CN107995195A - A kind of document security reading method and system based on mobile equipment - Google Patents

A kind of document security reading method and system based on mobile equipment Download PDF

Info

Publication number
CN107995195A
CN107995195A CN201711255261.8A CN201711255261A CN107995195A CN 107995195 A CN107995195 A CN 107995195A CN 201711255261 A CN201711255261 A CN 201711255261A CN 107995195 A CN107995195 A CN 107995195A
Authority
CN
China
Prior art keywords
document
reader
module
server
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711255261.8A
Other languages
Chinese (zh)
Inventor
谭国联
王志海
喻波
吴宏毅
安鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN201711255261.8A priority Critical patent/CN107995195A/en
Publication of CN107995195A publication Critical patent/CN107995195A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of document security reading method based on mobile equipment and system, this method to comprise the following steps:Mobile equipment receives document to be read;Reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;Judge whether the document is encrypted document, whether can be matched if judging the level of confidentiality of the document with the level of confidentiality in the subscriber policy, if successful match, utilize secret key decryption the document in system strategy;Successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows.With this solution, convenience and the security that document is read, edits, sharing are improved.

Description

A kind of document security reading method and system based on mobile equipment
Technical field
The present invention relates to data security arts, and in particular to a kind of document security reading method based on mobile equipment and is System.
Background technology
With the arrival of information age, people become rich and varied to the mode of acquisition of information, and the reading of document is by tradition The mode for being read to obtain using newpapers and periodicals, books, be progressively changed into electronic reading, but due to the factor such as be busy with one's work Limitation, most of user can not carry PC whenever and wherever possible and carry out document information reading, so the electronic reading in mobile equipment exists Solve the problems, such as that people spend reading comfort to a greater extent, this comfort level is not only easy to carry, more can be anywhere or anytime Read, just because of this easily mode, the safety problem of data message leakage also more and more emerges, with society The development of the platforms such as friendship, for enterprises document, individual privacy document, there is the security risk for being transmitted leakage, for existing The problem of shape, document information is read safely, is urgently to be resolved hurrily.
There is a kind of technology " a kind of reading system and method for encrypting file " in the prior art, which includes " main service Device ", " region server ", " reader ", realizes encrypted document read function.The strategy control that the technology is issued based on server System, realizes a kind of ciphertext reader for carrying out document encryption and decryption functions.
The specific implementation of the technology is as follows:
1. each region server is communicated to connect with master server, also it is connected with more than one reader communication;
2. the region server that reader is connected to it sends the application information for reading encryption file, the regional service is utilized Encryption file is decrypted in the authorization message that device returns, and opens the obtained decryption file of decryption;
3. region server judges that received application information is then by this application whether from the reader itself authorized Information is sent to master server, and the authorization message that master server is returned is sent to the reader, otherwise, this application is not believed Breath is sent to master server;
4. master server judges that received application information is Ze Xianggai areas whether from the region server itself authorized Domain server sends authorization message, otherwise, does not send authorization message to the region server.
The prior art has the following disadvantages:
1. the reader can only decrypt the ciphertext that corresponding server issues, cause reader data source single;
2. the reader cannot set logon account, it is impossible to by the strategy that server issues to corresponding logon account, It can not achieve the control for carrying out point-to-point document decryption;
3. the reader cannot carry out documents editing, and the document of editor is carried out corresponding encryption, pass through social platform The document data transfer function of safety is carried out, it is single to cause reader functionality.
Nowadays in the epoch of network rapid development, while bringing benefit, drawback is also obvious all the more.With the quick of network Development, the propagation platform of data message is abundant all the more, and more quickly, but private data information is transmitted the safety of leakage and asks at the same time Topic, is also increasingly taken seriously.
The content of the invention
In order to solve the above technical problems, the present invention provides a kind of document security reading method based on mobile equipment, should Method comprises the following steps:
1) mobile equipment receives document to be read;
2) reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;
3) judge whether the document is encrypted document, if it is, step 4) is jumped to, if it is not, then jumping to step It is rapid 5);
4) whether judge the level of confidentiality of the document can match with the level of confidentiality in the subscriber policy, if successful match, Using secret key decryption the document in system strategy, step 6) is otherwise jumped to;
5) successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows;
6) terminate.
According to an embodiment of the invention, it is preferred that need to create reader logon account in server end, and to the account Level of confidentiality and key are generated, reader is handed down to by subscriber policy and system strategy respectively.
According to an embodiment of the invention, it is preferred that in the step 1), mobile equipment, which receives, passes through third party's social platform Or the document that mail is shared.
According to an embodiment of the invention, it is preferred that, can be to this article after being shown in the step 5) to document progress plaintext Shelves share third party's social platform into edlin after the document after to editor is encrypted;
The encryption key comes from system strategy.
According to an embodiment of the invention, it is preferred that in the step 2), if logged on success, then server returns to user Strategy and system strategy, otherwise jump to step 6).
In order to solve the above technical problems, the present invention provides a kind of document security reading system, it is characterised in that the system Including server, mobile equipment;
The server includes account management module, policy management module;
The movement equipment is provided with a reader, and the reader includes account authentication module, tactful acquisition module, document Encryption/decryption module, file display module;
The reader receives document to be read;
The reader initiates logging request, the account management module pair of server by account authentication module to server Logon account certification returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from The system strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to decryption failure Document carries out ciphertext and shows.
According to an embodiment of the invention, it is preferred that server end creates reader logon account by account management module, And level of confidentiality and key are generated to the account, reader is handed down to by subscriber policy and system strategy respectively.
According to an embodiment of the invention, it is preferred that the system further includes:Document Editing module and sharing files module;
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social activity Platform.
According to an embodiment of the invention, it is preferred that for the logging request of reader, server passes through account management module To logon account certification success, then subscriber policy and system strategy are returned to, otherwise the result of return authentication failure.
