CN106407820B - Method and system for preventing file from being tampered and leaked through watermark encryption - Google Patents
Method and system for preventing file from being tampered and leaked through watermark encryption Download PDFInfo
- Publication number
- CN106407820B CN106407820B CN201610798622.2A CN201610798622A CN106407820B CN 106407820 B CN106407820 B CN 106407820B CN 201610798622 A CN201610798622 A CN 201610798622A CN 106407820 B CN106407820 B CN 106407820B
- Authority
- CN
- China
- Prior art keywords
- module
- document
- information
- filing
- leaked
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0201—Image watermarking whereby only tamper or origin are detected and no embedding takes place
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention provides a method and a system for preventing a file from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built file needs to be encrypted according to the requirement of a filing worker, and if the built file needs to be encrypted, performing a step 2; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The invention encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.
Description
Technical Field
The invention relates to the technical field of digital content security, in particular to a method and a system for preventing files from being tampered and leaked through watermark encryption.
Background
The rise of network platforms in the electronic era, network information systems are becoming business platforms for offices and institutions of people; becomes an important means for improving the service quality and reducing the operation cost. Particularly, as an environment and means for daily office work of an enterprise administrative organ, an office automation network almost relates to enterprise secret information or internal matters which are not easy to be disclosed, and the information is important contents which relate to enterprise security benefits and enterprise stability. Therefore, from the perspective of security work, while the office automation network is built, the security work of the office automation network is also enhanced practically, and a solid security protection system is established by paying attention to development and application of effective security measures. The existing encryption modes are all through complex encryption algorithms, and after the file is successfully decrypted, the file is difficult to carry out security control. When the same document is given to a plurality of people, the divulgence time of the questioning document, the divulgence personnel and even the divulgence computer can not be judged.
If the application number is: 200910083158.9 Chinese patent of invention discloses a system and method for securing electronic documents, which realizes security verification, authority control and log and document distribution by establishing an electronic document security system. But the electronic document is not transparently encrypted and decrypted, and the content of the electronic document has security holes such as copying and tampering. If the application number is as follows: 201110217836.3 discloses an electronic document security management system, which has the application numbers: 20121004114.6 discloses a method for safely distributing electronic documents based on multiple security protection mechanisms, which has the following application numbers: 201210411606.5 Chinese patent discloses an electronic document access control method based on security level identification, and the application number is: 201210299203.6A Chinese patent of invention discloses a multiple encryption and hierarchical management method for electronic documents, which realizes security authentication, authority control and asymmetric encryption and decryption of electronic documents. However, the encryption and decryption processes are not transparent, and users need to perform manual encryption and decryption processes on the document, which causes inconvenience to the users. The application numbers are: 201210154777.4 discloses a system and method for on-line separating and restoring document, which realizes security authentication, authority control and asymmetric encryption and decryption of electronic document. The existence of a 'separated storage area' is required, and the security of the 'separated storage area' becomes a weak link of the security of the whole electronic document.
In summary, in the prior art, no matter which method is independently adopted, different defects exist, the safety of the electronic document and the usability of user operation cannot be met, and document leakage cannot be traced.
disclosure of Invention
In order to solve the problems that the safety of an electronic document and the usability of user operation cannot be met, the document leakage cannot be traced and the like in the prior art, the invention provides a method and a system for preventing the document from being tampered and leaked through watermark encryption.
The specific technical scheme is as follows:
A method for preventing a file from being tampered and leaked through watermark encryption,
Step 1: judging whether the established document needs to be encrypted according to the requirements of the filing staff, and if so, performing the step 2;
step 2: acquiring information of a filing worker, including filing time and a filing IP;
And step 3: the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved;
And 4, step 4: the filing is completed and the entire document is displayed.
On the basis, the method also comprises the step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator.
on the basis, the method also comprises the step 6: and (5) extracting and tracing the operator information stored in the step (5).
The invention also provides a system for preventing the file from being tampered and leaked through the watermark encryption, which comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module, the document anti-tampering module and the document tracing module are sequentially connected, the security document establishing module is used for establishing the security document with the watermark encryption, the document anti-tampering module is used for preventing the document from being tampered or leaked after being established, and the document tracing module is used for tracing the document after the document is tampered or leaked.
