CN112100685A - Encryption and tamper-proof processing method for checking and detecting electronic report - Google Patents

Encryption and tamper-proof processing method for checking and detecting electronic report Download PDF

Info

Publication number
CN112100685A
CN112100685A CN202010796881.8A CN202010796881A CN112100685A CN 112100685 A CN112100685 A CN 112100685A CN 202010796881 A CN202010796881 A CN 202010796881A CN 112100685 A CN112100685 A CN 112100685A
Authority
CN
China
Prior art keywords
electronic
seal
electronic report
file
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010796881.8A
Other languages
Chinese (zh)
Inventor
陈炜美
吴周立
李洁婷
吴潮标
郑海珍
刘懿
邓泽海
张驰
李璐嘉
周恺
谢惠筠
陈雪良
彭凯琳
陈梓德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Inspection and Research Institute of Special Equipment Zhuhai Inspection Institute
Original Assignee
Guangdong Inspection and Research Institute of Special Equipment Zhuhai Inspection Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Inspection and Research Institute of Special Equipment Zhuhai Inspection Institute filed Critical Guangdong Inspection and Research Institute of Special Equipment Zhuhai Inspection Institute
Priority to CN202010796881.8A priority Critical patent/CN112100685A/en
Publication of CN112100685A publication Critical patent/CN112100685A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Artificial Intelligence (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a technical scheme for verifying and detecting an encryption and tamper-proof processing method of an electronic report, which comprises the following steps: generating corresponding electronic report files by the inspection and detection data according to the template; detecting an electronic seal of the electronic report file, and executing the stamping of a perforation seal; calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after the verification is finished; and sending the encrypted and anti-falsified electronic report file to a corresponding user in an electronic mail or internet push mode. The invention has the beneficial effects that: the special equipment inspection and detection field sets an electronic perforation seal and an electronic seal for an electronic report in a product thereof, so that important documents are protected; a method for setting a perforation seal on an electronic report, wherein the signature of each page not only protects the content of the page; and performing anti-counterfeiting authentication on each page of the product and finally realizing CA authentication.