In order to solve the above technical problems, the present invention provides a kind of mobile equipment, it includes computer-readable recording medium And computer processor unit, the media storage have computer program, which is performed by the computer processor unit Sequence realizes one of above-mentioned method.
By technical scheme, following technique effect is achieved:
(1. can receive the document information shared from various social platforms, no matter the document data of ciphertext or plaintext It can carry out access by this reader to go forward side by side edlin, data source is rich and varied;
2. can communicate with server, logon account is set, it is real for the logon account, server distributing policy Existing point-to-point document encryption and decryption control;
3. documents editing can be carried out, and document is encrypted using corresponding level of confidentiality, is pacified by social platform Full document data transfer function, enjoying, network by now is fast-developing, not only so that data information transfer is quicker, but also protects Safety problem of the private data information in transmitting procedure is demonstrate,proved.
Brief description of the drawings
Fig. 1 is the system architecture diagram of the prior art.
Fig. 2 is the method flow diagram of the prior art.
Fig. 3 is the system architecture diagram of the present invention.
The safety that Fig. 4 is the present invention reads key technology flow chart.
Fig. 5 is the safe reading method flow chart of the present invention.
Embodiment
In the present invention, mobile equipment refers to refer in particular to smart mobile phone or tablet computer in this document;Reader, is a kind of people Quick, the practical document reading software or program of mobile reading are carried out, (this program or software can on the mobile apparatus for operation Freely to read document content, a variety of file formats are supported, while can carry out edit and storage to file, the function such as share);Visitor The reader in mobile equipment is refered in particular at family end, and in the present invention, client is reader.
<Protected view system framework>
Such as Fig. 3, the system integrally includes client and server
Client is divided into:Be divided into account authentication module, tactful acquisition module, document encryption/decryption module, documents editing module, Document sharing module, has five modules altogether.As needed, a file display module (being not shown) can also be increased
The reader receives document to be read;
The reader initiates logging request, the account management module pair of server by account authentication module to server Logon account certification returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from The system strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to decryption failure Document carries out ciphertext and shows.
Server end creates reader logon account by account management module, and generates level of confidentiality and key to the account, Reader is handed down to by subscriber policy and system strategy respectively.
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social activity Platform.
As shown in figure 4, server is successful to logon account certification by account management module, then subscriber policy is returned with being The result of system strategy, otherwise return authentication failure.
Created an account in server console, and carry out tactful establishment, setting will carry out document the level of confidentiality of encryption and decryption, clothes Business device oneself generation key, issues level of confidentiality, system strategy issues the mode of key to destiny account, and sets life with subscriber policy Effect, equally in console, it is also possible that the corresponding strategy fails of the user;
, it is necessary to be logged in using the account that console creates after client terminal start-up, and the strategy that server issues is updated, It is saved in local;
Client has document encryption and decryption functions, if encrypted document is obtained from other sources, can pass through social activity The more of platform apply opening function or sharing function, have directly adjusted ciphertext reader, cryptograph files are passed in reader;
Reader obtains level of confidentiality present in ciphertext, and it is corresponding close that the level of confidentiality is matched in the subscriber policy locally preserved Key, carries out document decryption and checks;
If document decryption failure is locally still shown without corresponding level of confidentiality, document with ciphertext, if there is right The level of confidentiality answered, then using corresponding key, be decrypted, accomplish it is point-to-point between document encryption and decryption functions;
, can be to document into edlin in reader, or create new document, can be by more after editor More applications are opened, and are shared in the movement equipment, are supported that the application of the reader sharing function is inner, but before sharing, text Shelves can be equally encrypted, even if being transmitted by people's malice, also be can only see ciphertext, be ensure that security of the document in transmitting procedure Problem.
Wherein the system realizes that the innovative point included is:
1. console can add account, and encryption and decryption strategy is created to the account, server generation counterpart keys, issue To specified user;
2. during client terminal start-up, being interacted with server, obtain or update relative strategy, be saved in local, be required for taking Business device responds;
3. reader is supported to share with being shared third-party application social platform function;
4. reader supports document creation editting function, before editor's completion is shared, the operation of automated execution file encryption.
<Safe reading method>
Such as Fig. 5, the present invention provides a kind of safety moving method based on mobile equipment, this method comprises the following steps:
1. console creates an account, and issues the account corresponding file encryption-decryption strategy, level of confidentiality and key are generated, is led to Cross subscriber policy and system strategy issues;
2. file is shared to ciphertext reader by third party's social platform or mail, the number as the ciphertext reader According to source;
3. entering ciphertext reader, interacted with server, there is the certification login process of complete set;
4. after logining successfully, being interacted with server, subscriber policy and system strategy that server issues are obtained;
5. the document data shared using third party, determines whether encryption data, if encryption data, then text is obtained Corresponding level of confidentiality in shelves, matches the secret level in local user's strategy, if non-encrypted data, directly carries out content and shows;
7. if after matching the level of confidentiality in subscriber policy, counterpart keys are obtained from system strategy, carry out document solution Close operation, if level of confidentiality can not be matched in subscriber policy, proves that the account haves no right that ciphertext is decrypted, and accomplishes a little pair Document encryption and decryption control between point;
8. if successful decryption, carries out plaintext and shows, if decryption failure, is shown with ciphertext form;
9. if, can also be social flat by sharing third party to the document into after the completion of edlin or new document Platform, but the file shared away is encrypted by corresponding key, is shared with ciphertext form before sharing operation is performed Transmission, ensures the security of data information transfer.
By technical scheme, following technique effect can be obtained:
1. the file for the social platform that third party's support is shared can be received, data source is more abundant;
2. controlled by console distributing policy, accomplish it is point-to-point between the control of document encryption and decryption;
3. reader can not only carry out document preview, while can carry out documents editing and share, before sharing, meeting Automatically operation is encrypted in document, ensures security of the file in network transmission process, prevent personal or company's privacy The risk of information leakage.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvement for being made etc., should all protect the guarantor in the present invention Within the scope of shield.

