CN106407820B - Method and system for preventing file from being tampered and leaked through watermark encryption - Google Patents

Method and system for preventing file from being tampered and leaked through watermark encryption Download PDF

Info

Publication number
CN106407820B
CN106407820B CN201610798622.2A CN201610798622A CN106407820B CN 106407820 B CN106407820 B CN 106407820B CN 201610798622 A CN201610798622 A CN 201610798622A CN 106407820 B CN106407820 B CN 106407820B
Authority
CN
China
Prior art keywords
module
document
information
filing
leaked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610798622.2A
Other languages
Chinese (zh)
Other versions
CN106407820A (en
Inventor
何中
蔡亚军
严伟
戴建峰
薛炜
于晓丽
何登
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU ZHONGWEI TECHNOLOGY SOFTWARE SYSTEM Co Ltd
Original Assignee
JIANGSU ZHONGWEI TECHNOLOGY SOFTWARE SYSTEM Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU ZHONGWEI TECHNOLOGY SOFTWARE SYSTEM Co Ltd filed Critical JIANGSU ZHONGWEI TECHNOLOGY SOFTWARE SYSTEM Co Ltd
Priority to CN201610798622.2A priority Critical patent/CN106407820B/en
Publication of CN106407820A publication Critical patent/CN106407820A/en
Application granted granted Critical
Publication of CN106407820B publication Critical patent/CN106407820B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0201Image watermarking whereby only tamper or origin are detected and no embedding takes place

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention provides a method and a system for preventing a file from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built file needs to be encrypted according to the requirement of a filing worker, and if the built file needs to be encrypted, performing a step 2; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The invention encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.

