CN104156674A - Electronic document processing method and device - Google Patents

Electronic document processing method and device Download PDF

Info

Publication number
CN104156674A
CN104156674A CN201410397725.9A CN201410397725A CN104156674A CN 104156674 A CN104156674 A CN 104156674A CN 201410397725 A CN201410397725 A CN 201410397725A CN 104156674 A CN104156674 A CN 104156674A
Authority
CN
China
Prior art keywords
electronic document
document
verified
information
bar code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410397725.9A
Other languages
Chinese (zh)
Inventor
贾利滨
刘浩伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING CALAND RUNHE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410397725.9A priority Critical patent/CN104156674A/en
Publication of CN104156674A publication Critical patent/CN104156674A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an electronic document processing method and device. According to the embodiment, electronic documents to be processed, identification information of the electronic documents and source tracing information of the electronic documents are obtained, Hash operation is carried out on the electronic documents, a Hash value of the electronic documents is obtained, encryption processing based on the PKI technology is carried out on the source tracing information, an encryption value of the source tracing information is accordingly obtained, bar code information is accordingly generated according to the Hash value of the electronic documents, the encryption value of the source tracing information and the identification information of the electronic documents, and therefore the bar code information is dispersed and displayed on specified pages of the electronic documents; in this way, the electronic documents or printed document corresponding to the electronic documents can be verified through the adoption of the bar code information, and therefore safety of the electronic documents is guaranteed.