Claims (10)

1. a kind of document security reading method based on mobile equipment, it is characterised in that this method comprises the following steps:
1) mobile equipment receives document to be read;
2) reader initiates logging request to server, and obtains the subscriber policy and system strategy of server return;
3) judge whether the document is encrypted document, if it is, step 4) is jumped to, if it is not, then jumping to step 5);
4) whether can with level of confidentiality in the subscriber policy match, if successful match, utilize if judging the level of confidentiality of the document Secret key decryption the document in system strategy, otherwise jumps to step 6);
5) successful decryption, then carry out plaintext to document and show, otherwise carrying out ciphertext to document shows;
6) terminate.
2. according to the method described in claim 1, it is necessary to which creating reader in server end logs in account before the step 1) Family, and level of confidentiality and key are generated to the account, reader is handed down to by subscriber policy and system strategy respectively.
3. according to the method described in claim 1, in the step 1), mobile equipment receive by third party's social platform or The document that mail is shared.
4. according to the method described in claim 1, carried out in the step 5) to document after plaintext shows, can to the document into Edlin, shares third party's social platform after the document after to editor is encrypted;
The encryption key comes from system strategy.
5. according to the method described in claim 1, in the step 2), if logged on success, then server returns to subscriber policy With system strategy, step 6) is otherwise jumped to.
6. a kind of document security reading system, it is characterised in that the system includes server, mobile equipment;
The server includes account management module, policy management module;
The movement equipment is provided with a reader, and the reader includes account authentication module, tactful acquisition module, document and adds solution Close module, file display module;
The reader receives document to be read;
The reader initiates logging request by account authentication module to server, and the account management module of server is to logging in Account authentication returns to subscriber policy and system strategy by rear, from policy management module to reader;
The tactful acquisition module of the reader receives the subscriber policy and system strategy returned;
The document encryption/decryption module is matched the level of confidentiality of the document with the level of confidentiality in the subscriber policy, and from described System strategy obtains corresponding key, and document is decrypted using the key;
The file display module carries out plaintext to the document of successful decryption or non-encrypted document and shows, to the document of decryption failure Ciphertext is carried out to show.
7. system according to claim 6, server end creates reader logon account by account management module, and right The account generates level of confidentiality and key, is handed down to reader by subscriber policy and system strategy respectively.
8. according to the method described in claim 6, the system further includes:Document Editing module and sharing files module;
By Document Editing module to the document of successful decryption or non-encrypted document into edlin;
By the sharing files module, the encrypted document of the encryption/decryption module will be passed through, share third party's social platform.
9. system according to claim 6, for the logging request of reader, server is by account management module to stepping on Account authentication success is recorded, then returns to subscriber policy and system strategy, otherwise the result of return authentication failure.
10. a kind of mobile equipment, it includes computer-readable recording medium and computer processor unit, which has calculating Machine program, performs the computer program by the computer processor unit and realizes such as the method for one of claim 1-5.
CN201711255261.8A 2017-12-02 2017-12-02 A kind of document security reading method and system based on mobile equipment Pending CN107995195A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711255261.8A CN107995195A (en) 2017-12-02 2017-12-02 A kind of document security reading method and system based on mobile equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711255261.8A CN107995195A (en) 2017-12-02 2017-12-02 A kind of document security reading method and system based on mobile equipment