Description

Method and system for preventing file from being tampered and leaked through watermark encryption
Technical Field
The invention relates to the technical field of digital content security, in particular to a method and a system for preventing files from being tampered and leaked through watermark encryption.
Background
The rise of network platforms in the electronic era, network information systems are becoming business platforms for offices and institutions of people; becomes an important means for improving the service quality and reducing the operation cost. Particularly, as an environment and means for daily office work of an enterprise administrative organ, an office automation network almost relates to enterprise secret information or internal matters which are not easy to be disclosed, and the information is important contents which relate to enterprise security benefits and enterprise stability. Therefore, from the perspective of security work, while the office automation network is built, the security work of the office automation network is also enhanced practically, and a solid security protection system is established by paying attention to development and application of effective security measures. The existing encryption modes are all through complex encryption algorithms, and after the file is successfully decrypted, the file is difficult to carry out security control. When the same document is given to a plurality of people, the divulgence time of the questioning document, the divulgence personnel and even the divulgence computer can not be judged.
If the application number is: 200910083158.9 Chinese patent of invention discloses a system and method for securing electronic documents, which realizes security verification, authority control and log and document distribution by establishing an electronic document security system. But the electronic document is not transparently encrypted and decrypted, and the content of the electronic document has security holes such as copying and tampering. If the application number is as follows: 201110217836.3 discloses an electronic document security management system, which has the application numbers: 20121004114.6 discloses a method for safely distributing electronic documents based on multiple security protection mechanisms, which has the following application numbers: 201210411606.5 Chinese patent discloses an electronic document access control method based on security level identification, and the application number is: 201210299203.6A Chinese patent of invention discloses a multiple encryption and hierarchical management method for electronic documents, which realizes security authentication, authority control and asymmetric encryption and decryption of electronic documents. However, the encryption and decryption processes are not transparent, and users need to perform manual encryption and decryption processes on the document, which causes inconvenience to the users. The application numbers are: 201210154777.4 discloses a system and method for on-line separating and restoring document, which realizes security authentication, authority control and asymmetric encryption and decryption of electronic document. The existence of a 'separated storage area' is required, and the security of the 'separated storage area' becomes a weak link of the security of the whole electronic document.
In summary, in the prior art, no matter which method is independently adopted, different defects exist, the safety of the electronic document and the usability of user operation cannot be met, and document leakage cannot be traced.
disclosure of Invention
In order to solve the problems that the safety of an electronic document and the usability of user operation cannot be met, the document leakage cannot be traced and the like in the prior art, the invention provides a method and a system for preventing the document from being tampered and leaked through watermark encryption.
The specific technical scheme is as follows:
A method for preventing a file from being tampered and leaked through watermark encryption,
Step 1: judging whether the established document needs to be encrypted according to the requirements of the filing staff, and if so, performing the step 2;
step 2: acquiring information of a filing worker, including filing time and a filing IP;
And step 3: the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved;
And 4, step 4: the filing is completed and the entire document is displayed.
On the basis, the method also comprises the step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator.
on the basis, the method also comprises the step 6: and (5) extracting and tracing the operator information stored in the step (5).
The invention also provides a system for preventing the file from being tampered and leaked through the watermark encryption, which comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module, the document anti-tampering module and the document tracing module are sequentially connected, the security document establishing module is used for establishing the security document with the watermark encryption, the document anti-tampering module is used for preventing the document from being tampered or leaked after being established, and the document tracing module is used for tracing the document after the document is tampered or leaked.
On the basis, the security document establishing module comprises an inquiring module, a secret document establishing module and a non-secret document establishing module, wherein the inquiring module is connected with the secret document establishing module and the non-secret document establishing module, and the secret document establishing module and the non-secret document establishing module are respectively called according to the result of the inquiring module so as to establish a secret document and a non-secret document.
On the basis, the confidential document establishing module comprises a first extracting module, a first saving module and an encrypting module, wherein the first extracting module, the first saving module and the encrypting module are sequentially connected, the first extracting module is used for extracting the information of the filing personnel, including filing time and filing ID, the first saving module is used for saving the information extracted by the first extracting module, and the encrypting module is used for encrypting the information in the first saving module in a reversible mode and attaching the information to the bottom of the document.
On the basis, the secret document establishing module further comprises an emergency degree module, the emergency degree module is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step.
on the basis, the document anti-tampering module comprises a monitoring module, a matching module, a tampering module and a non-tampering module, wherein the monitoring module is used for monitoring whether tampering action exists, if the tampering action exists, the matching module is triggered, the matching module is used for matching information of an operator and information of a filing worker, if the tampering action exists, the non-tampering module is triggered, and otherwise, the tampering module is triggered.
On the basis, the tampering module comprises a second extraction module and a second storage module, the second extraction module is used for extracting the information of the operating personnel and storing the information in the second storage module, and the second storage module is synchronous with the operated document.
On this basis, the document tracing module comprises a first positioning module, a first decryption module, a second positioning module and a second decryption module, the first positioning module is connected with the first storage module, the first decryption module is used for decrypting the information of the document creation personnel in the first storage module, the second positioning module is connected with the second storage module, and the second decryption module is used for tracing the non-document creation personnel in the second storage module.
Compared with the prior art, the invention has the beneficial effects that:
1. The invention provides a method for preventing a file from being tampered and leaked through watermark encryption, which judges whether a built file needs to be encrypted according to the requirements of a filing worker, and if the built file needs to be encrypted, carries out a step 2; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks.
2. The method and the device provided by the invention have the advantages that whether the established document is tampered or leaked is monitored, such as actions of downloading, photographing and screen capturing, if the document is tampered or leaked, the information of the operator is stored, and when the document is suspected to be tampered or leaked, the information of the operator can be directly stored by the file for future tracing.
3. The first extraction module is used for extracting the information of the filing staff, including filing time and filing ID, the first storage module is used for storing the information extracted by the first extraction module, and the encryption module is used for encrypting the information in the first storage module in a reversible mode and attaching the information to the bottom of the document. And the watermark mode can be changed according to the urgency degree of the document so as to deepen the protection of the document and effectively prevent the document from being tampered.
4. The document tracing module comprises a first positioning module, a first decryption module, a second positioning module and a second decryption module, wherein the first decryption module is used for decrypting the information of the documenting personnel in the first storage module, and the second decryption module is used for tracing the non-documenting personnel in the second storage module. The method also comprises the step of tracing the tampering and the leakage of the document, wherein the information of a document builder is matched with the information of an operator, and if the matching is unsuccessful, the leaked document is directly traced through the second decryption module to form the tracking of the document, so that a solid security protection system is established.
Drawings
FIG. 1 is a flow chart illustrating a method for preventing a file from being tampered and leaked through watermark encryption according to the present invention;
FIG. 2 is a schematic structural diagram of a security document creation module in a system for preventing a file from being tampered and leaked through watermark encryption according to the present invention;
FIG. 3 is a schematic structural diagram of a document tamper-proof module in a system for preventing a document from being tampered and leaked through watermark encryption according to the present invention;
Fig. 4 is a schematic structural diagram of a document tracing module in a system for preventing a file from being tampered and leaked through watermark encryption according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
With the rise of network platforms in the electronic era, office automation networks are taken as basic means for daily office of administrative organs, and almost no exception is related to enterprise secret information, so that the invention discloses a method for preventing files from being tampered and leaked through watermark encryption, as shown in fig. 1, comprising the following steps:
Step 1: judging whether the created document needs to be encrypted according to the requirements of the filing staff, if so, performing the step 2, if not, judging the system to be a common document, and directly editing the document, wherein anyone can use and edit the document.
Step 2: the information of the filing staff is acquired, including the filing time and the filing IP, preferably, the specific filing staff information in the embodiment includes the login ID of the filing staff, the filing time, the ID of a filing tool and the like, which all belong to fixed attributes that are not changeable, and are a favorable means for preventing the document from being stolen, and the whole document includes all the information of the filing staff, so that whether the document is leaked or not can be effectively judged, and the document can be effectively prevented from being leaked through modes such as screen capturing, photographing and downloading and through a PS (packet switched).
and step 3: the obtained information of the person who creates the file is encrypted in a reversible way and the whole file is paved, preferably, in this embodiment, the information of the person who creates the file is encrypted in a watermark encryption way, and the information is attached to the bottom of the document in a watermark way, and different shading chromaticities can be configured, and the depth of the watermark shading can be controlled.
And 4, step 4: the filing is completed and the entire document is displayed. The invention realizes the encryption, decryption and tracing of the whole form based on the TRUE file form, and the document with the watermark is the encrypted document, which can be visually displayed to the user, and is simple and clear.
As shown in fig. 1, the present embodiment further includes step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator. The method and the device provided by the invention have the advantages that whether the established document is tampered or leaked is monitored, and when the document is suspected to be tampered or leaked, the information of an operator can be directly stored by the document for future tracing.
As shown in fig. 1, this embodiment further includes step 6: and (5) extracting and tracing the operator information stored in the step (5). The invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks.