Description

The disposal route of electronic document and device
[technical field]
The present invention relates to information security technology, relate in particular to a kind of disposal route and device of electronic document.
[background technology]
Electronic document refers to what people formed in social activities, the written material taking chemical magnetic materials such as computing machine disc, disk and CDs as carrier.Relying on computer system access also can be in transmitted over communications networks.It mainly comprises electronic document, electronic mail, electronic report forms and electronic drawing etc.Alterability is the key property that electronic document has.
But, there is alterability just because of electronic document, make the security of electronic document be difficult to ensure.
[summary of the invention]
Many aspects of the present invention provide a kind of disposal route and device of electronic document, in order to ensure the security of electronic document.
An aspect of of the present present invention, provides a kind of disposal route of electronic document, comprising:
Obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document;
Described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
The described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
According to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Described bar code information is disperseed to be presented in the specified page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, described described bar code information disperseed to be presented in the specified page of described electronic document, comprising:
Obtain revealable at least two positions in described specified page;
Described bar code information is carried out to Hash operation, to obtain at least two hashing units;
Described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and revealable at least two positions in the described specified page of described acquisition, comprising:
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; According to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions; Or
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; Each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in acquisition; According to described numerical value, select at least two numerical value; And according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described electronic document is PDF document; Described each hashing unit in described at least two hashing units is disperseed to be respectively presented in described at least two positions on each position, comprising:
Utilize a figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, in the described specified page of described bar code information being disperseed to be presented in described electronic document after, also comprise:
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage;
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, in the described specified page of described bar code information being disperseed to be presented in described electronic document after, also comprise:
Whether client detects described electronic document and is modified;
If described electronic document is modified, described client is carried out crash handling to described bar code information.
Another aspect of the present invention, provides a kind for the treatment of apparatus of electronic document, comprising:
Obtain unit, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document;
Hash units, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
Ciphering unit, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
Generation unit, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Represent unit, for described bar code information being disperseed to be presented in the specified page of described electronic document.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, described in represent unit, specifically for
Obtain revealable at least two positions in described specified page;
Described bar code information is carried out to Hash operation, to obtain at least two hashing units; And
Described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, described in represent unit, specifically for
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; According to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions; Or
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; Each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in acquisition; According to described numerical value, select at least two numerical value; And according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described electronic document is PDF document; The described unit that represents, specifically for
Utilize a figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
Aspect as above and arbitrary possible implementation, further provide a kind of implementation, and described device also comprises:
Receiving element, for
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
Authentication unit, for
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
As shown from the above technical solution, the embodiment of the present invention is by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented in the specified page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented in the specified page of electronic document, therefore, if the specified page of electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively ensure the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further ensure the security of electronic document.
[brief description of the drawings]
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
The schematic flow sheet of the disposal route of the electronic document that Fig. 1 provides for one embodiment of the invention;
The structural representation of the treating apparatus of the electronic document that Fig. 2 provides for another embodiment of the present invention;
The structural representation of the treating apparatus of the electronic document that Fig. 3 provides for another embodiment of the present invention.
[embodiment]
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making whole other embodiment that obtain under creative work prerequisite, belong to the scope of protection of the invention.
It should be noted that, in the embodiment of the present invention, related terminal can include but not limited to mobile phone, personal digital assistant (Personal Digital Assistant, PDA), radio hand-held equipment, panel computer (Tablet Computer), PC (Personal Computer, PC), MP3 player, MP4 player etc.
In addition, term "and/or" herein, is only a kind of incidence relation of describing affiliated partner, and expression can exist three kinds of relations, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/" herein, generally represents that forward-backward correlation is to liking a kind of relation of "or".
The schematic flow sheet of the disposal route of the electronic document that Fig. 1 provides for one embodiment of the invention, as shown in Figure 1.
101, obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document.
Wherein, described electronic document can include but not limited to text formatting document, WORD document, PPT (Power Point) format file or portable document format (Portable Document Format, PDF) document, the present embodiment is not particularly limited this.
Wherein, the information of tracing to the source of described electronic document can include but not limited to download person's information of electronic document and the download time information of electronic document, and the present embodiment is not particularly limited this.
Be understandable that, due to the download person of electronic document and the variation of download time, therefore, may make the information of tracing to the source of described electronic document constantly update.
102, described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document.
Wherein, Hash (HASH) operation is according to the data of the content of electronic document, carries out preassigned logical operation.Hash operates the numerical value obtaining, and can be called cryptographic hash.The electronic document of different content, even identical filename, it is also not identical that Hash operates the cryptographic hash obtaining.
103, the described information of tracing to the source is carried out to the encryption based on public keys system (Public Key Infrastructure, PKI) technology, with the secret value of the information of tracing to the source described in obtaining.
104, according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information.
Wherein, described bar code information can include but not limited to bar code or two-dimensional bar code.
105, described bar code information is disperseed to be presented in the specified page of described electronic document.
Wherein, described specified page can include but not limited to any one page of described electronic document, for example, the catalogue page of the first page of described electronic document, the last page of described electronic document or described electronic document etc., the present embodiment is not particularly limited this.
It should be noted that, 101~105 executive agent can be electronic document processing apparatus, can be arranged in the server of network side, to process online.
Like this, by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented in the specified page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented in the specified page of electronic document, therefore, if the specified page of electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively ensure the integrality of electronic document.
