CN106446710A - Signed-document encrypting and safety browsing device and method thereof - Google Patents

Signed-document encrypting and safety browsing device and method thereof Download PDF

Info

Publication number
CN106446710A
CN106446710A CN201610864482.4A CN201610864482A CN106446710A CN 106446710 A CN106446710 A CN 106446710A CN 201610864482 A CN201610864482 A CN 201610864482A CN 106446710 A CN106446710 A CN 106446710A
Authority
CN
China
Prior art keywords
document
client
sign
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610864482.4A
Other languages
Chinese (zh)
Inventor
曹海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Evergrande Intelligent Technology Co Ltd
Original Assignee
Guangzhou Crane Internet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Crane Internet Technology Co Ltd filed Critical Guangzhou Crane Internet Technology Co Ltd
Priority to CN201610864482.4A priority Critical patent/CN106446710A/en
Publication of CN106446710A publication Critical patent/CN106446710A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a signed-document encrypting and safety browsing device and a method thereof, and relates to the field of electronic document transmission. The signed-document encrypting and safety browsing device and the method thereof have the advantages that a secret key is generated when an encryption identification of a signed document is identified, the signed document is encrypted according to the secret key and an encryption algorithm to generate an encrypted document, manual encryption of users is not needed, and accordingly, user experience is good; the secret key and the encrypted document are sent to a second client side when verification information sent by each third client side is received; when a user not knowing the secret key wants to browse the encrypted signed document, the signed document and the secret key can be received by the second client side after verification of each responsible person related to the signed document, so that the content of the signed document is protected to some extent, practical document application capability is improved, and users' browsing experience is good.