On the basis, the security document establishing module comprises an inquiring module, a secret document establishing module and a non-secret document establishing module, wherein the inquiring module is connected with the secret document establishing module and the non-secret document establishing module, and the secret document establishing module and the non-secret document establishing module are respectively called according to the result of the inquiring module so as to establish a secret document and a non-secret document.
On the basis, the confidential document establishing module comprises a first extracting module, a first saving module and an encrypting module, wherein the first extracting module, the first saving module and the encrypting module are sequentially connected, the first extracting module is used for extracting the information of the filing personnel, including filing time and filing ID, the first saving module is used for saving the information extracted by the first extracting module, and the encrypting module is used for encrypting the information in the first saving module in a reversible mode and attaching the information to the bottom of the document.
On the basis, the secret document establishing module further comprises an emergency degree module, the emergency degree module is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step.
on the basis, the document anti-tampering module comprises a monitoring module, a matching module, a tampering module and a non-tampering module, wherein the monitoring module is used for monitoring whether tampering action exists, if the tampering action exists, the matching module is triggered, the matching module is used for matching information of an operator and information of a filing worker, if the tampering action exists, the non-tampering module is triggered, and otherwise, the tampering module is triggered.
On the basis, the tampering module comprises a second extraction module and a second storage module, the second extraction module is used for extracting the information of the operating personnel and storing the information in the second storage module, and the second storage module is synchronous with the operated document.
On this basis, the document tracing module comprises a first positioning module, a first decryption module, a second positioning module and a second decryption module, the first positioning module is connected with the first storage module, the first decryption module is used for decrypting the information of the document creation personnel in the first storage module, the second positioning module is connected with the second storage module, and the second decryption module is used for tracing the non-document creation personnel in the second storage module.
Compared with the prior art, the invention has the beneficial effects that:
1. The invention provides a method for preventing a file from being tampered and leaked through watermark encryption, which judges whether a built file needs to be encrypted according to the requirements of a filing worker, and if the built file needs to be encrypted, carries out a step 2; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks.
2. The method and the device provided by the invention have the advantages that whether the established document is tampered or leaked is monitored, such as actions of downloading, photographing and screen capturing, if the document is tampered or leaked, the information of the operator is stored, and when the document is suspected to be tampered or leaked, the information of the operator can be directly stored by the file for future tracing.
3. The first extraction module is used for extracting the information of the filing staff, including filing time and filing ID, the first storage module is used for storing the information extracted by the first extraction module, and the encryption module is used for encrypting the information in the first storage module in a reversible mode and attaching the information to the bottom of the document. And the watermark mode can be changed according to the urgency degree of the document so as to deepen the protection of the document and effectively prevent the document from being tampered.
4. The document tracing module comprises a first positioning module, a first decryption module, a second positioning module and a second decryption module, wherein the first decryption module is used for decrypting the information of the documenting personnel in the first storage module, and the second decryption module is used for tracing the non-documenting personnel in the second storage module. The method also comprises the step of tracing the tampering and the leakage of the document, wherein the information of a document builder is matched with the information of an operator, and if the matching is unsuccessful, the leaked document is directly traced through the second decryption module to form the tracking of the document, so that a solid security protection system is established.
Drawings
FIG. 1 is a flow chart illustrating a method for preventing a file from being tampered and leaked through watermark encryption according to the present invention;
FIG. 2 is a schematic structural diagram of a security document creation module in a system for preventing a file from being tampered and leaked through watermark encryption according to the present invention;
FIG. 3 is a schematic structural diagram of a document tamper-proof module in a system for preventing a document from being tampered and leaked through watermark encryption according to the present invention;
Fig. 4 is a schematic structural diagram of a document tracing module in a system for preventing a file from being tampered and leaked through watermark encryption according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
With the rise of network platforms in the electronic era, office automation networks are taken as basic means for daily office of administrative organs, and almost no exception is related to enterprise secret information, so that the invention discloses a method for preventing files from being tampered and leaked through watermark encryption, as shown in fig. 1, comprising the following steps:
Step 1: judging whether the created document needs to be encrypted according to the requirements of the filing staff, if so, performing the step 2, if not, judging the system to be a common document, and directly editing the document, wherein anyone can use and edit the document.
