CN101859360A - File security processing method, corresponding software and decryption reading device - Google Patents
File security processing method, corresponding software and decryption reading device Download PDFInfo
- Publication number
- CN101859360A CN101859360A CN200910106502A CN200910106502A CN101859360A CN 101859360 A CN101859360 A CN 101859360A CN 200910106502 A CN200910106502 A CN 200910106502A CN 200910106502 A CN200910106502 A CN 200910106502A CN 101859360 A CN101859360 A CN 101859360A
- Authority
- CN
- China
- Prior art keywords
- file
- information
- protected
- image information
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a file security process method, corresponding software and a decryption reading device, which are used for keeping file contents a secret. The method comprises the step of setting one or more protected contents (1) in the file contents, wherein the protected contents (1) consist of bar code image information (103) generated by protected information (101) through an encryption program and a bar code generating program. Because the protected contents (1) exit in the file contents in a form of the bar code image information (103), so long as the contents are printed on a piece of paper, only open contents (2) and the bar code image information (103) but secret contents represented by the bar code image information (103) can be seen directly when the paper is viewed by naked eyes; and therefore, a file security function is realized. The invention also comprises a file decryption reading device (3) by which the bar code image information (103) on a paper file can be restored to the original protected information (101) very conveniently for a user to view.
Description
[technical field]
The present invention relates to information security field, particularly relate to a kind of file security processing method and corresponding software and decryption reader.
[background technology]
Current general file security is handled, and adopts key with file encryption mostly, when consulting content, use key with file decryption after, could the accessed document content.The time slot scrambling of this encrypting and decrypting only is applicable to some e-files, and some use the paper document of traditional approach printing, just can't use this method to encrypt.File on the traditional commerce, great majority are to use paper document, because paper document does not need special instrument and equipment just can directly check, and the signature that more can the affix a seal to a document content of coming authentication document, so even e-file becomes more and more popular, e-file can not replace files such as paper document, particularly some contractual agreements fully, and major part all is to adopt paper document.In addition, paper document belongs to object in kind, its damage generally is gradual change, generally just discernable by visual inspection, can make early and remedying, for example paper document causes the paper destruction such as make moist of turning to be yellow gradually along with time, before file is damaged fully, file content still can clearly be read usually, and reliability is very high.Review e-file, though e-file can carry out confidential treatment, but e-file has an opportunity having no damage suddenly under the situation of tendency, influence the reliability of e-file, for example be stored in the e-file in the memory card, as long as the semiconductor element in the memory card breaks down, just may cause the interior e-file of card to damage forever, and the damage of semiconductor element, generally all be not have obvious tendency, when realizing that e-file damages, can not have made and having remedied, so general commercially still electronic paper printer can be become paper document to file, in case of need.But electronic paper printer is become paper document, and paper document has not just had the function of keeping secret that e-file possessed, as long as anyone takes this paper document, just can see content.A kind of secrecy technology that can be applied to e-file and paper document simultaneously is a untapped problem.
[summary of the invention]
Purpose of the present invention is to provide a kind of file security processing method and corresponding software and decryption reader, can be used for the multiple application of maintaining secrecy of e-file and paper document.
The object of the present invention is achieved like this; adopt a kind of like this file security processing method; be used for file content is maintained secrecy; it is characterized in that; described method is included on the content of file one or more protected content (1) is set, and each protected content (1) is made up of by the barcode image information (103) that encipheror and bar code generator program generated protected information (101).Because protected content (1) is to exist in the content of file with barcode image information (103); as long as file content is printed on the paper; contained content has just comprised this barcode image information (103) on the paper; adopt naked eyes to check and to see open content in the content (2) part and barcode image information (103); can not directly see the content of barcode image information (103) representative, just can keep the function of keeping secret of file like this on the paper.