Publications (1)

Publication Number Publication Date
CN107995195A true CN107995195A (en) 2018-05-04

Family

ID=62035197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711255261.8A Pending CN107995195A (en) 2017-12-02 2017-12-02 A kind of document security reading method and system based on mobile equipment

Country Status (1)

Country Link
CN (1) CN107995195A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109597976A (en) * 2018-10-11 2019-04-09 阿里巴巴集团控股有限公司 A kind of document edit method and device
CN111340459A (en) * 2020-03-25 2020-06-26 江苏安泰信息科技发展有限公司 Evaluation report management system and operation method for safety production and occupational health

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5633932A (en) * 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
CN101877692A (en) * 2009-04-30 2010-11-03 深圳市汉拓科技有限公司 Method and system for encryption-decryption and security management for file
CN102611732A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework
CN103679050A (en) * 2013-12-31 2014-03-26 中国电子科技集团公司第三研究所 Security management method for enterprise-level electronic documents
US20170264432A1 (en) * 2015-09-25 2017-09-14 Eliot Horowitz Systems and methods for hierarchical key management in encrypted distributed databases

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5633932A (en) * 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
CN101877692A (en) * 2009-04-30 2010-11-03 深圳市汉拓科技有限公司 Method and system for encryption-decryption and security management for file
CN102611732A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework
CN103679050A (en) * 2013-12-31 2014-03-26 中国电子科技集团公司第三研究所 Security management method for enterprise-level electronic documents
US20170264432A1 (en) * 2015-09-25 2017-09-14 Eliot Horowitz Systems and methods for hierarchical key management in encrypted distributed databases

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109597976A (en) * 2018-10-11 2019-04-09 阿里巴巴集团控股有限公司 A kind of document edit method and device
CN111340459A (en) * 2020-03-25 2020-06-26 江苏安泰信息科技发展有限公司 Evaluation report management system and operation method for safety production and occupational health

Similar Documents

Publication Publication Date Title
US6185308B1 (en) Key recovery system
CN104113534B (en) The login system and method for application APP
CN103428221B (en) Safe login method, system and device to Mobile solution
US20080097923A1 (en) Method and apparatus for providing digital rights management content and license, and method and apparatus for using digital rights management content
IL159295A0 (en) Authentication of a user across communication sessions
CN107918731A (en) Method and apparatus for controlling the authority to access to open interface
CN105956496A (en) Security and secrecy method for sharing storage files
CN104917807A (en) Resource transfer method, apparatus and system
JP2010113462A (en) Information management apparatus, information processing system, information management method, and information management program
CN109150800A (en) Login access method, system and storage medium
CN112651049B (en) Privacy data sharing method and system based on block chain
JP4883698B2 (en) Key distribution method and system
CN114006736A (en) Instant communication message protection system and method based on hardware password equipment
CN114500069A (en) Method and system for storing and sharing electronic contract
CN107995195A (en) A kind of document security reading method and system based on mobile equipment
KR20200037508A (en) System and method of providing anonymity message service using block chain
CN109740319A (en) Digital identity verification method and server
CN107566119A (en) A kind of guard method of eSIM cards data safety and system
CN107104888A (en) A kind of safe instant communicating method
CN111181905A (en) File encryption method and device
CN109274690A (en) Group&#39;s data ciphering method
CN103929722A (en) Short message encryption method and system
JPH11212850A (en) Encipherment common file transmission and reception system
CN113422757B (en) Document management system based on encryption application
CN116546500B (en) Terminal capability identification method, system, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504