PKI is public keys system, and it utilizes the feature of public key algorithm, sets up the system of a set of certificate issued, management and using, support with completion system in authentication, information encryption, guarantee data integrity and non-repudiation etc.PKI technology, is used cryptographic algorithm and pair of secret keys, and a public keys is that PKI (public key) and a private cipher key are private key (private key).Its ultimate principle is: the information content being encrypted by a key, can only just can be decrypted processing by another key matching with it.PKI can be issued and own relevant correspondent widely, and private key needs to deposit fool proofly.PKI is by digital certificate and its owner's relevant information, and for example, name, work unit, email address etc. bundle, by authoritative institution (Certificate Authority, CA) certification, distribution & management.That is to say, give the other side digital certificate, with regard to being equivalent to, the PKI of oneself has been sent to the other side.
Alternatively, in one of the present embodiment possible implementation, electronic document processing apparatus can also further carry out authentication to client.Particularly, client specifically can be obtained the corresponding user's of this client private key and digital certificate, and then utilizes private key to be encrypted digital certificate, to obtain signature, and digital certificate and signature is sent to electronic document processing apparatus.Electronic document processing apparatus utilizes digital certificate to obtain the corresponding user's of this client PKI, utilizes PKI that signature is decrypted and is processed and checking, confirms user's legal identity.
Like this, only have legal user, could use client-requested to obtain, electronic document processing apparatus is by carrying out 105 electronic documents that obtain, for example, and to electronic document processing apparatus request download etc.
It should be noted that, client specifically can be from inserting in the USBkey the terminal that this client moves, and reads the relevant information of the PKI technology that this USBkey stores, for example, and the corresponding user's of client digital certificate, PKI and private key etc.Electronic document processing apparatus can utilize digital certificate, obtains the corresponding user's of this client PKI from CA.
Alternatively, in one of the present embodiment possible implementation, in 103, specifically can obtain the PKI of the corresponding operation side of electronic document processing apparatus, and then utilize this PKI to be encrypted the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining.
It should be noted that, electronic document processing apparatus specifically can be from inserting in the USBkey this electronic document processing apparatus, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side of electronic document processing apparatus.
Alternatively, in one of the present embodiment possible implementation, in 105, specifically can obtain revealable at least two positions in described specified page, and described bar code information is carried out to Hash operation, to obtain at least two hashing units.Then, each hashing unit in described at least two hashing units can be disperseed to be respectively presented in described at least two positions on each position.
Be understandable that, carry out step and the execution of " obtaining revealable at least two positions in described specified page " and " described bar code information is carried out to Hash operation, with obtain at least two hashing units " step can there is no fixing execution sequence, can first carry out the step of " obtaining revealable at least two positions in described specified page ", carry out again and " described bar code information is carried out to Hash operation, with obtain at least two hashing units " step, or when can also carrying out the step of " obtaining revealable at least two positions in described specified page ", carry out and " described bar code information is carried out to Hash operation, with obtain at least two hashing units " step, or can also first carry out and " described bar code information be carried out to Hash operation, with obtain at least two hashing units " step, carry out again the step of " obtaining revealable at least two positions in described specified page ", the present embodiment is not particularly limited this.
Described Hash operation, refers to, bar code information, taking specified pixel quantity as unit, is cut into at least two hashing units, the pixel that each hashing unit comprises specified pixel quantity.
For example, matrix two-dimensional barcode, is made up of 21 × 21 (441) individual pixels conventionally, is made up of 21 row pixels and 21 row pixels.Conventionally, can, by matrix two-dimensional barcode with 1 pixel quantity, be cut into 441 hashing units.
Particularly, at least one item in the line number that specifically can comprise according to described each hashing unit and columns, and the pixel quantity comprising, pixel to described specified page is divided into groups, to obtain at least two pixel groups, and then according to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions.
For example, at least one item in the line number that specifically can comprise according to described each hashing unit and columns, and the pixel quantity comprising, to specified page nominated bank, for example, if line number is a line, can be to specific page the 10th row, 20 row, 30 row, 40 row ... on pixel divide into groups, to obtain at least two pixel groups, the pixel quantity that each pixel groups comprises equates with the pixel quantity that described each hashing unit comprises.Specifically can adopt Fibonacci sequence, 0,1,1,2,3,5,8,13,21,34,55,89,144 ..., claim again Fibonacci sequence, as the ordered series of numbers setting in advance.The position that each hashing unit disperses described at least two pixel groups numberings that position is corresponding, specifically can be determined by the numerical value in each ordered series of numbers successively, i.e. each numerical value in ordered series of numbers, can be corresponding to the numbering of pixel groups.As:
In the 10th row, adopt ordered series of numbers 1,2,3,5,8,13,21,34,55,89,144 ..., therefore, pixel groups numbering corresponding to position that hashing unit disperses is followed successively by 1,2,3,5,8,13,21,34,55,89,144,
In the 20th row, adopt ordered series of numbers 2,3,5,8,13,21,34,55,89,144 ..., therefore, pixel groups numbering corresponding to position that hashing unit disperses is followed successively by 2,3,5,8,13,21,34,55,89,144,
In the 30th row, adopt ordered series of numbers 3,5,8,13,21,34,55,89,144 ..., therefore, pixel groups numbering corresponding to position that hashing unit disperses is followed successively by 3,5,8,13,21,34,55,89,144,
In the 40th row, adopt ordered series of numbers 5,8,13,21,34,55,89,144 ..., therefore, pixel groups numbering corresponding to position that hashing unit disperses is followed successively by 5,8,13,21,34,55,89,144,
The like, until the end of specific page.
Can find out that described at least two positions can be that the pixel groups of the 10th row is numbered 1,2,3 successively, 5,8,13,21,34,55,89,144 ... pixel groups, be numbered 2 in the pixel groups of the 20th row, 3,5,8,13,21,34,55,89,144 ... pixel groups, the pixel groups of the 30th row is numbered 3,5, and 8,13,21,34,55,89,144, pixel groups, the pixel groups of the 40th row is numbered 5,8,13,21,34,55,89,144 ... pixel groups, the like, until the end of specific page.
Particularly, at least one item in the line number that specifically can comprise according to described each hashing unit and columns, and the pixel quantity comprising, pixel to described specified page is divided into groups, to obtain at least two pixel groups, and then each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in obtaining.Then, according to described numerical value, select at least two numerical value, and according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
For example, the pixel quantity that specifically can comprise according to described each hashing unit, at least one item in line number and columns, to specified page nominated bank, for example, if line number is a line, can be to specific page the 10th row, 20 row, 30 row, 40 row ... on pixel divide into groups, to obtain at least two pixel groups, the pixel quantity that each pixel groups comprises equates with the pixel quantity that described each hashing unit comprises.Specifically can adopt self-defining self-defined ordered series of numbers, for example, 1,2,3,4,5,6,7,8,9,10,11,12 ..., as the ordered series of numbers setting in advance.Each pixel groups, the specifically numerical value in corresponding each ordered series of numbers successively, using the numbering as pixel groups.The position that each hashing unit disperses described at least two positions, specifically can specify for example mod10 computing of delivery to determine by the numerical value in each ordered series of numbers successively.If the result of modulo operation is 0, the pixel groups taking numerical value as numbering, the position that can disperse for hashing unit.As,
At the 10th row, 20 row, 30 row, 40 row ... in, the position that hashing unit disperses successively corresponding pixel groups be numbered 10,20,30,40,50,60,70,80,90,100,110,120 ...
Can find out, described at least two positions, can be at the 10th row, 20 row, 30 row, 40 row successively ... pixel groups be numbered 10,20,30,40,50,60,70,80,90,100,110,120 ... pixel groups, until the end of specific page.
