CN109508518A - A kind of document handling method, system and file decryption equipment - Google Patents
A kind of document handling method, system and file decryption equipment Download PDFInfo
- Publication number
- CN109508518A CN109508518A CN201710835371.5A CN201710835371A CN109508518A CN 109508518 A CN109508518 A CN 109508518A CN 201710835371 A CN201710835371 A CN 201710835371A CN 109508518 A CN109508518 A CN 109508518A
- Authority
- CN
- China
- Prior art keywords
- file
- watermark
- module
- equipment
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000004891 communication Methods 0.000 claims description 19
- 238000012545 processing Methods 0.000 abstract description 7
- 230000000694 effects Effects 0.000 abstract description 5
- 238000005516 engineering process Methods 0.000 description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application provides a kind of document handling method, system and file decryption equipment, this document processing system specific work process are as follows: file is encrypted to encryption file by file encryption equipment, reader could open encrypted file by file decryption equipment, and file decryption equipment is added to for file with the watermark that can be identified for that this document decryption device during decrypting file.Therefore, the reading as long as file is opened, have on this document with the uniquely corresponding watermark of file decryption equipment, once this document is leaked out, just would know that be this document to be to decrypt by which file decryption equipment, and then determine leaked out from which reader according to watermark.Therefore, document handling system and method provided by the embodiments of the present application can be realized the effect that file prevents traceable source of divulging a secret after divulging a secret and divulging a secret.
Description
Technical field
The present invention relates to encryption and decryption technology fields more particularly to a kind of document handling method, system and file decryption to set
It is standby.
Background technique
With the development of internet, the propagation of file in a network, while offering convenience to the work and life of people,
Sometimes it also will appear the problem of file is divulged a secret, especially, the classified papers of government and enterprise will be leaked in recent years, lead to secret
File often occurs on network.However, but there are no a kind of effectively means to go to prevent classified papers from being let out for government and enterprise
Reveal on network, does not also know that classified papers are leaked out from where.
Summary of the invention
In view of this, can effectively achieve file this application provides a kind of document handling method and system and prevent divulging a secret
And the effect in source of divulging a secret can be traced after divulging a secret.
In addition, present invention also provides a kind of file decryption equipment, to guarantee the application and reality of the above method in practice
It is existing.
A kind of document handling system is provided in the application first aspect, which includes: file encryption equipment and file
Decryption device;
File encryption equipment obtains encryption file for being encrypted to file.
File decryption equipment includes: file decryption module and watermark module;
Wherein, file decryption module obtains file for above-mentioned encryption file to be decrypted, and by this document and uniquely
Characteristic value is transmitted to watermark module;Wherein, the unique features value is that the file decryption module generates, being capable of unique identification
The characteristic value of the file decryption equipment.
The watermark information is added to described by watermark module for generating watermark information according to the unique features value
In file, to obtain the file with watermark.
A kind of file decryption equipment is provided in the application second aspect, this document decryption device includes: file decryption mould
Block and watermark module;
Wherein, file decryption module, for being decrypted to obtain file to encryption file, and by this document and unique features
Value is transmitted to watermark module;Wherein, the unique features value is that the file decryption module generates, can be described in unique identification
The characteristic value of file decryption equipment.
Watermark information is added to file for generating watermark information according to the unique features value received by watermark module
In, to obtain the file with watermark.
Optionally, this document decryption device can be intelligent code key.
So, the unique features value which provides, can be the device id of intelligent code key.
Optionally, this document decryption device further include: watermark parameters selecting module;
The watermark parameters selecting module, for providing the watermark parameters for user's selection, and the watermark that user is chosen
Parameter is sent to the watermark module.
Then watermark module, specifically for generating watermark information according to the unique features value and selected watermark parameters,
The watermark information is added in the file, to obtain the file with watermark.
Optionally, this document decryption device further include: input module;
The personal information for receiving the personal information of user's input, and is sent to the watermark by the input module
Module.
Then watermark module is specifically used for generating watermark information according to the unique features value and the personal information, by institute
It states watermark information to be added in the file, to obtain the file with watermark.
Optionally, this document decryption device further include: display module;
Display module, for showing the file with watermark.
Optionally, this document decryption device further include: communication module;
The file with watermark is transmitted to the terminal for being communicated with terminal device by communication module
Equipment.
Optionally, this document decryption device further include: encryption file introducting interface;
File introducting interface is encrypted, for receiving the encryption file, and is transmitted to the file decryption module.