Step 2: the information of the filing staff is acquired, including the filing time and the filing IP, preferably, the specific filing staff information in the embodiment includes the login ID of the filing staff, the filing time, the ID of a filing tool and the like, which all belong to fixed attributes that are not changeable, and are a favorable means for preventing the document from being stolen, and the whole document includes all the information of the filing staff, so that whether the document is leaked or not can be effectively judged, and the document can be effectively prevented from being leaked through modes such as screen capturing, photographing and downloading and through a PS (packet switched).
and step 3: the obtained information of the person who creates the file is encrypted in a reversible way and the whole file is paved, preferably, in this embodiment, the information of the person who creates the file is encrypted in a watermark encryption way, and the information is attached to the bottom of the document in a watermark way, and different shading chromaticities can be configured, and the depth of the watermark shading can be controlled.
And 4, step 4: the filing is completed and the entire document is displayed. The invention realizes the encryption, decryption and tracing of the whole form based on the TRUE file form, and the document with the watermark is the encrypted document, which can be visually displayed to the user, and is simple and clear.
As shown in fig. 1, the present embodiment further includes step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator. The method and the device provided by the invention have the advantages that whether the established document is tampered or leaked is monitored, and when the document is suspected to be tampered or leaked, the information of an operator can be directly stored by the document for future tracing.
As shown in fig. 1, this embodiment further includes step 6: and (5) extracting and tracing the operator information stored in the step (5). The invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks.
The invention also discloses a system for preventing a file from being tampered and leaked through watermark encryption, which comprises a security document establishing module 1, a document anti-tampering module 2 and a document tracing module 3, wherein the security document establishing module 1, the document anti-tampering module 2 and the document tracing module 3 are sequentially connected, the security document establishing module 1 is used for establishing a security document with watermark encryption, the document anti-tampering module 2 is used for preventing the document from being tampered or leaked after being established, and the document tracing module 3 is used for tracing the document after the document is tampered or leaked.
As shown in fig. 2, the security document creating module 1 in this embodiment includes an inquiry module 11, a confidential document creating module 111, and a non-confidential document creating module 112, where the inquiry module 11 is connected to both the confidential document creating module 111 and the non-confidential document creating module 112, and calls the confidential document creating module 111 and the non-confidential document creating module 112 respectively according to the result of the inquiry module 11 to create a confidential document and a non-confidential document, and when a user selects to create a non-confidential document system, i.e. determines a document as a normal document, the document can be edited directly, and any person can use and edit the document, which indicates that the document is suitable for circulation. The confidential document establishing module 111 includes a first extracting module 1111, a first saving module 1112 and an encrypting module 1113, the first extracting module 1111, the first saving module 1112 and the encrypting module 1113 are sequentially connected, the first extracting module 1111 is used for extracting the information of the document-creating person, including the document-creating time and the document-creating ID, the specific document-creating person information in the embodiment includes the login ID of the document-creating person, the document-creating time, the ID of the document-creating tool and the like, which all belong to fixed attributes that are not changeable, which is a favorable means for preventing the document from being stolen, and the whole document includes all the information of the document-creating person, which can effectively judge whether the document is leaked, and can effectively prevent the document from being leaked through screen capture, photographing and downloading and through PS and the like. The first saving module 1112 is configured to save the information extracted by the first extracting module 1111, and the encrypting module 1113 is configured to encrypt the information in the first saving module 1112 in a reversible manner and attach the information to the bottom of the document. The classified document establishing module 111 further comprises an urgency module 1114, wherein the urgency module 1114 is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step. The first extraction module 1111 of the present invention is configured to extract information of a document creator, including a document creation time and a document creation ID, the first storage module 1112 is configured to store the information extracted by the first extraction module 1111, and the encryption module 1113 is configured to encrypt the information in the first storage module 1112 in a reversible manner and attach the information to the bottom of the document. And the watermark mode can be changed according to the urgency degree of the document so as to deepen the protection of the document and effectively prevent the document from being tampered. For example, different shading chromaticities are configured, the depth of the watermark shading and the area of the full file are controlled, and the more special and more dense the watermark mode is, the more the file can be effectively prevented from being tampered.