In the present embodiment, described bar code information is carried out to Hash operation, the hashing unit corresponding with described at least two positions obtaining, can be according to described at least two positions, disperse to be equably presented in the specified page of described electronic document.The implication of " evenly ", can refer to that each hashing unit is on described at least two positions, represent successively once, be hashing unit A, hashing unit B, hashing unit C, hashing unit D and hashing unit E, or can also refer to that each hashing unit is on described at least two positions, circulation is presented in several times successively, hashing unit A, hashing unit B, hashing unit C, hashing unit D, hashing unit E, hashing unit A, hashing unit B, hashing unit C, hashing unit D, hashing unit E, hashing unit A, hashing unit B, hashing unit C, hashing unit D, hashing unit E, hashing unit A, hashing unit B, hashing unit C, hashing unit D, hashing unit E, hashing unit A, hashing unit B, hashing unit C, hashing unit D, hashing unit E, the present embodiment is not particularly limited this.
Particularly, be the situation of PDF document for electronic document, specifically can utilize figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.The implementation of PDF document can be regarded as the stack of multiple figure layers, and information of every insertion just can be regarded as a figure layer, the restriction that the quantity of its figure layer is not fixed.For example,
Specifically can utilize iText technology, locate described in the specified page of described electronic document each locational hashing unit at least two positions.The picture format of iText technical support can include but not limited to GIF, JPEG, PNG and WMF form, and the present embodiment is not particularly limited this.
For different picture formats, the automatic recognition image form of same constructed fuction for iText technology.Obtain respectively the example of GIF, JPEG and PNG image by code below:
Image?gif=Image.getInstance("vonnegut.gif");
Image?jpeg=Image.getInstance("myKids.jpg");
Image?png=Image.getInstance("hitchcock.png");
1. the position of image
The position of image mainly refers to the alignment thereof of image in document, and position relationship between image and text.In IText, process by function public void setAlignment (int alignment), parameter alignment is that Image.RIGHT, Image.MIDDLE, Image.LEFT refer to respectively Right Aligns, placed in the middle, left-justify; When parameter alignment is Image.TEXTWRAP, Image.UNDERLYING refers to that respectively word shows as the background of word around figure demonstration, figure.These two kinds of parameters can be in conjunction with to get a desired effect, and the effect showing as setAlignment (Image.RIGHT|Image.TEXTWRAP) is image Right Aligns, and word shows around image.
2. the size of image and rotation
If image shows not according to life size, can set by function below in document:
public?void?scaleAbsolute(int?newWidth,int?newHeight)
public?void?scalePercent(int?percent)
public?void?scalePercent(int?percentX,int?percentY)
Function public void scaleAbsolute (int newWidth, int newHeight) is set and display size directly; Function public void scalePercent (int percent)
Set and display ratio, as scalePercent (50) represents that the size showing is full-sized 50%; And image of function scalePercent (int percentX, int percentY)
3. high wide displaying ratio
If image in document, show after need to rotating to an angle, can pass through function public void setRotation (double r) sets, and parameter r is radian, if the anglec of rotation is 30 degree, parameter r=Math.PI/6.
Particularly, it is the situation of WORD document for electronic document, specifically can utilize the AddPicture method of nlineShapes type, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.For example,
For Shapes object: can and return to a Shape object from existing document creation one pictures, this object represents new picture.
For InlineShapes object: can and return to an InlineShape object from picture of existing document creation, this object represents new picture.
Grammer 1
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Left,Top,Width,Height,Anchor);
Grammer 2
expression.AddPicture(FileName,LinkToFile,SaveWithDocument,Range)。Wherein,
Expression, grammer 1: essential.This expression formula is returned to a Shapes object; Grammer 2: essential.This expression formula is returned to an InlineShapes object.
FileName, character types (String), essential.Appointment will create the document name of object.
LinkToFile, variable type (Variant), optional.If this setup of attribute is true (True), by created object and the document links that creates this object.If be set to vacation (False), the object this being created becomes the separate copy of the document that creates this object.Default value is False.
SaveWithDocument, variable type (Variant), optional.If this attribute is True, the picture of link is preserved together with document.Default value is False.
Left, Top, variable type (Variant), optional.The position of the relative lock token in the upper left corner of designated pictures.
Width, Height, variable type (Variant), optional.The width of designated pictures and length.
Anchor, variable type (Variant), optional.The ' locked ' zone of designated pictures.If specified Anchor, it will appear at the beginning of ' locked ' zone first paragraph.If ignore this parameter, automatically place lock token, and picture is with reference to coboundary and the left margin location of the page.
Range, variable type (Variant), optional.Specify a region, the object creating is placed in the word in this region.If this region is not folding, picture will cover this region so; Otherwise, at this region insert pictures.If ignore this parameter, automatically place picture.
Alternatively, in one of the present embodiment possible implementation, after 105, can also further receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the cryptographic hash of described document to be verified, the secret value of the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified.Wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified.And then, can be according to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage.Then, then according to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.Be understandable that, related Hash operation here, with 102 in the Hash operation carried out, be all that electronic document is carried out to preassigned identical logical operation.
Particularly, client is passed through the described bar code information of identification in the specified page of document to be verified, obtain the identification information of document to be verified, be specially 105 inverse operation, 105 how specific implementation bar code information is disperseed to be presented in the specified page of electronic document, this step is obtained described bar code information with regard to how being embodied in the specified page of document to be verified, and detailed description can, referring to 105 related content, repeat no more herein.
Wherein, specifically can obtain the private key of the corresponding operation side of electronic document processing apparatus, and then utilize this private key, the information of tracing to the source described in decrypting, to carry out record.
It should be noted that, electronic document processing apparatus specifically can be from inserting in the USBkey this electronic document processing apparatus, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side of electronic document processing apparatus.
Particularly, if the cryptographic hash of described document to be verified is consistent with the cryptographic hash of the electronic document of described storage, illustrate that described document to be verified is correct document, document was not modified or document is real document, Deng, can ensure the security of document; If the cryptographic hash of the cryptographic hash of described document to be verified and the electronic document of described storage is inconsistent, illustrate that described document to be verified is incorrect document, document was modified or document is false document, etc., cannot ensure the security of document.
Like this, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further ensure the security of electronic document.
Be understandable that, described client can be mounted in the application program in terminal, or can also be a webpage of browser, if can realize electronic document processing outwardness form can, the present embodiment does not limit this.
Further alternatively, if described document to be verified is correct document, in order to prevent the phenomenon that copies of bar code information, can also further receive the request of obtaining that client sends, obtain request according to described, the electronic document of described document to be verified is sent to described client.Like this, if what take before the user of client is to print document, so, the electronic document that user can utilize described client to obtain, further carry out the verification of word for word to printing document, can further improve the security of printing document, can also overcome the defect that bar code information easily copies simultaneously.
Alternatively, in one of the present embodiment possible implementation, after 105, whether client further client detects described electronic document and is modified.If described electronic document is modified, described client can be carried out crash handling to described bar code information, for example, in described bar code information, stamps oblique line, etc.