A kind of document handling method is provided in the application third aspect, is applied to file decryption equipment side, this method packet
It includes:
Receive encryption file, be decrypted to obtain file to encryption file, and generate can unique identification file decryption set
Standby unique features value;
Watermark information is generated according to above-mentioned unique features value, watermark information is added in file, to obtain with watermark
File.
Scheme provided by the present application has the advantages that
In the scheme of the application, file is encrypted to encryption file by file encryption equipment, and reader passes through file
Decryption device could open encrypted file, and file decryption equipment is added to tool during decrypting file for file
There is the watermark that can be identified for that this document decryption device, therefore, the reading once this document is opened just has an only nothing on this document
Two watermark, the watermark and file decryption equipment be it is unique corresponding, watermark can be seen by human eye, therefore, even if this article
Part is leaked out, and just would know that is revealed by file decryption equipment according to watermark, determines that out it is at which reader
It leaks out.Therefore, the scheme of the application can achieve the effect that file prevents that source of divulging a secret can be traced after divulging a secret and divulging a secret.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property
Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of document handling system provided by the embodiments of the present application;
Fig. 2 is the structural schematic diagram of file decryption equipment provided by the embodiments of the present application;
Fig. 3 is the flow chart of document handling method provided by the embodiments of the present application.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
Technical staff's every other embodiment obtained without creative efforts, all should belong to protection of the present invention
Range.
With the development of internet, the propagation of file in a network, while offering convenience to the work and life of people,
Sometimes it also will appear the problem of file is divulged a secret, especially, for business and government, there are many classified papers, these secrets
File is read and is referred to only for specific staff, is not suitable for widely being passed round and being used.But specified reader is reading
When classified papers, it is possible to classified papers are leaked to other people or are revealed in a network, divulging a secret for classified papers is caused, and
Due to the popularity and rapidity of Internet communication, the leakage of classified papers will cause immeasurable consequence and loss.
Certainly, in addition to business and government can encounter the problem of classified papers are divulged a secret, in practical applications, individual can also encounter
The problem of classified papers are divulged a secret, therefore, no matter enterprise, government or individual can be potentially encountered the problem of file is got compromised.
Based on this, this application provides a kind of document handling method, system and file decryption equipment, can effectively prevent
File is divulged a secret, also, when file is leaked, and the source of divulging a secret of file can be found in time, on the one hand in time by file
Scope control divulge a secret in minimum zone, reduces loss, on the other hand, discovery source of divulging a secret determines blabber, to ensure other
The safety of classified papers.
A kind of document handling system provided by the present application is first introduced below.
In practical applications, system provided by the embodiments of the present application can limit the reader of file, only limited reader
Distribute file decryption equipment, limited reader, which only passes through file decryption equipment, can just obtain file, could reading file, centainly
It ensure that the safety of file in degree, and this document decryption device can make watermark to file, watermark includes file decryption
Therefore the information of equipment unique identification once file is leaked, just can determine which file solution file is from by the watermark
Mi Shebeichu leakage, and then it is determined which is limited leakage from reader from.
It is a kind of structure chart of document handling system provided by the embodiments of the present application referring to Fig. 1, Fig. 1, as shown in Figure 1, should
System includes: file encryption equipment 100 and file decryption equipment 200;
Wherein, file encryption equipment 100 obtains encryption file for being encrypted to file.
In specific implementation, file refers to having for the coherent element for carrying out description content with text, number, letter and/or figure
Sequence sequence.There are many multiplicity, such as word, excel, ppt, pdf, text, html, GIF, etc. for the concrete form of file.
For enterprise, government, personally for, be related to secret file, classified papers, need to prevent file from divulging a secret, all may be used
Equipment 100 is encrypted by this document first file is encrypted.
For example, for enterprise, the file such as equipment operation of file, enterprise engineering operating aspect in terms of business administration
Regulation, drawing, process flow chart, division management specification, externally links up letters etc. at job instruction, these files are for enterprise
All it is important, more secret file for industry, needs to prevent file from divulging a secret, then company manager can first passes through this document
File is encrypted in encryption equipment 100, obtains corresponding encryption file.
For government, the article of some official document letters, the countries concerned's policy, theory etc. some dedicated is killed
Malicious software, working software etc. are all classified papers, when needing to prevent file from divulging a secret, all equipment 100 can be encrypted by this document first
File is encrypted.
Personally for, the personal contract signed, bank transaction file, file comprising secret identity information, etc.,
These files are all unusual secrets, very important to individual, therefore, for these files, when needing to prevent file from divulging a secret,
All equipment 100 can be encrypted by this document first file is encrypted.
