CN112100685A - Encryption and tamper-proof processing method for checking and detecting electronic report - Google Patents
Encryption and tamper-proof processing method for checking and detecting electronic report Download PDFInfo
- Publication number
- CN112100685A CN112100685A CN202010796881.8A CN202010796881A CN112100685A CN 112100685 A CN112100685 A CN 112100685A CN 202010796881 A CN202010796881 A CN 202010796881A CN 112100685 A CN112100685 A CN 112100685A
- Authority
- CN
- China
- Prior art keywords
- electronic
- seal
- electronic report
- file
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 22
- 238000001514 detection method Methods 0.000 claims abstract description 27
- 238000000034 method Methods 0.000 claims abstract description 15
- 238000007689 inspection Methods 0.000 claims abstract description 12
- 238000012795 verification Methods 0.000 claims abstract description 11
- 230000011218 segmentation Effects 0.000 claims description 11
- 238000013475 authorization Methods 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 238000007639 printing Methods 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000007789 sealing Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/186—Templates
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Artificial Intelligence (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a technical scheme for verifying and detecting an encryption and tamper-proof processing method of an electronic report, which comprises the following steps: generating corresponding electronic report files by the inspection and detection data according to the template; detecting an electronic seal of the electronic report file, and executing the stamping of a perforation seal; calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after the verification is finished; and sending the encrypted and anti-falsified electronic report file to a corresponding user in an electronic mail or internet push mode. The invention has the beneficial effects that: the special equipment inspection and detection field sets an electronic perforation seal and an electronic seal for an electronic report in a product thereof, so that important documents are protected; a method for setting a perforation seal on an electronic report, wherein the signature of each page not only protects the content of the page; and performing anti-counterfeiting authentication on each page of the product and finally realizing CA authentication.
Description
Technical Field
The invention relates to the field of computers, in particular to an encryption and tamper-proof processing method for detecting an electronic report.
Background
With the popularization of the Internet and the rapid development of various electronic commerce activities and electronic government activities, electronic signatures are widely applied to various fields, wherein electronic signatures are applied to the field of special equipment inspection and detection to realize the 'Internet + government affairs' increasingly bloom. But the seamless connection between the paper version signature and the electronic version signature can be solved more truly, and no first case exists.
In order to guarantee authenticity, integrity, confidentiality and non-repudiation of the electronic official document, in practical application, a paper version signature does not need to be stamped at a signature position, a plurality of pages of a paper document need to be stamped with a physical seal together, each page is only stamped with one part of the physical seal, the plurality of pages are combined to obtain a complete physical seal, and therefore a certain page or certain pages of the document is guaranteed not to be replaced. A stamp stamped in this manner is generally referred to as a jotting stamp.
The daily electronic signature is popularized and applied to electronic books, company reports, electronic official documents, electronic invoices and the like, and the file format adopted by the batch of electronic data is a PDF format, which is an ideal document format for electronic report issuing and digital information transmission on the Internet.
Although many current software supports electronic signature on PDF, for some important documents, a common seal needs to be applied to multiple pages of a paper document to ensure that some pages of the document are not replaced, and the solution in the field is not clear.
Disclosure of Invention
The invention aims to solve at least one of the technical problems in the prior art and provides an encryption and anti-tampering processing method for checking and detecting an electronic report, which ensures the authenticity, safety and integrity of the checked and detected electronic report stored in a server.
The technical scheme of the invention comprises an encryption and tamper-proof processing method for detecting an electronic report, which is characterized in that: s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template; s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a seal on the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal adding of the seal; s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after verification is completed; s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein S100 comprises: s110, reading data of the electronic report to be detected from the business system, and generating electronic report templates of different types according to requirements; s120, replacing one or more parameters in the electronic report template by using data replacement words, wherein the data replacement words are character strings; s130, traversing a parameter list of data of the detected electronic report, and replacing the data replacement words with the required parameters to obtain an electronic report file.