Particularly, client specifically can periodically, regularly or in real time, be carried out Hash operation to electronic document, to obtain the cryptographic hash of described electronic document.If this cryptographic hash changes, illustrate that electronic document is modified, now, described client need to be carried out crash handling to bar code information.
It should be noted that, the Hash operation now carried out, can carry out according to preassigned logical operation.This Hash operation, can be identical with the Hash operation that electronic document processing apparatus carries out before, also can be different, and the present embodiment is not particularly limited this.
Whether like this, be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further ensure the security of electronic document.
In the present embodiment, by obtaining pending electronic document, the information of tracing to the source of the identification information of described electronic document and described electronic document, and described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document, the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining, and then according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, make it possible to described bar code information to disperse to be presented in the specified page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented in the specified page of electronic document, therefore, if the specified page of electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively ensure the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further ensure the security of electronic document.
It should be noted that, for aforesaid each embodiment of the method, for simple description, therefore it is all expressed as to a series of combination of actions, but those skilled in the art should know, the present invention is not subject to the restriction of described sequence of movement, because according to the present invention, some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and related action and module might not be that the present invention is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part of detailed description, can be referring to the associated description of other embodiment.
The structural representation of the treating apparatus of the electronic document that Fig. 2 provides for another embodiment of the present invention, as shown in Figure 2.The treating apparatus of the electronic document of the present embodiment can comprise acquisition unit 21, hash units 22, ciphering unit 23, generation unit 24 and represent unit 25.Wherein,
Obtain unit 21, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document.
Wherein, described electronic document can include but not limited to text formatting document, WORD document, PPT (Power Point) format file or portable document format (Portable Document Format, PDF) document, the present embodiment is not particularly limited this.
Wherein, the information of tracing to the source of described electronic document can include but not limited to download person's information of electronic document and the download time information of electronic document, and the present embodiment is not particularly limited this.
Be understandable that, due to the download person of electronic document and the variation of download time, therefore, may make the information of tracing to the source of described electronic document constantly update.
Hash units 22, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document.
Wherein, Hash (HASH) operation is according to the data of the content of electronic document, carries out preassigned logical operation.Hash operates the numerical value obtaining, and can be called cryptographic hash.The electronic document of different content, even identical filename, it is also not identical that Hash operates the cryptographic hash obtaining.
Ciphering unit 23, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining.
Generation unit 24, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information.
Wherein, described bar code information can include but not limited to bar code or two-dimensional bar code.
Represent unit 25, for described bar code information being disperseed to be presented in the specified page of described electronic document.
Wherein, described assigned address can include but not limited to the margin position of every page of described electronic document, and the present embodiment is not particularly limited this.For example, every page of close rightmost position, or more for example, every page of close position bottom, etc.
It should be noted that the treating apparatus of the electronic document that the present embodiment provides can be arranged in the server of network side, to process online.
Like this, obtain pending electronic document by obtaining unit, the information of tracing to the source of the identification information of described electronic document and described electronic document, and hash units is carried out Hash operation to described electronic document, to obtain the cryptographic hash of described electronic document, ciphering unit carries out the encryption based on PKI technology to the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining, and then by generation unit according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, making to represent unit can disperse described bar code information to be presented in the specified page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented in the specified page of electronic document, therefore, if the specified page of electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively ensure the integrality of electronic document.
PKI is public keys system, and it utilizes the feature of public key algorithm, sets up the system of a set of certificate issued, management and using, support with completion system in authentication, information encryption, guarantee data integrity and non-repudiation etc.PKI technology, is used cryptographic algorithm and pair of secret keys, and a public keys is that PKI (public key) and a private cipher key are private key (private key).Its ultimate principle is: the information content being encrypted by a key, can only just can be decrypted processing by another key matching with it.PKI can be issued and own relevant correspondent widely, and private key needs to deposit fool proofly.PKI is by digital certificate and its owner's relevant information, and for example, name, work unit, email address etc. bundle, by authoritative institution (Certificate Authority, CA) certification, distribution & management.That is to say, give the other side digital certificate, with regard to being equivalent to, the PKI of oneself has been sent to the other side.
Alternatively, in one of the present embodiment possible implementation, the treating apparatus of the electronic document that the present embodiment provides can also further carry out authentication to client.Particularly, client specifically can be obtained the corresponding user's of this client private key and digital certificate, and then utilizes private key to be encrypted digital certificate, to obtain signature, and digital certificate is sent to the treating apparatus of electronic document with signing.The treating apparatus of electronic document utilizes digital certificate to obtain the corresponding user's of this client PKI, utilizes PKI that signature is decrypted and is processed and checking, confirms user's legal identity.
Like this, only have legal user, could use client-requested to obtain, represent the electronic document that unit 25 obtains, for example, to treating apparatus request download of electronic document etc.
It should be noted that, client specifically can be from inserting in the USBkey the terminal that this client moves, and reads the relevant information of the PKI technology that this USBkey stores, for example, and the corresponding user's of client digital certificate, PKI and private key etc.The treating apparatus of electronic document can utilize digital certificate, obtains the corresponding user's of this client PKI from CA.
Alternatively, in one of the present embodiment possible implementation, ciphering unit 23 specifically can obtain the PKI of the corresponding operation side for the treatment of apparatus of electronic document, and then utilizes this PKI to be encrypted the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining.
It should be noted that, ciphering unit 23 specifically can be from inserting in the USBkey the treating apparatus of this electronic document, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side for the treatment of apparatus of electronic document.
Alternatively, in one of the present embodiment possible implementation, described in represent unit 25, specifically can be for obtaining revealable at least two positions in described specified page; Described bar code information is carried out to Hash operation, to obtain at least two hashing units; And described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
Particularly, described in represent unit 25, specifically can be at least one in the line number that comprises according to described each hashing unit and columns, and the pixel quantity comprising, the pixel of described specified page is divided into groups, to obtain at least two pixel groups; According to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions.