In specific implementation, user determines which file needs prevents from divulging a secret, then file is input to this document encryption and set
It is encrypted in standby 100, voluntarily determines which secret file needs prevents from divulging a secret by user, which classified papers needs anti-
Stopping leak is close, etc..
In specific implementation, file encryption equipment 100 can obtain electricity by way of wire communication or wireless communication
File on the terminal devices such as brain or mobile phone.According to wired communication mode, user can be by terminals such as computer or mobile phones
On file be transferred in file encryption equipment 100 by modes such as USB data lines;According to communication, Yong Huke
By be by the file in the terminals such as computer or mobile phone by WIFI or bluetooth etc. in a manner of be transferred to file encryption equipment 100
In.
In specific implementation, file encryption equipment 100 can both use hardware encryption mode, can also use soft encryption side
Formula.Both modes are illustrated respectively below.
If file encryption equipment 100 uses hardware encryption mode, file encryption equipment 100 specifically can be hardware encryption
Machine, hardware encryption equipment refer to the equipment encrypted using hardware encryption lock to file, which can be encryption U
Disk, encrypted card, the equipment such as encryption U-shield.When file encryption equipment 100 is using hardware encryption mode, it can be realized parallel in large quantity
Encryption improves encryption efficiency rapidly to encrypt to a large amount of file.
If file encryption equipment 100 is using soft encryption mode, particular by specific cipher table or Encryption Algorithm,
File is encrypted.Wherein, common file encryption algorithm has: pseudo random number Encryption Algorithm, order Encryption Algorithm, byte-by-byte
Exclusive or Encryption Algorithm etc..In specific implementation, the built-in a set of algorithm of file encryption equipment 100, using Unified Algorithm to difference
File is encrypted;This document encrypt equipment 100 also it is built-in cover algorithm, using different algorithms to different files respectively into
Row encryption.
For example: the manager of certain enterprise wants that two files (file 1 and file 2) are encrypted, the pipe
File on the computer of oneself is transmitted in file encryption equipment 100 by reason person by USB data line, file encryption equipment 100
Pass through the Encryption Algorithm 1 and Encryption Algorithm 2 built in it, (such as pseudo random number Encryption Algorithm and order Encryption Algorithm), using puppet
Random number encryption algorithm encrypts file 1, is encrypted using order Encryption Algorithm to file 2, respectively obtains each text
The corresponding encryption file of part.
File is encrypted in advance by file encryption equipment 100 to obtain encryption file, so that the plaintext of file is not right
It is outer visible;Reader can just obtain the plaintext of file after must decrypting by corresponding file decryption equipment to it, can just read
The plaintext of file is read, therefore, by the encryption of file encryption equipment 100, accomplishes fluently data confidentiality basis for file is leakage-preventing.
File is encrypted by file encryption equipment 100 to obtain corresponding encryption file, if limited reader
Reading file is wanted, then encryption file must be decrypted correctly and watermark processing by file decryption equipment 200, it can
See file.
Wherein, file decryption equipment 200 includes: file decryption module 201 and watermark module 202;
File decryption module 201, for being decrypted to obtain the file to the encryption file, and by the file and
Unique features value is transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates, can
The characteristic value of file decryption equipment described in unique identification;
The watermark information is added to institute for generating watermark information according to the unique features value by watermark module 202
It states in file, to obtain the file with watermark.
The treatment process of modules about file decryption equipment 200 can be found in the realization of embodiment illustrated in fig. 2.
It should be noted that file encryption equipment 100 and file decryption equipment 200 are needed using corresponding encryption and decryption mode
Realize corresponding function, but there is no hardware annexation between file encryption equipment 100 and file decryption equipment 200, two
Equipment is independent from each other.
In practical applications, which may include a file encryption equipment 100 and a file decryption equipment 200,
It may include a file encryption equipment 100 and multiple file decryption equipment 200, it is of course also possible to include multiple file encryptions
Equipment 100 and multiple file decryption equipment 200, that is, the file encryption equipment and file decryption equipment for being included in the system
Number and without limitation, as long as each equipment can be realized above-described corresponding function.
Document handling system provided by the embodiments of the present application encrypts file by file encryption equipment, is added
Ciphertext part;When limited reader has the reading to the encryption file to need, the encryption file is carried out using file decryption module
Decryption obtains above-mentioned file, and generates one and the unique corresponding unique features value of above-mentioned file decryption equipment, by above-mentioned text
Part and the unique features value are transmitted to watermark module;Watermark information is generated according to above-mentioned unique features value by watermark module, and will
The watermark information is added in the file of above-mentioned decryption, obtains the file with watermark.Once this document is leaked, then pass through
The watermark information can be traced to corresponding file decryption equipment, and the limited reader using this document decryption device.
It is the explanation carried out to document handling system provided by the embodiments of the present application above.Hereafter the application is implemented
The file decryption equipment that example provides is introduced.
First by taking enterprise's application scenarios as an example, to the field of file decryption equipment provided by the embodiments of the present application in practical applications
Scape is briefly described.
Company manager preassigns the limited reader of file according to actual file security demand, is each limited
Reader distributes file decryption equipment, and decipherment algorithm used by this document decryption device is to use to add with file encryption equipment
The corresponding decipherment algorithm of close algorithm, each file decryption equipment be it is independent, uniquely, there is unique identification, therefore, by
When limiting reader using file decryption equipment decryption file, limited read just is established by the unique identification of this document decryption device
The corresponding relationship between file after reader and decryption, which is to chase after the first day of the lunar month source of divulging a secret and establish data basis.
Referring to fig. 2, Fig. 2 is the structure chart of file decryption equipment provided by the embodiments of the present application.As shown in Fig. 2, this document
Decryption device 200 includes: file decryption module 201 and watermark module 202;
Wherein, file decryption module 201 obtain the file for the encryption file to be decrypted, and will be described
File and unique features value are transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates
, it is capable of the characteristic value of file decryption equipment described in unique identification.
In specific implementation, file encryption module 201 are decrypted encryption file using preset decipherment algorithm, obtain
Corresponding file after to decryption, and generate the unique features value that can be identified for that this document decryption device 200.For example, this is unique
Characteristic value can be the hardware number of this document decryption device 200, which is also possible to this document encrypting module 201
The production sequence number of chip, etc..
Optionally, above-mentioned file decryption module 201, can be intelligent code key.
The intelligent code key is combined with a new generation's text of contemporary cryptology technology, smart card techniques and SD interface technology
Part decryption device, encryption file can be decrypted as plaintext or intelligent code key or be mentioned in intelligent code key
It is logical by the above specific decryption by the intelligent code key for the specific decryption channel of the terminals such as itself and computer or mobile phone
Road transmits specific key to the terminal device of connection, will encrypt file decryption in plain text using the key, this is not in plain text
The visible form of user, needs to be returned to intelligent code key, carries out subsequent watermarking processing.
Specifically, for encryption file, each limited reader has an intelligent code key, every intelligent cipher
Key in key is also different, only knows the limited reader of key, and intelligent code key could be utilized to encryption text
Part is decrypted, even if other people obtain this document decryption device, but it does not know that the intelligence in this document decryption device is close
The key of code key, also can not be to file decryption, and then is unable to get file.Therefore limited reader needs the intelligence using oneself
Can cipher key, will encryption file decryption be in plain text, at the same time, the intelligent code key can produce one it is corresponding
Unique features value characterizes the identity of reader.
Optionally, the unique features value which provides is the ID of intelligent code key.
File decryption module 201 not only realizes the decryption for encrypting file, and also generates one for characterizing file
The unique features value of file decryption equipment 200 belonging to deciphering module 201 establishes file decryption module by the unique features value
Plaintext and the one-to-one relationship of file decryption equipment 200 after 201 decryption.
The watermark information is added to institute for generating watermark information according to the unique features value by watermark module 202
It states in file, to obtain the file with watermark.
Watermark information refers to the certain specific informations added with certain algorithm to file, realizes the discrimination function of file uniqueness
Energy.
Watermark module 202 receives the file and unique features value that file decryption module 201 is sent, and utilizes the unique features
Value generation watermark information, then the watermark information generated relationship corresponding with 200 existence anduniquess of file decryption equipment, and file decryption
Equipment 200 is pre-assigned to limited reader, so, there is also one-to-one correspondence with limited reader for the watermark information of generation
Relationship.
Specifically, watermark information is added in file by watermark module 202 in the form of dark line, and generating has watermark
File will not influence the ornamental and integrality of file.
By the acquisition of watermark module 202 and the unique corresponding characteristic value of file decryption equipment 200, watermark information is generated,
Watermark information is added in the file after file decryption module 201 is decrypted.So that file has had before visible by user
Have unique watermark information, once this document is leaked out, then according to the watermark information can trace back to this document be from
What which file decryption equipment was spread away.
Optionally, file decryption equipment 200 may also include that encryption file introducting interface 203,
File introducting interface 203 is encrypted, for receiving above-mentioned encryption file, and is transmitted to file decryption module 201.
The encryption file introducting interface 203 can be the encryption text for receiving and directly transmitting from file encryption equipment 100
Part is also possible to receive the encryption file sent from a certain terminal device for preserving the encryption file, specific received text
Part is the storage location depending on the encryption file from which equipment.
In specific implementation, the encryption file introducting interface 203, can be integrated in file decryption module 201 one
A interface is also possible to an individual interface module.Encrypt file introducting interface 203 and send encryption file terminal it
Between, it can be by the way of wirelessly communicating (such as bluetooth), it can also be by the way of wire communication (such as USB data line).
Encryption file introducting interface 203 is sent to file decryption module 201 for file is encrypted.
Optionally, this document decryption device 200 further include: input module 204, for receiving the personal letter of user's input
Breath, and the personal information is sent to the watermark module 202.
After increasing input module 204, watermark module 202 generates water according to the unique features value and the personal information
Official seal breath, the watermark information is added in the file, to obtain the file with watermark.
In specific implementation, which can be integrated in the soft keyboard or hard in file decryption equipment 200
Keyboard, as U-shield touch screen on Keysheet module or entity touch keyboard;Wherein, the personal information of user's input refers to
It is capable of the information such as the information of unique identification user, such as user identity card information, name, work number, individual mailbox.
The personal information that the user received inputs is sent to watermark module 202 by input module 204, then watermark module
The userspersonal information that the 202 unique features values sent according to file decryption module 201 and input module 204 transmit, generates water
Official seal breath, then the watermark information can either characterize the unique identification of file decryption equipment, and can characterize user identity.Watermark module
The watermark information is added to the file for generating in file and having watermark by 202, then can quickly be oriented by the watermark information
The reader of this document then can rapidly and accurately trace blabber once this document is leaked.
Optionally, this document decryption device 200 further include: watermark parameters selecting module 205, for provide display for
The watermark parameters of family selection, and the watermark parameters that user is chosen are sent to the watermark module 202;Wherein, watermark parameters, can
It include: watermark style, font, size, position, pattern etc..
Then after increasing watermark parameters selecting module 205, watermark module 202 is according to unique features value and selected water
It prints parameter and generates watermark information, watermark information is added in the file, to obtain the file with watermark.
The watermark parameters selecting module 205 is the watermark parameters option that user provides, comprising: watermark font, size, position
It sets, pattern etc..It, be according to user for the selection feelings of watermark parameters when watermark information is added in file by watermark module 202
Condition (for example the font of watermark information is the Song typeface, size is No. three, the lower right corner that position is every page, and certainly according to interest addition
The picture of definition), handle corresponding watermark information.
In specific implementation, watermark parameters selecting module 205 can be integrated in having in file decryption equipment 200
The module (such as touch display screen) of display and input function shows the watermark parameters for user's selection by touch display screen,
And receive the selection operation of user's selection.The watermark parameters that watermark parameters selecting module 205 chooses user are sent to watermark
Module 202, the unique features value and watermark parameters selecting module 205 that watermark module 202 is sent according to file decryption module 201 pass
The watermark parameters sent generate watermark information, will generate watermark information and are added in file, obtain the file with watermark.
Watermark parameters selecting module 205, can provide it is a variety of for user selection watermark parameters, watermark module 202
Watermark information is generated according to the watermark parameters and unique features value of selection, and the watermark information is added in the file of decryption,
Keep the watermark form of the file with watermark more flexible, meets limited reader to the individual demand of watermark, it is ensured that every
The diversity for the file with watermark that a limited reader obtains.
Optionally, file decryption equipment 200 further includes display module 206, for showing the file with watermark.
In specific implementation, display module 206 can be integrated in the display screen in file decryption equipment.Watermark module
File with watermark is sent to the display module 206 by 202, carries out the display with the file of watermark, for being limited reader
It is read.
Optionally, file decryption equipment 200 further includes communication module 207, is set for file decryption equipment 200 with terminal
Communication between standby, the file with watermark is transmitted on terminal device.
In order to which more convenient limited reader reads and operates, this document decryption device 200 is made more to be bonded user
Demand needs for the above-mentioned file with watermark to be transferred to the terminal device of easy-to-read or storage by communication module 207
On.
In specific implementation, which can be wireless communication module such as wifi module, bluetooth module, etc.,
The communication module 207 is also possible to wire communication module, such as USB interface, terminal device is connected by USB data line, with reality
The transmission of existing file.
For the description of above-described embodiment, it should be strongly noted that, this document different from conventional file decryption equipment
Encryption file decryption is not only that in plain text, can also generate one on the basis of original file decryption module by decryption device 200
Unique features value corresponding with file decryption equipment, watermark module generate corresponding watermark information using the unique features value, add
It is added in file, has one with file decryption equipment by the file with watermark that file decryption equipment decrypts in this way
One-to-one correspondence allows the file of leakage that can find unique corresponding file decryption equipment according to the watermark in file, in turn
Determine the limited reader using this document decryption device, that is, find the source of divulging a secret.
In order to more clearly explain the scheme of above-described embodiment, below by an example to provided by the embodiments of the present application
Scheme illustrates.
In some enterprise, there are classified papers A, manager passes through file in order to ensure the safety of above-mentioned classified papers A
Encryption equipment 100 encrypts it, obtains corresponding encryption file A ', and be stored in the public Cyberspace of department.Due to portion
Door need of work, specifying limited reader is first, second, the third three people, everyone distributes a file decryption equipment, and referring to fig. 2,
Each file decryption equipment includes: encryption file introducting interface 203, file decryption module 201, input module 204, watermark ginseng
Number selecting module 205, display module 206, watermark module 202, communication module 207.Wherein, each file decryption equipment has it
Unique ID.
Assuming that the file decryption equipment of first is X1, ID 000, the file decryption equipment of second is X2, ID 666, third
File decryption equipment be X3, ID 888.
If first wants reading file A, it is necessary first to pass through the encryption file introducting interface of the file decryption equipment of oneself
203, encryption file A ' is transmitted to the file decryption module 201 of X1 from public space;File decryption module 201 decrypts A '
For plaintext A, and unique features value 000 is generated, A and 000 are sent to watermark module 202;Then, the file decryption equipment X1 of first
Prompt input ID card No., first inputs 100010001000100, after the completion of input in input module 204, in the watermark of X1
The display format by the digital processing in watermark for capitalization is selected in parameter selecting module 205, level is shown in file A every page
Middle, font is the Song typeface, and font size is No. two;After selecting above-mentioned watermark parameters, watermark module 202 by above-mentioned watermark parameters,
The ID card No. of ID and user's first generates unique watermark information, is added on file A, obtains A1;On display module 206
Display is added to the file of watermark;In order to which more convenient first is read, therefore, by A1 by communication module 207 with the shape of bluetooth
Formula is sent on the terminal Y1 of first.
Similarly, what is obtained in the terminal of second is to carry the watermark letter that number and ID (666) generation of X2 are demonstrate,proved by own identification
The file A2 of breath, what is obtained in third terminal is to carry the watermark information generated by the ID (888) that own identification demonstrate,proves number and X3
File A3.As it can be seen that is each obtained after file decryption equipment decryption of the limited reader using oneself there are different watermarks to believe
The file of breath is based on this, and counter can chase after north this document by watermark information is which limited reader utilizes which file decryption
What equipment obtained.
Once in other cases, hair existing file A1 is revealed on network or other carriers, this can be uniquely determined
The leakage source of a file is file decryption equipment X1, and the reader of leakage is first.
File decryption equipment provided by the embodiments of the present application is added to for file with energy during decrypting file
Enough identify the watermark of this document decryption device.Therefore, the reading once this document is opened just has on this document unique
Watermark, the watermark and file decryption equipment be it is unique corresponding, watermark can be seen by human eye, therefore, even if this document quilt
It leaks out, just would know that it is to reveal by file decryption equipment, and then determination is which reader leaks out according to watermark
It goes.Therefore, the file decryption equipment of the application can achieve the effect that file prevents that source of divulging a secret can be traced after divulging a secret and divulging a secret.
It is the explanation carried out to file decryption equipment provided by the embodiments of the present application above.Hereafter the application is implemented
The method for the file process that example provides is introduced.
It is the flow chart of the method for file process provided by the embodiments of the present application referring to Fig. 3, Fig. 3.As shown in figure 3, in text
Part decryption device side, the method that this document is handled include:
Step 301, encryption file is received, which is decrypted to obtain file, and generating being capable of unique identification
The unique features value of file decryption equipment.
The concrete processing procedure of the step 301 can be found in the realization of figure 2 above illustrated embodiment.
Step 302, watermark information is generated according to above-mentioned unique features value, which is added to the file after decryption
In, to obtain the file with watermark.
The concrete processing procedure of the step 302 can be found in the realization of figure 2 above illustrated embodiment.
The method of file process provided by the embodiments of the present application is based on file decryption equipment side, in the mistake of decryption file
Cheng Zhong, with decipherment algorithm by encrypt file decryption be plaintext while, for file be added to have can be identified for that file decryption is set
The watermark that standby characteristic value generates.Therefore, encryption file is decrypted in document handling method in this way, the text after decryption
Part is once leaked out, and just would know that the file of the leakage is decrypted by which file decryption equipment according to watermark
, and then determination is which reader leaks out.Therefore, document handling method provided by the embodiments of the present application, Neng Gouda
The effect that source of divulging a secret can be traced after divulging a secret and divulging a secret is prevented to file.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, service
Device computer, handheld device or portable device, laptop device, multicomputer system, microprocessor-based system, top set
Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, including any of the above system or equipment
Distributed computing environment etc..
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The present invention can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Claims (10)
1. a kind of document handling system, which is characterized in that the system comprises:
File encryption equipment and file decryption equipment;
The file encryption equipment obtains encryption file for being encrypted to file;
The file decryption equipment includes: file decryption module and watermark module;
Wherein, the file decryption module, for being decrypted to obtain the file to the encryption file, and by the file
The watermark module is transmitted to unique features value;Wherein, the unique features value is that the file decryption module generates, energy
The characteristic value of file decryption equipment described in enough unique identifications;
The watermark information is added to described by the watermark module for generating watermark information according to the unique features value
In file, to obtain the file with watermark.
2. a kind of file decryption equipment, which is characterized in that the file decryption equipment includes:
File decryption module and watermark module;
Wherein, the file decryption module, for being decrypted to obtain the file to encryption file, and by the file and only
One characteristic value is transmitted to the watermark module;Wherein, the unique features value is that the file decryption module generates, Neng Gouwei
The characteristic value of the one mark file decryption equipment;
The watermark information is added to described by the watermark module for generating watermark information according to the unique features value
In file, to obtain the file with watermark.
3. file decryption equipment according to claim 2, which is characterized in that the file decryption module is intelligent cipher key
Spoon.
4. file decryption equipment according to claim 3, which is characterized in that unique spy that the intelligent code key provides
Value indicative is the device id of the intelligent code key.
5. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: watermark
Parameter selecting module;
The watermark parameters selecting module, for providing the watermark parameters for user's selection, and the watermark that user is chosen is joined
Number is sent to the watermark module;
The then watermark module, specifically for generating watermark information according to the unique features value and selected watermark parameters,
The watermark information is added in the file, to obtain the file with watermark.
6. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: input
Module;
The personal information for receiving the personal information of user's input, and is sent to the watermark mould by the input module
Block;
The then watermark module is specifically used for generating watermark information according to the unique features value and the personal information, by institute
It states watermark information to be added in the file, to obtain the file with watermark.
7. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: display
Module;
The display module, for showing the file with watermark.
8. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: communication
Module;
The file with watermark is transmitted to the terminal for being communicated with terminal device by the communication module
Equipment.
9. file decryption equipment according to claim 2, which is characterized in that the file decryption equipment further include: encryption
File introducting interface;
The encryption file introducting interface, for receiving the encryption file, and is transmitted to the file decryption module.
10. a kind of document handling method, which is characterized in that the method is applied to file decryption equipment side, which comprises
Encryption file is received, the encryption file is decrypted to obtain the file, and generating being capable of unique identification file solution
The unique features value of close equipment;
Watermark information is generated according to the unique features value, the watermark information is added in the file, to be had
The file of watermark.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710835371.5A CN109508518A (en) | 2017-09-15 | 2017-09-15 | A kind of document handling method, system and file decryption equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710835371.5A CN109508518A (en) | 2017-09-15 | 2017-09-15 | A kind of document handling method, system and file decryption equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109508518A true CN109508518A (en) | 2019-03-22 |
Family
ID=65745126
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710835371.5A Pending CN109508518A (en) | 2017-09-15 | 2017-09-15 | A kind of document handling method, system and file decryption equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109508518A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110489945A (en) * | 2019-07-26 | 2019-11-22 | 山东科技大学 | A kind of biographic information protection and retroactive method of divulging a secret |
CN113536349A (en) * | 2021-07-23 | 2021-10-22 | 优材优建(青岛)电子商务科技有限公司 | Bidding quotation anti-leakage method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030217280A1 (en) * | 2002-05-17 | 2003-11-20 | Keaton Thomas S. | Software watermarking for anti-tamper protection |
CN1558594A (en) * | 2004-01-14 | 2004-12-29 | 哈尔滨工业大学 | Method of handling secrecy, authentication, authority management and dispersion control for electronic files |
CN1786867A (en) * | 2005-09-22 | 2006-06-14 | 深圳市江波龙电子有限公司 | Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof |
CN102073826A (en) * | 2009-08-26 | 2011-05-25 | 奥多比公司 | System and method for digital copyright management using lightweight digital watermark adding component |
CN102222195A (en) * | 2011-07-29 | 2011-10-19 | 飞天诚信科技股份有限公司 | E-book reading method and system |
CN102347836A (en) * | 2010-04-30 | 2012-02-08 | 龚华清 | Electronic document protected view system and method |
US20170099149A1 (en) * | 2015-10-02 | 2017-04-06 | Sonimark, Llc | System and Method for Securing, Tracking, and Distributing Digital Media Files |
-
2017
- 2017-09-15 CN CN201710835371.5A patent/CN109508518A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030217280A1 (en) * | 2002-05-17 | 2003-11-20 | Keaton Thomas S. | Software watermarking for anti-tamper protection |
CN1558594A (en) * | 2004-01-14 | 2004-12-29 | 哈尔滨工业大学 | Method of handling secrecy, authentication, authority management and dispersion control for electronic files |
CN1786867A (en) * | 2005-09-22 | 2006-06-14 | 深圳市江波龙电子有限公司 | Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof |
CN102073826A (en) * | 2009-08-26 | 2011-05-25 | 奥多比公司 | System and method for digital copyright management using lightweight digital watermark adding component |
CN102347836A (en) * | 2010-04-30 | 2012-02-08 | 龚华清 | Electronic document protected view system and method |
CN102222195A (en) * | 2011-07-29 | 2011-10-19 | 飞天诚信科技股份有限公司 | E-book reading method and system |
US20170099149A1 (en) * | 2015-10-02 | 2017-04-06 | Sonimark, Llc | System and Method for Securing, Tracking, and Distributing Digital Media Files |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110489945A (en) * | 2019-07-26 | 2019-11-22 | 山东科技大学 | A kind of biographic information protection and retroactive method of divulging a secret |
CN113536349A (en) * | 2021-07-23 | 2021-10-22 | 优材优建(青岛)电子商务科技有限公司 | Bidding quotation anti-leakage method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9253167B2 (en) | Device and system for facilitating communication and networking within a secure mobile environment | |
CN105007155B (en) | Quick Response Code mask encryption and decryption approaches and system | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
CN101056166B (en) | A method for improving the data transmission security | |
CN102088349B (en) | Personalized method and system of intelligent card | |
CN105553951A (en) | Data transmission method and data transmission device | |
JP3917679B2 (en) | High bandwidth cryptographic system with low bandwidth cryptographic module | |
CN103248476B (en) | The management method of data encryption key, system and terminal | |
CN105306194A (en) | Multiple encryption method and multiple encryption system for encrypting file and/or communication protocol | |
CN101720071A (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN103886263A (en) | Method and system for protecting data in mobile terminal | |
CN104657670A (en) | Data encryption based safety use method of configuration file | |
CN104424446A (en) | Safety verification and transmission method and system | |
CN106101150A (en) | The method and system of AES | |
CN109600725A (en) | A kind of message encryption method based on SM9 algorithm | |
CN106790259A (en) | A kind of asymmetric across cryptographic system re-encryption, decryption method and system | |
Idrizi et al. | Analyzing the speed of combined cryptographic algorithms with secret and public key | |
CN110191136A (en) | A kind of convenient and fast file secure transmission method and equipment | |
CN102833077A (en) | Encryption and decryption methods of remote card-issuing data transmission of financial IC (Integrated Circuit) card and financial social security IC card | |
CN104717643A (en) | Mobile device safety communication platform | |
CN109508518A (en) | A kind of document handling method, system and file decryption equipment | |
CN101394411B (en) | Safe packet transmission system and method | |
CN101383825A (en) | Method, apparatus and terminal implementing computer file ciphering | |
CN107493287A (en) | Industry control network data security system | |
CN102761417A (en) | Method for processing data transmission of terminals and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190322 |