CN103793665A - Electronic document processing method and device - Google Patents

Electronic document processing method and device Download PDF

Info

Publication number
CN103793665A
CN103793665A CN201410081119.6A CN201410081119A CN103793665A CN 103793665 A CN103793665 A CN 103793665A CN 201410081119 A CN201410081119 A CN 201410081119A CN 103793665 A CN103793665 A CN 103793665A
Authority
CN
China
Prior art keywords
electronic document
document
information
verified
bar code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410081119.6A
Other languages
Chinese (zh)
Inventor
贾利滨
刘浩伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410081119.6A priority Critical patent/CN103793665A/en
Publication of CN103793665A publication Critical patent/CN103793665A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an electronic document processing method and device. An electronic document Hash value is obtained by obtaining an electronic document to be processed, identification information of the electronic document and trace source information of the electronic document and performing Hash operation on the electronic document, encryption treatment based on a PKI technology is performed on the trace source information so as to obtain an encryption value of the trace source information, and further bar code information is generated according to the electronic document Hash value, the encryption value of the trace source information and the identification information of the electronic document and can be displayed at designated positions of pages of the electronic document in a disperse mode. Therefore, the electronic document or a printed document corresponding to the electronic document is verified by utilizing the bar code information, and accordingly the safety of the electronic document is ensured.

Description

The disposal route of electronic document and device
[technical field]
The present invention relates to information security technology, relate in particular to a kind of disposal route and device of electronic document.
[background technology]
Electronic document refers to what people formed in social activities, the written material take chemical magnetic materials such as computing machine disc, disk and CDs as carrier.Relying on computer system access also can be in transmitted over communications networks.It mainly comprises electronic document, electronic mail, electronic report forms and electronic drawing etc.Alterability is the key property that electronic document has.
But, there is alterability just because of electronic document, make the security of electronic document be difficult to guarantee.
[summary of the invention]
Many aspects of the present invention provide a kind of disposal route and device of electronic document, in order to guarantee the security of electronic document.
An aspect of of the present present invention, provides a kind of disposal route of electronic document, comprising:
Obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document;
Described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
The described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
According to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Described bar code information is disperseed to be presented on the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, on described every page of described bar code information dispersion being presented in to described electronic document, comprising:
Described bar code information is carried out to sectioning, to obtain N slice information, wherein, the number of pages that N is described electronic document;
Each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described electronic document is PDF document; On the described assigned address of every page that each slice information is disperseed to be respectively presented in described electronic document, comprising:
Utilize figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described assigned address comprises the margin position of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, on the described assigned address of every page that described bar code information is disperseed to be presented in described electronic document after, also comprise:
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage;
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, on the described assigned address of every page that described bar code information is disperseed to be presented in described electronic document after, also comprise:
Whether client detects described electronic document and is modified;
If described electronic document is modified, described client is carried out crash handling to described bar code information.
Another aspect of the present invention, provides a kind for the treatment of apparatus of electronic document, comprising:
Obtain unit, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document;
Hash units, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
Ciphering unit, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
Generation unit, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Represent unit, for described bar code information being disperseed to be presented in the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, described in represent unit, specifically for
Described bar code information is carried out to sectioning, to obtain N slice information, wherein, the number of pages that N is described electronic document; And
Each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described electronic document is PDF document; The described unit that represents, specifically for
Utilize figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described assigned address comprises the margin position of every page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described device also comprises:
Receiving element, be used for the cryptographic hash of the document to be verified that receives client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
Authentication unit, for
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
As shown from the above technical solution, the embodiment of the present invention is by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented on the assigned address of every page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented on the assigned address of every page of electronic document, therefore, if electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively guarantee the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further guarantee the security of electronic document.
[accompanying drawing explanation]
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The schematic flow sheet of the disposal route of the electronic document that Fig. 1 provides for one embodiment of the invention;
The structural representation of the treating apparatus of the electronic document that Fig. 2 provides for another embodiment of the present invention;
The structural representation of the treating apparatus of the electronic document that Fig. 3 provides for another embodiment of the present invention.
[embodiment]
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making whole other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
It should be noted that, in the embodiment of the present invention, related terminal can include but not limited to mobile phone, personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, panel computer (Tablet Computer), PC (Personal Computer, PC), MP3 player, MP4 player etc.
In addition, term "and/or" herein, is only a kind of incidence relation of describing affiliated partner, and expression can exist three kinds of relations, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/" herein, generally represents that forward-backward correlation is to liking a kind of relation of "or".
The schematic flow sheet of the disposal route of the electronic document that Fig. 1 provides for one embodiment of the invention, as shown in Figure 1.
101, obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document.
Wherein, described electronic document can include but not limited to text formatting document, WORD document, PPT(Power Point) format file or portable document format (Portable Document Format, PDF) document, the present embodiment is not particularly limited this.
Wherein, the information of tracing to the source of described electronic document can include but not limited to download person's information of electronic document and the download time information of electronic document, and the present embodiment is not particularly limited this.
Be understandable that, due to the download person of electronic document and the variation of download time, therefore, may make the information of tracing to the source of described electronic document constantly update.
102, described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document.
Wherein, Hash (HASH) operation is according to the data of the content of electronic document, carries out preassigned logical operation.Hash operates the numerical value obtaining, and can be called cryptographic hash.The electronic document of different content, even identical filename, it is also not identical that Hash operates the cryptographic hash obtaining.
103, the described information of tracing to the source is carried out to the encryption based on public keys system (Public Key Infrastructure, PKI) technology, with the secret value of the information of tracing to the source described in obtaining.
104, according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information.
Wherein, described bar code information can include but not limited to bar code or two-dimensional bar code.
105, described bar code information is disperseed to be presented on the assigned address of every page of described electronic document.
Wherein, described assigned address can include but not limited to the margin position of every page of described electronic document, and the present embodiment is not particularly limited this.For example, every page of close rightmost position, or more for example, every page of close position bottom, etc.
It should be noted that, 101~105 executive agent can be electronic document processing apparatus, can be arranged in the server of network side, to process online.
Like this, by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented on the assigned address of every page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented on the assigned address of every page of electronic document, therefore, if electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively guarantee the integrality of electronic document.
PKI is public keys system, and it utilizes the feature of public key algorithm, sets up the system of a set of certificate issued, management and using, support with completion system in authentication, information encryption, guarantee data integrity and non-repudiation etc.PKI technology, is used cryptographic algorithm and pair of secret keys, and a public keys is that PKI (public key) and a private cipher key are private key (private key).Its ultimate principle is: the information content being encrypted by a key, can only just can be decrypted processing by another key matching with it.PKI can be issued and own relevant correspondent widely, and private key needs to deposit fool proofly.PKI is by digital certificate and its owner's relevant information, and for example, name, work unit, email address etc. bundle, by authoritative institution (Certificate Authority, CA) authentication, distribution & management.That is to say, give the other side digital certificate, with regard to being equivalent to, the PKI of oneself has been sent to the other side.
Alternatively, in one of the present embodiment possible implementation, electronic document processing apparatus can also further carry out authentication to client.Particularly, client specifically can be obtained the corresponding user's of this client private key and digital certificate, and then utilizes private key to be encrypted digital certificate, to obtain signature, and digital certificate and signature is sent to electronic document processing apparatus.Electronic document processing apparatus utilizes digital certificate to obtain the corresponding user's of this client PKI, utilizes PKI that signature is decrypted and is processed and checking, confirms user's legal identity.
Like this, only have legal user, could use client-requested to obtain, electronic document processing apparatus is by carrying out 105 electronic documents that obtain, for example, and to electronic document processing apparatus request download etc.
It should be noted that, client specifically can be from inserting in the USBkey the terminal that this client moves, and reads the relevant information of the PKI technology that this USBkey stores, for example, and the corresponding user's of client digital certificate, PKI and private key etc.Electronic document processing apparatus can utilize digital certificate, obtains the corresponding user's of this client PKI from CA.
Alternatively, in one of the present embodiment possible implementation, in 103, specifically can obtain the PKI of the corresponding operation side of electronic document processing apparatus, and then utilize this PKI to be encrypted the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining.
It should be noted that, electronic document processing apparatus specifically can be from inserting in the USBkey this electronic document processing apparatus, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side of electronic document processing apparatus.
Alternatively, in one of the present embodiment possible implementation, in 105, specifically can carry out sectioning to described bar code information, to obtain N slice information, wherein, the number of pages that N is described electronic document.Wherein, described sectioning can include but not limited at least one operation in slices across operation and the sectioning of total picture, and the present embodiment is not particularly limited this.Then, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Particularly, be the situation of PDF document for electronic document, specifically can utilize figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.The implementation of PDF document can be regarded as the stack of multiple figure layers, and information of every insertion just can be regarded as a figure layer, the restriction that the quantity of its figure layer is not fixed.For example,
Specifically can utilize iText technology, locate the slice information on every page of described electronic document.The picture format of iText technical support can include but not limited to GIF, JPEG, PNG and WMF form, and the present embodiment is not particularly limited this.
For different picture formats, the automatic recognition image form of same constructed fuction for iText technology.Obtain respectively the example of GIF, JPEG and PNG image by code below:
Image?gif=Image.getInstance("vonnegut.gif");
Image?jpeg=Image.getInstance("myKids.jpg");
Image?png=Image.getInstance("hitchcock.png");
1. the position of image
The position of image mainly refers to the alignment thereof of image in document, and position relationship between image and text.In IText, process by function public void setAlignment (int alignment), parameter alignment is that Image.RIGHT, Image.MIDDLE, Image.LEFT refer to respectively Right Aligns, placed in the middle, left-justify; When parameter alignment is Image.TEXTWRAP, Image.UNDERLYING refers to that respectively word shows as the background of word around figure demonstration, figure.These two kinds of parameters can be in conjunction with to get a desired effect, and the effect showing as setAlignment (Image.RIGHT|Image.TEXTWRAP) is image Right Aligns, and word shows around image.
2. the size of image and rotation
If image shows not according to life size, can set by function below in document:
public?void?scaleAbsolute(int?newWidth,int?newHeight)
public?void?scalePercent(int?percent)
public?void?scalePercent(int?percentX,int?percentY)
Function public void scaleAbsolute (int newWidth, int newHeight) is set and display size directly; Function public void scalePercent (int percent)
Set and display ratio, as scalePercent (50) represents that the size showing is full-sized 50%; And image of function scalePercent (int percentX, int percentY)
3. high wide displaying ratio
If image in document, show after need to rotating to an angle, can pass through function public void setRotation (double r) sets, and parameter r is radian, if the anglec of rotation is 30 degree, parameter r=Math.PI/6.
Particularly, be the situation of WORD document for electronic document, specifically can utilize the AddPicture method of nlineShapes type, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.For example,
For Shapes object: can and return to a Shape object from existing document creation one pictures, this object represents new picture.
For InlineShapes object: can and return to an InlineShape object from picture of existing document creation, this object represents new picture.
Grammer 1
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Left,Top,Width,Height,Anchor);
Grammer 2
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Range)。Wherein,
Expression, grammer 1: essential.This expression formula is returned to a Shapes object; Grammer 2: essential.This expression formula is returned to an InlineShapes object.
FileName, character types (String), essential.Appointment will create the document name of object.
LinkToFile, variable type (Variant), optional.If this setup of attribute is true (True), by created object and the document links that creates this object.If be set to vacation (False), the object this being created becomes the separate copy of the document that creates this object.Default value is False.
SaveWithDocument, variable type (Variant), optional.If this attribute is True, the picture of link is preserved together with document.Default value is False.
Left, Top, variable type (Variant), optional.The position of the relative lock token in the upper left corner of designated pictures.
Width, Height, variable type (Variant), optional.The width of designated pictures and length.
Anchor, variable type (Variant), optional.The ' locked ' zone of designated pictures.If specified Anchor, it will appear at the beginning of ' locked ' zone first paragraph.If ignore this parameter, automatically place lock token, and picture is with reference to coboundary and the left margin location of the page.
Range, variable type (Variant), optional.Specify a region, the object creating is placed in the word in this region.If this region is not folding, picture will cover this region so; Otherwise, at this region insert pictures.If ignore this parameter, automatically place picture.
Alternatively, in one of the present embodiment possible implementation, after 105, can also further receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the cryptographic hash of described document to be verified, the secret value of the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified.Wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified.And then, can be according to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage.Then, then according to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.Be understandable that, related Hash operation here, with 102 in the Hash operation carried out, be all that electronic document is carried out to preassigned identical logical operation.
Wherein, specifically can obtain the private key of the corresponding operation side of electronic document processing apparatus, and then utilize this private key, the information of tracing to the source described in decrypting, to carry out record.
It should be noted that, electronic document processing apparatus specifically can be from inserting in the USBkey this electronic document processing apparatus, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side of electronic document processing apparatus.
Particularly, if the cryptographic hash of described document to be verified is consistent with the cryptographic hash of the electronic document of described storage, illustrate that described document to be verified is correct document, document was not modified or document is real document, Deng, can guarantee the security of document; If the cryptographic hash of the cryptographic hash of described document to be verified and the electronic document of described storage is inconsistent, illustrate that described document to be verified is incorrect document, document was modified or document is false document, etc., cannot guarantee the security of document.
Like this, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further guarantee the security of electronic document.
Be understandable that, described client can be mounted in the application program in terminal, or can also be a webpage of browser, if can realize electronic document processing outwardness form can, the present embodiment does not limit this.
Further alternatively, if described document to be verified is correct document, in order to prevent the phenomenon that copies of bar code information, can also further receive the request of obtaining that client sends, obtain request according to described, the electronic document of described document to be verified is sent to described client.Like this, if what take before the user of client is to print document, so, the electronic document that user can utilize described client to obtain, further carry out the verification of word for word to printing document, can further improve the security of printing document, can also overcome the defect that bar code information easily copies simultaneously.
Alternatively, in one of the present embodiment possible implementation, after 105, whether client further client detects described electronic document and is modified.If described electronic document is modified, described client can be carried out crash handling to described bar code information, for example, in described bar code information, stamps oblique line, etc.
Particularly, client specifically can periodically, regularly or in real time, be carried out Hash operation to electronic document, to obtain the cryptographic hash of described electronic document.If this cryptographic hash changes, illustrate that electronic document is modified, now, described client need to be carried out crash handling to bar code information.
It should be noted that, the Hash operation now carried out, can carry out according to preassigned logical operation.This Hash operation, can be identical with the Hash operation that electronic document processing apparatus carries out before, also can be different, and the present embodiment is not particularly limited this.
Whether like this, be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further guarantee the security of electronic document.
In the present embodiment, by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented on the assigned address of every page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented on the assigned address of every page of electronic document, therefore, if electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively guarantee the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further guarantee the security of electronic document.
It should be noted that, for aforesaid each embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the present invention is not subject to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part of detailed description, can be referring to the associated description of other embodiment.
The structural representation of the treating apparatus of the electronic document that Fig. 2 provides for another embodiment of the present invention, as shown in Figure 2.The treating apparatus of the electronic document of the present embodiment can comprise acquisition unit 21, hash units 22, ciphering unit 23, generation unit 24 and represent unit 25.Wherein,
Obtain unit 21, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document.
Wherein, described electronic document can include but not limited to text formatting document, WORD document, PPT(Power Point) format file or portable document format (Portable Document Format, PDF) document, the present embodiment is not particularly limited this.
Wherein, the information of tracing to the source of described electronic document can include but not limited to download person's information of electronic document and the download time information of electronic document, and the present embodiment is not particularly limited this.
Be understandable that, due to the download person of electronic document and the variation of download time, therefore, may make the information of tracing to the source of described electronic document constantly update.
Hash units 22, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document.
Wherein, Hash (HASH) operation is according to the data of the content of electronic document, carries out preassigned logical operation.Hash operates the numerical value obtaining, and can be called cryptographic hash.The electronic document of different content, even identical filename, it is also not identical that Hash operates the cryptographic hash obtaining.
Ciphering unit 23, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining.
Generation unit 24, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information.
Wherein, described bar code information can include but not limited to bar code or two-dimensional bar code.
Represent unit 25, for described bar code information being disperseed to be presented in the assigned address of every page of described electronic document.
Wherein, described assigned address can include but not limited to the margin position of every page of described electronic document, and the present embodiment is not particularly limited this.For example, every page of close rightmost position, or more for example, every page of close position bottom, etc.
It should be noted that the treating apparatus of the electronic document that the present embodiment provides can be arranged in the server of network side, to process online.