Description

Sign-off file encryption and safe browsing apparatus and method
Technical field
The present invention relates to electronic document transmission field, browse dress in particular to a kind of sign-off file encryption and safety Put and method.
Background technology
Electronic document (Electronic document) refers to what people were formed in social activities, with computer disc, The chemistry magnetic material such as disk and CD is the written material of carrier.Rely on computer system access and can pass on a communication network Defeated, it mainly includes electronic document, electronic mail, electronic report forms, electronic drawing etc..But, in order to prevent some to be related to machine The electronic document of close or privacy content during transmission is led to reveal it is therefore desirable in electronics literary composition by other people illegal acquisitions Before shelves transmission, electronic document is encrypted.
In prior art, the document in computer is encrypted usually user to complete manually, needs user to judge The need of encryption, seem document more inconvenience in actual applications;And user forgets document to be encrypted, no sometimes Safety beneficial to document;And be uploaded to the document of computer encrypted after, need to consult literary composition when there being other users trusty During shelves, due to not knowing that the key of document leads to not consult document;Reduce the practice ability of document, and user is clear The experience sense look at is poor.
Content of the invention
In view of this, the purpose of the embodiment of the present invention is to provide a kind of sign-off file encryption and safe browsing apparatus and side Method.
In a first aspect, embodiments providing a kind of sign-off file encryption and safe browsing apparatus, described sign-off literary composition Shelves encryption and safe browsing apparatus include:
Information receiving unit, for receiving the electronic document that one first client sends;
Format conversion unit, for entering row format conversion to the electronic document receiving;
Described information receiving unit is additionally operable to receive signature data and the signature information that described first client sends;
Sign-off document structure tree unit, for according to the electronic document after conversion, described signature data and described stamped signature letter Breath generates sign-off document;
Encryption identification recognition unit, for identifying whether described sign-off document includes encryption identification;
Encrypted document signal generating unit, if including encryption identification for described sign-off document, generates key, and according to close Key, AES generate encrypted document to described sign-off file encryption;
Described information receiving unit is additionally operable to receive the document viewing instruction of one second client transmission and checks the person Part information;
Information transmitting unit, for, after receiving described document viewing instruction and viewer's identity information, sending checking Request, viewer's identity information are to the 3rd client associating with default multiple identifier's identity informations;
Judging unit, judges whether to receive that each described 3rd client sends is verified information;
If described information transmitting element is additionally operable to receive when being verified information of each described 3rd client transmission, Send described key and encrypted document to described second client.
Second aspect, the embodiment of the present invention additionally provides a kind of sign-off file encryption and safe browsing method, described sign-off File encryption and safe browsing method include:
Receive the electronic document that one first client sends;
The electronic document receiving is entered with row format conversion;
Receive signature data and the signature information that described first client sends;
Generate sign-off document according to the electronic document after conversion, described signature data and described signature information;
Identify whether described sign-off document includes encryption identification;
If described sign-off document includes encryption identification, generate key, and according to key, AES to described sign-off File encryption generates encrypted document;
Receive document viewing instruction and the viewer's identity information that one second client sends;
After receiving described document viewing instruction and viewer's identity information, send checking request, viewer's identity letter Cease to the 3rd client associating with default multiple identifier's identity informations;
Judge whether to receive that each described 3rd client sends is verified information;
If receiving when being verified information of each described 3rd client transmission, send described key and encryption literary composition Shelves are to described second client.
Compared with prior art, sign-off file encryption provided in an embodiment of the present invention and safe browsing apparatus and method, Recognize sign-off document and include generation key during encryption identification, and according to key, AES to described sign-off file encryption Generate encrypted document, encrypt manually without user, Consumer's Experience sense is high, and send receiving each described 3rd client When being verified information, send described key and encrypted document to described second client, as the user not knowing key During sign-off document after wanting to browse encryption, need to pass through per capita to be verified with the responsibility of this sign-off document associations through each Afterwards, you can sign-off document and key are received by the second client, thus browsing to the flesh and blood of sign-off document, both right The content of sign-off document has the practice ability that certain protectiveness improves document again, and the experience sense that user browses High.
For enabling the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate Appended accompanying drawing, is described in detail below.
Brief description