For realizing purpose of the present invention; also adopt a kind of like this file security to handle software; adopt file security processing method as previously described; be used to handle the file that employing file security processing method is as previously described handled; it is characterized in that; described software is provided with and comprises the information encryption program; the bar code generator program; the bar code scan decoding program; the decrypts information program; wherein; described information encryption program is mainly used in encrypts generation ciphertext (102) with protected information (101); described bar code generator program is mainly used in ciphertext (102) is converted to barcode image information (103); described bar code scan decoding program is mainly used in barcode image information (103) decoding is reduced to ciphertext (102); described decrypts information program is mainly used in ciphertext (102) is decrypted the original protected information (101) that restores; and; described software comprises by preset program running: barcode image information (103) conversion of the protected content (1) of file is reduced to original protected information (101); the protected information (101) of the protected content (1) of file is converted to barcode image information (103).
In addition; the present invention also comprises a kind of file decryption reading device; be used to read the protected content (1) of the file that employing file security processing method as previously described handles; it is characterized in that; described file decryption reading device (3) includes controller (301); image scanner (302); display screen (303); card reader (304); wherein; described controller (301) is by the preset program running; read the interior decruption key (105) of key card (4) by card reader (304); the content scanning spanned file image of protected content (1) will be comprised by image scanner (302) on the file; and the decoding of the barcode image information (103) of the protected content in this document image (1) restored ciphertext (102); use this decruption key (105) that ciphertext (102) deciphering is restored original protected information (101) then; and; barcode image information (103) in will the protected content (1) of the described document image of this protected information (101) displacement shows this document image by display screen (303) then.
So just realized purpose of the present invention.
Time slot scrambling of the present invention can be applied to e-file and traditional paper document; still can keep function of keeping secret on the electronic paper printer paper with employing time slot scrambling of the present invention; when checking the protected information (101) of protected content on the paper document (1) barcode image information (103) representative partly; as long as file decryption reading device (3) is placed on barcode image information (103) position on the paper document, just barcode image information (103) can be restored protected information (101) confession user by file decryption reading device (3) and decruption key (105) and check.
[description of drawings]
Fig. 1 adopts file security processing method of the present invention to carry out the schematic illustration of the preceding paper document of confidential treatment;
Fig. 2 adopts file security processing method of the present invention to carry out the schematic illustration that the preceding e-file of confidential treatment shows at computer screen;
Fig. 3 adopts file security processing method of the present invention to carry out the schematic illustration of the paper document after the confidential treatment;
Fig. 4 adopts file security processing method of the present invention to carry out the schematic illustration that the e-file after the confidential treatment shows at computer screen;
Fig. 5 is the step schematic illustration that barcode image information (103) generates;
Fig. 6 is the step schematic illustration that barcode image information (103) is reduced to protected information (101);
Fig. 7 is the image schematic illustration of file decryption reading device of the present invention (3);
Fig. 8 is the frame structure schematic illustration of file decryption reading device of the present invention (3);
Schematic illustration when Fig. 9 is file decryption reading device of the present invention (3) use.
Among the figure, the system that identical digitized representation is identical, device, parts device, accompanying drawing are schematically, in order to principal character of the present invention to be described.
[embodiment]
Below in conjunction with accompanying drawing, method of the present invention is described in further detail.
Consult Fig. 1 to Fig. 4; Fig. 1 adopts file security processing method of the present invention to carry out the schematic illustration of the preceding paper document of confidential treatment; Fig. 2 adopts file security processing method of the present invention to carry out the schematic illustration that the preceding e-file of confidential treatment shows at computer screen; Fig. 3 adopts file security processing method of the present invention to carry out the schematic illustration of the paper document after the confidential treatment; Fig. 4 adopts file security processing method of the present invention to carry out the schematic illustration that the e-file after the confidential treatment shows at computer screen; illustrated among Fig. 1 and Fig. 3 and adopted file security processing method of the present invention paper document to be carried out the example of confidential treatment; adopt file security processing method of the present invention e-file to be carried out the example of confidential treatment and illustrated among Fig. 2 and Fig. 4; the file security processing method that file adopted shown in Fig. 1 to Fig. 4 is included on the content of file one or more protected content (1) is set; each protected content (1) is made up of by the barcode image information (103) that encipheror and bar code generator program generated protected information (101); wherein; described barcode image information (103) is the image information of two-dimensional bar code, and described two-dimensional bar code comprises matrix two-dimensional barcode; the bar code of different size standards such as stack two-dimensional bar code.