As shown in fig. 3, the document tamper-proofing module 2 in this embodiment includes a monitoring module 21, a matching module 22, a tampering module 221, and a non-tampering module 222, where the monitoring module 21 is configured to monitor whether a tampering action exists, if it is monitored that the tampering action exists, the matching module 22 is triggered, the matching module 22 is configured to match information of an operator and information of a filing staff, if the tampering action is consistent with the information of the filing staff, the non-tampering module 222 is triggered, and otherwise, the tampering module 221 is triggered. The tampering module 221 includes a second extracting module 2221 and a second saving module 2222, where the second extracting module 2221 is configured to extract the operator information and save the operator information in the second saving module 2222, and the second saving module 2222 is synchronized with the operated document.
As shown in fig. 4, the document tracing back module 3 in this embodiment includes a first positioning module 31, a first decryption module 32, a second positioning module 33, and a second decryption module 34, where the first positioning module 31 is connected to the first storage module 1112, the first decryption module 32 is configured to decrypt the information of the person who creates the file in the first storage module 1112, the second positioning module 33 is connected to the second storage module 2222, and the second decryption module 34 is configured to track the person who does not create the file in the second storage module 2222, and when the document is tampered or leaked, the information of the operator is stored, and the tracking is performed according to the information of the operator.
the advantages of the invention are as follows: the invention can encrypt the document in a pertinence way, is more humanized, and can effectively prevent the document from being tampered and leaked because the document is not full of watermarks. In addition, the method can trace the document tampering and leakage, firstly, information of a document builder is matched with information of an operator, and if the matching is unsuccessful, the leaked document is directly traced through the second decryption module 34 to form tracking on the document, so that a solid security protection system is established.
while the foregoing description shows and describes the preferred embodiments of the present invention, it is to be understood that the invention is not limited to the forms disclosed herein, but is not to be construed as excluding other embodiments and is capable of use in various other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as described herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A method for preventing files from being tampered and leaked through watermark encryption is characterized in that:
Step 1: judging whether the established document needs to be encrypted according to the requirements of the filing staff, and if so, performing the step 2;
Step 2: acquiring information of a filing worker, including filing time and a filing IP;
And step 3: the acquired information of the filing staff is encrypted in a reversible way, the whole file is paved, the information of the filing staff is encrypted in a watermark encryption way, the information is attached to the bottom of the file in a watermark way, different shading chromaticities can be configured, and the depth of the watermark shading can be controlled;
and 4, step 4: the filing is completed and the entire document is displayed.
2. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 1, wherein: further comprising the step 5: monitoring whether the established document is tampered or leaked, such as downloading, photographing and screen capturing actions, and if the established document is tampered or leaked, storing the information of an operator.
3. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 1, wherein: further comprising the step 6: and (5) extracting and tracing the operator information stored in the step (5).
4. A system for preventing files from being tampered and leaked through watermark encryption is characterized in that: the system comprises a security document establishing module (1), a document anti-tampering module (2) and a document tracing module (3), wherein the security document establishing module (1), the document anti-tampering module (2) and the document tracing module (3) are sequentially connected, the security document establishing module (1) is used for establishing a security document with watermark encryption, the document anti-tampering module (2) is used for preventing a document from being tampered or leaked after being established, and the document tracing module (3) is used for tracing the document after the document is tampered or leaked; the document anti-tampering module (2) comprises a monitoring module (21), a matching module (22), a tampering module (221) and a non-tampering module (222), wherein the monitoring module (21) is used for monitoring whether tampering action exists, if the tampering action exists, the matching module (22) is triggered, the matching module (22) is used for matching information of an operator and information of a filing worker, if the information of the operator is consistent with the information of the filing worker, the non-tampering module (222) is triggered, and if the information of the filing worker is not consistent with the information of the filing worker, the tampering module (221) is triggered; the tampering module (221) comprises a second extraction module (2221) and a second saving module (2222), wherein the second extraction module (2221) is used for extracting the operator information and saving the operator information in the second saving module (2222), and the second saving module (2222) is synchronous with the operated document.
5. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the security document establishing module (1) comprises an inquiry module (11), a secret document establishing module (111) and a non-secret document establishing module (112), wherein the inquiry module (11) is connected with the secret document establishing module (111) and the non-secret document establishing module (112), and the secret document establishing module (111) and the non-secret document establishing module (112) are respectively called according to the result of the inquiry module (11) to establish a secret document and a non-secret document.
6. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 5, wherein: the confidential document establishing module (111) comprises a first extracting module (1111), a first storing module (1112) and an encrypting module (1113), wherein the first extracting module (1111), the first storing module (1112) and the encrypting module (1113) are sequentially connected, the first extracting module (1111) is used for extracting the information of the document-building personnel, including the document-building time and the document-building ID, the first storing module (1112) is used for storing the information extracted by the first extracting module (1111), and the encrypting module (1113) is used for encrypting the information in the first storing module (1112) in a reversible mode and attaching the information to the bottom of the document.
7. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 6, wherein: the classified document establishing module (111) further comprises an emergency degree module (1114), the emergency degree module (1114) is provided with a general mode, an emergency mode and an emergency mode, and watermark encryption modes corresponding to the modes are increased step by step.
8. The system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the document anti-tampering module (2) comprises a monitoring module (21), a matching module (22), a tampering module (221) and a non-tampering module (222), wherein the monitoring module (21) is used for monitoring whether tampering action exists, if the tampering action exists, the matching module (22) is triggered, the matching module (22) is used for matching information of an operator and information of a filing staff, if the information of the filing staff is consistent with the information of the filing staff, the non-tampering module (222) is triggered, and if the information of the filing staff is not consistent with the information of the filing staff, the tampering module (221) is triggered.
9. The system for preventing file from being tampered and leaked through watermark encryption according to claim 8, wherein: the tampering module (221) comprises a second extraction module (2221) and a second saving module (2222), the second extraction module (2221) is used for extracting the information of the operator and saving the information in the second saving module (2222), and the second saving module (2222) is synchronous with the operated document.
10. the system for preventing the file from being tampered and leaked through the watermark encryption according to claim 4, wherein: the document tracing module (3) comprises a first positioning module (31), a first decryption module (32), a second positioning module (33) and a second decryption module (34), the first positioning module (31) is connected with a first storage module (1112), the first decryption module (32) is used for decrypting the filing personnel information in the first storage module (1112), the second positioning module (33) is connected with a second storage module (2222), and the second decryption module (34) is used for tracking non-filing personnel in the second storage module (2222).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610798622.2A CN106407820B (en) | 2016-08-31 | 2016-08-31 | Method and system for preventing file from being tampered and leaked through watermark encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610798622.2A CN106407820B (en) | 2016-08-31 | 2016-08-31 | Method and system for preventing file from being tampered and leaked through watermark encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106407820A CN106407820A (en) | 2017-02-15 |
CN106407820B true CN106407820B (en) | 2019-12-10 |
Family
ID=58002104
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610798622.2A Active CN106407820B (en) | 2016-08-31 | 2016-08-31 | Method and system for preventing file from being tampered and leaked through watermark encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106407820B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018176176A1 (en) * | 2017-04-01 | 2018-10-04 | 福建福昕软件开发股份有限公司 | Method for automatically giving alarm after encrypted document is leaked |
CN109145632A (en) * | 2017-06-28 | 2019-01-04 | 北京京东尚科信息技术有限公司 | For generating the method and device of traceable file |
CN107451947A (en) * | 2017-08-03 | 2017-12-08 | 武汉远众科技有限公司 | A kind of enhancing evidence collection method based on picture watermark |
CN108108632A (en) * | 2017-11-30 | 2018-06-01 | 中车青岛四方机车车辆股份有限公司 | A kind of multifactor file watermark generation extracting method and system |
CN108985081B (en) * | 2018-07-06 | 2022-02-01 | 泰康保险集团股份有限公司 | Watermark encryption method, device, medium and electronic equipment |
CN110489945B (en) * | 2019-07-26 | 2021-03-30 | 山东科技大学 | Resume information protection and divulgence tracing method |
CN113704828A (en) * | 2020-05-22 | 2021-11-26 | 永中软件股份有限公司 | System and method for preventing file from being tampered and leaked through watermark encryption |
CN114285669A (en) * | 2021-12-31 | 2022-04-05 | 深圳昂楷科技有限公司 | Watermark embedding method for embedding application system plug-in |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101504709A (en) * | 2009-04-03 | 2009-08-12 | 中国科学院研究生院 | Weak software watermark method used for software configuration management |
CN102651057A (en) * | 2011-02-27 | 2012-08-29 | 孙星明 | OOXML (office open extensible markup language)-based electronic document digital evidence collecting method and device thereof |
CN103413204A (en) * | 2013-08-22 | 2013-11-27 | 南通大学 | Examination safety management method based on watermarks and workflow control |
CN104657637A (en) * | 2015-01-29 | 2015-05-27 | 深信服网络科技(深圳)有限公司 | Document information embedding and tracking methods and systems and proxy service equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8493581B2 (en) * | 2005-08-04 | 2013-07-23 | Ricoh Company, Ltd. | Electronic document having authentication function |
-
2016
- 2016-08-31 CN CN201610798622.2A patent/CN106407820B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101504709A (en) * | 2009-04-03 | 2009-08-12 | 中国科学院研究生院 | Weak software watermark method used for software configuration management |
CN102651057A (en) * | 2011-02-27 | 2012-08-29 | 孙星明 | OOXML (office open extensible markup language)-based electronic document digital evidence collecting method and device thereof |
CN103413204A (en) * | 2013-08-22 | 2013-11-27 | 南通大学 | Examination safety management method based on watermarks and workflow control |
CN104657637A (en) * | 2015-01-29 | 2015-05-27 | 深信服网络科技(深圳)有限公司 | Document information embedding and tracking methods and systems and proxy service equipment |
Non-Patent Citations (1)
Title |
---|
《适用于电子图书版权保护的可逆可见水印方案》;姜明芳;《现代情报》;20140215;第58-61页 * |
Also Published As
Publication number | Publication date |
---|---|
CN106407820A (en) | 2017-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106407820B (en) | Method and system for preventing file from being tampered and leaked through watermark encryption | |
CN107423629B (en) | Method and system for file information output anti-disclosure and tracing | |
US10839104B2 (en) | Obfuscating information related to personally identifiable information (PII) | |
US8140857B2 (en) | Method for selective encryption within documents | |
CN102999732B (en) | Multi-stage domain protection method and system based on information security level identifiers | |
CN103268456B (en) | Method and device for file safety control | |
CN103763313B (en) | File protection method and system | |
CN101547199B (en) | Electronic document safety guarantee system and method | |
US10970403B1 (en) | Forensic investigation tool | |
TWI493950B (en) | Conditional electric document right management system and method | |
US9608811B2 (en) | Managing access to a secure digital document | |
CN107871081A (en) | A kind of computer information safe system | |
CN108108632A (en) | A kind of multifactor file watermark generation extracting method and system | |
CN107426223A (en) | Cloud file encryption and decryption method, encryption and decryption device and processing system | |
CN112948870A (en) | Electronic document security management method and management system based on big data | |
CN112989320B (en) | User state management system and method for password equipment | |
US20220377056A1 (en) | Securing confidential content in a virtual meeting | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN213122985U (en) | PIS authentication system | |
CN102945354A (en) | Information processing apparatus and data management method | |
CN111859423A (en) | Information security encryption method and device | |
CN110086805B (en) | Information security transmission method based on cross-domain distributed micro-service architecture | |
JP3984951B2 (en) | Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium | |
CN117272358A (en) | Data storage encryption method, device, electronic equipment and computer program product | |
CN115221546A (en) | Safety data processing method and device for burning after use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |