CN101686294A - Embedded type file information security management system - Google Patents

Embedded type file information security management system Download PDF

Info

Publication number
CN101686294A
CN101686294A CN200910090836A CN200910090836A CN101686294A CN 101686294 A CN101686294 A CN 101686294A CN 200910090836 A CN200910090836 A CN 200910090836A CN 200910090836 A CN200910090836 A CN 200910090836A CN 101686294 A CN101686294 A CN 101686294A
Authority
CN
China
Prior art keywords
watermark
information
unit
file
active user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910090836A
Other languages
Chinese (zh)
Other versions
CN101686294B (en
Inventor
李卫平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LANXUM NEW TECHNOLOGY Co Ltd
Original Assignee
BEIJING LANXUM NEW TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LANXUM NEW TECHNOLOGY Co Ltd filed Critical BEIJING LANXUM NEW TECHNOLOGY Co Ltd
Priority to CN2009100908364A priority Critical patent/CN101686294B/en
Publication of CN101686294A publication Critical patent/CN101686294A/en
Application granted granted Critical
Publication of CN101686294B publication Critical patent/CN101686294B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention provides an embedded type file information security management system, comprising a watermark embedding module for generating an original paper file embedded with a watermark; aconfiguring and auditing module for configuring the operation authority of a user; and a copy control module for extracting the security classification information of the watermark of the original paper file, generating the watermark embedded type copy of the original paper file when the current user is judged to have the authority to copy according to the security classification information and the operation authority of the current user, and embedding the identification information of the current user in the watermark of the copy. The invention overcomes the drawback that file management inthe prior art is mainly implemented forcedly by security management system, particularly the paper file is basically registered and audited manually, leading to easy divulgence of documents in transmission and distribution.

Description

Embedded type file information security management system
Technical field
The present invention relates to information security field, in particular to a kind of embedded type file information security management system.
Background technology
Units such as army, government, secret scientific research need ensure the distribution security of secret papers, existing implementation is, intensive files is left concentratedly in secret chamber, at the special-purpose photocopier of the indoor outfit of maintaining secrecy, and establish full-time administrative person and keep an eye on, when the consultant need duplicate, there is the keeper to verify, to guarantee whether file can be copied, and registration is duplicated in craft, register content just allows the use photocopier to carry out copying operation after comprising that consultant, duplicating date, hard-copy file title, duplicating number of pages, duplicating umber etc. are verified by the keeper.The content of duplicating registration is hand filling, and papery and hand-written characteristics have all determined to preserve in the future and consulted very inconvenience.
In the daily life for the true and false of identification note, people usually with bank note facing to light source, can find to have in the genuine bank note distinct image information to show, Here it is we " watermark " be familiar with.Why adopt digital watermark to be because watermark has its unique character: the first, watermark is a kind of visible hardly marking, must be positioned over could be in sight under the specific environment, do not influence the use of article; The second, the making of watermark and duplicate more complicated need special technology and material, and the watermark on the printed matter is difficult to be removed.Therefore watermark often also is applied to judging for a long time that such as in the important printed matters such as check, certificate, passport, invoice an important means of the printed matter true and false checks it whether to comprise watermark exactly.
Digital watermark technology is a up-to-date in the world Information Hiding Techniques.So-called digital watermark technology is embedded into copyright informations such as numeral, sequence number, literal, logos in the multi-medium data exactly, and copyright is followed the tracks of and the effect of copyright protection to play.In addition, aspect such as also implicit in true and false discriminating, covert communications, sign, the electronic identity authentication of digital watermarking has important use and is worth.The research of digital watermark technology relates to multi-disciplinary research fields such as informatics, cryptography, mathematics, computer science, pattern recognition, makes the information of hiding have more disguise, fail safe, also has symmetry and error correction simultaneously.Research is indicating that digital watermarking has huge and wide application prospect, and has caused the extensive concern of academia, industrial quarters and the military.
Use for reference the implication and the function of common watermark, people adopt similar notion protection such as digital picture, the such multi-medium data of digital music, have therefore just produced the notion of " digital watermarking ".So-called " digital watermarking " is some digital information of adding in multi-medium data, such as adding production person's information in digital photo, adds information of film company or the like in DVD.With the property class of common watermark seemingly, digital watermarking (as digital photograph) in multi-medium data also almost is sightless, also is difficult to destroyedly fall.Therefore digital watermarking the computer of today and the Internet era be well worth doing.
Digital watermark technology is directly to be embedded into some significant information in the content of multimedia by certain algorithm, present most of watermark production program all adopts encryption (comprising public-key cryptography, the private cipher key) system in the cryptography to strengthen, embedding in watermark, adopt a kind of key during extraction, in addition several keys unite use.The watermark that Fig. 1 shows according to correlation technique embeds schematic diagram, and Fig. 2 shows the watermark extracting method schematic diagram according to correlation technique.
Existing digital watermark technology; the core of paying close attention to is the protection of electronic data; be widely used in e-file copyright protection field; and do not relate at the distribution security control field of paper document; and at some particularity in paper document distribution control field; as duplicate process control, whether watermarking algorithm is highly resistant to duplicating, scanning etc., these all are very big challenges to existing technology.
In realizing process of the present invention, the inventor finds that the management to file mainly is to adopt the security management system to put teeth in the prior art, especially rely on manual registration and audit to finish substantially for paper document, cause document more easily to cause and divulge a secret in links such as transmission, distributions.
Summary of the invention
The present invention aims to provide a kind of embedded type file information security management system, the management that can solve in the prior art file mainly is to adopt the security management system to put teeth in, especially rely on manual registration and audit to finish substantially for paper document, cause document more easily to cause the problem of divulging a secret in links such as transmission, distributions.
In an embodiment of the present invention, provide a kind of embedded type file information security management system, having comprised: the watermark merge module is used to generate watermarked paper document original paper; Dispose and the audit module, be used for the operating right of configure user; Duplicate control module, be used to extract the security information of the watermark of paper document original paper, when judging the active user according to security information and active user's operating right and have authority to duplicate, generate the watermarked copy of paper document original paper, and in the watermark of copy, embed active user's identity information.
In the above-described embodiments, by operating right watermarked in the document of need to be keep secret and that the user is set, making does not have the user who authorizes to duplicate the document, while is identity information watermarked and embedding active user in watermark in the document that duplicates, the security information that has kept the document original paper in the feasible document that duplicates, overcome that the management to file mainly is to adopt the security management system to put teeth in the prior art, especially rely on manual registration and audit to finish substantially for paper document, cause document in transmission, links such as distribution more easily cause the problem of divulging a secret.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
The watermark that Fig. 1 shows according to correlation technique embeds schematic diagram;
Fig. 2 shows the watermark extracting method schematic diagram according to correlation technique;
Fig. 3 shows embedded type file information security management system block diagram according to an embodiment of the invention;
Fig. 4 shows watermark merge module structure chart according to an embodiment of the invention;
Fig. 5 shows configuration according to an embodiment of the invention and audit modular structure figure;
Fig. 6 shows duplicating control module structure chart according to an embodiment of the invention.
Embodiment
Below with reference to the accompanying drawings and in conjunction with the embodiments, describe the present invention in detail.
Fig. 3 shows embedded type file information security management system block diagram according to an embodiment of the invention, comprising:
Watermark merge module 10 is used to generate watermarked paper document original paper;
Dispose and audit module 20, be used for the operating right of configure user;
Duplicate control module 30, be used to extract the security information of the watermark of paper document original paper, when judging the active user according to security information and active user's operating right and have authority to duplicate, generate the watermarked copy of paper document original paper, and in the watermark of copy, embed active user's identity information.
In the present embodiment, by operating right watermarked in the document of need to be keep secret and that the user is set, making does not have the user who authorizes to duplicate the document, while is identity information watermarked and embedding active user in watermark in the document that duplicates, the security information that has kept the document original paper in the feasible document that duplicates, overcome that the management to file mainly is to adopt the security management system to put teeth in the prior art, especially rely on manual registration and audit to finish substantially for paper document, cause document in transmission, links such as distribution more easily cause the problem of divulging a secret.
Preferably, watermark merge module 10 comprises: the virtual printing unit, be used to accept the virtual setting of active user to the document that will print, and according to the virtual virtual printing document that is provided with; Access control unit is used for accepting the active user by the watermark printing login interface and importing logon information, and the load right of logon information is judged behind virtual printing unit virtual printing document; Watermark embeds the unit, is used for when access control unit is judged the active user and had load right, and is watermarked in the document of virtual printing; Print unit is used to print watermarked document, and the document of deletion virtual printing.By above unit make the user with authority can be in the document of need to be keep secret embed watermark information, guarantee that document is not illegally used.
As shown in Figure 4, watermark merge module according to an embodiment of the invention is made up of virtual printer unit, watermark embedding unit, print unit and four unit of access control unit.When the user need print watermarked paper file, earlier at the (Word of software for editing, PDF etc.) select " printing " order in, in the Page Setup or Print dialog box that ejects, select the virtual printer of native system as current printer, the user can import laterally vertically simultaneously, paper size (as A4 etc.), print resolution, the colour print pattern, the printer page scope, print parameters such as convergent-divergent (one) (wherein laterally vertically, paper size (A4 etc.), print resolution, the colour print pattern is provided with in virtual printer " attribute ", and all the other are arranged in the print dialog of software for editing).Virtual printer prints corresponding document picture according to these print parameters () then.After the user clicks " determining " of the Page Setup or Print dialog box, virtual printer prints the file and picture of document at assigned catalogue, " watermark printing software " service processes ejects " watermark printing software " login interface after detecting file and picture, and the user lands keeper's account.The user embeds the watermark information that input will embed in the interface in watermark, the watermarking algorithm parameter and print umber, single two-sided, use print parameters (two) such as any platform printer.The watermark merge module is embedded into watermark information in the picture file according to the watermark information and the corresponding watermarking algorithm of watermarking algorithm parameter call that embed.Be that function parameter calling system api function prints picture file by print unit with print parameters (two) then, also need after printing is finished picture file " safety deletion ".
Preferably, configuration comprises with audit module 20: user's login unit is used to accept the logon information that the active user imports, and by logon information the active user is authenticated; The daily record auditable unit is used to preserve the service recorder that the user operates embedded type file information security management system, and service recorder is managed and analyzes; First communication unit is used for communicating with duplicating control module 30; The policy configurations unit is used to accept the policy information that the keeper imports, and by first communication unit policy information is transferred to the duplicating control module.By said units, the security strategy that the keeper is can be according to different document configuration different has increased the flexibility of document security management.The document of reviewing for needs can be by configuration and audit module, checks the watermark information that comprise in the document and the operating position of the document easily, is convenient to the use history of trace files.
Preferably, configuration and audit module 20 also comprise: service management unit is used to accept the authority setting of keeper to user identity.The keeper can authorize different authorities to different users according to the security classification of document.
Fig. 5 shows configuration according to an embodiment of the invention and audit module, and configuration and audit module are configured the equipment usage policy, user's equipment operating position is made record, thereby reach the function that these records are audited.The user logins the authentication that the unit is used for user identity, prevents the visit of unrelated person to system; Service management unit is used for user identity is carried out authority setting (whether the authority audit log is arranged, whether have authority to carry out policy configurations); The policy configurations unit passes to photocopier to strategy file according to the policy information of keeper's input by first communication unit; The equipment service recorder of daily record auditable unit recording user, and these records are managed and analyze; First communication unit is used for communicating with duplicating control module, comprises and transmits strategy file and subscriber equipment service recorder.
Preferably, duplicate control module 30 and comprise: the user profile acquiring unit is used for obtaining by card reader active user's identity information, and identity information is transferred to administrative unit; The file and picture acquiring unit is used to obtain the file and picture of the operated document of active user, and file and picture is transferred to administrative unit; Watermark extracting and add the unit, the watermark that is used to extract file and picture, and in the watermark of file and picture, add active user's identity information according to watermark; The strategy acquiring unit is used for from configuration and audit module 20 acquisition strategy information, and policy information is transferred to administrative unit; Administrative unit is used for the identity information according to the active user, the watermark and the policy information of file and picture, and active user's operation is let pass or refused; The second communication unit, when being used for the operation as administrative unit clearance active user and photocopier communicate, with watermark extracting and the file and picture after adding cell processing be transferred to copy and duplicate.By in the document watermark, adding user profile, can follow the trail of the use history of document.In the duplicating process, can carry out the real-time electronic registration to the operation note of duplicating, no matter duplicate the result and be success or owing to authorize and fail inadequately to duplicate successfully, the capital is the electronization registration in system, the information of registration comprises that duplicating people, duplicating time, photocopier sign, file identification, file level of confidentiality, duplicating successfully still is information such as failure, final all hard-copy logs all can be aggregated in audit and the configuration management subsystem, convenient consulting and auditing in the future, because record is electronic, all be very easily so store and consult.
Preferably, duplicate control module 30 and also comprise: the log record unit is used to write down the log information that the active user uses embedded type file information security management system, and log information is write configuration and audit module 20.By checking log information, can understand the operating position of embedded type file information security management system, confidential documents is provided follow the trail of protection afterwards.
Fig. 6 shows duplicating control module according to an embodiment of the invention, when the user needs to duplicate, scans, faxes when having the file made of paper of security information, all-in-one extracts the security information in the file made of paper automatically, and determine whether providing service for it according to current operation user's authority, add the identity information that duplicates the user then in watermark, output at last adds the copy after the watermark once more.The user profile acquiring unit obtains active user's identity from the all-in-one card reader, and subscriber identity information is passed to administrative unit; The file and picture acquiring unit obtains file and picture from the document that the user will operate, and file and picture is passed to administrative unit; Watermark extracting and adding unit process file and picture, thereby extract the watermark information in the file and picture, and return the file and picture after the watermark of adding user identity; Administrative unit connects other each unit, with their interactive information, and the information that provides according to other each unit, user's operation is refused or is let pass; Log record unit record user uses all log informations of equipment, writes configuration and audit module; The strategy acquiring unit is from configuration and audit module acquisition strategy file, and the strategy relation is sent to administrative unit; Second communication unit and photocopier exchange message comprise obtaining file and picture, send the file and picture that adds watermark and duplicate to photocopier.
From above description; as can be seen; the above embodiments of the present invention have realized following technique effect: realize the paper document distribution security by technological means; on existing digital watermark technology basis; through improving and innovation; according to content to be protected; can select to adopt image watermark; text watermark etc.; the dominant character that authentication information is embedded into the information that do not influence in the information to be protected; in conjunction with the innovation of duplicating the process control aspect; realize that one overlaps the management system that security control is duplicated in complete being effective to, provide safety protection function to the different security level paper document, thereby finish the safeguard protection of sensitive information.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. an embedded type file information security management system is characterized in that, comprising:
The watermark merge module is used to generate watermarked paper document original paper;
Dispose and the audit module, be used for the operating right of configure user;
Duplicate control module, be used to extract the security information of the described watermark of described paper document original paper, when judging described active user according to described security information and active user's described operating right and have authority to duplicate, generate the copy of the described watermark of embedding of described paper document original paper, and in the described watermark of described copy, embed described active user's identity information.
2. embedded type file information security management system according to claim 1 is characterized in that, described watermark merge module comprises:
The virtual printing unit is used to accept the virtual setting of active user to the document that will print, and according to the described virtual described document of virtual printing that is provided with;
Access control unit is used for accepting described active user by the watermark printing login interface and importing logon information, and the load right of described logon information is judged behind the described document of described virtual printing unit virtual printing;
Watermark embeds the unit, is used for when described access control unit is judged described active user and had described load right, and is watermarked in the described document of virtual printing;
Print unit is used to print the described document that embeds described watermark, and deletes the described document of described virtual printing.
3. embedded type file information security management system according to claim 1 is characterized in that, described configuration comprises with the audit module:
User's login unit is used to accept the logon information that the active user imports, and by described logon information described active user is authenticated;
The daily record auditable unit is used to preserve the service recorder that the user operates described embedded type file information security management system, and described service recorder is managed and analyzes;
First communication unit is used for communicating with described duplicating control module; The policy configurations unit is used to accept the policy information that the keeper imports, and by described first communication unit described policy information is transferred to the duplicating control module.
4. embedded type file information security management system according to claim 3 is characterized in that, described configuration and audit module also comprise:
Service management unit is used to accept the authority setting of keeper to user identity.
5. embedded type file information security management system according to claim 3 is characterized in that, described duplicating control module comprises:
The user profile acquiring unit is used for obtaining by card reader active user's identity information, and described identity information is transferred to administrative unit;
The file and picture acquiring unit is used to obtain the file and picture of the operated document of described active user, and described file and picture is transferred to described administrative unit;
Watermark extracting and add the unit, the watermark that is used to extract described file and picture, and in the watermark of described file and picture, add described active user's identity information according to described watermark;
The strategy acquiring unit is used for obtaining described policy information from described configuration and audit module, and described policy information is transferred to described administrative unit;
Described administrative unit is used for the described watermark and the described policy information of the identity information according to described active user, described file and picture, and described active user's operation is let pass or refused;
The second communication unit is used for when described administrative unit is let pass described active user's operation and photocopier communicates, with described watermark extracting and the described file and picture after adding cell processing be transferred to described copy and duplicate.
6. embedded type file information security management system according to claim 5 is characterized in that, described duplicating control module also comprises:
The log record unit is used to write down the log information that described active user uses described embedded type file information security management system, and described log information is write described configuration and audit module.
CN2009100908364A 2009-08-10 2009-08-10 Embedded type file information security management system Expired - Fee Related CN101686294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100908364A CN101686294B (en) 2009-08-10 2009-08-10 Embedded type file information security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100908364A CN101686294B (en) 2009-08-10 2009-08-10 Embedded type file information security management system

Publications (2)

Publication Number Publication Date
CN101686294A true CN101686294A (en) 2010-03-31
CN101686294B CN101686294B (en) 2011-06-15

Family

ID=42049256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100908364A Expired - Fee Related CN101686294B (en) 2009-08-10 2009-08-10 Embedded type file information security management system

Country Status (1)

Country Link
CN (1) CN101686294B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336921A (en) * 2013-07-26 2013-10-02 衡阳市劳动保障信息中心 Method capable of tracing blabber
CN105991891A (en) * 2015-02-12 2016-10-05 株式会社理光 Image forming device and image forming system
CN107037993A (en) * 2016-02-04 2017-08-11 株式会社理光 Image processing system and image formation system
CN107566682A (en) * 2017-08-17 2018-01-09 珠海赛纳打印科技股份有限公司 Safety auditing system and method
CN107977584A (en) * 2017-12-14 2018-05-01 中铁信安(北京)信息安全技术有限公司 The safe copy system of desktop type
CN108765252A (en) * 2018-05-25 2018-11-06 珠海奔图电子有限公司 A kind of watermark configuration method, watermark configuration device and image forming apparatus
CN108961139A (en) * 2018-05-25 2018-12-07 珠海奔图电子有限公司 watermark configuration control method and system
CN109063503A (en) * 2018-08-16 2018-12-21 中威戎安科技有限公司 A kind of watermark embedding apparatus and method
CN111310135A (en) * 2018-12-12 2020-06-19 中兴通讯股份有限公司 Watermark adding method and device based on virtual desktop
CN112258376A (en) * 2020-10-20 2021-01-22 中国农业银行股份有限公司 Encrypted document processing method and system
CN113032744A (en) * 2021-03-29 2021-06-25 吉林省容汇科技服务中心(有限合伙) Digital watermark all-in-one system
CN112258376B (en) * 2020-10-20 2024-04-12 中国农业银行股份有限公司 Method and system for processing encrypted document

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107066844B (en) * 2017-04-12 2020-08-14 北京溯斐科技有限公司 Method and device for safety control and traceability tracking of paper documents

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5664018A (en) * 1996-03-12 1997-09-02 Leighton; Frank Thomson Watermarking process resilient to collusion attacks
US7680447B2 (en) * 2005-11-15 2010-03-16 International Business Machines Corporation Method and apparatus for duplicating secure documents
US20080008318A1 (en) * 2006-07-10 2008-01-10 Kabushiki Kaisha Toshiba Image Forming Apparatus and Document Management System
CN1963865A (en) * 2006-12-01 2007-05-16 中南大学 A safety multifunctional image digital watermark system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336921A (en) * 2013-07-26 2013-10-02 衡阳市劳动保障信息中心 Method capable of tracing blabber
CN105991891A (en) * 2015-02-12 2016-10-05 株式会社理光 Image forming device and image forming system
CN105991891B (en) * 2015-02-12 2018-08-03 株式会社理光 Image forming apparatus and image formation system
CN107037993A (en) * 2016-02-04 2017-08-11 株式会社理光 Image processing system and image formation system
CN107566682A (en) * 2017-08-17 2018-01-09 珠海赛纳打印科技股份有限公司 Safety auditing system and method
CN107977584A (en) * 2017-12-14 2018-05-01 中铁信安(北京)信息安全技术有限公司 The safe copy system of desktop type
CN108765252A (en) * 2018-05-25 2018-11-06 珠海奔图电子有限公司 A kind of watermark configuration method, watermark configuration device and image forming apparatus
CN108961139A (en) * 2018-05-25 2018-12-07 珠海奔图电子有限公司 watermark configuration control method and system
CN109063503A (en) * 2018-08-16 2018-12-21 中威戎安科技有限公司 A kind of watermark embedding apparatus and method
CN111310135A (en) * 2018-12-12 2020-06-19 中兴通讯股份有限公司 Watermark adding method and device based on virtual desktop
CN112258376A (en) * 2020-10-20 2021-01-22 中国农业银行股份有限公司 Encrypted document processing method and system
CN112258376B (en) * 2020-10-20 2024-04-12 中国农业银行股份有限公司 Method and system for processing encrypted document
CN113032744A (en) * 2021-03-29 2021-06-25 吉林省容汇科技服务中心(有限合伙) Digital watermark all-in-one system

Also Published As

Publication number Publication date
CN101686294B (en) 2011-06-15

Similar Documents

Publication Publication Date Title
CN101686294B (en) Embedded type file information security management system
JP3803378B2 (en) Secure copy of confidential documents
EP3907634B1 (en) Copyright protection based on hidden copright information
JP4767750B2 (en) System and method for controlling duplication of documents containing confidential information
US6983056B1 (en) Method and device for embedding and detecting watermarking information into a black and white binary document image
CN101097416B (en) Printing system, printing control method
US20040080777A1 (en) Secure document printing
US9864920B2 (en) Semiautomatic multifunction device-based validation of secure documents
JP2004201321A (en) System and method for providing and validating hardcopy secure document
CN107066844A (en) A kind of method and apparatus of paper document security management and control and tracing
US10855868B1 (en) Systems, processes, and computer program products for detecting and verifying invisible information in documents
JP2007052779A (en) System for preparing security document and system for reproducing security document
US9864906B2 (en) Method and system for creating a validation document for security
CN101359214B (en) Security document printing system and method of controlling the same
CN108171023A (en) Digital watermarking " object electricity one " seal processing system
US8264707B2 (en) Enforcing reproduction rights for hard copies of documents
KR20070036001A (en) Image processing apparatus, control method therefor, and computer-readable storage medium
Husain et al. Printed document integrity verification using barcode
KR102114391B1 (en) System and method for printing security of computerised documentation
KR100430469B1 (en) System for preventing document from forging/alternating
CN116842583B (en) Electronic signature system and method with PDF signature as core
US11157639B2 (en) Systems, processes, and computer program products for authentication of documents based on invisible information in documents
CN108646993A (en) Output file uniqueness ensuring method based on biological attribute and fluorescent printing technology
JP2001344557A (en) Method and device for managing document
Khadam et al. Data aggregation and privacy preserving using computational intelligence

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Zhang Xuguang

Inventor before: Li Weiping

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: LI WEIPING TO: ZHANG XUGUANG

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110615

CF01 Termination of patent right due to non-payment of annual fee