Like this, obtain pending electronic document by obtaining unit, the information of tracing to the source of the identification information of described electronic document and described electronic document, and hash units is carried out Hash operation to described electronic document, to obtain the cryptographic hash of described electronic document, ciphering unit carries out the encryption based on PKI technology to the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining, and then by generation unit according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, making to represent unit can disperse described bar code information to be presented on the assigned address of every page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented on the assigned address of every page of electronic document, therefore, if electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively guarantee the integrality of electronic document.
PKI is public keys system, and it utilizes the feature of public key algorithm, sets up the system of a set of certificate issued, management and using, support with completion system in authentication, information encryption, guarantee data integrity and non-repudiation etc.PKI technology, is used cryptographic algorithm and pair of secret keys, and a public keys is that PKI (public key) and a private cipher key are private key (private key).Its ultimate principle is: the information content being encrypted by a key, can only just can be decrypted processing by another key matching with it.PKI can be issued and own relevant correspondent widely, and private key needs to deposit fool proofly.PKI is by digital certificate and its owner's relevant information, and for example, name, work unit, email address etc. bundle, by authoritative institution (Certificate Authority, CA) authentication, distribution & management.That is to say, give the other side digital certificate, with regard to being equivalent to, the PKI of oneself has been sent to the other side.
Alternatively, in one of the present embodiment possible implementation, the treating apparatus of the electronic document that the present embodiment provides can also further carry out authentication to client.Particularly, client specifically can be obtained the corresponding user's of this client private key and digital certificate, and then utilizes private key to be encrypted digital certificate, to obtain signature, and digital certificate is sent to the treating apparatus of electronic document with signing.The treating apparatus of electronic document utilizes digital certificate to obtain the corresponding user's of this client PKI, utilizes PKI that signature is decrypted and is processed and checking, confirms user's legal identity.
Like this, only have legal user, could use client-requested to obtain, represent the electronic document that unit 25 obtains, for example, to treating apparatus request download of electronic document etc.
It should be noted that, client specifically can be from inserting in the USBkey the terminal that this client moves, and reads the relevant information of the PKI technology that this USBkey stores, for example, and the corresponding user's of client digital certificate, PKI and private key etc.The treating apparatus of electronic document can utilize digital certificate, obtains the corresponding user's of this client PKI from CA.
Alternatively, in one of the present embodiment possible implementation, ciphering unit 23 specifically can obtain the PKI of the corresponding operation side for the treatment of apparatus of electronic document, and then utilizes this PKI to be encrypted the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining.
It should be noted that, ciphering unit 23 specifically can be from inserting in the USBkey the treating apparatus of this electronic document, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side for the treatment of apparatus of electronic document.
Alternatively, in one of the present embodiment possible implementation, described in represent unit 25, specifically can be for described bar code information is carried out to sectioning, to obtain N slice information, wherein, the number of pages that N is described electronic document; And each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
Particularly, be the situation of PDF document for electronic document, described in represent unit 25 specifically can utilization figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.The implementation of PDF document can be regarded as the stack of multiple figure layers, and information of every insertion just can be regarded as a figure layer, the restriction that the quantity of its figure layer is not fixed.For example,
The described unit 25 that represents specifically can utilize iText technology, locates the slice information on every page of described electronic document.The picture format of iText technical support can include but not limited to GIF, JPEG, PNG and WMF form, and the present embodiment is not particularly limited this.
For different picture formats, the automatic recognition image form of same constructed fuction for iText technology.Obtain respectively the example of GIF, JPEG and PNG image by code below:
Image?gif=Image.getInstance("vonnegut.gif");
Image?jpeg=Image.getInstance("myKids.jpg");
Image?png=Image.getInstance("hitchcock.png");
1. the position of image
The position of image mainly refers to the alignment thereof of image in document, and position relationship between image and text.In IText, process by function public void setAlignment (int alignment), parameter alignment is that Image.RIGHT, Image.MIDDLE, Image.LEFT refer to respectively Right Aligns, placed in the middle, left-justify; When parameter alignment is Image.TEXTWRAP, Image.UNDERLYING refers to that respectively word shows as the background of word around figure demonstration, figure.These two kinds of parameters can be in conjunction with to get a desired effect, and the effect showing as setAlignment (Image.RIGHT|Image.TEXTWRAP) is image Right Aligns, and word shows around image.
2. the size of image and rotation
If image shows not according to life size, can set by function below in document:
public?void?scaleAbsolute(int?newWidth,int?newHeight)
public?void?scalePercent(int?percent)
public?void?scalePercent(int?percentX,int?percentY)
Function public void scaleAbsolute (int newWidth, int newHeight) is set and display size directly; Function public void scalePercent (int percent)
Set and display ratio, as scalePercent (50) represents that the size showing is full-sized 50%; And image of function scalePercent (int percentX, int percentY)
3. high wide displaying ratio
If image in document, show after need to rotating to an angle, can pass through function public void setRotation (double r) sets, and parameter r is radian, if the anglec of rotation is 30 degree, parameter r=Math.PI/6.
Particularly, be the situation of WORD document for electronic document, described in represent unit 25 and specifically can utilize the AddPicture method of nlineShapes type, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.For example,
For Shapes object: can and return to a Shape object from existing document creation one pictures, this object represents new picture.
For InlineShapes object: can and return to an InlineShape object from picture of existing document creation, this object represents new picture.
Grammer 1
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Left,Top,Width,Height,Anchor);
Grammer 2
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Range)。Wherein,
Expression, grammer 1: essential.This expression formula is returned to a Shapes object; Grammer 2: essential.This expression formula is returned to an InlineShapes object.
FileName, character types (String), essential.Appointment will create the document name of object.
LinkToFile, variable type (Variant), optional.If this setup of attribute is true (True), by created object and the document links that creates this object.If be set to vacation (False), the object this being created becomes the separate copy of the document that creates this object.Default value is False.
SaveWithDocument, variable type (Variant), optional.If this attribute is True, the picture of link is preserved together with document.Default value is False.