Purpose, technical scheme and advantage for making the embodiment of the present invention are clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described it is clear that described embodiment is The a part of embodiment of the present invention, rather than whole embodiments.The present invention generally described and illustrated in accompanying drawing herein is implemented The assembly of example can be arranged with various different configurations and design.Therefore, the reality to the present invention providing in the accompanying drawings below The detailed description applying example is not intended to limit the scope of claimed invention, but is merely representative of the selected enforcement of the present invention Example.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained under the premise of not making creative work Every other embodiment, broadly falls into the scope of protection of the invention.
Fig. 1 be server provided in an embodiment of the present invention respectively with the first client, the second client and the 3rd client The interactive schematic diagram at end;
Fig. 2 is the block diagram of server provided in an embodiment of the present invention;
Fig. 3 is the functional unit schematic diagram of sign-off file encryption provided in an embodiment of the present invention and safe browsing apparatus;
Fig. 4-Fig. 5 is the flow chart of sign-off file encryption provided in an embodiment of the present invention and safe browsing method.
Wherein, the corresponding relation between reference and component names is as follows:Server 101, the first client 102, the Two clients 103, the 3rd client 104, sign-off file encryption and safe browsing apparatus 105, memory 106, storage control 107, processor 108, Peripheral Interface 109, information receiving unit 301, format conversion unit 302, sign-off document structure tree unit 303, encryption identification recognition unit 304, encrypted document signal generating unit 305, information transmitting unit 306, judging unit 307, select Unit 308.
Specific embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Ground description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Generally exist The assembly of the embodiment of the present invention described and illustrated in accompanying drawing can be arranged with various different configurations and design herein.Cause This, be not intended to limit claimed invention to the detailed description of the embodiments of the invention providing in the accompanying drawings below Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing The every other embodiment being obtained on the premise of going out creative work, broadly falls into the scope of protection of the invention.
As shown in figure 1, being the server 101 and the first client 102, the second client that present pre-ferred embodiments provide 103 and the 3rd schematic diagram of interacting of client 104.Described server 101 passes through network or data/address bus and first Client 102, the second client 103 and the 3rd client 104 interact and are communicatively coupled, with enter row data communication or Interaction.Described server 101 can be the webserver, database server etc..Described server 101 can be PC (personal computer, PC), panel computer, smart mobile phone, personal digital assistant (personal digital Assistant, PDA) server.
As shown in Fig. 2 being the block diagram of described server 101.Described server 101 include sign-off file encryption and Safe browsing apparatus 105, memory 106, storage control 107, processor 108, Peripheral Interface 109.
Described memory 106, storage control 107, processor 108, each element of Peripheral Interface 109 each other directly or Indirectly it is electrically connected with, to realize transmission or the interaction of data.For example, these elements can lead to by one or more each other News bus or holding wire are realized being electrically connected with.It is permissible that described sign-off file encryption and safe browsing apparatus 105 include at least one The form of software or firmware (firmware) is stored in described memory 106 or is solidificated in the operation system of described server 101 Software function module in system (operating system, OS).Described processor 108 is used for executing storage in memory 106 Executable module, software function module or computer that for example described sign-off file encryption and safe browsing apparatus 105 include Program.
Wherein, memory 106 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only storage (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc.. Wherein, memory 106 is used for storage program, and described processor 108, after receiving execute instruction, executes described program, aforementioned The method performed by server 101 of the stream process definition that embodiment of the present invention any embodiment discloses can apply to processor In 108, or realized by processor 108.
Processor 108 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned processor 108 can To be general processor 108, including central processing unit (Central Processing Unit, abbreviation CPU), network processing unit (Network Processor, abbreviation NP) etc.;Can also be digital signal processor (DSP), special IC (ASIC), Ready-made programmable gate array (FPGA) or other PLDs, discrete gate or transistor logic, discrete hard Part assembly.Can realize or execute disclosed each method in the embodiment of the present invention, step and logic diagram.General processor Can be microprocessor or this processor 108 can also be any conventional processor 108 etc..It should be noted that this The function of the processor 108 that a kind of file encryption system that bright embodiment provides is provided, can realize leading to by software The hardware crossing entity realizes (for example, realizing above-mentioned function by the integrated circuit (IC) of processor), and here is not limited.
Various input/output devices are coupled to processor 108 and memory 106 by described Peripheral Interface 109.At some In embodiment, Peripheral Interface 109, processor 108 and storage control 107 can be realized in one single chip.Other one In a little examples, they can be realized by independent chip respectively.
Refer to Fig. 3, a kind of sign-off file encryption provided in an embodiment of the present invention and safe browsing apparatus 105, it is applied to Server 101, described sign-off file encryption and safe browsing apparatus 105 include information receiving unit 301, format conversion unit 302nd, sign-off document structure tree unit 303, encryption identification recognition unit 304, encrypted document signal generating unit 305, information transmitting unit 306th, judging unit 307 and selected unit 308.
Described information receiving unit 301 is used for receiving the electronic document that one first client 102 sends.
Specifically, user can open browser in the first client 102, and inputs account page info, you can obtains clear The electronic document look in device uploads the page.Specific operating procedure can be as follows:1. click on electronic document and upload " opening of the page Document " button, now browser prompts user select local file to open, load the electronic document of selection, and user can point Hit document preview button, the electronic document that can select in browser online browse.And also " preservation document " button can be clicked on, will This electronic document function is another to be existed under selected path.In preview electronic document and after confirming that electronic document is errorless, now use " transmission document " button can be clicked in browser page in family, and now browser is by subscriber identity information, terminal identity information, document The electronic document of label information and user's upload sends to server 101, so that follow-up operation.
Described format conversion unit 302 is used for the electronic document receiving is entered with row format conversion.
For example, the form of the document that information receiving unit 301 receives is DOC form, and presetting form is DOCX lattice Formula, then now the document of DOC form is converted into the document of DOCX form by format conversion unit 302, to carry out follow-up operation.
Described information receiving unit 301 is additionally operable to receive signature data and the stamped signature letter that described first client 102 sends Breath.
Client can show the documents editing inframe that the electronic document after conversion conversion form is shown in user interface, and The user interface that client provides also includes at least one signature boxes, and user directly moves signature and stamped signature frame to literary composition by mouse Shelves editor's inframe, clicks on and submits to, thus signature data and signature information are sent to information receiving unit 301.
Described sign-off document structure tree unit 303 be used for according to form conversion after electronic document, described signature data and Described signature information generates sign-off document.
After information receiving unit 301 receives signature data and signature information, sign-off document structure tree unit 303 according to turn Electronic document after changing, described signature data and described signature information generate sign-off document, thus signature boxes, stamped signature all with civilian The electronic document that shelves editor's inframe shows is synthetically generated sign-off document.
Described encryption identification recognition unit 304 is used for identifying whether described sign-off document includes encryption identification.
Wherein, encryption identification can edit the word content write during document, such as English word for user " Secret ", " leakage ".
If described encrypted document signal generating unit 305 includes encryption identification for described sign-off document, generate key, and According to key, AES, encrypted document is generated to described sign-off file encryption.
Wherein, the key of generation can be computer identity information or subscriber identity information.Further, the present embodiment In, described selected unit 308 is used for selecting the word content between encryption origin identification and encryption end of identification.Described encryption literary composition Shelves signal generating unit 305 is used for being encrypted generation encrypted document according to key, AES to selected word content.
Wherein, encryption origin identification and encryption end of identification are compiled in document content, and for example, passage content is " start technical scheme is result end of XXXXXXXXXXXXXX.Wherein, " start " is encryption origin identification, " end " conduct Encryption end of identification, " technical scheme is the word content between encryption origin identification and encryption end of identification The result of XXXXXXXXXXXXXX ".By selecting unit 308, sign-off document is selected with the word content of encryption, then by encryption Document structure tree unit 305 is encrypted to the word content of selected encryption, when user is when browsing this sign-off document, can view Unencrypted character area, if desired check the character area of encryption then need to input key to the deciphering of sign-off document it is achieved that The variation of mode consulted by document, and avoids and deposit encrypted content and clear content, operation side with two sign-off documents Just, Consumer's Experience sense is high.
Described information receiving unit 301 is additionally operable to receive the document viewing instruction of one second client 103 transmission and looks into See people's identity information.
For example, when other users want to check this sign-off document, this user can open in the second client 103 and browse Device, and input account page info (i.e. the identity information of user), the filename click now finding the document checks button, that is, By the identity information of user and instruction can be checked to information receiving unit 301, now information receiving unit 301 receives the second visitor Document viewing instruction and viewer's identity information that family end 103 sends.
Described information transmitting element 306 is used for, after receiving described document viewing instruction and viewer's identity information, sending out Send checking request, viewer's identity information the 3rd client 104 to associating with default multiple identifier's identity informations.
In the present embodiment, default multiple identifier's identity informations can be the identity letter of the person liable of this sign-off document Breath, for example, the identity information of enterprise boss, technician, department manager and executive secretary.When each person liable is the 3rd Client 104 receives checking request, after viewer's identity information, can decide whether that checking is logical according to the identity information of viewer Cross, and select in the 3rd client 104 and be verified or refuse the result passed through to information receiving unit 301.
Described judging unit 307 judges whether to receive that each described 3rd client 104 sends is verified information.
If described information transmitting element 306 is additionally operable to receive being verified of each described 3rd client 104 transmission During information, send described key and encrypted document to described second client 103.
In order to improve the security of this sign-off document, each responsibility is needed to be verified per capita, the second client 103 ability Receive key and the encrypted document of information transmitting unit 306 transmission, user can be by the second key in the second client 103 check encrypted document.
In addition, described judging unit 307 be additionally operable to judge whether to receive within the presetting time each described What three client 104 sent is verified information.
If described information transmitting element 306 is additionally operable to not receive one of described 3rd visitor within the presetting time What family end 104 sent is verified information, then send information to described one of described 3rd client 104.
In view of when the 3rd client 104 receives checking request, viewer's identity information is not rung by person liable for a long time Should, the inconvenience of many can be caused to the user that browses, if therefore not receiving one of described the within the presetting time When being verified information of three client 104 transmission, it is extremely described one of described that information transmitting unit 306 sends information 3rd client 104, so that this person liable responds to this checking demand in time (being verified or refuse to pass through).
Described judging unit 307 is additionally operable to judge whether to receive the payment amount that described second client 103 sends.
If described information transmitting element 306 is additionally operable to receive being verified of each described 3rd client 104 transmission Information or receive the second client 103 transmission payment amount when, send described key and described encrypted document to described Second client 103.
In addition, this sign-off document can also be consulted by paying, when information receiving unit 301 receives the second client During the payment amount of end 103 transmission, that is, send described key and described encrypted document extremely described second client 103, now User can browse sign-off document in the second client 103.
More preferably, described sign-off document includes importance of documents mark, and described judging unit 307 is additionally operable to judge to receive Whether the payment amount arriving is more than or equal to the standard amount of money associating with default and described importance of documents mark.
If the payment amount that described information transmitting element 306 is additionally operable to receive is more than or equal to and default and described literary composition During the standard amount of money of shelves importance mark association, send described key and described encrypted document to described second client 103.
In the present embodiment, the sign-off document for different importance is marked with different importance of documents marks respectively, and And different payment amount are associated with for different document importance mark.When only receive in information receiving unit 301 Payment amount be more than or equal to default and described importance of documents mark associate the standard amount of money when, transmission described key with And described encrypted document is to described second client 103.
Refer to Fig. 4, Fig. 5, the embodiment of the present invention additionally provides a kind of sign-off file encryption and safe browsing method, described Sign-off file encryption and safe browsing method include:
Step S401:Receive the electronic document of one first client 102 transmission.
Step S402:The electronic document receiving is entered with row format conversion.
Step S403:Receive signature data and the signature information that described first client 102 sends.
Step S404:Generate and sign according to the electronic document after form conversion, described signature data and described signature information Core document.
Step S405:Identify whether described sign-off document includes encryption identification, if described sign-off document includes encryption Mark then execution step S406.
In the present embodiment, described sign-off document includes encryption origin identification and encryption end of identification.
Described sign-off file encryption and safe browsing method also include:
Step S406:Generate key, and select the word content between encryption origin identification and encryption end of identification.
Step S407:According to key, AES, generation encrypted document is encrypted to selected word content.
Step S408:Receive document viewing instruction and viewer's identity information of one second client 103 transmission.
Step S409:After receiving described document viewing instruction and viewer's identity information, send checking request, check People's identity information is to the 3rd client 104 associating with default multiple identifier's identity informations.
Step S410:Judge whether receive testing of each described 3rd client 104 transmission within the presetting time Whether card by information and receives the payment amount that described second client 103 sends, if not connecing within the presetting time Receive that one of described 3rd client 104 sends is verified information and does not receive described second client 103 The payment amount sent, then execute S411, if receive that each described 3rd client 104 sends is verified information or reception To described second client 103 send payment amount when execution step S412.
