It is document-based server authorization and decryption, and digital certificate-based documents access policy strategy, but also in the encryption, decryption and access process using of strong authentication strategies, and fully guarantee the confidentiality of information. However, this architecture deploys a large number of hardware and software, the implementation is expensive, so it is difficult to be widely used.