Left, Top, variable type (Variant), optional.The position of the relative lock token in the upper left corner of designated pictures.
Width, Height, variable type (Variant), optional.The width of designated pictures and length.
Anchor, variable type (Variant), optional.The ' locked ' zone of designated pictures.If specified Anchor, it will appear at the beginning of ' locked ' zone first paragraph.If ignore this parameter, automatically place lock token, and picture is with reference to coboundary and the left margin location of the page.
Range, variable type (Variant), optional.Specify a region, the object creating is placed in the word in this region.If this region is not folding, picture will cover this region so; Otherwise, at this region insert pictures.If ignore this parameter, automatically place picture.
Alternatively, in one of the present embodiment possible implementation, as shown in Figure 3, the treating apparatus of the electronic document that the present embodiment provides can further include receiving element 31 and authentication unit 32.Wherein,
Receiving element 31, be used for the cryptographic hash of the document to be verified that receives client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the cryptographic hash of described document to be verified, the secret value of the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified.Wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified.
Authentication unit 32, for according to the identification information of described document to be verified, obtains the electronic document of storage, and the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And according to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and record the information of tracing to the source of described document to be verified.Be understandable that related Hash operation here, with the Hash operation that hash units 22 is carried out, is all that electronic document is carried out to preassigned identical logical operation.
Wherein, authentication unit 32 specifically can obtain the private key of the corresponding operation side for the treatment of apparatus of electronic document, and then utilizes this private key, and the information of tracing to the source described in decrypting, to carry out record.
It should be noted that, authentication unit 32 specifically can be from inserting in the USBkey the treating apparatus of this electronic document, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side for the treatment of apparatus of electronic document.
Particularly, if the cryptographic hash of described document to be verified is consistent with the cryptographic hash of the electronic document of described storage, illustrate that described document to be verified is correct document, document was not modified or document is real document, Deng, can guarantee the security of document; If the cryptographic hash of the cryptographic hash of described document to be verified and the electronic document of described storage is inconsistent, illustrate that described document to be verified is incorrect document, document was modified or document is false document, etc., cannot guarantee the security of document.
Like this, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further guarantee the security of electronic document.
Be understandable that, described client can be mounted in the application program in terminal, or can also be a webpage of browser, if can realize electronic document processing outwardness form can, the present embodiment does not limit this.
Further alternatively, if described document to be verified is correct document, in order to prevent the phenomenon that copies of bar code information, the treating apparatus of the electronic document that the present embodiment provides can also further receive the request of obtaining that client sends, obtain request according to described, the electronic document of described document to be verified is sent to described client.Like this, if what take before the user of client is to print document, so, the electronic document that user can utilize described client to obtain, further carry out the verification of word for word to printing document, can further improve the security of printing document, can also overcome the defect that bar code information easily copies simultaneously.
In the present embodiment, obtain pending electronic document by obtaining unit, the information of tracing to the source of the identification information of described electronic document and described electronic document, and hash units is carried out Hash operation to described electronic document, to obtain the cryptographic hash of described electronic document, ciphering unit carries out the encryption based on PKI technology to the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining, and then by generation unit according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, making to represent unit can disperse described bar code information to be presented on the assigned address of every page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented on the assigned address of every page of electronic document, therefore, if electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively guarantee the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further guarantee the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further guarantee the security of electronic document.
Those skilled in the art can be well understood to, for convenience and simplicity of description, the system of foregoing description, the specific works process of device and unit, can, with reference to the corresponding process in preceding method embodiment, not repeat them here.
In several embodiment provided by the present invention, should be understood that, disclosed system, apparatus and method, can realize by another way.For example, device embodiment described above is only schematic, for example, the division of described unit, is only that a kind of logic function is divided, and when actual realization, can have other dividing mode, for example, multiple unit or assembly can in conjunction with or can be integrated into another system, or some features can ignore, or do not carry out.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, indirect coupling or the communication connection of device or unit can be electrically, machinery or other form.
The described unit as separating component explanation can or can not be also physically to separate, and the parts that show as unit can be or can not be also physical locations, can be positioned at a place, or also can be distributed in multiple network element.Can select according to the actual needs some or all of unit wherein to realize the object of the present embodiment scheme.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing unit, can be also that the independent physics of unit exists, and also can be integrated in a unit two or more unit.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that also can adopt hardware to add SFU software functional unit realizes.
The integrated unit that the above-mentioned form with SFU software functional unit realizes, can be stored in a computer read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, comprise that some instructions (can be personal computers in order to make a computer installation, server, or network equipment etc.) or processor (processor) carry out the part steps of method described in each embodiment of the present invention.And aforesaid storage medium comprises: various media that can be program code stored such as USB flash disk, portable hard drive, ROM (read-only memory) (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CDs.
Finally it should be noted that: above embodiment only, in order to technical scheme of the present invention to be described, is not intended to limit; Although the present invention is had been described in detail with reference to previous embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or part technical characterictic is wherein equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (11)

