CN109508518A - A kind of document handling method, system and file decryption equipment - Google Patents

A kind of document handling method, system and file decryption equipment Download PDF

Info

Publication number
CN109508518A
CN109508518A CN201710835371.5A CN201710835371A CN109508518A CN 109508518 A CN109508518 A CN 109508518A CN 201710835371 A CN201710835371 A CN 201710835371A CN 109508518 A CN109508518 A CN 109508518A
Authority
CN
China
Prior art keywords
file
watermark
module
equipment
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710835371.5A
Other languages
Chinese (zh)
Inventor
周卫国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing WatchData System Co Ltd
Beijing WatchSmart Technologies Co Ltd
Original Assignee
Beijing WatchSmart Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing WatchSmart Technologies Co Ltd filed Critical Beijing WatchSmart Technologies Co Ltd
Priority to CN201710835371.5A priority Critical patent/CN109508518A/en
Publication of CN109508518A publication Critical patent/CN109508518A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application provides a kind of document handling method, system and file decryption equipment, this document processing system specific work process are as follows: file is encrypted to encryption file by file encryption equipment, reader could open encrypted file by file decryption equipment, and file decryption equipment is added to for file with the watermark that can be identified for that this document decryption device during decrypting file.Therefore, the reading as long as file is opened, have on this document with the uniquely corresponding watermark of file decryption equipment, once this document is leaked out, just would know that be this document to be to decrypt by which file decryption equipment, and then determine leaked out from which reader according to watermark.Therefore, document handling system and method provided by the embodiments of the present application can be realized the effect that file prevents traceable source of divulging a secret after divulging a secret and divulging a secret.

Description

A kind of document handling method, system and file decryption equipment
Technical field
The present invention relates to encryption and decryption technology fields more particularly to a kind of document handling method, system and file decryption to set It is standby.
Background technique
With the development of internet, the propagation of file in a network, while offering convenience to the work and life of people, Sometimes it also will appear the problem of file is divulged a secret, especially, the classified papers of government and enterprise will be leaked in recent years, lead to secret File often occurs on network.However, but there are no a kind of effectively means to go to prevent classified papers from being let out for government and enterprise Reveal on network, does not also know that classified papers are leaked out from where.
Summary of the invention
In view of this, can effectively achieve file this application provides a kind of document handling method and system and prevent divulging a secret And the effect in source of divulging a secret can be traced after divulging a secret.
In addition, present invention also provides a kind of file decryption equipment, to guarantee the application and reality of the above method in practice It is existing.
A kind of document handling system is provided in the application first aspect, which includes: file encryption equipment and file Decryption device;
File encryption equipment obtains encryption file for being encrypted to file.
File decryption equipment includes: file decryption module and watermark module;
Wherein, file decryption module obtains file for above-mentioned encryption file to be decrypted, and by this document and uniquely Characteristic value is transmitted to watermark module;Wherein, the unique features value is that the file decryption module generates, being capable of unique identification The characteristic value of the file decryption equipment.
The watermark information is added to described by watermark module for generating watermark information according to the unique features value In file, to obtain the file with watermark.
A kind of file decryption equipment is provided in the application second aspect, this document decryption device includes: file decryption mould Block and watermark module;
Wherein, file decryption module, for being decrypted to obtain file to encryption file, and by this document and unique features Value is transmitted to watermark module;Wherein, the unique features value is that the file decryption module generates, can be described in unique identification The characteristic value of file decryption equipment.
Watermark information is added to file for generating watermark information according to the unique features value received by watermark module In, to obtain the file with watermark.
Optionally, this document decryption device can be intelligent code key.
So, the unique features value which provides, can be the device id of intelligent code key.
Optionally, this document decryption device further include: watermark parameters selecting module;
The watermark parameters selecting module, for providing the watermark parameters for user's selection, and the watermark that user is chosen Parameter is sent to the watermark module.
Then watermark module, specifically for generating watermark information according to the unique features value and selected watermark parameters, The watermark information is added in the file, to obtain the file with watermark.
Optionally, this document decryption device further include: input module;
The personal information for receiving the personal information of user's input, and is sent to the watermark by the input module Module.
Then watermark module is specifically used for generating watermark information according to the unique features value and the personal information, by institute It states watermark information to be added in the file, to obtain the file with watermark.
Optionally, this document decryption device further include: display module;
Display module, for showing the file with watermark.
Optionally, this document decryption device further include: communication module;
The file with watermark is transmitted to the terminal for being communicated with terminal device by communication module Equipment.
Optionally, this document decryption device further include: encryption file introducting interface;
File introducting interface is encrypted, for receiving the encryption file, and is transmitted to the file decryption module.
A kind of document handling method is provided in the application third aspect, is applied to file decryption equipment side, this method packet It includes:
Receive encryption file, be decrypted to obtain file to encryption file, and generate can unique identification file decryption set Standby unique features value;
Watermark information is generated according to above-mentioned unique features value, watermark information is added in file, to obtain with watermark File.
Scheme provided by the present application has the advantages that
In the scheme of the application, file is encrypted to encryption file by file encryption equipment, and reader passes through file Decryption device could open encrypted file, and file decryption equipment is added to tool during decrypting file for file There is the watermark that can be identified for that this document decryption device, therefore, the reading once this document is opened just has an only nothing on this document Two watermark, the watermark and file decryption equipment be it is unique corresponding, watermark can be seen by human eye, therefore, even if this article Part is leaked out, and just would know that is revealed by file decryption equipment according to watermark, determines that out it is at which reader It leaks out.Therefore, the scheme of the application can achieve the effect that file prevents that source of divulging a secret can be traced after divulging a secret and divulging a secret.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of document handling system provided by the embodiments of the present application;
Fig. 2 is the structural schematic diagram of file decryption equipment provided by the embodiments of the present application;
Fig. 3 is the flow chart of document handling method provided by the embodiments of the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common Technical staff's every other embodiment obtained without creative efforts, all should belong to protection of the present invention Range.
With the development of internet, the propagation of file in a network, while offering convenience to the work and life of people, Sometimes it also will appear the problem of file is divulged a secret, especially, for business and government, there are many classified papers, these secrets File is read and is referred to only for specific staff, is not suitable for widely being passed round and being used.But specified reader is reading When classified papers, it is possible to classified papers are leaked to other people or are revealed in a network, divulging a secret for classified papers is caused, and Due to the popularity and rapidity of Internet communication, the leakage of classified papers will cause immeasurable consequence and loss.