Consult Fig. 5, Fig. 5 is the step schematic illustration that barcode image information (103) generates, and barcode image information (103) has been shown among Fig. 5 has generated by comprising following A group step:
A1. use encryption key (104) that protected information (101) is encrypted and generate ciphertext (102);
A2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
Consult Fig. 6, Fig. 6 is the step schematic illustration that barcode image information (103) is reduced to protected information (101), has illustrated among Fig. 6 barcode image information (103) is reduced to protected information (101) by comprising following B group step:
B1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102);
B2. use decruption key (105) that ciphertext (102) deciphering is restored original protected information (101).
The further improvement of file security processing method of the present invention; be when encrypting, to add some random informations; two different barcode image information (103) that two identical protected information (101) are generated after encryption; can prevent from like this to guess out protected information (101) content by in conjunction with the open content (2) of file and the barcode image information (103) of diverse location.Adopt this improved encryption method to generate barcode image information (103) by following C group step:
C1. use encryption key (104) that protected information (101) is encrypted together with random information and generate ciphertext (102);
C2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
When barcode image information (103) is reduced to protected information (101), can adopt to comprise that following D group step is converted to protected information (101) with barcode image information (103):
D1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102);
D2. use decruption key (105) that ciphertext (102) deciphering is restored original protected information (101) and random information, wherein, random information without any effect, can abandon after deciphering.
The further improvement of file security processing method of the present invention, be to add cryptographic levels mechanism, cryptographic levels is divided into the N level, be respectively five-star the 1st grade to first degree N level, and the decruption key (105) of employing N bar encryption key (104) and N bar correspondence, and described N is 1 or above positive integer.After adding cryptographic levels mechanism, the step that generates barcode image information (103) also will be done some and change and cooperate, and described barcode image information (103) can generate by comprising following E group step:
E1. use the 1st a protected information (101) encrypt to be generated the enciphered message of corresponding each bar encryption key (104) together with random information to each bar encryption key (104) of N level respectively, then each enciphered message is formed a ciphertext (102);
E2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
In addition, the step that barcode image information (103) is converted to protected information (101) also will be done some and change and cooperate, and described barcode image information (103) can be by comprising that following F group step conversion be protected information (101):
F1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102), find out the 1st to each corresponding enciphered message of each bar encryption key (104) of N level from this ciphertext (102);
F2. use corresponding the 1st a wherein decruption key (105) that each enciphered message is decrypted, then one of them enciphered message that can successfully decipher deciphering is restored original protected information (101) to each bar encryption key (104) of N level.
The graduate mechanism of this password, can make things convenient for the security work of management document, some coml financial report files for example, the content that need maintain secrecy in the file can be divided into Three Estate, content that can some are secret be set at the first order, senior executive by company consults only, the content that some are responsive be set at the second level, can consult by the senior executive of company and the personnel of related work, and the content setting of some inconvenient full disclosures is the third level, can be by the senior executive of company, the personnel of related work and all personnel of intra-company consult.And encryption key (104) and decruption key (105) also are divided into three grades; each senior executive that the decruption key of the first order (105) is distributed to company uses; the personnel that partial decruption key (105) is distributed to related work use; the decruption key of the third level (105) distribute to company other the office worker in short-term; with the protected content (1) of file when encrypting; the protected information (101) of the protected content of the first order (1) only can be encrypted by the encryption key of the first order (104) and be generated ciphertext (102); the protected information (101) of partial protected content (1) can be generated ciphertext (102) by the first order and partial encryption key (104) encryption respectively; the protected information (101) of the protected content of the third level (1) can be respectively by the first order; the encryption key of the second level and the third level etc. (104) is encrypted and is generated ciphertext (102); like this; just can use decruption key (105) protected content (1) deciphering that all are at different levels of the first order; and use the partial decruption key (105) just can be with second and the deciphering of the protected content (1) of the third level; as for third level decruption key (105); just third level protected content (1) can only be deciphered; by the key of different brackets is set, just can be easy to protected content (1) is done differentiated control.
Below described file security processing method of the present invention in detail; the present invention also comprises the software of a kind of employing file security processing method as previously described; be used to handle the file that employing file security processing method is as previously described handled; described software is provided with and comprises the information encryption program; the bar code generator program; the bar code scan decoding program; the decrypts information program; wherein; described information encryption program is mainly used in encrypts generation ciphertext (102) with protected information (101); described bar code generator program is mainly used in ciphertext (102) is converted to barcode image information (103); described bar code scan decoding program is mainly used in barcode image information (103) decoding is reduced to ciphertext (102); described decrypts information program is mainly used in ciphertext (102) is decrypted the original protected information (101) that restores; and; described software comprises by preset program running: barcode image information (103) conversion of the protected content (1) of file is reduced to original protected information (101); the protected information (101) of the protected content (1) of file is converted to barcode image information (103).In addition, described software also comprises: with described file content by screen display function and/or with described file content by the function of printer prints on carrier, described file content comprises protected content (1) and remaining open content (2).
Consult Fig. 7 and Fig. 8; Fig. 7 is the image schematic illustration of file decryption reading device of the present invention (3); Fig. 8 is the frame structure schematic illustration of file decryption reading device of the present invention (3); file decryption reading device (3) shown in Fig. 7 and Fig. 8 is the protected content (1) that is used to read the file that adopts file security processing method processing of the present invention; described file decryption reading device (3) includes controller (301); image scanner (302); display screen (303); card reader (304); wherein; described controller (301) is by the preset program running; read the interior decruption key (105) of key card (4) by card reader (304); the content scanning spanned file image of protected content (1) will be comprised by image scanner (302) on the file; and the decoding of the barcode image information (103) of the protected content in this document image (1) restored ciphertext (102); use this decruption key (105) that ciphertext (102) deciphering is restored original protected information (101) then; and; barcode image information (103) in will the protected content (1) of the described document image of this protected information (101) displacement shows this document image by display screen (303) then.In addition, described display screen (303) is a touch control screen, and, store in the described key card (4) and enable password, when controller (301) reads decruption key (105) in the key card (4) by card reader (304), controller (301) demonstrates a virtual soft dish by display screen (303), the user will import the correct password of enabling by this virtual soft dish, the password of enabling that to be inputed by controller (301) is sent to key card (4) again, key card (4) check send enable password correct after just to file decryption reading device (3) output decruption key (105).
Consult Fig. 9; schematic illustration when Fig. 9 is file decryption reading device of the present invention (3) use; Fig. 9 shows file decryption reading device (3) is placed on the paper document that is printed with barcode image information (103) content; by file decryption reading device (3) each barcode image information (103) decoding is restored ciphertext (102); use the decruption key (105) in the key card (4) that decrypt ciphertext is restored original protected information (101) then, and barcode image information (103) is replaced into this protected information (101) is presented at display screen (303) and goes up for the user and check.
Below described feature of the present invention in detail, though the present invention is illustrated with the above embodiments, but the present invention is not limited to this, under the situation of the scope of not leaving spirit of the present invention and appended claims, can do multiple change and variation.
File security processing method of the present invention and corresponding software and decryption reader, can be applied to e-file and paper document simultaneously, the function of keeping secret of existing e-file can keep the reliability of paper document again, its enforcement can bring good economic benefit and social benefit.