The invention also discloses a system for preventing a file from being tampered and leaked through watermark encryption, which comprises a security document establishing module 1, a document anti-tampering module 2 and a document tracing module 3, wherein the security document establishing module 1, the document anti-tampering module 2 and the document tracing module 3 are sequentially connected, the security document establishing module 1 is used for establishing a security document with watermark encryption, the document anti-tampering module 2 is used for preventing the document from being tampered or leaked after being established, and the document tracing module 3 is used for tracing the document after the document is tampered or leaked.
As shown in fig. 2, the security document creating module 1 in this embodiment includes an inquiry module 11, a confidential document creating module 111, and a non-confidential document creating module 112, where the inquiry module 11 is connected to both the confidential document creating module 111 and the non-confidential document creating module 112, and calls the confidential document creating module 111 and the non-confidential document creating module 112 respectively according to the result of the inquiry module 11 to create a confidential document and a non-confidential document, and when a user selects to create a non-confidential document system, i.e. determines a document as a normal document, the document can be edited directly, and any person can use and edit the document, which indicates that the document is suitable for circulation. The confidential document establishing module 111 includes a first extracting module 1111, a first saving module 1112 and an encrypting module 1113, the first extracting module 1111, the first saving module 1112 and the encrypting module 1113 are sequentially connected, the first extracting module 1111 is used for extracting the information of the document-creating person, including the document-creating time and the document-creating ID, the specific document-creating person information in the embodiment includes the login ID of the document-creating person, the document-creating time, the ID of the document-creating tool and the like, which all belong to fixed attributes that are not changeable, which is a favorable means for preventing the document from being stolen, and the whole document includes all the information of the document-creating person, which can effectively judge whether the document is leaked, and can effectively prevent the document from being leaked through screen capture, photographing and downloading and through PS and the like. The first saving module 1112 is configured to save the information extracted by the first extracting module 1111, and the encrypting module 1113 is configured to encrypt the information in the first saving module 1112 in a reversible manner and attach the information to the bottom of the document. The classified document establishing module 111 further comprises an urgency module 1114, wherein the urgency module 1114 is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step. The first extraction module 1111 of the present invention is configured to extract information of a document creator, including a document creation time and a document creation ID, the first storage module 1112 is configured to store the information extracted by the first extraction module 1111, and the encryption module 1113 is configured to encrypt the information in the first storage module 1112 in a reversible manner and attach the information to the bottom of the document. And the watermark mode can be changed according to the urgency degree of the document so as to deepen the protection of the document and effectively prevent the document from being tampered. For example, different shading chromaticities are configured, the depth of the watermark shading and the area of the full file are controlled, and the more special and more dense the watermark mode is, the more the file can be effectively prevented from being tampered.
As shown in fig. 3, the document tamper-proofing module 2 in this embodiment includes a monitoring module 21, a matching module 22, a tampering module 221, and a non-tampering module 222, where the monitoring module 21 is configured to monitor whether a tampering action exists, if it is monitored that the tampering action exists, the matching module 22 is triggered, the matching module 22 is configured to match information of an operator and information of a filing staff, if the tampering action is consistent with the information of the filing staff, the non-tampering module 222 is triggered, and otherwise, the tampering module 221 is triggered. The tampering module 221 includes a second extracting module 2221 and a second saving module 2222, where the second extracting module 2221 is configured to extract the operator information and save the operator information in the second saving module 2222, and the second saving module 2222 is synchronized with the operated document.
As shown in fig. 4, the document tracing back module 3 in this embodiment includes a first positioning module 31, a first decryption module 32, a second positioning module 33, and a second decryption module 34, where the first positioning module 31 is connected to the first storage module 1112, the first decryption module 32 is configured to decrypt the information of the person who creates the file in the first storage module 1112, the second positioning module 33 is connected to the second storage module 2222, and the second decryption module 34 is configured to track the person who does not create the file in the second storage module 2222, and when the document is tampered or leaked, the information of the operator is stored, and the tracking is performed according to the information of the operator.
the advantages of the invention are as follows: the invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks. In addition, the method can trace the document tampering and leakage, firstly, information of a document builder is matched with information of an operator, and if the matching is unsuccessful, the leaked document is directly traced through the second decryption module 34 to form tracking on the document, so that a solid security protection system is established.
while the foregoing description shows and describes the preferred embodiments of the present invention, it is to be understood that the invention is not limited to the forms disclosed herein, but is not to be construed as excluding other embodiments and is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as described herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for preventing files from being tampered and leaked through watermark encryption is characterized in that:
Step 1: judging whether the established document needs to be encrypted according to the requirements of the filing staff, and if so, performing the step 2;
Step 2: acquiring information of a filing worker, including filing time and a filing IP;
And step 3: the acquired information of the filing staff is encrypted in a reversible way, the whole file is paved, the information of the filing staff is encrypted in a watermark encryption way, the information is attached to the bottom of the file in a watermark way, different shading chromaticities can be configured, and the depth of the watermark shading can be controlled;
and 4, step 4: the filing is completed and the entire document is displayed.
2. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 1, wherein: further comprising the step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator.
3. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 1, wherein: further comprising the step 6: and (5) extracting and tracing the operator information stored in the step (5).
4. A system for preventing files from being tampered and leaked through watermark encryption is characterized in that: the system comprises a security document establishing module (1), a document anti-tampering module (2) and a document tracing module (3), wherein the security document establishing module (1), the document anti-tampering module (2) and the document tracing module (3) are sequentially connected, the security document establishing module (1) is used for establishing a security document with watermark encryption, the document anti-tampering module (2) is used for preventing a document from being tampered or leaked after being established, and the document tracing module (3) is used for tracing the document after the document is tampered or leaked; the document anti-tampering module (2) comprises a monitoring module (21), a matching module (22), a tampering module (221) and a non-tampering module (222), wherein the monitoring module (21) is used for monitoring whether tampering action exists, if the tampering action exists, the matching module (22) is triggered, the matching module (22) is used for matching information of an operator and information of a filing worker, if the information of the operator is consistent with the information of the filing worker, the non-tampering module (222) is triggered, and if the information of the filing worker is not consistent with the information of the filing worker, the tampering module (221) is triggered; the tampering module (221) comprises a second extraction module (2221) and a second saving module (2222), wherein the second extraction module (2221) is used for extracting the operator information and saving the operator information in the second saving module (2222), and the second saving module (2222) is synchronous with the operated document.
5. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the security document establishing module (1) comprises an inquiry module (11), a secret document establishing module (111) and a non-secret document establishing module (112), wherein the inquiry module (11) is connected with the secret document establishing module (111) and the non-secret document establishing module (112), and the secret document establishing module (111) and the non-secret document establishing module (112) are respectively called according to the result of the inquiry module (11) to establish a secret document and a non-secret document.
6. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 5, wherein: the confidential document establishing module (111) comprises a first extracting module (1111), a first storing module (1112) and an encrypting module (1113), wherein the first extracting module (1111), the first storing module (1112) and the encrypting module (1113) are sequentially connected, the first extracting module (1111) is used for extracting the information of the document-building personnel, including the document-building time and the document-building ID, the first storing module (1112) is used for storing the information extracted by the first extracting module (1111), and the encrypting module (1113) is used for encrypting the information in the first storing module (1112) in a reversible mode and attaching the information to the bottom of the document.
7. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 6, wherein: the classified document establishing module (111) further comprises an emergency degree module (1114), the emergency degree module (1114) is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step.
8. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the document anti-tampering module (2) comprises a monitoring module (21), a matching module (22), a tampering module (221) and a non-tampering module (222), wherein the monitoring module (21) is used for monitoring whether tampering action exists, if the tampering action exists, the matching module (22) is triggered, the matching module (22) is used for matching information of an operator and information of a filing staff, if the information of the filing staff is consistent with the information of the filing staff, the non-tampering module (222) is triggered, and if the information of the filing staff is not consistent with the information of the filing staff, the tampering module (221) is triggered.
9. The system for preventing file from being tampered and leaked through watermark encryption according to claim 8, wherein: the tampering module (221) comprises a second extraction module (2221) and a second saving module (2222), the second extraction module (2221) is used for extracting the information of the operator and saving the information in the second saving module (2222), and the second saving module (2222) is synchronous with the operated document.
10. the system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the document tracing module (3) comprises a first positioning module (31), a first decryption module (32), a second positioning module (33) and a second decryption module (34), the first positioning module (31) is connected with a first storage module (1112), the first decryption module (32) is used for decrypting the filing personnel information in the first storage module (1112), the second positioning module (33) is connected with a second storage module (2222), and the second decryption module (34) is used for tracking non-filing personnel in the second storage module (2222).
CN201610798622.2A 2016-08-31 2016-08-31 Method and system for preventing file from being tampered and leaked through watermark encryption Active CN106407820B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610798622.2A CN106407820B (en) 2016-08-31 2016-08-31 Method and system for preventing file from being tampered and leaked through watermark encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610798622.2A CN106407820B (en) 2016-08-31 2016-08-31 Method and system for preventing file from being tampered and leaked through watermark encryption