Specifically, described sign-off document includes importance of documents mark, and step S410 may further include:Judge pre- Whether receive each described 3rd client 104 transmission in the time setting is verified information and the paying gold receiving Whether volume identifies, more than or equal to default and described importance of documents, the standard amount of money associating, if within the presetting time Do not receive being verified information and not receiving described second client of one of described 3rd client 104 transmission The payment amount of 103 transmissions, then execute S411, if receive that each described 3rd client 104 sends is verified information Or the payment amount receiving is executed when being more than or equal to the standard amount of money being associated with default and described importance of documents mark Step S412.
Step S411:Send information to described one of described 3rd client 104.
Step S412:Send described key and encrypted document to described second client 103.
To sum up, sign-off file encryption provided in an embodiment of the present invention and safe browsing apparatus and method, are recognizing sign-off Document includes generation key during encryption identification, and according to key, AES, described sign-off file encryption is generated with encryption literary composition Shelves, encrypt manually without user, and Consumer's Experience sense is high, and are receiving the checking that each described 3rd client 104 sends During by information, send described key and encrypted document to described second client 103, when the user not knowing key wants When browsing the sign-off document after encryption, need after each responsibility with this sign-off document associations is per capita by being verified, Sign-off document and key can be received by the second client 103, thus browsing to the flesh and blood of sign-off document, both right The content of sign-off document has the practice ability that certain protectiveness improves document again, and the experience sense that user browses High.
It should be understood that disclosed apparatus and method are it is also possible to pass through in several embodiments provided herein Other modes are realized.Device embodiment described above is only schematically, for example, the flow chart in accompanying drawing and block diagram Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.At this point, each square frame in flow chart or block diagram can represent the one of a module, program segment or code Part, a part for described module, program segment or code comprises holding of one or more logic function for realizing regulation Row instruction.It should also be noted that at some as in the implementation replaced, the function of being marked in square frame can also be to be different from The order being marked in accompanying drawing occurs.For example, two continuous square frames can essentially execute substantially in parallel, and they are sometimes Can execute in the opposite order, this is depending on involved function.It is also noted that it is every in block diagram and/or flow chart The combination of the square frame in individual square frame and block diagram and/or flow chart, can be with the special base of the function of execution regulation or action System in hardware to be realized, or can be realized with combining of computer instruction with specialized hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation Divide or modules individualism is it is also possible to two or more modules are integrated to form an independent part.
If described function realized using in the form of software function module and as independent production marketing or use when, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words Partly being embodied in the form of software product of part that prior art is contributed or this technical scheme, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execution each embodiment methods described of the present invention all or part of step. And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need Illustrate, herein, such as first and second or the like relational terms be used merely to by an entity or operation with Another entity or operation make a distinction, and not necessarily require or imply there is any this reality between these entities or operation The relation on border or order.And, term " inclusion ", "comprising" or its any other variant are intended to the bag of nonexcludability Containing, so that including a series of process of key elements, method, article or equipment not only include those key elements, but also including Other key elements being not expressly set out, or also include for this process, method, article or the intrinsic key element of equipment. In the absence of more restrictions, the key element being limited by sentence "including a ..." is it is not excluded that including described key element Process, method, also there is other identical element in article or equipment.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made any repair Change, equivalent, improvement etc., should be included within the scope of the present invention.It should be noted that:Similar label and letter exist Representing similar terms in figure below, therefore, once being defined in a certain Xiang Yi accompanying drawing, being then not required in subsequent accompanying drawing It is defined further and to be explained.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, and any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention should described be defined by scope of the claims.
It should be noted that herein, such as first and second or the like relational terms are used merely to a reality Body or operation are made a distinction with another entity or operation, and not necessarily require or imply these entities or deposit between operating In any this actual relation or order.And, term " inclusion ", "comprising" or its any other variant are intended to Comprising of nonexcludability, wants so that including a series of process of key elements, method, article or equipment and not only including those Element, but also include other key elements being not expressly set out, or also include for this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element that limited by sentence "including a ..." it is not excluded that Also there is other identical element including in the process of described key element, method, article or equipment.