According to the encryption and tamper-proofing processing method for checking and detecting the electronic report, S100 further comprises: and storing the electronic report file as a specified file type, and sending the electronic report file to an authentication system server for authentication detection.
According to the encryption and tamper-proofing processing method for checking and detecting the electronic report, wherein S200 comprises the following steps: and reading the electronic report file, positioning the position of the file to be stamped, and executing the seal-riding processing according to the required stamping position.
The encryption and tamper-proofing processing method for detecting the electronic report according to the verification, wherein the processing of the seal comprises the following steps: acquiring the seal data with the same size as the electronic seal in the electronic report file; setting the electronic report position and page number of the seal to determine the coordinate and the segmentation mode of the seal needing to be set; the electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature relative to the height of the document need to be set in the electronic report; extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of an electronic report; and adding a signature domain object to each page of object at the electronic report paging, and storing the document inserted with the signature domain object.
The encryption and tamper-proofing processing method for detecting the electronic report according to the verification, wherein S300 comprises: positioning the abscissa and ordinate of the electronic report to be stamped, and transmitting the abscissa and ordinate and the generated electronic document to an authentication server; the authentication server positions the document according to the provided horizontal and vertical coordinates, and adds a special inspection seal at the horizontal and vertical coordinate positioned document position for storage.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein the e-mail in S400 includes: after the electronic report is authenticated and stamped, the report and the corresponding mark are packaged by using a plug-in, the mailbox address of the client is obtained according to the service logic, and a mail is sent to the corresponding mailbox address; and recording the successful sending state, and if the mail is not successfully sent, sending the mail again after a set time interval.
The encryption and tamper-proofing processing method of the electronic report according to the verification detection, wherein the e-mail in S400 includes: the check checks the electronic report is saved in a local system file, using the clusters 2 technology, creating a link for download and printing on the internet.
The authentication system server interface is configured to: the method comprises an authorization ID, interface configuration and an interface input parameter array, wherein the authorization ID is a calling identity certificate and is a dynamic authorization code for calling an authorization mechanism established by an encryption server and a platform; the interface is configured to call the function combination configuration of the application service to realize the personalized application service function; the input parameter group is an array of all parameters for calling application service, and is used for providing personalized dynamic expansion of interface configuration.
The invention has the beneficial effects that: the special equipment inspection and detection field sets an electronic perforation seal and an electronic seal for an electronic report of a product thereof, so that important documents are protected; the method for setting the perforation seal on the electronic report has the advantages that the signature of each page not only protects the content of the page, but also protects the content of all pages from the initial page to the page; and performing anti-counterfeiting authentication on each page of the product and finally realizing the step of CA authentication, wherein the whole set of program is rigorous and can not be modified, otherwise, the product is invalid.
Drawings
The invention is further described below with reference to the accompanying drawings and examples;
FIG. 1 shows a general flow diagram according to an embodiment of the invention.
Fig. 2 is a general system block diagram according to an embodiment of the present invention.
Fig. 3 is a flow chart of a service according to an embodiment of the present invention.
Fig. 4 shows a network topology according to an embodiment of the invention.
FIG. 5 is a system security plan according to an embodiment of the present invention.
Fig. 6a, 6b are examples of electronic report templates according to the present invention.
Detailed Description
Reference will now be made in detail to the present preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number.
In the description of the present invention, the consecutive reference numbers of the method steps are for convenience of examination and understanding, and the implementation order between the steps is adjusted without affecting the technical effect achieved by the technical solution of the present invention by combining the whole technical solution of the present invention and the logical relationship between the steps.