Claims (13)
1. file security processing method; be used for file content is maintained secrecy; it is characterized in that; described method is included on the content of file one or more protected content (1) is set, and each protected content (1) is made up of by the barcode image information (103) that encipheror and bar code generator program generated protected information (101).
2. file security processing method as claimed in claim 1 is characterized in that, described barcode image information (103) is the image information of two-dimensional bar code, and described two-dimensional bar code comprises matrix two-dimensional barcode, stack two-dimensional bar code.
3. file security processing method as claimed in claim 1 is characterized in that, described barcode image information (103) can generate by comprising following A group step:
A1. use encryption key (104) that protected information (101) is encrypted and generate ciphertext (102);
A2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
4. file security processing method as claimed in claim 1 is characterized in that, described barcode image information (103) can be reduced to protected information (101) by comprising following B group step:
B1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102);
B2. use decruption key (105) that ciphertext (102) deciphering is restored original protected information (101).
5. file security processing method as claimed in claim 1 is characterized in that, described barcode image information (103) can generate by comprising following C group step:
C1. use encryption key (104) that protected information (101) is encrypted together with random information and generate ciphertext (102);
C2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
6. file security processing method as claimed in claim 1 is characterized in that, described barcode image information (103) can be protected information (101) by comprising that following D organizes step conversion:
D1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102);
D2. use decruption key (105) that ciphertext (102) deciphering is restored original protected information (101) and random information.
7. file security processing method as claimed in claim 1, it is characterized in that, described method also comprises the cryptographic levels mechanism that adopts, cryptographic levels is divided into the N level, be respectively five-star the 1st grade to first degree N level, and adopt the decruption key (105) of N bar encryption key (104) and N bar correspondence, and described N is 1 or above positive integer.
8. file security processing method as claimed in claim 7 is characterized in that, described barcode image information (103) can generate by comprising following E group step:
E1. use the 1st a protected information (101) encrypt to be generated the enciphered message of corresponding each bar encryption key (104) together with random information to each bar encryption key (104) of N level respectively, then each enciphered message is formed a ciphertext (102);
E2. by the bar code generator program ciphertext (102) is generated barcode image information (103).
9. file security processing method as claimed in claim 7 is characterized in that, described barcode image information (103) can be protected information (101) by comprising that following F organizes step conversion:
F1. by the bar code scan decoding program barcode image information (103) decoding is restored ciphertext (102), find out the 1st to each corresponding enciphered message of each bar encryption key (104) of N level from this ciphertext (102);
F2. use corresponding the 1st a wherein decruption key (105) that each enciphered message is decrypted, then one of them enciphered message that can successfully decipher deciphering is restored original protected information (101) to each bar encryption key (104) of N level.
10. a file security is handled software; adopt as each described file security processing method of claim 1 to 9; be used to handle the file that adopts as each described file security processing method processing of claim 1 to 9; it is characterized in that; described software is provided with and comprises the information encryption program; the bar code generator program; the bar code scan decoding program; the decrypts information program; wherein; described information encryption program is mainly used in encrypts generation ciphertext (102) with protected information (101); described bar code generator program is mainly used in ciphertext (102) is converted to barcode image information (103); described bar code scan decoding program is mainly used in barcode image information (103) decoding is reduced to ciphertext (102); described decrypts information program is mainly used in ciphertext (102) is decrypted the original protected information (101) that restores; and; described software comprises by preset program running: barcode image information (103) conversion of the protected content (1) of file is reduced to original protected information (101); the protected information (101) of the protected content (1) of file is converted to barcode image information (103).
11. file security as claimed in claim 10 is handled software; it is characterized in that; described software also comprises: with described file content by screen display function and/or with described file content by the function of printer prints on carrier, described file content comprises protected content (1) and remaining open content (2).
12. file decryption reading device; be used to read the protected content (1) that adopts the file of handling as each described file security processing method of claim 1 to 9; it is characterized in that; described file decryption reading device (3) includes controller (301); image scanner (302); display screen (303); card reader (304); wherein; described controller (301) is by the preset program running; read the interior decruption key (105) of key card (4) by card reader (304); the content scanning spanned file image of protected content (1) will be comprised by image scanner (302) on the file; and the decoding of the barcode image information (103) of the protected content in this document image (1) restored ciphertext (102); use this decruption key (105) that ciphertext (102) deciphering is restored original protected information (101) then; and; barcode image information (103) in will the protected content (1) of the described document image of this protected information (101) displacement shows this document image by display screen (303) then.
13. file decryption reading device as claimed in claim 12, it is characterized in that, described display screen (303) is a touch control screen, and, store in the described key card (4) and enable password, when controller (301) reads decruption key (105) in the key card (4) by card reader (304), controller (301) demonstrates a virtual soft dish by display screen (303), the user will import the correct password of enabling by this virtual soft dish, the password of enabling that to be inputed by controller (301) is sent to key card (4) again, key card (4) check send enable password correct after just to file decryption reading device (3) output decruption key (105).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910106502A CN101859360A (en) | 2009-04-08 | 2009-04-08 | File security processing method, corresponding software and decryption reading device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910106502A CN101859360A (en) | 2009-04-08 | 2009-04-08 | File security processing method, corresponding software and decryption reading device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101859360A true CN101859360A (en) | 2010-10-13 |
Family
ID=42945262
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910106502A Pending CN101859360A (en) | 2009-04-08 | 2009-04-08 | File security processing method, corresponding software and decryption reading device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101859360A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103489017A (en) * | 2013-09-23 | 2014-01-01 | 深圳市海云天科技股份有限公司 | Electronic examination paper handling method and system based on two-dimension codes |
CN107111593A (en) * | 2015-01-21 | 2017-08-29 | 安岛科技有限公司 | The method for allowing data to classify in rigid software development environment |
WO2020077048A1 (en) * | 2018-10-10 | 2020-04-16 | Safenet Inc. | Methods for securing and accessing a digital document |
WO2020077043A1 (en) * | 2018-10-10 | 2020-04-16 | Safenet Inc. | Method for securing a digital document |
US10956590B2 (en) | 2018-10-22 | 2021-03-23 | Thales Dis Cpl Usa, Inc. | Methods for securely managing a paper document |
CN115688150A (en) * | 2023-01-04 | 2023-02-03 | 徐工汉云技术股份有限公司 | File encryption transmission method, decryption display method, storage medium and electronic equipment |
US11625496B2 (en) | 2018-10-10 | 2023-04-11 | Thales Dis Cpl Usa, Inc. | Methods for securing and accessing a digital document |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1519705A (en) * | 2003-01-24 | 2004-08-11 | 黄庆祥 | Bar code safety system for E-Mail and its method |
US6892947B1 (en) * | 2003-07-30 | 2005-05-17 | Hewlett-Packard Development Company, L.P. | Barcode embedding methods, barcode communication methods, and barcode systems |
CN1735127A (en) * | 2004-08-09 | 2006-02-15 | 株式会社东芝 | Encrypting method and encrypting apparatus for image processing apparatus |
CN1758587A (en) * | 2005-09-06 | 2006-04-12 | 宏碁股份有限公司 | Data processing method |
CN101383825A (en) * | 2008-09-25 | 2009-03-11 | 深圳华为通信技术有限公司 | Method, apparatus and terminal implementing computer file ciphering |
-
2009
- 2009-04-08 CN CN200910106502A patent/CN101859360A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1519705A (en) * | 2003-01-24 | 2004-08-11 | 黄庆祥 | Bar code safety system for E-Mail and its method |
US6892947B1 (en) * | 2003-07-30 | 2005-05-17 | Hewlett-Packard Development Company, L.P. | Barcode embedding methods, barcode communication methods, and barcode systems |
CN1735127A (en) * | 2004-08-09 | 2006-02-15 | 株式会社东芝 | Encrypting method and encrypting apparatus for image processing apparatus |
CN1758587A (en) * | 2005-09-06 | 2006-04-12 | 宏碁股份有限公司 | Data processing method |
CN101383825A (en) * | 2008-09-25 | 2009-03-11 | 深圳华为通信技术有限公司 | Method, apparatus and terminal implementing computer file ciphering |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103489017A (en) * | 2013-09-23 | 2014-01-01 | 深圳市海云天科技股份有限公司 | Electronic examination paper handling method and system based on two-dimension codes |
CN107111593A (en) * | 2015-01-21 | 2017-08-29 | 安岛科技有限公司 | The method for allowing data to classify in rigid software development environment |
WO2020077048A1 (en) * | 2018-10-10 | 2020-04-16 | Safenet Inc. | Methods for securing and accessing a digital document |
WO2020077043A1 (en) * | 2018-10-10 | 2020-04-16 | Safenet Inc. | Method for securing a digital document |
WO2020077061A1 (en) * | 2018-10-10 | 2020-04-16 | Safenet Inc. | Methods for securely managing a paper document |
US10970408B2 (en) | 2018-10-10 | 2021-04-06 | Thales Dis Cpl Usa, Inc. | Method for securing a digital document |
US11625496B2 (en) | 2018-10-10 | 2023-04-11 | Thales Dis Cpl Usa, Inc. | Methods for securing and accessing a digital document |
US10956590B2 (en) | 2018-10-22 | 2021-03-23 | Thales Dis Cpl Usa, Inc. | Methods for securely managing a paper document |
CN115688150A (en) * | 2023-01-04 | 2023-02-03 | 徐工汉云技术股份有限公司 | File encryption transmission method, decryption display method, storage medium and electronic equipment |
CN115688150B (en) * | 2023-01-04 | 2023-04-07 | 徐工汉云技术股份有限公司 | File encryption transmission method, decryption display method, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101295343B (en) | Two-dimensional code multi-enciphering anti-fake printing method | |
CN100576196C (en) | Content enciphering method, system and utilize this encryption method that the method for content is provided by network | |
US7353393B2 (en) | Authentication receipt | |
CN101859360A (en) | File security processing method, corresponding software and decryption reading device | |
CN1889419B (en) | Method and apparatus for realizing encrypting | |
US20050105719A1 (en) | Personal information control and processing | |
CN101388776B (en) | Ciphering and deciphering method and device for printed written files | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
CN101859351B (en) | System and method for ensuring safe read of data stored in storage | |
CN101739758B (en) | Method for encrypting and decrypting smart card, system and reader-writer | |
CN105323064A (en) | System and method for on-line adding of instant file dynamic label and on-line encryption | |
CA2613289A1 (en) | Generating a secret key from an asymmetric private key | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN101770559A (en) | Data protecting device and data protecting method | |
KR101035868B1 (en) | Maintaining security of a document communicated by fax | |
CN112347493A (en) | Encryption, decryption and graying method for OFD (office file) | |
US8181869B2 (en) | Method for customizing customer identifier | |
US11356427B1 (en) | Signcrypted envelope message | |
CN102332978B (en) | Lottery ticket off-line verification system | |
CN112217640A (en) | Method and system for safely transmitting data of metering operation and maintenance system | |
CN1607511B (en) | Data protection method and system | |
CN205541148U (en) | Go out paper money system based on close algorithm of state | |
JP2001177518A (en) | Enciphering method, and decoding method and device | |
CN102647428A (en) | Encrypting and decrypting system and method adopting trusteeship control based on communication network | |
CN111865945A (en) | Internal and external network data safety transmission method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: The International Chamber of Commerce building, No. 2 Beijing 100035 Xicheng District huapichang alley 16 Applicant after: Huang Jinfu Address before: 100032, Beijing, Financial Street, Xicheng District No. 27 investment Plaza, block B, 19 Applicant before: Huang Jinfu |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20101013 |