Description

Encryption and tamper-proof processing method for checking and detecting electronic report
Technical Field
The invention relates to the field of computers, in particular to an encryption and tamper-proof processing method for detecting an electronic report.
Background
With the popularization of the Internet and the rapid development of various electronic commerce activities and electronic government activities, electronic signatures are widely applied to various fields, wherein electronic signatures are applied to the field of special equipment inspection and detection to realize the 'Internet + government affairs' increasingly bloom. But the seamless connection between the paper version signature and the electronic version signature can be solved more truly, and no first case exists.
In order to guarantee authenticity, integrity, confidentiality and non-repudiation of the electronic official document, in practical application, a paper version signature does not need to be stamped at a signature position, a plurality of pages of a paper document need to be stamped with a physical seal together, each page is only stamped with one part of the physical seal, the plurality of pages are combined to obtain a complete physical seal, and therefore a certain page or certain pages of the document is guaranteed not to be replaced. A stamp stamped in this manner is generally referred to as a jotting stamp.
The daily electronic signature is popularized and applied to electronic books, company reports, electronic official documents, electronic invoices and the like, and the file format adopted by the batch of electronic data is a PDF format, which is an ideal document format for electronic report issuing and digital information transmission on the Internet.
Although many current software supports electronic signature on PDF, for some important documents, a common seal needs to be applied to multiple pages of a paper document to ensure that some pages of the document are not replaced, and the solution in the field is not clear.
Disclosure of Invention
The invention aims to solve at least one of the technical problems in the prior art and provides an encryption and anti-tampering processing method for checking and detecting an electronic report, which ensures the authenticity, safety and integrity of the checked and detected electronic report stored in a server.
The technical scheme of the invention comprises an encryption and tamper-proof processing method for detecting an electronic report, which is characterized in that: s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template; s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a seal on the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal adding of the seal; s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after verification is completed; s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein S100 comprises: s110, reading data of the electronic report to be detected from the business system, and generating electronic report templates of different types according to requirements; s120, replacing one or more parameters in the electronic report template by using data replacement words, wherein the data replacement words are character strings; s130, traversing a parameter list of data of the detected electronic report, and replacing the data replacement words with the required parameters to obtain an electronic report file.
According to the encryption and tamper-proofing processing method for checking and detecting the electronic report, S100 further comprises: and storing the electronic report file as a specified file type, and sending the electronic report file to an authentication system server for authentication detection.
According to the encryption and tamper-proofing processing method for checking and detecting the electronic report, wherein S200 comprises the following steps: and reading the electronic report file, positioning the position of the file to be stamped, and executing the seal-riding processing according to the required stamping position.
The encryption and tamper-proofing processing method for detecting the electronic report according to the verification, wherein the processing of the seal comprises the following steps: acquiring the seal data with the same size as the electronic seal in the electronic report file; setting the electronic report position and page number of the seal to determine the coordinate and the segmentation mode of the seal needing to be set; the electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature relative to the height of the document need to be set in the electronic report; extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of an electronic report; and adding a signature domain object to each page of object at the electronic report paging, and storing the document inserted with the signature domain object.
The encryption and tamper-proofing processing method for detecting the electronic report according to the verification, wherein S300 comprises: positioning the abscissa and ordinate of the electronic report to be stamped, and transmitting the abscissa and ordinate and the generated electronic document to an authentication server; the authentication server positions the document according to the provided horizontal and vertical coordinates, and adds a special inspection seal at the horizontal and vertical coordinate positioned document position for storage.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein the e-mail in S400 includes: after the electronic report is authenticated and stamped, the report and the corresponding mark are packaged by using a plug-in, the mailbox address of the client is obtained according to the service logic, and a mail is sent to the corresponding mailbox address; and recording the successful sending state, and if the mail is not successfully sent, sending the mail again after a set time interval.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein the e-mail in S400 includes: the check checks the electronic report is saved in a local system file, using the clusters 2 technology, creating a link for download and printing on the internet.
The authentication system server interface is configured to: the method comprises an authorization ID, interface configuration and an interface input parameter array, wherein the authorization ID is a calling identity certificate and is a dynamic authorization code for calling an authorization mechanism established by an encryption server and a platform; the interface is configured to call the function combination configuration of the application service to realize the personalized application service function; the input parameter group is an array of all parameters for calling application service, and is used for providing personalized dynamic expansion of interface configuration.
The invention has the beneficial effects that: the special equipment inspection and detection field sets an electronic perforation seal and an electronic seal for an electronic report of a product thereof, so that important documents are protected; the method for setting the perforation seal on the electronic report has the advantages that the signature of each page not only protects the content of the page, but also protects the content of all pages from the initial page to the page; and performing anti-counterfeiting authentication on each page of the product and finally realizing the step of CA authentication, wherein the whole set of program is rigorous and can not be modified, otherwise, the product is invalid.
Drawings
The invention is further described below with reference to the accompanying drawings and examples;
FIG. 1 shows a general flow diagram according to an embodiment of the invention.
Fig. 2 is a general system block diagram according to an embodiment of the present invention.
Fig. 3 is a flow chart of a service according to an embodiment of the present invention.
Fig. 4 shows a network topology according to an embodiment of the invention.
FIG. 5 is a system security plan according to an embodiment of the present invention.
Fig. 6a, 6b are examples of electronic report templates according to the present invention.
Detailed Description
Reference will now be made in detail to the present preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number.
In the description of the present invention, the consecutive reference numbers of the method steps are for convenience of examination and understanding, and the implementation order between the steps is adjusted without affecting the technical effect achieved by the technical solution of the present invention by combining the whole technical solution of the present invention and the logical relationship between the steps.
FIG. 1 shows a general flow diagram according to an embodiment of the invention. The process comprises the following steps: s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template; s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a perforation seal in the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and performing stamping of the perforation seal; s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after the verification is finished; s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