FIG. 1 shows a general flow diagram according to an embodiment of the invention. The process comprises the following steps: s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template; s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a perforation seal in the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and performing stamping of the perforation seal; s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after the verification is finished; s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
Fig. 2 is a general system block diagram according to an embodiment of the present invention. The system comprises: the electronic report generating module is used for reading the data corresponding to the detection from the service system and generating a corresponding electronic report file according to the detection data according to the template; the seal-stamping processing module is used for detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting the coordinate and the segmentation mode of a seal-stamping in the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal-stamping of the seal-stamping; the authentication module is used for calling an authentication system server interface to verify the electronic report file and adding an anti-counterfeiting authentication seal after the verification is finished; and the distribution module is used for sending the encrypted and anti-falsified electronic report file to a corresponding user in an electronic mail or internet push mode.
Fig. 3 is a flow chart of a service according to an embodiment of the present invention. The main service of the report certificate is electronic signature and mail sending, firstly, a system administrator uploads report certificates needing to be sealed in batch, then the system requests a file sealing system to seal files, the electronic signature system returns the files after sealing, the administrator can send the sealed files to an appointed client, if the client receives the mail, the service is finished, if the client does not receive the mail, the mailbox of the client is possibly filled with errors, the administrator needs to contact the client and correct the mailbox address, and then the mail is sent again until the mail is successful.
Fig. 4 shows a network topology according to an embodiment of the invention. The system logs in through a PC end and a mobile phone end, and belongs to a management system, a user request passes through a firewall and then reaches an externally open router interface of the system, then the server address where the system is located is accessed, the security of the server is ensured, the system receives the request, and a Struts framework is applied to safely filter the request, so that the malicious input of the user is prevented, data is tampered, and the data security of the system is ensured. The system relates to a plurality of systems, servers are also arranged on different machines, and used databases are different, so that the system can receive data of the plurality of databases and perform data backup at intervals, and the integrity and the safety of the data are ensured.
FIG. 5 is a system security plan according to an embodiment of the present invention. The method mainly comprises the steps of carrying out safety design from a service system, a database, seal encryption and user behavior operation, wherein the behavior operation design is mainly verified at the front end of a platform to prevent a client from intentionally invading; the business module is mainly used for digital authentication signature from the consideration of equipment urging inspection and stamping safety, and the digital authentication certificate is stored in the password card; the database is backed up at intervals to ensure data integrity.
Fig. 6a, 6b are examples of electronic report templates according to the present invention. Meanwhile, in combination with the method flow of fig. 1, the technical scheme of the invention also provides the following implementation modes:
and (I) checking generation of a PDF format file of the detected electronic report.
Data relating to the test electronic report is read from the business system, and different types of electronic report templates are generated as required.
And (3) using the mysql relational database for data persistence, connecting the service system database in the local area network, entering the wtbgxtsz database, acquiring data of various reports from the database, and generating corresponding electronic reports according to various inspection report templates.
The generation of the electronic report plays an important role in the platform, and the generation process is as follows:
firstly, important data are displayed and typeset in a word document according to a material object report specification, and then a data replacement word, such as 'use unit name $ { SYDW }', is added, so that a platform replaces corresponding data from the obtained reported data value according to the replacement word.
Examples of templates are shown in FIGS. 6a and 6 b:
data obtained from the business system database, such as $ { SYDW } this English character.
And converting the set word template into an html format, and reading and storing the template in a File system of a computer by using fileInputStream in a File tool.
And selecting one of the report types, acquiring template data by the java system through a service system database, and configuring and packaging the template data into a List sequence object set by using a program.
Reading the html template, and circularly traversing the List sequence object set to replace the html template substitute words.
The template page is printed and converted into a transferable pdf format File by using the File template tool fileOutputStream.
And persisting the report with the stored data, storing the generated electronic pdf in a file system, and transmitting the electronic pdf to an authentication system.
And (II) checking and detecting generation of a seal on the perforation of the electronic report.
After the pdf formatted file is generated, the file is read in the technical system using the file toolstream.
And (3) positioning the position of the file to be stamped by using the photoShop software, and distributing the seal on the perforation according to the required position of the seal and the like by using a seal on the perforation technology.