Particularly, described in represent unit 25, specifically can be at least one in the line number that comprises according to described each hashing unit and columns, and the pixel quantity comprising, the pixel of described specified page is divided into groups, to obtain at least two pixel groups; Each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in acquisition; According to described numerical value, select at least two numerical value; And according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
Particularly, be the situation of PDF document for electronic document, described in represent unit 25 specifically can be for utilization figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.The implementation of PDF document can be regarded as the stack of multiple figure layers, and information of every insertion just can be regarded as a figure layer, the restriction that the quantity of its figure layer is not fixed.
Detailed description can, referring to the related content in embodiment corresponding to Fig. 1, repeat no more herein.
Alternatively, in one of the present embodiment possible implementation, as shown in Figure 3, the treating apparatus of the electronic document that the present embodiment provides can further include receiving element 31 and authentication unit 32.Wherein,
Receiving element 31, be used for the cryptographic hash of the document to be verified that receives client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the cryptographic hash of described document to be verified, the secret value of the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified.Wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified.
Authentication unit 32, for according to the identification information of described document to be verified, obtains the electronic document of storage, and the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And according to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and record the information of tracing to the source of described document to be verified.Be understandable that related Hash operation here, with the Hash operation that hash units 22 is carried out, is all that electronic document is carried out to preassigned identical logical operation.
Wherein, authentication unit 32 specifically can obtain the private key of the corresponding operation side for the treatment of apparatus of electronic document, and then utilizes this private key, and the information of tracing to the source described in decrypting, to carry out record.
It should be noted that, authentication unit 32 specifically can be from inserting in the USBkey the treating apparatus of this electronic document, read the relevant information of the PKI technology that this USBkey stores, for example, PKI and the private key etc. of the corresponding operation side for the treatment of apparatus of electronic document.
Particularly, if the cryptographic hash of described document to be verified is consistent with the cryptographic hash of the electronic document of described storage, illustrate that described document to be verified is correct document, document was not modified or document is real document, Deng, can ensure the security of document; If the cryptographic hash of the cryptographic hash of described document to be verified and the electronic document of described storage is inconsistent, illustrate that described document to be verified is incorrect document, document was modified or document is false document, etc., cannot ensure the security of document.
Like this, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further ensure the security of electronic document.
Be understandable that, described client can be mounted in the application program in terminal, or can also be a webpage of browser, if can realize electronic document processing outwardness form can, the present embodiment does not limit this.
Further alternatively, if described document to be verified is correct document, in order to prevent the phenomenon that copies of bar code information, the treating apparatus of the electronic document that the present embodiment provides can also further receive the request of obtaining that client sends, obtain request according to described, the electronic document of described document to be verified is sent to described client.Like this, if what take before the user of client is to print document, so, the electronic document that user can utilize described client to obtain, further carry out the verification of word for word to printing document, can further improve the security of printing document, can also overcome the defect that bar code information easily copies simultaneously.
In the present embodiment, obtain pending electronic document by obtaining unit, the information of tracing to the source of the identification information of described electronic document and described electronic document, and hash units is carried out Hash operation to described electronic document, to obtain the cryptographic hash of described electronic document, ciphering unit carries out the encryption based on PKI technology to the described information of tracing to the source, with the secret value of the information of tracing to the source described in obtaining, and then by generation unit according to the cryptographic hash of described electronic document, the secret value of the described information of tracing to the source and the identification information of described electronic document, generate bar code information, making to represent unit can disperse described bar code information to be presented in the specified page of described electronic document, like this, just can utilize bar code information to verify described electronic document or the corresponding printing document of this electronic document, thereby ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, due to bar code information is disperseed to be presented in the specified page of electronic document, therefore, if the specified page of electronic document is imperfect, cannot provide complete bar code information so that described electronic document is verified, can effectively ensure the integrality of electronic document.
In addition, adopt technical scheme provided by the invention, owing to being in the process verified of the corresponding printing document of electronic document or this electronic document to document to be verified utilizing bar code information, also further record the information of tracing to the source of described document to be verified, therefore, can have good grounds to the leakage approach of document to be verified, can further ensure the security of electronic document.
In addition, adopt technical scheme provided by the invention, whether be modified by client detected electrons document, if described electronic document is modified, described client can be carried out crash handling to described bar code information, can further ensure the security of electronic document.
Those skilled in the art can be well understood to, for convenience and simplicity of description, the system of foregoing description, the specific works process of device and unit, can, with reference to the corresponding process in preceding method embodiment, not repeat them here.
In several embodiment provided by the present invention, should be understood that, disclosed system, apparatus and method, can realize by another way.For example, device embodiment described above is only schematic, for example, the division of described unit, is only that a kind of logic function is divided, and when actual realization, can have other dividing mode, for example, multiple unit or assembly can in conjunction with or can be integrated into another system, or some features can ignore, or do not carry out.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, indirect coupling or the communication connection of device or unit can be electrically, machinery or other form.
The described unit as separating component explanation can or can not be also physically to separate, and the parts that show as unit can be or can not be also physical locations, can be positioned at a place, or also can be distributed in multiple network element.Can select according to the actual needs some or all of unit wherein to realize the object of the present embodiment scheme.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing unit, can be also that the independent physics of unit exists, and also can be integrated in a unit two or more unit.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that also can adopt hardware to add SFU software functional unit realizes.
The integrated unit that the above-mentioned form with SFU software functional unit realizes, can be stored in a computer read/write memory medium.Above-mentioned SFU software functional unit is stored in a storage medium, comprise that some instructions (can be personal computers in order to make a computer installation, server, or network equipment etc.) or processor (processor) carry out the part steps of method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (Read-Only Memory, ROM), the various media that can be program code stored such as random access memory (Random Access Memory, RAM), magnetic disc or CD.
Finally it should be noted that: above embodiment only, in order to technical scheme of the present invention to be described, is not intended to limit; Although the present invention is had been described in detail with reference to previous embodiment, those of ordinary skill in the art is to be understood that: its technical scheme that still can record aforementioned each embodiment is modified, or part technical characterictic is wherein equal to replacement; And these amendments or replacement do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (11)

1. a disposal route for electronic document, is characterized in that, comprising:
Obtain the information of tracing to the source of identification information and the described electronic document of pending electronic document, described electronic document;
Described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
The described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
According to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Described bar code information is disperseed to be presented in the specified page of described electronic document.
2. method according to claim 1, is characterized in that, described described bar code information is disperseed to be presented in the specified page of described electronic document, comprising:
Obtain revealable at least two positions in described specified page;
Described bar code information is carried out to Hash operation, to obtain at least two hashing units;
Described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
3. method according to claim 2, is characterized in that, revealable at least two positions in the described specified page of described acquisition, comprising:
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; According to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions; Or
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; Each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in acquisition; According to described numerical value, select at least two numerical value; And according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
4. method according to claim 2, is characterized in that, described electronic document is PDF document; Described each hashing unit in described at least two hashing units is disperseed to be respectively presented in described at least two positions on each position, comprising:
Utilize a figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
5. according to the method described in the arbitrary claim of claim 1~4, it is characterized in that, in the described specified page of described bar code information being disperseed to be presented in described electronic document after, also comprise:
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage;
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
6. according to the method described in the arbitrary claim of claim 1~4, it is characterized in that, in the described specified page of described bar code information being disperseed to be presented in described electronic document after, also comprise:
Whether client detects described electronic document and is modified;
If described electronic document is modified, described client is carried out crash handling to described bar code information.
7. a treating apparatus for electronic document, is characterized in that, comprising:
Obtain unit, for obtaining the information of tracing to the source of identification information and described electronic document of pending electronic document, described electronic document;
Hash units, for described electronic document is carried out to Hash operation, to obtain the cryptographic hash of described electronic document;
Ciphering unit, for the described information of tracing to the source is carried out to the encryption based on PKI technology, with the secret value of the information of tracing to the source described in obtaining;
Generation unit, for according to the cryptographic hash of described electronic document, described in the trace to the source secret value of information and the identification information of described electronic document, generate bar code information;
Represent unit, for described bar code information being disperseed to be presented in the specified page of described electronic document.
8. device according to claim 7, is characterized in that, described in represent unit, specifically for
Obtain revealable at least two positions in described specified page;
Described bar code information is carried out to Hash operation, to obtain at least two hashing units; And
Described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
9. device according to claim 8, is characterized in that, described in represent unit, specifically for
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; According to the ordered series of numbers setting in advance, in described at least two pixel groups, select all or part of pixel groups, using as described at least two positions; Or
At least one item in the line number comprising according to described each hashing unit and columns, and the pixel quantity comprising, divide into groups to the pixel of described specified page, to obtain at least two pixel groups; Each pixel groups corresponding numerical value in the ordered series of numbers setting in advance at least two pixel groups described in acquisition; According to described numerical value, select at least two numerical value; And according to described at least two numerical value, at least two corresponding pixel groups of numerical value described in acquisition, using as described at least two positions.
10. device according to claim 8, is characterized in that, described electronic document is PDF document; The described unit that represents, specifically for
Utilize a figure layer technology, described in each hashing unit in described at least two hashing units is disperseed to be respectively presented at least two positions on each position.
11. according to the device described in the arbitrary claim of claim 7~10, it is characterized in that, described device also comprises:
Receiving element, for
Receive the cryptographic hash of the document to be verified of client transmission, the secret value of the information of tracing to the source and the identification information of described document to be verified of described document to be verified, the secret value of the cryptographic hash of described document to be verified, the information of tracing to the source of described document to be verified and the identification information of described document to be verified are that described client obtains by the described bar code information of identification in the specified page of document to be verified, wherein, described document to be verified comprises electronic document to be verified and/or printing document to be verified;
Authentication unit, for
According to the identification information of described document to be verified, obtain the electronic document of storage, the electronic document of described storage is carried out to Hash operation, to obtain the cryptographic hash of electronic document of described storage; And
According to the cryptographic hash of the electronic document of described storage, the cryptographic hash of described document to be verified is verified, and recorded the information of tracing to the source of described document to be verified.
CN201410397725.9A 2014-08-13 2014-08-13 Electronic document processing method and device Pending CN104156674A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410397725.9A CN104156674A (en) 2014-08-13 2014-08-13 Electronic document processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410397725.9A CN104156674A (en) 2014-08-13 2014-08-13 Electronic document processing method and device