Publications (2)

Publication Number Publication Date
CN106407820A CN106407820A (en) 2017-02-15
CN106407820B true CN106407820B (en) 2019-12-10

Family

ID=58002104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610798622.2A Active CN106407820B (en) 2016-08-31 2016-08-31 Method and system for preventing file from being tampered and leaked through watermark encryption

Country Status (1)

Country Link
CN (1) CN106407820B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018176176A1 (en) * 2017-04-01 2018-10-04 福建福昕软件开发股份有限公司 Method for automatically giving alarm after encrypted document is leaked
CN109145632A (en) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 For generating the method and device of traceable file
CN107451947A (en) * 2017-08-03 2017-12-08 武汉远众科技有限公司 A kind of enhancing evidence collection method based on picture watermark
CN108108632A (en) * 2017-11-30 2018-06-01 中车青岛四方机车车辆股份有限公司 A kind of multifactor file watermark generation extracting method and system
CN108985081B (en) * 2018-07-06 2022-02-01 泰康保险集团股份有限公司 Watermark encryption method, device, medium and electronic equipment
CN110489945B (en) * 2019-07-26 2021-03-30 山东科技大学 Resume information protection and divulgence tracing method
CN113704828A (en) * 2020-05-22 2021-11-26 永中软件股份有限公司 System and method for preventing file from being tampered and leaked through watermark encryption
CN114285669A (en) * 2021-12-31 2022-04-05 深圳昂楷科技有限公司 Watermark embedding method for embedding application system plug-in

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504709A (en) * 2009-04-03 2009-08-12 中国科学院研究生院 Weak software watermark method used for software configuration management
CN102651057A (en) * 2011-02-27 2012-08-29 孙星明 OOXML (office open extensible markup language)-based electronic document digital evidence collecting method and device thereof
CN103413204A (en) * 2013-08-22 2013-11-27 南通大学 Examination safety management method based on watermarks and workflow control
CN104657637A (en) * 2015-01-29 2015-05-27 深信服网络科技(深圳)有限公司 Document information embedding and tracking methods and systems and proxy service equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8493581B2 (en) * 2005-08-04 2013-07-23 Ricoh Company, Ltd. Electronic document having authentication function

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101504709A (en) * 2009-04-03 2009-08-12 中国科学院研究生院 Weak software watermark method used for software configuration management
CN102651057A (en) * 2011-02-27 2012-08-29 孙星明 OOXML (office open extensible markup language)-based electronic document digital evidence collecting method and device thereof
CN103413204A (en) * 2013-08-22 2013-11-27 南通大学 Examination safety management method based on watermarks and workflow control
CN104657637A (en) * 2015-01-29 2015-05-27 深信服网络科技(深圳)有限公司 Document information embedding and tracking methods and systems and proxy service equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《适用于电子图书版权保护的可逆可见水印方案》;姜明芳;《现代情报》;20140215;第58-61页 *

Also Published As

Publication number Publication date
CN106407820A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
CN106407820B (en) Method and system for preventing file from being tampered and leaked through watermark encryption
CN107423629B (en) Method and system for file information output anti-disclosure and tracing
US10839104B2 (en) Obfuscating information related to personally identifiable information (PII)
US8140857B2 (en) Method for selective encryption within documents
CN102999732B (en) Multi-stage domain protection method and system based on information security level identifiers
CN103268456B (en) Method and device for file safety control
CN103763313B (en) File protection method and system
CN101547199B (en) Electronic document safety guarantee system and method
US10970403B1 (en) Forensic investigation tool
TWI493950B (en) Conditional electric document right management system and method
US9608811B2 (en) Managing access to a secure digital document
CN107871081A (en) A kind of computer information safe system
CN108108632A (en) A kind of multifactor file watermark generation extracting method and system
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN112948870A (en) Electronic document security management method and management system based on big data
CN112989320B (en) User state management system and method for password equipment
US20220377056A1 (en) Securing confidential content in a virtual meeting
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN213122985U (en) PIS authentication system
CN102945354A (en) Information processing apparatus and data management method
CN111859423A (en) Information security encryption method and device
CN110086805B (en) Information security transmission method based on cross-domain distributed micro-service architecture
JP3984951B2 (en) Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium
CN117272358A (en) Data storage encryption method, device, electronic equipment and computer program product
CN115221546A (en) Safety data processing method and device for burning after use

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant