SM4 algorithm module decrypts the Office document by using the converted program language.

Compared with the prior art, the invention has one or more of the following beneficial effects:

1. the invention provides an encryption and decryption method of Office documents, which adopts a dynamic document transparent encryption technology, a virtualization technology, an identity authentication technology, a hardware binding technology, combines multidimensional security level and authority management, and carries out fine-grained authority management on important data on the basis of transparent encryption aiming at the differentiation of employees and departments in an enterprise and the autonomous management requirements of the enterprise;

2. when the document is opened, the document can be operated only after the document passes identity authentication and an access password is correct, the algorithm at the bottom layer of the document is encrypted, and unauthorized people cannot perform any operation on the document, so that the high safety of information is ensured;

3. the encryption plug-in is manufactured and obtained by combining the national cipher administration commercial cipher standard, the cipher system of the secret administration and the military cipher system, and the encryption plug-in is adaptive to the original security architecture of office software and is integrated with office software programs;

4. the encryption plug-in of the invention is provided with an encryption module and an SM4 algorithm module, wherein the encryption module is used for inputting an encryption program into an SM4 algorithm module, the SM4 algorithm module converts the encryption program into a program language consistent with the Office document, and the SM4 algorithm module encrypts the Office document by using the converted program language;

5. the encryption plug-in also has a decryption module, namely, the encryption of the Office document is reversible, when the information can be disclosed, an administrator can decrypt the file through the decryption module, and the text information is disclosed to the outside.

Drawings

In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.

FIG. 1 is a block flow diagram of the Office document encryption and decryption methods of the present invention;

FIG. 2 is a schematic diagram of an interface of a document encrypted by the encryption method of the present invention when the document is opened.

Wherein, 1-a computer device; 2-encryption plug-in; 21-an encryption module; 22-SM4 algorithm module; 23-a decryption module; 3-Office documents.

Detailed Description

The technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.

In the description of the present invention, it is to be understood that the terms "upper", "lower", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.

In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; either directly or indirectly through intervening media, either internally or in any other relationship. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.

The gist of the present invention will be further explained below with reference to the accompanying drawings and examples.

Example (b):

for solving the problems in the prior art, the invention provides an Office document encryption method, please refer to fig. 1-2, fig. 1 is a flow chart of the Office document encryption method and decryption method of the invention; fig. 2 is a schematic interface diagram of a document encrypted by using the encryption method of the present invention when the document is opened, where the Office document may include a word document, a ppt document, and an excel document.

An Office document encryption method comprises the following steps:

placing an encryption plug-in 2 into a computer device 1, operating the computer device 1 to run the encryption plug-in 2, wherein the encryption plug-in 2 carries out encryption processing on an Office document in a system environment of the computer device 1, the encryption processing is to implant an authentication protocol in the Office document,

when the Office document is shared over a network, a document recipient that passes the authentication protocol can open the Office document.

Further, the encryption plug-in 2 is adapted to the native security architecture of office software,

furthermore, the encryption plug-in 2 is manufactured and obtained by combining the national cipher administration commercial cipher standard, the secret administration cipher system and the military cipher system.

Further, the encryption plug-in 2 has an encryption module 21 and an SM4 algorithm module 22, the encryption module 21 is configured to input an encryption program into the SM4 algorithm module 22, the SM4 algorithm module 22 converts the encryption program into a program language consistent with the Office document, and the SM4 algorithm module 22 encrypts the Office document by using the converted program language.

Further, the verification protocol comprises a password protocol, an identity authentication protocol, a multidimensional secret protocol and a right management protocol.

Further, the verification protocol is used in cooperation with virtualization technology, identity authentication technology and hardware binding technology.

The invention further provides an Office document decryption method, please continue to refer to fig. 1, an encryption plug-in 2 is operated in a computer device 1, the encryption plug-in 2 is provided with a decryption module 23 and an SM4 algorithm module 22, the decryption module 23 inputs a decryption program into the SM4 algorithm module 22, the SM4 algorithm module 22 converts the decryption program into a program language consistent with the Office document, and the SM4 algorithm module 22 decrypts the Office document by using the converted program language.

The invention provides an encryption and decryption method for Office documents, which adopts a dynamic document transparent encryption technology, a virtualization technology, an identity authentication technology and a hardware binding technology, combines multidimensional security and authority management, and carries out fine-grained authority management on important data on the basis of transparent encryption according to the differentiation of employees and departments in an enterprise and the autonomous management requirements of the enterprise.

The document encrypted by the encryption method of the invention can be operated only after the document is correctly authenticated and the access password is required to be opened, the algorithm at the bottom layer of the document is encrypted, and unauthorized people can not operate the document, thereby ensuring the high safety of information.

The encryption plug-in is manufactured by combining the national cipher administration commercial cipher standard, the cipher system of the secret administration and the military cipher system, is adaptive to the original security architecture of office software and is integrated with office software programs.

The encryption plug-in of the invention is provided with an encryption module and an SM4 algorithm module, wherein the encryption module is used for inputting an encryption program into the SM4 algorithm module, the SM4 algorithm module converts the encryption program into a program language consistent with the Office document, and the SM4 algorithm module encrypts the Office document by using the converted program language.

The encryption plug-in also has a decryption module, namely, the encryption of the Office document is reversible, when the information can be disclosed, an administrator can decrypt the file through the decryption module, and the text information is disclosed to the outside.

In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example" or "some examples" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples described in this specification can be combined and combined by one skilled in the art.

While embodiments of the present invention have been shown and described above, it is to be understood that the above embodiments are exemplary and not to be construed as limiting the present invention, and that changes, modifications and variations may be made therein by those of ordinary skill in the art within the scope of the present invention.

7页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种单芯片共享文件的管理方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类