1. a disposal route for electronic document, is characterized in that, comprising:
Obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document;
Described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
The described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
According to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Described bar code information is disperseed to be presented on the assigned address of every page of described electronic document.
2. method according to claim 1, is characterized in that, on described every page of described bar code information dispersion being presented in to described electronic document, comprising:
Described bar code information is carried out to sectioning, to obtain N slice information, wherein, the number of pages that N is described electronic document;
Each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
3. method according to claim 2, is characterized in that, described electronic document is PDF document; On the described assigned address of every page that each slice information is disperseed to be respectively presented in described electronic document, comprising:
Utilize figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
4. method according to claim 1, is characterized in that, described assigned address comprises the margin position of every page of described electronic document.
5. according to the method described in the arbitrary claim of claim 1~4, it is characterized in that, on the described assigned address of every page that described bar code information is disperseed to be presented in described electronic document after, also comprise:
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage;
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
6. according to the method described in the arbitrary claim of claim 1~4, it is characterized in that, on the described assigned address of every page that described bar code information is disperseed to be presented in described electronic document after, also comprise:
Whether client detects described electronic document and is modified;
If described electronic document is modified, described client is carried out crash handling to described bar code information.
7. a treating apparatus for electronic document, is characterized in that, comprising:
Obtain unit, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document;
Hash units, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
Ciphering unit, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
Generation unit, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Represent unit, for described bar code information being disperseed to be presented in the assigned address of every page of described electronic document.
8. device according to claim 7, is characterized in that, described in represent unit, specifically for
Described bar code information is carried out to sectioning, to obtain N slice information, wherein, the number of pages that N is described electronic document; And
Each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
9. device according to claim 8, is characterized in that, described electronic document is PDF document; The described unit that represents, specifically for
Utilize figure layer technology, each slice information is disperseed to be respectively presented on the assigned address of every page of described electronic document.
10. device according to claim 7, is characterized in that, described assigned address comprises the margin position of every page of described electronic document.
11. according to the device described in the arbitrary claim of claim 7~10, it is characterized in that, described device also comprises:
Receiving element, be used for the cryptographic hash of the document to be verified that receives client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification on the assigned address of every page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
Authentication unit, for
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
CN201410081119.6A 2014-03-06 2014-03-06 Electronic document processing method and device Pending CN103793665A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410081119.6A CN103793665A (en) 2014-03-06 2014-03-06 Electronic document processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410081119.6A CN103793665A (en) 2014-03-06 2014-03-06 Electronic document processing method and device

Publications (1)

Publication Number Publication Date
CN103793665A true CN103793665A (en) 2014-05-14

Family

ID=50669314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410081119.6A Pending CN103793665A (en) 2014-03-06 2014-03-06 Electronic document processing method and device

Country Status (1)

Country Link
CN (1) CN103793665A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156674A (en) * 2014-08-13 2014-11-19 北京淦蓝润和信息技术有限公司 Electronic document processing method and device
CN105117661A (en) * 2015-08-04 2015-12-02 北京金山安全软件有限公司 File protection method and device
CN106953864A (en) * 2017-03-28 2017-07-14 中国空气动力研究与发展中心高速空气动力研究所 A kind of method that multisystem output document is quickly traced to the source in wind tunnel test
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method
CN111832009A (en) * 2020-07-22 2020-10-27 上海绿安信息科技有限公司 Electronic signature verification method applied to medicine management

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558385A (en) * 2004-02-04 2004-12-29 吴建明 Method of preventing file inset replacement
CN1558595A (en) * 2004-01-18 2004-12-29 哈尔滨工业大学 Method for making and verifying digital signature and digital watermark bar code
US20090307756A1 (en) * 2006-08-10 2009-12-10 Korea Institute For Electronic Commerce System of Electronic Document Repository which Guarantees Authenticity of the Electronic Document and Issues Certificates and Method of Registering, Reading, Issuing, Transferring, A Certificate Issuing Performed in the System
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
CN103500296A (en) * 2013-09-29 2014-01-08 北京溯源鸿业科技有限公司 Inlaying method and device of digital watermarks in text documents
US20140056469A1 (en) * 2010-01-27 2014-02-27 Dst Technologies, Inc. Contextualization of machine indeterminable information based on machine determinable information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558595A (en) * 2004-01-18 2004-12-29 哈尔滨工业大学 Method for making and verifying digital signature and digital watermark bar code
CN1558385A (en) * 2004-02-04 2004-12-29 吴建明 Method of preventing file inset replacement
US20090307756A1 (en) * 2006-08-10 2009-12-10 Korea Institute For Electronic Commerce System of Electronic Document Repository which Guarantees Authenticity of the Electronic Document and Issues Certificates and Method of Registering, Reading, Issuing, Transferring, A Certificate Issuing Performed in the System
US20140056469A1 (en) * 2010-01-27 2014-02-27 Dst Technologies, Inc. Contextualization of machine indeterminable information based on machine determinable information
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
CN103500296A (en) * 2013-09-29 2014-01-08 北京溯源鸿业科技有限公司 Inlaying method and device of digital watermarks in text documents

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156674A (en) * 2014-08-13 2014-11-19 北京淦蓝润和信息技术有限公司 Electronic document processing method and device
CN105117661A (en) * 2015-08-04 2015-12-02 北京金山安全软件有限公司 File protection method and device
CN105117661B (en) * 2015-08-04 2018-05-08 北京金山安全软件有限公司 File protection method and device
CN106953864A (en) * 2017-03-28 2017-07-14 中国空气动力研究与发展中心高速空气动力研究所 A kind of method that multisystem output document is quickly traced to the source in wind tunnel test
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method
CN111832009A (en) * 2020-07-22 2020-10-27 上海绿安信息科技有限公司 Electronic signature verification method applied to medicine management

Similar Documents

Publication Publication Date Title
US10402784B2 (en) Dynamic notary system
CN110798315B (en) Data processing method and device based on block chain and terminal
DE102011082101B4 (en) A method of creating a soft token, computer program product, and service computer system
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
US20160162897A1 (en) System and method for user authentication using crypto-currency transactions as access tokens
US20140254796A1 (en) Method and apparatus for generating and/or processing 2d barcode
US8826036B1 (en) Ebook encryption using variable keys
CN103701611A (en) Method for accessing and uploading data in data storage system
CN103793665A (en) Electronic document processing method and device
CA3113543C (en) Systems and computer-based methods of document certification and publication
WO2021218166A1 (en) Contract signing method and apparatus, device and computer-readable storage medium
CN106921496A (en) A kind of digital signature method and system
CN103607284A (en) Identity authentication method and equipment and server
CN110598433B (en) Block chain-based anti-fake information processing method and device
CN107992759A (en) Realize device, method and the computer-readable recording medium of E-seal
US20120278631A1 (en) Document management system and method
CN104320253A (en) Two-dimension code authentication system and method based on CBS signature mechanism
KR20130011868A (en) Method for generating electronic document available at mobile devices and device of producing the same
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN104156645A (en) Copy verification system and application method thereof
CN106203556A (en) A kind of method and device of reading electronic labels information
CN104156674A (en) Electronic document processing method and device
US9277097B2 (en) Method for authenticating a document
Taylor et al. A comprehensive forensic preservation methodology for crypto wallets
CN101404573B (en) Authorization method, system and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140514