Claims (10)

1. a kind of sign-off file encryption and safe browsing apparatus are it is characterised in that described sign-off file encryption and safety browse dress Put including:
Information receiving unit, for receiving the electronic document that one first client sends;
Format conversion unit, for entering row format conversion to the electronic document receiving;
Described information receiving unit is additionally operable to receive signature data and the signature information that described first client sends;
Sign-off document structure tree unit, for according to the electronic document after form conversion, described signature data and described stamped signature letter Breath generates sign-off document;
Encryption identification recognition unit, for identifying whether described sign-off document includes encryption identification;
Encrypted document signal generating unit, if including encryption identification for described sign-off document, generates key, and according to key, plus Close algorithm generates encrypted document to described sign-off file encryption;
Described information receiving unit is additionally operable to receive document viewing instruction and the viewer's identity letter that one second client sends Breath;
Information transmitting unit, for after receiving the instruction of described document viewing and viewer's identity information, send checking request, Viewer's identity information is to the 3rd client associating with default multiple identifier's identity informations;
Judging unit, judges whether to receive that each described 3rd client sends is verified information;
If described information transmitting element is additionally operable to receive when being verified information of each described 3rd client transmission, send Described key and encrypted document are to described second client.
2. sign-off file encryption according to claim 1 and safe browsing apparatus are it is characterised in that described sign-off document bag Encryption origin identification and encryption end of identification are included, described sign-off file encryption and safe browsing apparatus also include:
Selected unit, for selecting the word content between encryption origin identification and encryption end of identification;
Described encrypted document signal generating unit, is encrypted generation encryption literary composition according to key, AES to selected word content Shelves.
3. sign-off file encryption according to claim 1 and safe browsing apparatus it is characterised in that described judging unit also For judging whether to receive the payment amount that described second client sends;
If described information transmitting element is additionally operable to receive, each described 3rd client sends is verified information or reception During the payment amount sending to the second client, send described key and described encrypted document to described second client.
4. sign-off file encryption according to claim 3 and safe browsing apparatus are it is characterised in that described sign-off document bag Include importance of documents mark, described judging unit is additionally operable to judge whether the payment amount receiving is more than or equal to and presets With the described importance of documents standard amount of money that associates of mark;
If the payment amount that described information transmitting element is additionally operable to receive is more than or equal to important with default and described document Property mark association the standard amount of money when, send described key and described encrypted document to described second client.
5. sign-off file encryption according to claim 1 and safe browsing apparatus it is characterised in that described judging unit also Whether for judging to receive within the presetting time, each described 3rd client sends is verified information;
If described information transmitting element is additionally operable to not receive one of described 3rd client within the presetting time and sends out That send is verified information, then send information to described one of described 3rd client.
6. a kind of sign-off file encryption and safe browsing method are it is characterised in that described sign-off file encryption and the safety side of browsing Method includes:
Receive the electronic document that one first client sends;
The electronic document receiving is entered with row format conversion;
Receive signature data and the signature information that described first client sends;
Generate sign-off document according to the electronic document after form conversion, described signature data and described signature information;
Identify whether described sign-off document includes encryption identification;
If described sign-off document includes encryption identification, generate key, and according to key, AES to described sign-off document Encryption generates encrypted document;
Receive document viewing instruction and the viewer's identity information that one second client sends;
After receiving described document viewing instruction and viewer's identity information, send checking request, viewer's identity information extremely The 3rd client associating with default multiple identifier's identity informations;
Judge whether to receive that each described 3rd client sends is verified information;
If receiving when being verified information of each described 3rd client transmission, the described key of transmission and encrypted document are extremely Described second client.
7. sign-off file encryption according to claim 6 and safe browsing method are it is characterised in that described sign-off document bag Include encryption origin identification and encryption end of identification, if described sign-off document includes encryption identification, generate key, and Include according to the step that key, AES generate encrypted document to described sign-off file encryption:
If described sign-off document includes encryption identification, generate key, and select encryption origin identification with encryption end of identification it Between word content;
According to key, AES, generation encrypted document is encrypted to selected word content.
8. sign-off file encryption according to claim 7 and safe browsing method are it is characterised in that described judge whether to connect The step being verified information receiving each described 3rd client transmission includes:Judge whether to receive each the described 3rd What client sent is verified information and whether receives the payment amount that described second client sends;
If described receive when being verified information of each described 3rd client transmission, send described key and encryption literary composition Shelves include to the step of described second client:If receive that each described 3rd client sends is verified information or connects When receiving the payment amount that the second client sends, send described key and described encrypted document to described second client.
9. sign-off file encryption according to claim 8 and safe browsing method are it is characterised in that described sign-off document bag Include importance of documents mark, described judged whether to receive that each described 3rd client sends is verified information and is The no step receiving the payment amount that described second client sends includes:Judge whether to receive each described 3rd client The payment amount that described second client that what end sent be verified information and receive sends whether more than or equal to pre- If with the described importance of documents standard amount of money that associates of mark;
If described receive being verified information or receiving what the second client sent of each described 3rd client transmission During payment amount, the step sending described key and described encrypted document to described second client includes:
If the payment amount being verified information or receiving receiving each described 3rd client transmission is more than or equal to During the standard amount of money associating with default and described importance of documents mark, send described key and described encrypted document to institute State the second client.
10. sign-off file encryption according to claim 6 and safe browsing method are it is characterised in that described judge whether The step being verified information receiving each described 3rd client transmission includes:Whether judge within the presetting time Receive each described 3rd client transmission is verified information;
If receiving when being verified information of each described 3rd client transmission described, send described key and encryption To before the step of described second client, methods described also includes document:If not receiving wherein within the presetting time What one described 3rd client sent is verified information, then send information to described one of described 3rd client End.
CN201610864482.4A 2016-09-29 2016-09-29 Signed-document encrypting and safety browsing device and method thereof Pending CN106446710A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610864482.4A CN106446710A (en) 2016-09-29 2016-09-29 Signed-document encrypting and safety browsing device and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610864482.4A CN106446710A (en) 2016-09-29 2016-09-29 Signed-document encrypting and safety browsing device and method thereof