Fig. 2 is a general system block diagram according to an embodiment of the present invention. The system comprises: the electronic report generating module is used for reading the data corresponding to the detection from the service system and generating a corresponding electronic report file according to the detection data according to the template; the seal-stamping processing module is used for detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting the coordinate and the segmentation mode of a seal-stamping in the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal-stamping of the seal-stamping; the authentication module is used for calling an authentication system server interface to verify the electronic report file and adding an anti-counterfeiting authentication seal after the verification is finished; and the distribution module is used for sending the encrypted and anti-falsified electronic report file to a corresponding user in an electronic mail or internet push mode.
Fig. 3 is a flow chart of a service according to an embodiment of the present invention. The main service of the report certificate is electronic signature and mail sending, firstly, a system administrator uploads report certificates needing to be sealed in batch, then the system requests a file sealing system to seal files, the electronic signature system returns the files after sealing, the administrator can send the sealed files to an appointed client, if the client receives the mail, the service is finished, if the client does not receive the mail, the mailbox of the client is possibly filled with errors, the administrator needs to contact the client and correct the mailbox address, and then the mail is sent again until the mail is successful.
Fig. 4 shows a network topology according to an embodiment of the invention. The system logs in through a PC end and a mobile phone end, and belongs to a management system, a user request passes through a firewall and then reaches an externally open router interface of the system, then the server address where the system is located is accessed, the security of the server is ensured, the system receives the request, and a Struts framework is applied to safely filter the request, so that the malicious input of the user is prevented, data is tampered, and the data security of the system is ensured. The system relates to a plurality of systems, servers are also arranged on different machines, and used databases are different, so that the system can receive data of the plurality of databases and perform data backup at intervals, and the integrity and the safety of the data are ensured.
FIG. 5 is a system security plan according to an embodiment of the present invention. The method mainly comprises the steps of carrying out safety design from a service system, a database, seal encryption and user behavior operation, wherein the behavior operation design is mainly verified at the front end of a platform to prevent a client from intentionally invading; the business module is mainly used for digital authentication signature from the consideration of equipment urging inspection and stamping safety, and the digital authentication certificate is stored in the password card; the database is backed up at intervals to ensure data integrity.
Fig. 6a, 6b are examples of electronic report templates according to the present invention. Meanwhile, in combination with the method flow of fig. 1, the technical scheme of the invention also provides the following implementation modes:
and (I) checking generation of a PDF format file of the detected electronic report.
Data relating to the test electronic report is read from the business system, and different types of electronic report templates are generated as required.
And (3) using the mysql relational database for data persistence, connecting the service system database in the local area network, entering the wtbgxtsz database, acquiring data of various reports from the database, and generating corresponding electronic reports according to various inspection report templates.
The generation of the electronic report plays an important role in the platform, and the generation process is as follows:
firstly, important data are displayed and typeset in a word document according to a material object report specification, and then a data replacement word, such as 'use unit name $ { SYDW }', is added, so that a platform replaces corresponding data from the obtained reported data value according to the replacement word.
Examples of templates are shown in FIGS. 6a and 6 b:
data obtained from the business system database, such as $ { SYDW } this English character.
And converting the set word template into an html format, and reading and storing the template in a File system of a computer by using fileInputStream in a File tool.
And selecting one of the report types, acquiring template data by the java system through a service system database, and configuring and packaging the template data into a List sequence object set by using a program.
Reading the html template, and circularly traversing the List sequence object set to replace the html template substitute words.
The template page is printed and converted into a transferable pdf format File by using the File template tool fileOutputStream.
And persisting the report with the stored data, storing the generated electronic pdf in a file system, and transmitting the electronic pdf to an authentication system.
And (II) checking and detecting generation of a seal on the perforation of the electronic report.
After the pdf formatted file is generated, the file is read in the technical system using the file toolstream.
And (3) positioning the position of the file to be stamped by using the photoShop software, and distributing the seal on the perforation according to the required position of the seal and the like by using a seal on the perforation technology.
The technical setting method of the perforation seal comprises the following steps:
and acquiring the perforation seal data consistent with the electronic seal in size.
And determining the coordinates and the segmentation mode of the seal needing to be set according to the electronic report position and the page number of the seal needing to be set.
The electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature on each page relative to the height of the document need to be set in the electronic report.
Extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a proposed segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of the electronic report.
And adding a signature domain object in each page of objects at the electronic report paging, and performing saving operation on the document in which the signature domain object is inserted.
The system operates as follows:
and acquiring an electronic seal picture input stream, and generating the electronic seal according to the input stream.
And importing the documents to be sealed, and determining the size, the number of pages, the content and the height and the length of the positions to be sealed of each electronic document to be sealed.
The segmentation mode and the seal size percentage of the electronic seal can be selected, the electronic seal is equally segmented according to the selected article page number, and the electronic seal is stamped to the corresponding page number in sequence.
And (III) checking and detecting the anti-counterfeiting certification generation of the electronic report.
Each electronic report of inspection and detection needs to be covered with a special electronic inspection seal for anti-counterfeiting authentication.
The special electronic inspection seal is arranged in the server interface of the authentication system to complete the electronic report anti-counterfeiting authentication. The specific process is as follows:
the photoShop is used to locate the abscissa and ordinate of the seal required by each type of electronic report.
And transmitting the horizontal and vertical coordinates and the generated electronic document to an authentication server.
The authentication server positions the document according to the provided horizontal and vertical coordinates, then places the special inspection seal at the designated position by using a method of adding a watermark, and stores the current file.
The processed pdf document is sent to an authentication system.
The authentication system uses File tool FileInputStream input stream to be stored as PDF document, and generates a check detection electronic report of electronic check special seal covered with anti-counterfeiting authentication and stores the report in a local File system.
(IV) test detection electronic report push operation
The mail pushing method comprises the following steps:
after the electronic report is authenticated and sealed, the report and the corresponding mark need to use a packaging Zip plug-in of org.
Both the report and the flag are packaged in Zip format.
And acquiring the mailbox address of the client according to the service logic.
Mail package, write send to customer mail address program.
The authenticated electronic report and the tag Zip package are sent to the customer.
Forming a sending result receipt: if the transmission is successful, the report platform records the successful transmission state; if the mail is not successfully sent, the mail is sent again after 15 seconds.
And finally, the state of the last sent report is stored to remind an administrator.
The internet pushing method comprises the following steps:
the check test electronic report is saved in a local system file for the customer to go to a website for downloading and printing using the clusters 2 technology over the internet.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (9)