Publications (1)

Publication Number Publication Date
CN104156674A true CN104156674A (en) 2014-11-19

Family

ID=51882171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410397725.9A Pending CN104156674A (en) 2014-08-13 2014-08-13 Electronic document processing method and device

Country Status (1)

Country Link
CN (1) CN104156674A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276744A (en) * 2017-05-27 2017-10-20 上海斐讯数据通信技术有限公司 A kind of file storage encryption method and system
CN107807950A (en) * 2017-09-18 2018-03-16 南京华盾电力信息安全测评有限公司 A kind of online friendly picture cutting method read of internet site group magazine file

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1964422A (en) * 2005-11-10 2007-05-16 冲电气工业株式会社 Watermarked information embedding apparatus and method, and computer program
KR20070059942A (en) * 2005-12-07 2007-06-12 후지쯔 가부시끼가이샤 Electronic document management program, electronic document management system and electronic document management method
CN101833746A (en) * 2010-04-23 2010-09-15 北京大学 Method for embedding reversible watermark in digital image and method for extracting reversible watermark from digital image
CN103793665A (en) * 2014-03-06 2014-05-14 北京淦蓝润和信息技术有限公司 Electronic document processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1964422A (en) * 2005-11-10 2007-05-16 冲电气工业株式会社 Watermarked information embedding apparatus and method, and computer program
KR20070059942A (en) * 2005-12-07 2007-06-12 후지쯔 가부시끼가이샤 Electronic document management program, electronic document management system and electronic document management method
CN101833746A (en) * 2010-04-23 2010-09-15 北京大学 Method for embedding reversible watermark in digital image and method for extracting reversible watermark from digital image
CN103793665A (en) * 2014-03-06 2014-05-14 北京淦蓝润和信息技术有限公司 Electronic document processing method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107276744A (en) * 2017-05-27 2017-10-20 上海斐讯数据通信技术有限公司 A kind of file storage encryption method and system
CN107276744B (en) * 2017-05-27 2020-12-18 王蕴卓 File storage encryption method and system
CN107807950A (en) * 2017-09-18 2018-03-16 南京华盾电力信息安全测评有限公司 A kind of online friendly picture cutting method read of internet site group magazine file
CN107807950B (en) * 2017-09-18 2021-05-04 南京华盾电力信息安全测评有限公司 Online friendly reading picture segmentation method for Internet station group magazine files

Similar Documents

Publication Publication Date Title
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
US20140254796A1 (en) Method and apparatus for generating and/or processing 2d barcode
KR102357978B1 (en) Document authentication and disclosure system and computer-based method thereof
CN105024824A (en) Method for generating and verifying credible label based on asymmetrical encryption algorithm and system
US20130297943A1 (en) Dynamic notary system
BR112014000919B1 (en) high value document authentication system and method
CN104021482A (en) Certificate false-proof verification method base on identification authentication technology
CN103793665A (en) Electronic document processing method and device
CN106921496A (en) A kind of digital signature method and system
WO2023009969A1 (en) Non-fungible token authentication
US8566615B2 (en) Document management system and method
CN1323114A (en) Discriminating system, discriminating method, discriminating equipment and its discriminating method
KR20110140122A (en) Methods for producing products which contain certificates and keys
CN107992759A (en) Realize device, method and the computer-readable recording medium of E-seal
CN104320253B (en) A kind of Quick Response Code Verification System and method based on CBS signature mechanisms
CN110598433A (en) Anti-counterfeiting information processing method and device based on block chain
CN111859431A (en) Electronic file signature method and device, electronic equipment and storage medium
US20120197688A1 (en) Systems and Methods for Verifying Ownership of Printed Matter
CN110135542B (en) The method, apparatus and system of user's interactive mode Internet of Things verifying based on RF tag
CN104156674A (en) Electronic document processing method and device
JP6755539B2 (en) Methods and equipment for publishing copyrighted works on networks
WO2019246077A1 (en) Multivariate encryption systems and methods
CN101404573B (en) Authorization method, system and apparatus
CN113328864A (en) Data transmission method and system based on function encryption, block chain and machine learning
CN110689354B (en) Two-dimensional code encryption website system for locking commodity origin place

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141119