Certainly, in addition to business and government can encounter the problem of classified papers are divulged a secret, in practical applications, individual can also encounter The problem of classified papers are divulged a secret, therefore, no matter enterprise, government or individual can be potentially encountered the problem of file is got compromised.
Based on this, this application provides a kind of document handling method, system and file decryption equipment, can effectively prevent File is divulged a secret, also, when file is leaked, and the source of divulging a secret of file can be found in time, on the one hand in time by file Scope control divulge a secret in minimum zone, reduces loss, on the other hand, discovery source of divulging a secret determines blabber, to ensure other The safety of classified papers.
A kind of document handling system provided by the present application is first introduced below.
In practical applications, system provided by the embodiments of the present application can limit the reader of file, only limited reader Distribute file decryption equipment, limited reader, which only passes through file decryption equipment, can just obtain file, could reading file, centainly It ensure that the safety of file in degree, and this document decryption device can make watermark to file, watermark includes file decryption Therefore the information of equipment unique identification once file is leaked, just can determine which file solution file is from by the watermark Mi Shebeichu leakage, and then it is determined which is limited leakage from reader from.
It is a kind of structure chart of document handling system provided by the embodiments of the present application referring to Fig. 1, Fig. 1, as shown in Figure 1, should System includes: file encryption equipment 100 and file decryption equipment 200;
Wherein, file encryption equipment 100 obtains encryption file for being encrypted to file.
In specific implementation, file refers to having for the coherent element for carrying out description content with text, number, letter and/or figure Sequence sequence.There are many multiplicity, such as word, excel, ppt, pdf, text, html, GIF, etc. for the concrete form of file.
For enterprise, government, personally for, be related to secret file, classified papers, need to prevent file from divulging a secret, all may be used Equipment 100 is encrypted by this document first file is encrypted.
For example, for enterprise, the file such as equipment operation of file, enterprise engineering operating aspect in terms of business administration Regulation, drawing, process flow chart, division management specification, externally links up letters etc. at job instruction, these files are for enterprise All it is important, more secret file for industry, needs to prevent file from divulging a secret, then company manager can first passes through this document File is encrypted in encryption equipment 100, obtains corresponding encryption file.
For government, the article of some official document letters, the countries concerned's policy, theory etc. some dedicated is killed Malicious software, working software etc. are all classified papers, when needing to prevent file from divulging a secret, all equipment 100 can be encrypted by this document first File is encrypted.
Personally for, the personal contract signed, bank transaction file, file comprising secret identity information, etc., These files are all unusual secrets, very important to individual, therefore, for these files, when needing to prevent file from divulging a secret, All equipment 100 can be encrypted by this document first file is encrypted.
In specific implementation, user determines which file needs prevents from divulging a secret, then file is input to this document encryption and set It is encrypted in standby 100, voluntarily determines which secret file needs prevents from divulging a secret by user, which classified papers needs anti- Stopping leak is close, etc..
In specific implementation, file encryption equipment 100 can obtain electricity by way of wire communication or wireless communication File on the terminal devices such as brain or mobile phone.According to wired communication mode, user can be by terminals such as computer or mobile phones On file be transferred in file encryption equipment 100 by modes such as USB data lines;According to communication, Yong Huke By be by the file in the terminals such as computer or mobile phone by WIFI or bluetooth etc. in a manner of be transferred to file encryption equipment 100 In.
In specific implementation, file encryption equipment 100 can both use hardware encryption mode, can also use soft encryption side Formula.Both modes are illustrated respectively below.
If file encryption equipment 100 uses hardware encryption mode, file encryption equipment 100 specifically can be hardware encryption Machine, hardware encryption equipment refer to the equipment encrypted using hardware encryption lock to file, which can be encryption U Disk, encrypted card, the equipment such as encryption U-shield.When file encryption equipment 100 is using hardware encryption mode, it can be realized parallel in large quantity Encryption improves encryption efficiency rapidly to encrypt to a large amount of file.
If file encryption equipment 100 is using soft encryption mode, particular by specific cipher table or Encryption Algorithm, File is encrypted.Wherein, common file encryption algorithm has: pseudo random number Encryption Algorithm, order Encryption Algorithm, byte-by-byte Exclusive or Encryption Algorithm etc..In specific implementation, the built-in a set of algorithm of file encryption equipment 100, using Unified Algorithm to difference File is encrypted;This document encrypt equipment 100 also it is built-in cover algorithm, using different algorithms to different files respectively into Row encryption.
For example: the manager of certain enterprise wants that two files (file 1 and file 2) are encrypted, the pipe File on the computer of oneself is transmitted in file encryption equipment 100 by reason person by USB data line, file encryption equipment 100 Pass through the Encryption Algorithm 1 and Encryption Algorithm 2 built in it, (such as pseudo random number Encryption Algorithm and order Encryption Algorithm), using puppet Random number encryption algorithm encrypts file 1, is encrypted using order Encryption Algorithm to file 2, respectively obtains each text The corresponding encryption file of part.
File is encrypted in advance by file encryption equipment 100 to obtain encryption file, so that the plaintext of file is not right It is outer visible;Reader can just obtain the plaintext of file after must decrypting by corresponding file decryption equipment to it, can just read The plaintext of file is read, therefore, by the encryption of file encryption equipment 100, accomplishes fluently data confidentiality basis for file is leakage-preventing.
File is encrypted by file encryption equipment 100 to obtain corresponding encryption file, if limited reader Reading file is wanted, then encryption file must be decrypted correctly and watermark processing by file decryption equipment 200, it can See file.
Wherein, file decryption equipment 200 includes: file decryption module 201 and watermark module 202;
File decryption module 201, for being decrypted to obtain the file to the encryption file, and by the file and Unique features value is transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates, can The characteristic value of file decryption equipment described in unique identification;
The watermark information is added to institute for generating watermark information according to the unique features value by watermark module 202 It states in file, to obtain the file with watermark.
The treatment process of modules about file decryption equipment 200 can be found in the realization of embodiment illustrated in fig. 2.
It should be noted that file encryption equipment 100 and file decryption equipment 200 are needed using corresponding encryption and decryption mode Realize corresponding function, but there is no hardware annexation between file encryption equipment 100 and file decryption equipment 200, two Equipment is independent from each other.
In practical applications, which may include a file encryption equipment 100 and a file decryption equipment 200, It may include a file encryption equipment 100 and multiple file decryption equipment 200, it is of course also possible to include multiple file encryptions Equipment 100 and multiple file decryption equipment 200, that is, the file encryption equipment and file decryption equipment for being included in the system Number and without limitation, as long as each equipment can be realized above-described corresponding function.
Document handling system provided by the embodiments of the present application encrypts file by file encryption equipment, is added Ciphertext part;When limited reader has the reading to the encryption file to need, the encryption file is carried out using file decryption module Decryption obtains above-mentioned file, and generates one and the unique corresponding unique features value of above-mentioned file decryption equipment, by above-mentioned text Part and the unique features value are transmitted to watermark module;Watermark information is generated according to above-mentioned unique features value by watermark module, and will The watermark information is added in the file of above-mentioned decryption, obtains the file with watermark.Once this document is leaked, then pass through The watermark information can be traced to corresponding file decryption equipment, and the limited reader using this document decryption device.
It is the explanation carried out to document handling system provided by the embodiments of the present application above.Hereafter the application is implemented The file decryption equipment that example provides is introduced.
First by taking enterprise's application scenarios as an example, to the field of file decryption equipment provided by the embodiments of the present application in practical applications Scape is briefly described.
Company manager preassigns the limited reader of file according to actual file security demand, is each limited Reader distributes file decryption equipment, and decipherment algorithm used by this document decryption device is to use to add with file encryption equipment The corresponding decipherment algorithm of close algorithm, each file decryption equipment be it is independent, uniquely, there is unique identification, therefore, by When limiting reader using file decryption equipment decryption file, limited read just is established by the unique identification of this document decryption device The corresponding relationship between file after reader and decryption, which is to chase after the first day of the lunar month source of divulging a secret and establish data basis.
Referring to fig. 2, Fig. 2 is the structure chart of file decryption equipment provided by the embodiments of the present application.As shown in Fig. 2, this document Decryption device 200 includes: file decryption module 201 and watermark module 202;
Wherein, file decryption module 201 obtain the file for the encryption file to be decrypted, and will be described File and unique features value are transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates , it is capable of the characteristic value of file decryption equipment described in unique identification.
In specific implementation, file encryption module 201 are decrypted encryption file using preset decipherment algorithm, obtain Corresponding file after to decryption, and generate the unique features value that can be identified for that this document decryption device 200.For example, this is unique Characteristic value can be the hardware number of this document decryption device 200, which is also possible to this document encrypting module 201 The production sequence number of chip, etc..
Optionally, above-mentioned file decryption module 201, can be intelligent code key.
The intelligent code key is combined with a new generation's text of contemporary cryptology technology, smart card techniques and SD interface technology Part decryption device, encryption file can be decrypted as plaintext or intelligent code key or be mentioned in intelligent code key It is logical by the above specific decryption by the intelligent code key for the specific decryption channel of the terminals such as itself and computer or mobile phone Road transmits specific key to the terminal device of connection, will encrypt file decryption in plain text using the key, this is not in plain text The visible form of user, needs to be returned to intelligent code key, carries out subsequent watermarking processing.
Specifically, for encryption file, each limited reader has an intelligent code key, every intelligent cipher Key in key is also different, only knows the limited reader of key, and intelligent code key could be utilized to encryption text Part is decrypted, even if other people obtain this document decryption device, but it does not know that the intelligence in this document decryption device is close The key of code key, also can not be to file decryption, and then is unable to get file.Therefore limited reader needs the intelligence using oneself Can cipher key, will encryption file decryption be in plain text, at the same time, the intelligent code key can produce one it is corresponding Unique features value characterizes the identity of reader.
Optionally, the unique features value which provides is the ID of intelligent code key.
File decryption module 201 not only realizes the decryption for encrypting file, and also generates one for characterizing file The unique features value of file decryption equipment 200 belonging to deciphering module 201 establishes file decryption module by the unique features value Plaintext and the one-to-one relationship of file decryption equipment 200 after 201 decryption.
The watermark information is added to institute for generating watermark information according to the unique features value by watermark module 202 It states in file, to obtain the file with watermark.
Watermark information refers to the certain specific informations added with certain algorithm to file, realizes the discrimination function of file uniqueness Energy.
Watermark module 202 receives the file and unique features value that file decryption module 201 is sent, and utilizes the unique features Value generation watermark information, then the watermark information generated relationship corresponding with 200 existence anduniquess of file decryption equipment, and file decryption Equipment 200 is pre-assigned to limited reader, so, there is also one-to-one correspondence with limited reader for the watermark information of generation Relationship.