1. An encryption and tamper-proof processing method for checking and detecting electronic reports, characterized by:
s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template;
s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a seal on the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal adding of the seal;
s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after verification is completed;
s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
2. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said S100 comprises:
s110, reading data of the electronic report to be detected from the business system, and generating electronic report templates of different types according to requirements;
s120, replacing one or more parameters in the electronic report template by using data replacement words, wherein the data replacement words are character strings;
s130, traversing a parameter list of data of the detected electronic report, and replacing the data replacement words with the required parameters to obtain an electronic report file.
3. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 2, wherein said S100 further comprises: and storing the electronic report file as a specified file type, encrypting the electronic report file in a password card and digital certificate authentication mode, and sending the electronic report file to an authentication system server for authentication detection.
4. The encryption and tamper-proofing processing method for verifying detection of electronic reports according to claim 2, wherein said S200 comprises:
and reading the electronic report file, positioning the position of the file to be stamped, and executing the seal-riding processing according to the required stamping position.
5. The encryption and tamper-proofing processing method of a check detect electronic report according to claim 2, wherein said chapter process includes:
acquiring the seal data with the same size as the electronic seal in the electronic report file;
setting the electronic report position and page number of the seal to determine the coordinate and the segmentation mode of the seal needing to be set;
the electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature relative to the height of the document need to be set in the electronic report;
extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of an electronic report;
and adding a signature domain object to each page of object at the electronic report paging, and storing the document inserted with the signature domain object.
6. The encryption and tamper-proofing processing method for verifying the detection of electronic reports according to claim 1, wherein said S300 comprises:
positioning the abscissa and ordinate of the electronic report to be stamped, and transmitting the abscissa and ordinate and the generated electronic document to an authentication server;
the authentication server positions the document according to the provided horizontal and vertical coordinates, and adds a special inspection seal at the horizontal and vertical coordinate positioned document position for storage.
7. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said e-mail in S400 includes:
after the electronic report is authenticated and stamped, the report and the corresponding mark are packaged by using a plug-in, the mailbox address of the client is obtained according to the service logic, and a mail is sent to the corresponding mailbox address;
and recording the successful sending state, and if the mail is not successfully sent, sending the mail again after a set time interval.
8. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said e-mail in S400 includes:
the check checks the electronic report is saved in a local system file, using the clusters 2 technology, creating a link for download and printing on the internet.
9. The encryption and tamper-proofing processing method of verification detection electronic reports of claim 1, wherein said authentication system server interface is configured to: the method comprises an authorization ID, interface configuration and an interface input parameter array, wherein the authorization ID is a calling identity certificate and is a dynamic authorization code for calling an authorization mechanism established by an encryption server and a platform; the interface is configured to call the function combination configuration of the application service to realize the personalized application service function; the input parameter group is an array of all parameters for calling application service, and is used for providing personalized dynamic expansion of interface configuration.
CN202010796881.8A 2020-08-10 2020-08-10 Encryption and tamper-proof processing method for checking and detecting electronic report Pending CN112100685A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010796881.8A CN112100685A (en) 2020-08-10 2020-08-10 Encryption and tamper-proof processing method for checking and detecting electronic report