Publications (1)

Publication Number Publication Date
CN106446710A true CN106446710A (en) 2017-02-22

Family

ID=58171070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610864482.4A Pending CN106446710A (en) 2016-09-29 2016-09-29 Signed-document encrypting and safety browsing device and method thereof

Country Status (1)

Country Link
CN (1) CN106446710A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509799A (en) * 2017-02-23 2018-09-07 珠海金山办公软件有限公司 A kind of template document acquisition methods, apparatus and system
CN109660494A (en) * 2017-10-11 2019-04-19 金联汇通信息技术有限公司 The signature method, apparatus and server of electronic contract

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101901124A (en) * 2010-06-30 2010-12-01 上海华御信息技术有限公司 File printing control method and system
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN102819704A (en) * 2012-07-20 2012-12-12 北京亿赛通科技发展有限责任公司 Document copyright protection method for intelligent terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787175A (en) * 1995-10-23 1998-07-28 Novell, Inc. Method and apparatus for collaborative document control
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101901124A (en) * 2010-06-30 2010-12-01 上海华御信息技术有限公司 File printing control method and system
CN102118503A (en) * 2011-01-25 2011-07-06 宇龙计算机通信科技(深圳)有限公司 Data protection method, device and terminal
CN102710633A (en) * 2012-05-29 2012-10-03 大连佳姆信息安全软件技术有限公司 Cloud security management system of security electronic documents and method
CN102819704A (en) * 2012-07-20 2012-12-12 北京亿赛通科技发展有限责任公司 Document copyright protection method for intelligent terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509799A (en) * 2017-02-23 2018-09-07 珠海金山办公软件有限公司 A kind of template document acquisition methods, apparatus and system
CN109660494A (en) * 2017-10-11 2019-04-19 金联汇通信息技术有限公司 The signature method, apparatus and server of electronic contract

Similar Documents

Publication Publication Date Title
US9501657B2 (en) Sensitive data protection during user interface automation testing systems and methods
EP3819855A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
DE112014005379B4 (en) Providing credentials on an electronic device using passwords communicated through verified channels
CN103917999B (en) On-line signature identity and verification method and its system in community
US10534931B2 (en) Systems, devices and methods for automatic detection and masking of private data
US7849201B1 (en) Method and system for capturing, organizing, searching and sharing web pages
US11636276B2 (en) Augmented reality information display and interaction via NFC based authentication
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN110768790A (en) Data security authorization access method, device, equipment and storage medium
US11615395B2 (en) Authentication for third party digital wallet provisioning
CN105447357A (en) Application processing method and terminal
CN106156654A (en) File encryption apparatus and method
CN105809445A (en) Password verifying and processing method, apparatus and terminal
CN104281272A (en) Password input processing method and device
US10402586B2 (en) Patient privacy de-identification in firewall switches forming VLAN segregation
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN106446710A (en) Signed-document encrypting and safety browsing device and method thereof
CN106411888A (en) Sign-off document encryption device and method
CN106453273B (en) A kind of information insurance management system and method based on cloud
US20150020165A1 (en) System of executing application and method thereof
US20140143858A1 (en) Processing arrangement and a method for processing information in a machine-to-human communications interface
CN112884102A (en) Management method and management system for two-dimension code of composite enterprise
US20140151451A1 (en) Smart card reader with space-saving and combined user-specific data input and output
DE102017128807A1 (en) Method and arrangement for triggering an electronic payment
KR101505934B1 (en) Method for providing personal page in internet banking service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190220

Address after: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000

Applicant after: Hengda Wisdom Technology Co., Ltd.

Address before: 510000 Room 3601, 78 Huangpu Avenue West, Tianhe District, Guangzhou City, Guangdong Province

Applicant before: Guangzhou crane Internet Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222