The technical setting method of the perforation seal comprises the following steps:
and acquiring the perforation seal data consistent with the electronic seal in size.
And determining the coordinates and the segmentation mode of the seal needing to be set according to the electronic report position and the page number of the seal needing to be set.
The electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature on each page relative to the height of the document need to be set in the electronic report.
Extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a proposed segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of the electronic report.
And adding a signature domain object in each page of objects at the electronic report paging, and performing saving operation on the document in which the signature domain object is inserted.
The system operates as follows:
and acquiring an electronic seal picture input stream, and generating the electronic seal according to the input stream.
And importing the documents to be sealed, and determining the size, the number of pages, the content and the height and the length of the positions to be sealed of each electronic document to be sealed.
The segmentation mode and the seal size percentage of the electronic seal can be selected, the electronic seal is equally segmented according to the selected article page number, and the electronic seal is stamped to the corresponding page number in sequence.
And (III) checking and detecting the anti-counterfeiting certification generation of the electronic report.
Each electronic report of inspection and detection needs to be covered with a special electronic inspection seal for anti-counterfeiting authentication.
The special electronic inspection seal is arranged in the server interface of the authentication system to complete the electronic report anti-counterfeiting authentication. The specific process is as follows:
the photoShop is used to locate the abscissa and ordinate of the seal required by each type of electronic report.
And transmitting the horizontal and vertical coordinates and the generated electronic document to an authentication server.
The authentication server positions the document according to the provided horizontal and vertical coordinates, then places the special inspection seal at the designated position by using a method of adding a watermark, and stores the current file.
The processed pdf document is sent to an authentication system.
The authentication system uses File tool FileInputStream input stream to be stored as PDF document, and generates a check detection electronic report of electronic check special seal covered with anti-counterfeiting authentication and stores the report in a local File system.
(IV) test detection electronic report push operation
The mail pushing method comprises the following steps:
after the electronic report is authenticated and sealed, the report and the corresponding mark need to use a packaging Zip plug-in of org.
Both the report and the flag are packaged in Zip format.
And acquiring the mailbox address of the client according to the service logic.
Mail package, write send to customer mail address program.
The authenticated electronic report and the tag Zip package are sent to the customer.
Forming a sending result receipt: if the transmission is successful, the report platform records the successful transmission state; if the mail is not successfully sent, the mail is sent again after 15 seconds.
And finally, the state of the last sent report is stored to remind an administrator.
The internet pushing method comprises the following steps:
the check test electronic report is saved in a local system file for the customer to go to a website for downloading and printing using the clusters 2 technology over the internet.
The embodiments of the present invention have been described in detail with reference to the accompanying drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.
Claims (9)
1. An encryption and tamper-proof processing method for checking and detecting electronic reports, characterized by:
s100, reading corresponding data of the detection from the business system, and generating a corresponding electronic report file according to the detection data and the template;
s200, detecting an electronic seal of the electronic report file, determining the size and the position of the electronic seal, setting coordinates and a segmentation mode of a seal on the electronic report file according to the size of the electronic seal and the page number of the electronic report file, and executing the seal adding of the seal;
s300, calling an authentication system server interface to verify the electronic report file, and adding an anti-counterfeiting authentication seal after verification is completed;
s400, the encrypted and anti-falsified electronic report file is sent to a corresponding user in the form of e-mail or internet push.
2. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said S100 comprises:
s110, reading data of the electronic report to be detected from the business system, and generating electronic report templates of different types according to requirements;
s120, replacing one or more parameters in the electronic report template by using data replacement words, wherein the data replacement words are character strings;
s130, traversing a parameter list of data of the detected electronic report, and replacing the data replacement words with the required parameters to obtain an electronic report file.
3. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 2, wherein said S100 further comprises: and storing the electronic report file as a specified file type, encrypting the electronic report file in a password card and digital certificate authentication mode, and sending the electronic report file to an authentication system server for authentication detection.
4. The encryption and tamper-proofing processing method for verifying detection of electronic reports according to claim 2, wherein said S200 comprises:
and reading the electronic report file, positioning the position of the file to be stamped, and executing the seal-riding processing according to the required stamping position.
5. The encryption and tamper-proofing processing method of a check detect electronic report according to claim 2, wherein said chapter process includes:
acquiring the seal data with the same size as the electronic seal in the electronic report file;
setting the electronic report position and page number of the seal to determine the coordinate and the segmentation mode of the seal needing to be set;
the electronic report needs to set the position of the seal on the perforation, which means that the starting page and the ending page of the seal on the perforation, the signature percentage of the first page and the ordinate of each signature relative to the height of the document need to be set in the electronic report;
extracting RGB data and Alpha data of all pixel points in the electronic seal data, segmenting the electronic seal data according to a segmentation mode, and respectively obtaining segmented electronic seal data corresponding to paging positions of specific coordinates of an electronic report;
and adding a signature domain object to each page of object at the electronic report paging, and storing the document inserted with the signature domain object.
6. The encryption and tamper-proofing processing method for verifying the detection of electronic reports according to claim 1, wherein said S300 comprises:
positioning the abscissa and ordinate of the electronic report to be stamped, and transmitting the abscissa and ordinate and the generated electronic document to an authentication server;
the authentication server positions the document according to the provided horizontal and vertical coordinates, and adds a special inspection seal at the horizontal and vertical coordinate positioned document position for storage.
7. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said e-mail in S400 includes:
after the electronic report is authenticated and stamped, the report and the corresponding mark are packaged by using a plug-in, the mailbox address of the client is obtained according to the service logic, and a mail is sent to the corresponding mailbox address;
and recording the successful sending state, and if the mail is not successfully sent, sending the mail again after a set time interval.
8. The encryption and tamper-proofing processing method of a check detection electronic report according to claim 1, wherein said e-mail in S400 includes:
the check checks the electronic report is saved in a local system file, using the clusters 2 technology, creating a link for download and printing on the internet.
9. The encryption and tamper-proofing processing method of verification detection electronic reports of claim 1, wherein said authentication system server interface is configured to: the method comprises an authorization ID, interface configuration and an interface input parameter array, wherein the authorization ID is a calling identity certificate and is a dynamic authorization code for calling an authorization mechanism established by an encryption server and a platform; the interface is configured to call the function combination configuration of the application service to realize the personalized application service function; the input parameter group is an array of all parameters for calling application service, and is used for providing personalized dynamic expansion of interface configuration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010796881.8A CN112100685A (en) | 2020-08-10 | 2020-08-10 | Encryption and tamper-proof processing method for checking and detecting electronic report |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010796881.8A CN112100685A (en) | 2020-08-10 | 2020-08-10 | Encryption and tamper-proof processing method for checking and detecting electronic report |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112100685A true CN112100685A (en) | 2020-12-18 |
Family
ID=73753001
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010796881.8A Pending CN112100685A (en) | 2020-08-10 | 2020-08-10 | Encryption and tamper-proof processing method for checking and detecting electronic report |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112100685A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113246632A (en) * | 2021-03-12 | 2021-08-13 | 深圳市疾病预防控制中心 | Anonymous detection system and detection method based on information card |
CN114428975A (en) * | 2022-04-07 | 2022-05-03 | 莱茵技术监督服务(广东)有限公司 | Method and device for detecting data directional sharing, storage medium and server |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010186490A (en) * | 2010-04-30 | 2010-08-26 | Nextage:Kk | Electronic seal authentication auditing system |
CN103729341A (en) * | 2013-12-31 | 2014-04-16 | 广东数字证书认证中心有限公司 | Method and device for positioning electronic seal and device for obtaining electronic seal |
CN108009789A (en) * | 2017-11-24 | 2018-05-08 | 国网北京市电力公司 | Method and apparatus for managing security tools and instruments detection |
CN108257197A (en) * | 2016-12-28 | 2018-07-06 | 航天信息股份有限公司 | A kind of method and system for the setting seal on the perforation at electronic document page-by-page |
CN110020418A (en) * | 2019-04-30 | 2019-07-16 | 广州供电局有限公司 | Electric power relay protection devices data monitoring system and electronic affirmation report-generating method |
-
2020
- 2020-08-10 CN CN202010796881.8A patent/CN112100685A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010186490A (en) * | 2010-04-30 | 2010-08-26 | Nextage:Kk | Electronic seal authentication auditing system |
CN103729341A (en) * | 2013-12-31 | 2014-04-16 | 广东数字证书认证中心有限公司 | Method and device for positioning electronic seal and device for obtaining electronic seal |
CN108257197A (en) * | 2016-12-28 | 2018-07-06 | 航天信息股份有限公司 | A kind of method and system for the setting seal on the perforation at electronic document page-by-page |
CN108009789A (en) * | 2017-11-24 | 2018-05-08 | 国网北京市电力公司 | Method and apparatus for managing security tools and instruments detection |
CN110020418A (en) * | 2019-04-30 | 2019-07-16 | 广州供电局有限公司 | Electric power relay protection devices data monitoring system and electronic affirmation report-generating method |
Non-Patent Citations (1)
Title |
---|
崔靖昀;陈炜美;: "基于"互联网+电子认证"技术的检验检测报告服务平台研发", 中国特种设备安全, no. 07 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113246632A (en) * | 2021-03-12 | 2021-08-13 | 深圳市疾病预防控制中心 | Anonymous detection system and detection method based on information card |
CN114428975A (en) * | 2022-04-07 | 2022-05-03 | 莱茵技术监督服务(广东)有限公司 | Method and device for detecting data directional sharing, storage medium and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6796489B2 (en) | Processing electronic documents with embedded digital signatures | |
JP4949269B2 (en) | Method and apparatus for adding signature information to an electronic document | |
US20020019937A1 (en) | Secure document transport process | |
US20010034835A1 (en) | Applied digital and physical signatures over telecommunications media | |
CN110532811B (en) | PDF (Portable document Format) signature method and PDF signature system | |
US20090292930A1 (en) | System, method and apparatus for assuring authenticity and permissible use of electronic documents | |
CN106598930A (en) | Electronic certificate processing method based on layout file | |
WO2016189488A2 (en) | Universal original document validation platform | |
US20120030187A1 (en) | System, method and apparatus for tracking digital content objects | |
US8688992B2 (en) | System and method for generating agreements | |
US20110231645A1 (en) | System and method to validate and authenticate digital data | |
US20040199778A1 (en) | Method and system for increasing the accuracy and security of data capture from a paper form | |
US20080130896A1 (en) | Method and system for increasing the accuracy and security of data capture from a paper form | |
CN107992759B (en) | Apparatus, method and computer readable storage medium for implementing electronic seal | |
US20210073369A1 (en) | Tampering detection method and apparatus and non-transitory computer-readable storage medium | |
CN112100685A (en) | Encryption and tamper-proof processing method for checking and detecting electronic report | |
CN110532808A (en) | A kind of electronic signature method based on electronic document image object | |
CN113064562A (en) | Man-machine interaction printing method and system based on block chain | |
US20180198787A1 (en) | Digital verified identification system and method | |
CN117632855A (en) | Single-system electronic archive filing system, method, equipment and storage medium based on four-package structure | |
CN113704708A (en) | Method and system for watermarking online preview of document based on browser | |
CN111078630A (en) | Signature system and method | |
JP2007082043A (en) | Time stamp service system | |
CN113806812B (en) | Method, device and system for managing user handwriting data and storage medium | |
JP2875450B2 (en) | Electronic approval information printing device and print verification device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |