CN102347836A - Electronic document protected view system and method - Google Patents

Electronic document protected view system and method Download PDF

Info

Publication number
CN102347836A
CN102347836A CN2010101652748A CN201010165274A CN102347836A CN 102347836 A CN102347836 A CN 102347836A CN 2010101652748 A CN2010101652748 A CN 2010101652748A CN 201010165274 A CN201010165274 A CN 201010165274A CN 102347836 A CN102347836 A CN 102347836A
Authority
CN
China
Prior art keywords
reader
document
key
authentication
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101652748A
Other languages
Chinese (zh)
Inventor
龚华清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010101652748A priority Critical patent/CN102347836A/en
Publication of CN102347836A publication Critical patent/CN102347836A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an electronic document protected view system and method, relating to the technical field of computer network information security. The electronic document protected view system comprises a publisher, a reader and a server and is used for realizing encryption and decryption, authorization and separation, as well as checks and balances. On the premise of meeting requirements of known document verification and identity authentication, reader authentication is added to enhance a security chain of an electronic document; memory is proposed to be a cipher text, the displayed content of a display screen is a plain text only, and thus, memory leakage security is increased maximally; a three-layer secret key mechanism (including an access secret key, a memory secret key and a screen secret key) is creatively proposed to combine and encrypt the electronic document in a multi-round and multi-layer manner, so that the electronic document is effectively prevented from leakage due to storage medium, network transmission and the memory; and due to independent authorization, the published electronic document is still under control so that the management and the use of multiple secret keys of multiple electronic documents are facilitated.

Description

Electronic document safety reading system and method thereof
Technical field
The present invention relates to the computer network information technical field of communication safety and comprising, comprise the audit of electronic document, storage, system and the method thereof propagating and read.
Background technology
In existing ocr software, major part is to utilize software for editing as ocr software, and the proprietary ocr software (back general designation ocr software) of few part; Though their also integrated certain safety functions, the user who does not all satisfy bright safety requirements from intensity and the function of protection.Intensity from protection mainly provides password, and password can not be very complicated because memory is convenient, easily by the password dictionary or guess; And in the process of entering password, exist password by the risk of eavesdroppings such as trojan horse through keyboard; And most software for editing is saved in storage medium with document content through the mode in slow in order to put forward bright efficient, also has the risk that does not have safeguard protection through temporary file.From safety function, what ocr software needed is password, and does not have other auxiliary security means.There is very big security risk in the ocr software of the password mode that therefore, reason is traditional.
It is bright to follow safety theory to carry, and particularly safer reading system appears in the maturation of PKI system, is mainly through digital certificate and signature way authenticating identity each other; Whether the hashed value identifying file through document content passes through modification; Through VPN ciphertext transferring documents; Medium encryption and decryption technique protection storage medium; The electronic document information concealing technology of variety of ways such as watermark.These safety measures are in transmission course safety, the authentication of the side of transmitting-receiving, authenticity of document and integrality have important carry bright.But, see from whole theft-resistant link chain, still there is following problem at present:
At first, reader itself is not caused great potential safety hazard by authentication
The first, reader itself is not caused the control of authority failure by authentication
As the important step that document is read, the safety of reader itself has important effect at whole theft-resistant link chain.The reading of present stage basically all provides the document of an encryption, and the mode through plug-in unit provides authentication and deciphering, gives general reader then.And the file format that general reader is read generally is disclosed; Anyone can develop the reader of oneself according to file; Therefore; Just have so a kind of risk, someone has developed the reader of standard document by oneself, ignores the control of authority characteristic of document itself then; Allow all authorities open; Thereby obtain expressly saving as new normative document, this file is revealed away.Such as pdf reader, though in the pdf document form, have a P to define the authority of opening document specially to popular pdf document; If oneself selects a PDF reader of increasing income, in opening pdf document, authority such as ignore the printing that defines in the document, edit, duplicate is directly all decontroled, and allows the control of authority of file not have guarantee basically like this.
The first, reader itself is not caused encrypted document to be decrypted into expressly leakage by authentication
Since not by authentication; Just can utilize a reader, helping you normally to open ciphertext, in the process of your normal reading through revising; Reader can save as a document that has no restriction with whole ciphertext in addition on the backstage, causes document to be divulged a secret.
The 3rd, reader itself possibly not caused private cipher key to be divulged a secret by authentication
For the document that needs the PKI authentication to open, when providing private cipher key, the user opens a document that needs authentication, just given reader the private cipher key of oneself; If this is a reader of implanting wooden horse, just can easyly obtain user's secret, such result is more dangerous.
Therefore, as a theft-resistant link chain, must adopt a correct attitude towards the safety problem of reader.
Secondly, the point-to-point mode based on PKI thought is unfavorable for using
Utilize PKI thought such as patent ZL200410013513.2, finely solved point-to-point safety, but but do not resolve point-to-points problem.Though allow a transmit leg set up a cryptograph files for each recipient in the operation, practical operation is pretty troublesome.Such as a notice of government inside, notify object maybe be up to ten thousand individual, can not be that each object generates a cryptograph files.
Once more, expressly also there is the risk of divulging a secret in internal memory
In the flourishing epoch of today network technology brightness, virus, network worm, spyware are seen everywhere, and under operating system, database, the application software condition filled with flaws, have some software to search for internal memory through internal memory unavoidably and obtain some sensitive information.More ironically, most readers all is expressly to preserve at internal memory, therefore, reduces effectively that expressly to divulge a secret in the internal memory also be present open question.
So we need ensure known safety: authentication, under the prerequisite of document authentication (comprising document verification and encrypted document) and reading authority, need to solve reader safety, internal memory is safety expressly, and convenient use under the prerequisite of safety.
Summary of the invention
Read the demand that safety function can not satisfy bright requirement property for the document that overcomes present technology, a kind of electronic document safety reading system and method thereof be provided, reach the object of the invention to satisfy following demand:
(1) confidentiality of document transmission and preservation;
(2) the document person of sending, document reader authentication is credible;
(3) authenticity and integrity of document;
(4) the controlled reading property of document;
Having under the basic safety of reinforcement, the safety of enhancing is:
(5) authentication of reader is credible;
(6) the anti-fail safe of divulging a secret of internal memory;
(7) making property of enforcement side;
At first, the transmit leg that native system discards tradition and recipient's pattern become distributor, reader and server three parts.
A document needs issue, at first gives distributor; The form of distributor elder generation document transfers the pdf document format to through the virtual printing machine technology, input document 1 is transferred to the document 2 of pdf form; Automatically produce the user cipher 3 of 128 bytes again, document 2 is utilized the close generation ciphertext 21 of pdf proof force; Automatically generate key 4 again, the document of encrypting 21 is encrypted as document 211; Document 211 is added file header h1, and the essential information of file header comprises file ID and rise time etc., and this document that comprises document 211 and file header h1 is a document 2111.This document can pass through mail, and variety of ways such as FTP send, and supplies reader to use.Simultaneously, distributor is created a key 5 automatically user cipher 3 is encrypted as password 31, and key 5 constitutes screen key s1 with password 31; Distributor is created key 6 automatically key 4 is encrypted as internal memory key m1, and s1 is encrypted as key s11 with the screen key; Comprise key 6 with one, the ID of document No. 2111, the hashed value of document 211, the hashed value of file header h1 are referred to as access control key v1; Distributor is through SSL and the mutual authentication of server, and with access control key v1, internal memory key m1 and screen key s11 pass to server to distributor through VPN.
The mutual authentication of server and distributor, and get access to access control key v1, internal memory key m1 and screen key s11 from distributor.All information are saved as file f 1 through encrypted private key, set up the incidence relation of file ID and file f 1 simultaneously; Server removes and has the PKI authentication function; Also need privilege management infrastructure (PMI; Privilege Management Infrastructure) function; Include: set up distributor and present a paper effective reading time of ID; The reading object of file ID, and the Reader ID of registration and the authorization information of reader.Server and reader are through the mutual authentication of PKI; Server authentication reader's method is through reader's oneself private key signature, passes to server through ss1, and the public key verifications that server by utilizing is read signs the authentication reader.Whether server comes identifying file credible through the hashed value and the document content hashed value of document id, document head, under the condition that satisfies server PMI, access key, screen key and internal memory key is sent to reader through VPN.
Reader obtains the encrypted document 2111 that distributor provides; Each reader has the certificate of oneself, and whether the mutual authentication of reader and server sends to the server authentication reader with the hashed value of reader file then and be modified; Simultaneously reader's private key signature is belonged to the hardware information of system.After reader was verified successfully, reader received access key, and through access key deciphering screen key and internal memory key.Reader will be deciphered internal memory with the document of storage medium through the internal memory key, according to the page of practical demand, with the ciphertext of internal memory, come out through the screen secret key decryption then, be printed on the screen.Reader is not cached to storage medium with any document content, and also the page that just needs at screen is decrypted into expressly, in case be not to need page displayed, random number empties the cleartext information of internal memory immediately.
Therefore, for the authentication of reader, the main PKI authentication mode that adopts classics, whether the checking of the hashed value of aid reading device itself is modified again, and Rule of judgment is placed on server end.And reader and server mainly come authentication through the mode of digital signature about reader's authentication.Reader just is expressly with page displayed contents decryption on the screen through the interior encrypted content that saves as, and reduces the plaintext in the internal memory to greatest extent; The dual key compound mode that adopts different levels to encrypt simultaneously has only 2 keys all to collect and could decipher, and with respect to a present secondary key, fail safe increases; And effectively strengthen uprising power deciphering.The mode that reader is also printed through refusal, the risk that printing type is divulged a secret when stopping to lead to; Any needs are printed, and all must obtain printed information from distributor, effectively protect the copyright of electronic document.
Therefore, method of the present invention can effectively solve the electronic document safety of tissue and read, and reduces the risk of revealing to greatest extent.Its advantage and characteristics are following:
(1) adopts the mode of reader authentication, remedy the weak safety issue of reader link in the whole theft-resistant link chain.Because reader passes through the PKI authentication, and judge that through hashed value whether reader is by malicious modification.With respect to thoroughly believing reader in the past, fail safe strengthens.
(2) in reading system, through access key, internal memory key and the multiple combination of keys of screen key; Remove to manage two other keys with a key; And the encryption of internal memory key and screen key different levels had both increased the reading safety of transmission link, internal memory link, and convenient management is arranged.
(3) system is divided into distributor, reader and server three parts, and distributor is separated key with ciphertext, introduces privilege management infrastructure (PMI, Privilege Management Infrastructure).Adopt this mode; Even reader personation file ID and required document check information; Server can also be through the identity in the certificate; With by the access rights of reading file; The key whether decision provides reading to need; If the reader does not have the access rights of this electronic document, still can't read electronic document.
(4) mode of employing screen window, only deciphering screen needs page displayed, reduces the plaintext of electronic document in internal memory to greatest extent.
Description of drawings
Fig. 1 is that distributor is made the encrypted document to reader; Fig. 2 is that distributor is made the screen key encryption information to server; Fig. 3 is that distributor is made the internal memory key encryption information to server; Fig. 4 is that distributor is made the access control key to server; Fig. 5 is that reader is read process chart; Fig. 6 is the sketch map of embodiment three; Fig. 7 is the sketch map of embodiment three.
Embodiment
Embodiment one: a plurality of readers, a distributor, a server