Specifically, watermark information is added in file by watermark module 202 in the form of dark line, and generating has watermark File will not influence the ornamental and integrality of file.
By the acquisition of watermark module 202 and the unique corresponding characteristic value of file decryption equipment 200, watermark information is generated, Watermark information is added in the file after file decryption module 201 is decrypted.So that file has had before visible by user Have unique watermark information, once this document is leaked out, then according to the watermark information can trace back to this document be from What which file decryption equipment was spread away.
Optionally, file decryption equipment 200 may also include that encryption file introducting interface 203,
File introducting interface 203 is encrypted, for receiving above-mentioned encryption file, and is transmitted to file decryption module 201.
The encryption file introducting interface 203 can be the encryption text for receiving and directly transmitting from file encryption equipment 100 Part is also possible to receive the encryption file sent from a certain terminal device for preserving the encryption file, specific received text Part is the storage location depending on the encryption file from which equipment.
In specific implementation, the encryption file introducting interface 203, can be integrated in file decryption module 201 one A interface is also possible to an individual interface module.Encrypt file introducting interface 203 and send encryption file terminal it Between, it can be by the way of wirelessly communicating (such as bluetooth), it can also be by the way of wire communication (such as USB data line). Encryption file introducting interface 203 is sent to file decryption module 201 for file is encrypted.
Optionally, this document decryption device 200 further include: input module 204, for receiving the personal letter of user's input Breath, and the personal information is sent to the watermark module 202.
After increasing input module 204, watermark module 202 generates water according to the unique features value and the personal information Official seal breath, the watermark information is added in the file, to obtain the file with watermark.
In specific implementation, which can be integrated in the soft keyboard or hard in file decryption equipment 200 Keyboard, as U-shield touch screen on Keysheet module or entity touch keyboard;Wherein, the personal information of user's input refers to It is capable of the information such as the information of unique identification user, such as user identity card information, name, work number, individual mailbox.
The personal information that the user received inputs is sent to watermark module 202 by input module 204, then watermark module The userspersonal information that the 202 unique features values sent according to file decryption module 201 and input module 204 transmit, generates water Official seal breath, then the watermark information can either characterize the unique identification of file decryption equipment, and can characterize user identity.Watermark module The watermark information is added to the file for generating in file and having watermark by 202, then can quickly be oriented by the watermark information The reader of this document then can rapidly and accurately trace blabber once this document is leaked.
Optionally, this document decryption device 200 further include: watermark parameters selecting module 205, for provide display for The watermark parameters of family selection, and the watermark parameters that user is chosen are sent to the watermark module 202;Wherein, watermark parameters, can It include: watermark style, font, size, position, pattern etc..
Then after increasing watermark parameters selecting module 205, watermark module 202 is according to unique features value and selected water It prints parameter and generates watermark information, watermark information is added in the file, to obtain the file with watermark.
The watermark parameters selecting module 205 is the watermark parameters option that user provides, comprising: watermark font, size, position It sets, pattern etc..It, be according to user for the selection feelings of watermark parameters when watermark information is added in file by watermark module 202 Condition (for example the font of watermark information is the Song typeface, size is No. three, the lower right corner that position is every page, and certainly according to interest addition The picture of definition), handle corresponding watermark information.
In specific implementation, watermark parameters selecting module 205 can be integrated in having in file decryption equipment 200 The module (such as touch display screen) of display and input function shows the watermark parameters for user's selection by touch display screen, And receive the selection operation of user's selection.The watermark parameters that watermark parameters selecting module 205 chooses user are sent to watermark Module 202, the unique features value and watermark parameters selecting module 205 that watermark module 202 is sent according to file decryption module 201 pass The watermark parameters sent generate watermark information, will generate watermark information and are added in file, obtain the file with watermark.
Watermark parameters selecting module 205, can provide it is a variety of for user selection watermark parameters, watermark module 202 Watermark information is generated according to the watermark parameters and unique features value of selection, and the watermark information is added in the file of decryption, Keep the watermark form of the file with watermark more flexible, meets limited reader to the individual demand of watermark, it is ensured that every The diversity for the file with watermark that a limited reader obtains.
Optionally, file decryption equipment 200 further includes display module 206, for showing the file with watermark.
In specific implementation, display module 206 can be integrated in the display screen in file decryption equipment.Watermark module File with watermark is sent to the display module 206 by 202, carries out the display with the file of watermark, for being limited reader It is read.
Optionally, file decryption equipment 200 further includes communication module 207, is set for file decryption equipment 200 with terminal Communication between standby, the file with watermark is transmitted on terminal device.
In order to which more convenient limited reader reads and operates, this document decryption device 200 is made more to be bonded user Demand needs for the above-mentioned file with watermark to be transferred to the terminal device of easy-to-read or storage by communication module 207 On.
In specific implementation, which can be wireless communication module such as wifi module, bluetooth module, etc., The communication module 207 is also possible to wire communication module, such as USB interface, terminal device is connected by USB data line, with reality The transmission of existing file.
For the description of above-described embodiment, it should be strongly noted that, this document different from conventional file decryption equipment Encryption file decryption is not only that in plain text, can also generate one on the basis of original file decryption module by decryption device 200 Unique features value corresponding with file decryption equipment, watermark module generate corresponding watermark information using the unique features value, add It is added in file, has one with file decryption equipment by the file with watermark that file decryption equipment decrypts in this way One-to-one correspondence allows the file of leakage that can find unique corresponding file decryption equipment according to the watermark in file, in turn Determine the limited reader using this document decryption device, that is, find the source of divulging a secret.
In order to more clearly explain the scheme of above-described embodiment, below by an example to provided by the embodiments of the present application Scheme illustrates.
In some enterprise, there are classified papers A, manager passes through file in order to ensure the safety of above-mentioned classified papers A Encryption equipment 100 encrypts it, obtains corresponding encryption file A ', and be stored in the public Cyberspace of department.Due to portion Door need of work, specifying limited reader is first, second, the third three people, everyone distributes a file decryption equipment, and referring to fig. 2, Each file decryption equipment includes: encryption file introducting interface 203, file decryption module 201, input module 204, watermark ginseng Number selecting module 205, display module 206, watermark module 202, communication module 207.Wherein, each file decryption equipment has it Unique ID.
Assuming that the file decryption equipment of first is X1, ID 000, the file decryption equipment of second is X2, ID 666, third File decryption equipment be X3, ID 888.
If first wants reading file A, it is necessary first to pass through the encryption file introducting interface of the file decryption equipment of oneself 203, encryption file A ' is transmitted to the file decryption module 201 of X1 from public space;File decryption module 201 decrypts A ' For plaintext A, and unique features value 000 is generated, A and 000 are sent to watermark module 202;Then, the file decryption equipment X1 of first Prompt input ID card No., first inputs 100010001000100, after the completion of input in input module 204, in the watermark of X1 The display format by the digital processing in watermark for capitalization is selected in parameter selecting module 205, level is shown in file A every page Middle, font is the Song typeface, and font size is No. two;After selecting above-mentioned watermark parameters, watermark module 202 by above-mentioned watermark parameters, The ID card No. of ID and user's first generates unique watermark information, is added on file A, obtains A1;On display module 206 Display is added to the file of watermark;In order to which more convenient first is read, therefore, by A1 by communication module 207 with the shape of bluetooth Formula is sent on the terminal Y1 of first.
Similarly, what is obtained in the terminal of second is to carry the watermark letter that number and ID (666) generation of X2 are demonstrate,proved by own identification The file A2 of breath, what is obtained in third terminal is to carry the watermark information generated by the ID (888) that own identification demonstrate,proves number and X3 File A3.As it can be seen that is each obtained after file decryption equipment decryption of the limited reader using oneself there are different watermarks to believe The file of breath is based on this, and counter can chase after north this document by watermark information is which limited reader utilizes which file decryption What equipment obtained.
Once in other cases, hair existing file A1 is revealed on network or other carriers, this can be uniquely determined The leakage source of a file is file decryption equipment X1, and the reader of leakage is first.
File decryption equipment provided by the embodiments of the present application is added to for file with energy during decrypting file Enough identify the watermark of this document decryption device.Therefore, the reading once this document is opened just has on this document unique Watermark, the watermark and file decryption equipment be it is unique corresponding, watermark can be seen by human eye, therefore, even if this document quilt It leaks out, just would know that it is to reveal by file decryption equipment, and then determination is which reader leaks out according to watermark It goes.Therefore, the file decryption equipment of the application can achieve the effect that file prevents that source of divulging a secret can be traced after divulging a secret and divulging a secret.
It is the explanation carried out to file decryption equipment provided by the embodiments of the present application above.Hereafter the application is implemented The method for the file process that example provides is introduced.
It is the flow chart of the method for file process provided by the embodiments of the present application referring to Fig. 3, Fig. 3.As shown in figure 3, in text Part decryption device side, the method that this document is handled include:
Step 301, encryption file is received, which is decrypted to obtain file, and generating being capable of unique identification The unique features value of file decryption equipment.
The concrete processing procedure of the step 301 can be found in the realization of figure 2 above illustrated embodiment.
Step 302, watermark information is generated according to above-mentioned unique features value, which is added to the file after decryption In, to obtain the file with watermark.
The concrete processing procedure of the step 302 can be found in the realization of figure 2 above illustrated embodiment.
The method of file process provided by the embodiments of the present application is based on file decryption equipment side, in the mistake of decryption file Cheng Zhong, with decipherment algorithm by encrypt file decryption be plaintext while, for file be added to have can be identified for that file decryption is set The watermark that standby characteristic value generates.Therefore, encryption file is decrypted in document handling method in this way, the text after decryption Part is once leaked out, and just would know that the file of the leakage is decrypted by which file decryption equipment according to watermark , and then determination is which reader leaks out.Therefore, document handling method provided by the embodiments of the present application, Neng Gouda The effect that source of divulging a secret can be traced after divulging a secret and divulging a secret is prevented to file.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, service Device computer, handheld device or portable device, laptop device, multicomputer system, microprocessor-based system, top set Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment Distributed computing environment etc..
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The present invention can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.

Claims (10)

1. a kind of document handling system, which is characterized in that the system comprises:
File encryption equipment and file decryption equipment;
The file encryption equipment obtains encryption file for being encrypted to file;
The file decryption equipment includes: file decryption module and watermark module;
Wherein, the file decryption module, for being decrypted to obtain the file to the encryption file, and by the file The watermark module is transmitted to unique features value;Wherein, the unique features value is that the file decryption module generates, energy The characteristic value of file decryption equipment described in enough unique identifications;
The watermark information is added to described by the watermark module for generating watermark information according to the unique features value In file, to obtain the file with watermark.
2. a kind of file decryption equipment, which is characterized in that the file decryption equipment includes:
File decryption module and watermark module;
Wherein, the file decryption module, for being decrypted to obtain the file to encryption file, and by the file and only One characteristic value is transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates, Neng Gouwei The characteristic value of the one mark file decryption equipment;
The watermark information is added to described by the watermark module for generating watermark information according to the unique features value In file, to obtain the file with watermark.
3. file decryption equipment according to claim 2, which is characterized in that the file decryption module is intelligent cipher key Spoon.
4. file decryption equipment according to claim 3, which is characterized in that unique spy that the intelligent code key provides Value indicative is the device id of the intelligent code key.
5. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: watermark Parameter selecting module;
The watermark parameters selecting module, for providing the watermark parameters for user's selection, and the watermark that user is chosen is joined Number is sent to the watermark module;
The then watermark module, specifically for generating watermark information according to the unique features value and selected watermark parameters, The watermark information is added in the file, to obtain the file with watermark.
6. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: input Module;
The personal information for receiving the personal information of user's input, and is sent to the watermark mould by the input module Block;
The then watermark module is specifically used for generating watermark information according to the unique features value and the personal information, by institute It states watermark information to be added in the file, to obtain the file with watermark.
7. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: display Module;
The display module, for showing the file with watermark.
8. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: communication Module;
The file with watermark is transmitted to the terminal for being communicated with terminal device by the communication module Equipment.
9. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: encryption File introducting interface;
The encryption file introducting interface, for receiving the encryption file, and is transmitted to the file decryption module.
10. a kind of document handling method, which is characterized in that the method is applied to file decryption equipment side, which comprises
Encryption file is received, the encryption file is decrypted to obtain the file, and generating being capable of unique identification file solution The unique features value of close equipment;
Watermark information is generated according to the unique features value, the watermark information is added in the file, to be had The file of watermark.
CN201710835371.5A 2017-09-15 2017-09-15 A kind of document handling method, system and file decryption equipment Pending CN109508518A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710835371.5A CN109508518A (en) 2017-09-15 2017-09-15 A kind of document handling method, system and file decryption equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710835371.5A CN109508518A (en) 2017-09-15 2017-09-15 A kind of document handling method, system and file decryption equipment

Publications (1)

Publication Number Publication Date
CN109508518A true CN109508518A (en) 2019-03-22

Family

ID=65745126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710835371.5A Pending CN109508518A (en) 2017-09-15 2017-09-15 A kind of document handling method, system and file decryption equipment

Country Status (1)

Country Link
CN (1) CN109508518A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489945A (en) * 2019-07-26 2019-11-22 山东科技大学 A kind of biographic information protection and retroactive method of divulging a secret
CN113536349A (en) * 2021-07-23 2021-10-22 优材优建(青岛)电子商务科技有限公司 Bidding quotation anti-leakage method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217280A1 (en) * 2002-05-17 2003-11-20 Keaton Thomas S. Software watermarking for anti-tamper protection
CN1558594A (en) * 2004-01-14 2004-12-29 哈尔滨工业大学 Method of handling secrecy, authentication, authority management and dispersion control for electronic files
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN102073826A (en) * 2009-08-26 2011-05-25 奥多比公司 System and method for digital copyright management using lightweight digital watermark adding component
CN102222195A (en) * 2011-07-29 2011-10-19 飞天诚信科技股份有限公司 E-book reading method and system
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
US20170099149A1 (en) * 2015-10-02 2017-04-06 Sonimark, Llc System and Method for Securing, Tracking, and Distributing Digital Media Files

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217280A1 (en) * 2002-05-17 2003-11-20 Keaton Thomas S. Software watermarking for anti-tamper protection
CN1558594A (en) * 2004-01-14 2004-12-29 哈尔滨工业大学 Method of handling secrecy, authentication, authority management and dispersion control for electronic files
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN102073826A (en) * 2009-08-26 2011-05-25 奥多比公司 System and method for digital copyright management using lightweight digital watermark adding component
CN102347836A (en) * 2010-04-30 2012-02-08 龚华清 Electronic document protected view system and method
CN102222195A (en) * 2011-07-29 2011-10-19 飞天诚信科技股份有限公司 E-book reading method and system
US20170099149A1 (en) * 2015-10-02 2017-04-06 Sonimark, Llc System and Method for Securing, Tracking, and Distributing Digital Media Files

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489945A (en) * 2019-07-26 2019-11-22 山东科技大学 A kind of biographic information protection and retroactive method of divulging a secret
CN113536349A (en) * 2021-07-23 2021-10-22 优材优建(青岛)电子商务科技有限公司 Bidding quotation anti-leakage method

Similar Documents

Publication Publication Date Title
US9253167B2 (en) Device and system for facilitating communication and networking within a secure mobile environment
CN105007155B (en) Quick Response Code mask encryption and decryption approaches and system
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
CN101056166B (en) A method for improving the data transmission security
CN102088349B (en) Personalized method and system of intelligent card
CN105553951A (en) Data transmission method and data transmission device
JP3917679B2 (en) High bandwidth cryptographic system with low bandwidth cryptographic module
CN103248476B (en) The management method of data encryption key, system and terminal
CN105306194A (en) Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103886263A (en) Method and system for protecting data in mobile terminal
CN104657670A (en) Data encryption based safety use method of configuration file
CN104424446A (en) Safety verification and transmission method and system
CN106101150A (en) The method and system of AES
CN109600725A (en) A kind of message encryption method based on SM9 algorithm
CN106790259A (en) A kind of asymmetric across cryptographic system re-encryption, decryption method and system
Idrizi et al. Analyzing the speed of combined cryptographic algorithms with secret and public key
CN110191136A (en) A kind of convenient and fast file secure transmission method and equipment
CN102833077A (en) Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card
CN104717643A (en) Mobile device safety communication platform
CN109508518A (en) A kind of document handling method, system and file decryption equipment
CN101394411B (en) Safe packet transmission system and method
CN101383825A (en) Method, apparatus and terminal implementing computer file ciphering
CN107493287A (en) Industry control network data security system
CN102761417A (en) Method for processing data transmission of terminals and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322