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010796881.8A CN112100685A (en) 2020-08-10 2020-08-10 Encryption and tamper-proof processing method for checking and detecting electronic report

Publications (1)

Publication Number Publication Date
CN112100685A true CN112100685A (en) 2020-12-18

Family

ID=73753001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010796881.8A Pending CN112100685A (en) 2020-08-10 2020-08-10 Encryption and tamper-proof processing method for checking and detecting electronic report

Country Status (1)

Country Link
CN (1) CN112100685A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113246632A (en) * 2021-03-12 2021-08-13 深圳市疾病预防控制中心 Anonymous detection system and detection method based on information card
CN114428975A (en) * 2022-04-07 2022-05-03 莱茵技术监督服务(广东)有限公司 Method and device for detecting data directional sharing, storage medium and server

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010186490A (en) * 2010-04-30 2010-08-26 Nextage:Kk Electronic seal authentication auditing system
CN103729341A (en) * 2013-12-31 2014-04-16 广东数字证书认证中心有限公司 Method and device for positioning electronic seal and device for obtaining electronic seal
CN108009789A (en) * 2017-11-24 2018-05-08 国网北京市电力公司 Method and apparatus for managing security tools and instruments detection
CN108257197A (en) * 2016-12-28 2018-07-06 航天信息股份有限公司 A kind of method and system for the setting seal on the perforation at electronic document page-by-page
CN110020418A (en) * 2019-04-30 2019-07-16 广州供电局有限公司 Electric power relay protection devices data monitoring system and electronic affirmation report-generating method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010186490A (en) * 2010-04-30 2010-08-26 Nextage:Kk Electronic seal authentication auditing system
CN103729341A (en) * 2013-12-31 2014-04-16 广东数字证书认证中心有限公司 Method and device for positioning electronic seal and device for obtaining electronic seal
CN108257197A (en) * 2016-12-28 2018-07-06 航天信息股份有限公司 A kind of method and system for the setting seal on the perforation at electronic document page-by-page
CN108009789A (en) * 2017-11-24 2018-05-08 国网北京市电力公司 Method and apparatus for managing security tools and instruments detection
CN110020418A (en) * 2019-04-30 2019-07-16 广州供电局有限公司 Electric power relay protection devices data monitoring system and electronic affirmation report-generating method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
崔靖昀;陈炜美;: "基于"互联网+电子认证"技术的检验检测报告服务平台研发", 中国特种设备安全, no. 07 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113246632A (en) * 2021-03-12 2021-08-13 深圳市疾病预防控制中心 Anonymous detection system and detection method based on information card
CN114428975A (en) * 2022-04-07 2022-05-03 莱茵技术监督服务(广东)有限公司 Method and device for detecting data directional sharing, storage medium and server

Similar Documents

Publication Publication Date Title
US6796489B2 (en) Processing electronic documents with embedded digital signatures
JP4949269B2 (en) Method and apparatus for adding signature information to an electronic document
US20020019937A1 (en) Secure document transport process
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
CN110532811B (en) PDF (Portable document Format) signature method and PDF signature system
US20090292930A1 (en) System, method and apparatus for assuring authenticity and permissible use of electronic documents
CN106598930A (en) Electronic certificate processing method based on layout file
WO2016189488A2 (en) Universal original document validation platform
US20120030187A1 (en) System, method and apparatus for tracking digital content objects
US8688992B2 (en) System and method for generating agreements
US20110231645A1 (en) System and method to validate and authenticate digital data
US20040199778A1 (en) Method and system for increasing the accuracy and security of data capture from a paper form
US20080130896A1 (en) Method and system for increasing the accuracy and security of data capture from a paper form
CN107992759B (en) Apparatus, method and computer readable storage medium for implementing electronic seal
US20210073369A1 (en) Tampering detection method and apparatus and non-transitory computer-readable storage medium
CN112100685A (en) Encryption and tamper-proof processing method for checking and detecting electronic report
CN110532808A (en) A kind of electronic signature method based on electronic document image object
CN113064562A (en) Man-machine interaction printing method and system based on block chain
US20180198787A1 (en) Digital verified identification system and method
CN117632855A (en) Single-system electronic archive filing system, method, equipment and storage medium based on four-package structure
CN113704708A (en) Method and system for watermarking online preview of document based on browser
CN111078630A (en) Signature system and method
JP2007082043A (en) Time stamp service system
CN113806812B (en) Method, device and system for managing user handwriting data and storage medium
JP2875450B2 (en) Electronic approval information printing device and print verification device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination