Computer and Modernization ›› 2010, Vol. 1 ›› Issue (3): 100-3.doi: 10.3969/j.issn.1006-2475.2010.03.029

• 应用与开发 • Previous Articles     Next Articles

Documents Transmission System Security Design and Implementation Strategy

LI Shi-wu,YANG Yi,MA Yong-xiang   

  1. Applied Mathematics Institute of Hebei Academy of Sciences, Shijiazhuang 050081, China
  • Received:2009-09-18 Revised:1900-01-01 Online:2010-03-20 Published:2010-03-20

Abstract:

With the development of information technology in some areas, industries, units, the supporting security is relatively lagging behind applying modern communications and office technology, it causes more security leaks and loopholes, and some units even in a defenseless state. There are serious security documents hidden. This article ensures overall security of documents transmission process, uses data encryption, digital signatures, digital envelopes to identity authentication, authorization, encryption, signatures, audit based on PKI. It helps speed up the pace of information processing, enhances informationprocessing capacity, enhances quality and services level of party and government organs at all levels, so as to better prefectural economic construction and social development.

Key words: PKI, digital signature, data encryption, digital envelopes