The PKI authentication can be adopted the openssl that increases income; The final act form that reader is read is the pdf form; Pdf is the international standard of International Standards Organization (ISO) in approval on July 2nd, 2008, and this form is opened and is used standard No. anyone is ISO 32000-1.The free exploitation sdk that also can adopt adobe company to provide simultaneously, or adopt the pdflib that increases income to wait and develop reader, the concrete realization of reader in the enforcement of back, no longer explained.
Distributor is implemented:
The first step:, can the typescripts format conversion be the pdf document form with all through the virtual printer mode.The meaning in this step is very great:
At first can satisfy the electronic document that all can be printed, such as word, pdf, txt, hmtl, excel, gif etc.; The more important thing is,, can also effectively filter electric hiding Info of in document, possibly embedding through method in this.Adopting known ghostscript to print skill realizes.
Second step: generate the screen password automatically,, realize encrypting for the first time as the user cipher of PDF standard.
Encryption at this time is the inner stream encryption of file, and other place still is expressly.Concrete encrypted content, normative reference number is the pdf file format document of ISO32000-1.
The 3rd step: through key, with the screen password encryption; Decruption key and encrypted mistake are kept in the screen cipher controlled piece with the screen password.
The 4th step: generate the internal memory key automatically to the whole file encryption of pdf document (PDF encrypts for the second time); Internal memory key and decipherment algorithm are kept at internal memory cipher controlled piece.
The 5th step: distributor asks that reading documents sets up new file header, include file ID, and essential informations such as creation-time together with the file spare of twice encryption, form the e-file that reader can receive, and through Email, modes such as FTP send.
The 6th step: generate the access control key automatically, utilize the access control key simultaneously to internal memory cipher controlled piece and the block encryption of screen cipher controlled.
The 7th step: distributor is some essential informations that server provides file; Be kept in the access control block (ACB); Mainly be in order to make the server authentication document whether true; The essential information that whether is modified; To only comprise access control block (ACB); The content of internal memory cipher controlled piece and screen controll block directly sends to server through the VPN escape way, and distributor this locality does not keep any key information;
The 8th step: distributor is through the PKI authentication, and SSL VPN will comprise the access control block message, and internal memory cipher controlled piece and screen controll block content send to server
Server
Server implementation comprises the content of three parts, and first and distributor mutual obtains necessary authorization information.This part mainly is through the mutual authentication of PKI and escape way is provided; Obtain some authorization informations of distributor publishing documents ID and this ID then from distributor, such as the hashed value of file header, the hashed value of encrypt file etc.Second portion is the document authorization control management of server oneself.This part enforcement can comprise this document effective time, can be by access control management such as which user capture readings.Third part is mutual between server and the reader.Practical implementation is to carry out the reader authentication with reader, reader's authentication and by the authentication of reading documents; Satisfying under the authentication or the condition of checking, satisfy the access control condition, at last key is sent to reader through escape way, keep a record convenient inquiry or tracking.
Reader
Reader comprises three parts, and first is authentication or the proof procedure with server, comprises reader, reader and by the authentication of reading documents or checking, satisfying under the authorising conditional, obtains key; Second portion is a document from storage medium or network decrypting to internal memory: third part is the deciphering procedure for displaying that has the pdf file of user key, and this part is the pdf form of standard.
Being embodied as of reader:
The first step: open reader, carry out reader authentication or checking;
Second step: open file, obtain the access control block (ACB) in the file header, obtain the server ip that key is deposited, and the information such as ID of presents.
The 3rd step: reader's authentication or checking;
The 4th step: document id is provided, and check information, beginning is by the authentication of reading documents or checking;
The 5th the step: the server notification result, if authorize, but and file belong to reader, obtain access control block (ACB), internal memory cipher controlled piece and screen cipher controlled piece;
The 6th step: reader is according to cryptographic algorithm and the secret key decryption internal memory cipher controlled piece and the screen cipher controlled piece of access control block (ACB)
The 7th step: according to user's screen, calculate the current page number that needs realization, calculating need be read the address of file
The 8th step: utilize the key of internal memory cipher controlled piece to realize deciphering from storage medium (or network) to internal memory.
The 9th step: with the key of screen controll block, the key of algorithm and encrypted information decrypts the inner cipher (being used for the deciphering of internal memory to screen) of pdf file.
Embodiment two: a plurality of readers, a distributor, a plurality of server load balancings
Can adopt typical three part methods, also can demonstrate,prove distributor information all is published to a plurality of servers, through the configuration reader different server ip address, realize the load balancing of server, shown in Figure 6.Also can the mode of dynamic Redirect Server address be provided, realize the load balancing of server through between reader and server.At reader in the server application; If the server present load is heavy; Not directly to carry out authentication with reader; But give its redirected instruction; Comprise the concrete destination server that is redirected in the instruction; Like this, reader just can be to the service of new server requests reading documents.Therefore realize load balancing.
Practical implementation three: a plurality of readers, a distributor, a plurality of servers form the level service
Also can adopt server to send for subordinate's server and recognize the information that distributor is obtained; Between server and the server still through authentication; The document control information of subordinate's server relies on higher level's server, and up, the server of the brightest layer is direct and distributor is mutual always.As shown in Figure 7, form layer management.

Claims (4)

1. an electronic document is maintained secrecy, authentication, and rights management, authority diffusion and the method for reading is characterized in that system comprises distributor, reader and server three parts realize encryption, deciphering, authorize and separate, and containing each other.In this three part, distributor is responsible for encryption, and reader is responsible for deciphering, and server is responsible for mandate; Distributor sends to reader with the encrypted result of oneself, and encryption key is sent to server; Server is responsible for the document mandate, and is that reader provides decruption key according to the encryption key of distributor, can adopt symmetric key, promptly is that encryption key is the same with decruption key; Reader is obtaining decruption key through after the authentication from server, the deciphering display document.
2. maintain secrecy according to right 1 described a kind of electronic document, authentication, rights management, authority diffusion and the method for reading is characterized in that introducing the reader authentication.
3. maintain secrecy according to right 1 described a kind of electronic document, authentication, rights management, authority diffusion and the method for reading it is characterized in that adopting the combined ciphering mode that the encryption of different aspects is provided, and the third key come two kinds of keys of encrypted document encryption.The encryption of different levels is not to adopt with file of a secret key encryption, the mode that the file after the encryption is encrypted again; But encrypt in the employing file, and then the mode of whole file encryption.
4. maintain secrecy according to right 1 described a kind of electronic document, authentication, rights management, authority diffusion and the method for reading is characterized in that document in the interior ciphertext that saves as, and have only on screen, the page displayed content to be plaintext.
CN2010101652748A 2010-04-30 2010-04-30 Electronic document protected view system and method Pending CN102347836A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101652748A CN102347836A (en) 2010-04-30 2010-04-30 Electronic document protected view system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101652748A CN102347836A (en) 2010-04-30 2010-04-30 Electronic document protected view system and method

Publications (1)

Publication Number Publication Date
CN102347836A true CN102347836A (en) 2012-02-08

Family

ID=45546149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101652748A Pending CN102347836A (en) 2010-04-30 2010-04-30 Electronic document protected view system and method

Country Status (1)

Country Link
CN (1) CN102347836A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123508A (en) * 2014-07-21 2014-10-29 浪潮电子信息产业股份有限公司 Design method based on intranet data security protection engine
CN108629188A (en) * 2017-03-17 2018-10-09 富士施乐株式会社 Management equipment and document file management system
CN109284426A (en) * 2018-08-23 2019-01-29 杭州创梦汇科技有限公司 It is a kind of most according to document classification system based on Permission Levels
CN109508518A (en) * 2017-09-15 2019-03-22 北京握奇智能科技有限公司 A kind of document handling method, system and file decryption equipment
CN110443051A (en) * 2019-07-30 2019-11-12 空气动力学国家重点实验室 A method of prevent security files in transmission on Internet
CN110609809A (en) * 2019-09-23 2019-12-24 中国银行股份有限公司 Method and device for acquiring digital file
CN111191253A (en) * 2019-05-17 2020-05-22 延安大学 Data encryption combination method
CN111611615A (en) * 2020-05-05 2020-09-01 山东同智伟业软件股份有限公司 Method for authorized consulting of printable file
CN113032826A (en) * 2021-03-18 2021-06-25 韩绍强 Encrypted electronic document sharing method based on multi-level authorization

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1340795A (en) * 2000-08-31 2002-03-20 优硕资讯科技股份有限公司 Method and system for preventing electronic file pirary
CN1612521A (en) * 2003-10-31 2005-05-04 多元网络株式会社 File security management system and identificaton server, user's machine and program
CN101216867A (en) * 2007-01-05 2008-07-09 黄承雄 A logging-on process cipher protection method by means of background synchronization
CN101290642A (en) * 2007-04-16 2008-10-22 瞬联软件科技(北京)有限公司 Electronic file transmission control method and its system based on area limit
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN101610148A (en) * 2009-07-08 2009-12-23 李伟 A kind of reciprocity internet digital literary property protection method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1340795A (en) * 2000-08-31 2002-03-20 优硕资讯科技股份有限公司 Method and system for preventing electronic file pirary
CN1612521A (en) * 2003-10-31 2005-05-04 多元网络株式会社 File security management system and identificaton server, user's machine and program
CN101216867A (en) * 2007-01-05 2008-07-09 黄承雄 A logging-on process cipher protection method by means of background synchronization
CN101290642A (en) * 2007-04-16 2008-10-22 瞬联软件科技(北京)有限公司 Electronic file transmission control method and its system based on area limit
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101515947A (en) * 2009-02-17 2009-08-26 浙江大学 Method and system for the quick-speed and safe distribution of file based on P2P
CN101610148A (en) * 2009-07-08 2009-12-23 李伟 A kind of reciprocity internet digital literary property protection method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104123508A (en) * 2014-07-21 2014-10-29 浪潮电子信息产业股份有限公司 Design method based on intranet data security protection engine
CN104123508B (en) * 2014-07-21 2017-01-25 浪潮电子信息产业股份有限公司 Design method based on intranet data security protection engine
CN108629188A (en) * 2017-03-17 2018-10-09 富士施乐株式会社 Management equipment and document file management system
CN108629188B (en) * 2017-03-17 2023-08-15 富士胶片商业创新有限公司 Management apparatus and document management system
CN109508518A (en) * 2017-09-15 2019-03-22 北京握奇智能科技有限公司 A kind of document handling method, system and file decryption equipment
CN109284426B (en) * 2018-08-23 2021-02-19 中信天津金融科技服务有限公司 Multi-data document classification system based on permission level
CN109284426A (en) * 2018-08-23 2019-01-29 杭州创梦汇科技有限公司 It is a kind of most according to document classification system based on Permission Levels
CN111191253A (en) * 2019-05-17 2020-05-22 延安大学 Data encryption combination method
CN110443051A (en) * 2019-07-30 2019-11-12 空气动力学国家重点实验室 A method of prevent security files in transmission on Internet
CN110443051B (en) * 2019-07-30 2022-12-27 空气动力学国家重点实验室 Method for preventing confidential documents from spreading on Internet
CN110609809A (en) * 2019-09-23 2019-12-24 中国银行股份有限公司 Method and device for acquiring digital file
CN111611615A (en) * 2020-05-05 2020-09-01 山东同智伟业软件股份有限公司 Method for authorized consulting of printable file
CN113032826A (en) * 2021-03-18 2021-06-25 韩绍强 Encrypted electronic document sharing method based on multi-level authorization
CN113032826B (en) * 2021-03-18 2022-08-23 韩绍强 Multi-level authorization-based encrypted electronic document sharing method

Similar Documents

Publication Publication Date Title
CN102347836A (en) Electronic document protected view system and method
CN104796265B (en) A kind of Internet of Things identity identifying method based on Bluetooth communication access
US20060072745A1 (en) Encryption system using device authentication keys
US5956403A (en) System and method for access field verification
US20060280297A1 (en) Cipher communication system using device authentication keys
CN101115060B (en) Method for protecting user encryption key in asymmetric cipher key transmitting process of user key management system
CN106464488A (en) Information transmission method and mobile device
CN105740725A (en) File protection method and system
CN102594824A (en) Security electronic document distribution method based on multiple security protection mechanisms
JP2009290508A (en) Electronized information distribution system, client device, server device and electronized information distribution method
KR20100114321A (en) Digital content transaction-breakdown the method thereof
CN103310159A (en) Method and system for safely taking out electronic file with mobile intelligent terminal
JP2006163956A (en) Security printing system, printer or multifunctional copying apparatus with printer function, ic card and information processing apparatus
CN116743470A (en) Service data encryption processing method and device
KR100420735B1 (en) Mail transmitting/receiving system using watermarking and encoding technique, and method thereof
JP2008234143A (en) Subject limited mail opening system using biometrics, method therefor, and program therefor
CN101325486B (en) Method and apparatus for transferring field permission cryptographic key
Mata et al. Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish)
KR102055888B1 (en) Encryption and decryption method for protecting information
CN111539032B (en) Electronic signature application system resistant to quantum computing disruption and implementation method thereof
CN105049433B (en) Markization card number information transmits verification method and system
CN111541652B (en) System for improving security of secret information keeping and transmission
JP2005237037A (en) Authentication system using authentication recording medium, and preparation method of authentication recording medium
KR100638265B1 (en) method for secure for exchanging e-document in the internet
Zhu et al. Study on security of electronic commerce information system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120208