CN107368747A - A kind of mobile office method, service end, client and system - Google Patents

A kind of mobile office method, service end, client and system Download PDF

Info

Publication number
CN107368747A
CN107368747A CN201610309349.2A CN201610309349A CN107368747A CN 107368747 A CN107368747 A CN 107368747A CN 201610309349 A CN201610309349 A CN 201610309349A CN 107368747 A CN107368747 A CN 107368747A
Authority
CN
China
Prior art keywords
file
encryption
mobile office
client
services
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610309349.2A
Other languages
Chinese (zh)
Inventor
查桂峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610309349.2A priority Critical patent/CN107368747A/en
Priority to PCT/CN2017/083869 priority patent/WO2017193950A1/en
Publication of CN107368747A publication Critical patent/CN107368747A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of mobile office method, service end, client and system, this method includes:Service end receives mobile office file, carries out encrypted signature processing to mobile office file, generates and store encryption file, generates the access information on services of mobile office file;Client initiates file access request according to information on services is accessed to service end;Service end is called and sends encryption file corresponding to file access request;Client receives encryption file, decryption encryption file and watermarking displaying.Pass through the implementation of the present invention, in whole process, client can not directly access mobile office file, and then it can not directly obtain the mobile office file of mobile office application service end memory storage, and it is modified, so that file security greatly enhances, file security caused by solving the problems, such as existing directly acquisition mobile office file is relatively low, enhances the usage experience of user.

Description

A kind of mobile office method, service end, client and system
Technical field
The present invention relates to mobile office field, more particularly to a kind of mobile office method, service end, client End and system.
Background technology
For mobile trend most very swift and violent over the past two years, equipment vendor, software developer etc. are paying close attention to this The change in individual market, also excavating the new chance of enterprise market application.
Many enterprises have been carried out mobile office at present, and the operation flow that some frequent routines are used moves Change, substantially increase office efficiency.But in the prior art, mobile office applications client can be straight The mobile office file for taking mobile office application service end memory to store up is obtained, and it is modified so that File security substantially reduces.
In view of the above-mentioned problems, a kind of mobile office method is proposed to solve existing directly acquisition mobile office text The problem of file security is relatively low caused by part, it is those skilled in the art's technical problem urgently to be resolved hurrily.
The content of the invention
It is existing to solve the invention provides a kind of mobile office method, service end, client and system The problem of file security caused by directly obtaining mobile office file is relatively low.
The invention provides a kind of mobile office method, it includes:
Receive mobile office file, to mobile office file carry out encrypted signature processing, generate and store plus Ciphertext part, the access information on services of mobile office file is generated, send and access information on services to client;
The file access request that client is initiated according to information on services is accessed is received, calls file access request Corresponding encryption file, corresponding encryption file is sent to client.
Further, in addition to:Receive authorization policy and period generation strategy corresponding to mobile office file, power Limit strategy includes access profile and file level of confidentiality;According to authorization policy and period generation strategy, encryption file is set The access term of validity and/or expired post processing pattern and/or trusted application list.
Further, encrypted signature processing is carried out to mobile office file, generates and store encryption file bag Include:The cryptographic Hash of mobile office file, call number Signcryption Algorithm are calculated using predetermined Hash algorithm Service private key is controlled using text processing generation signing messages is carried out to predetermined Hash algorithm and cryptographic Hash, will sign Information and the intermediate file of mobile office file composition mobile office file, call symmetric encipherment algorithm to use The encryption secret key pair intermediate file of mobile office file is encrypted, generation encryption file.
Further, after client is received according to the file access request that information on services is initiated is accessed, Also include:The text control service public key of client, encryption text corresponding to lookup are extracted in file access request The encryption key of part, control service public key using text and encryption key is encrypted, after transmission encryption Key is encrypted to client.
The invention provides a kind of mobile office method, it includes:
Receive the access information on services that simultaneously storage service end is sent;
According to access information on services to service end initiate file access request, receive service end return with visit Ask encryption file corresponding to information on services, decryption encryption file and watermarking displaying.
Further, in addition to:The period generation strategy and authorization policy of encryption file are obtained, to encrypting file And its Crypted password carries out storage management.
Further, before file access request is initiated to service end according to access information on services, also wrap Include:Judge whether to be stored with and access encryption file corresponding to information on services, if so, then directly invoking.
Further, file access request carries text control service public key;Decryption, which is encrypted file and shown, to be included: The encryption key after servicing the encryption that public key returns to service end is controlled using text processing is decrypted, obtained and add Close key, call symmetric encipherment algorithm to be decrypted using encryption secret key pair encryption file, obtain middle text Part, intermediate file include signing messages and mobile office file, and call number Signcryption Algorithm uses text Control service private key carries out signature check to signing messages, and signature check is by rear, according to watermark configuration information Watermark processing, the mobile office file after displaying processing are carried out to mobile office file.
The invention provides a kind of mobile office method, it includes:
Service end receives mobile office file, encrypted signature processing is carried out to mobile office file, generation is simultaneously Storage encryption file, the access information on services of mobile office file is generated, sends and accesses information on services to visitor Family end;
The access information on services that client is received and storage service end is sent, according to accessing information on services to clothes Initiate file access request in business end;
Service end receives the file access request that client is initiated according to information on services is accessed, and calls file to visit Encryption file corresponding to request is asked, sends corresponding encryption file to client;
Client receives the corresponding with accessing information on services of service end return and encrypts file, decryption encryption text Part and watermarking displaying.
The invention provides a kind of service end for mobile office, it includes:
Document management module, for receiving mobile office file, encrypted signature is carried out to mobile office file Processing, generates and stores encryption file, generates the access information on services of mobile office file, sends and accesses Information on services is to client;
File sending module, please according to the file access for accessing information on services initiation for receiving client Ask, call encryption file corresponding to file access request, send corresponding encryption file to client.
Further, document management module is additionally operable to receive corresponding to mobile office file authorization policy and week Phase strategy, authorization policy include access profile and file level of confidentiality;According to authorization policy and period generation strategy, if Put the access term of validity and/or expired post processing pattern and/or the trusted application list of encryption file.
Further, document management module is used for the Kazakhstan that mobile office file is calculated using predetermined Hash algorithm Uncommon value, call number Signcryption Algorithm control service private key using text and predetermined Hash algorithm and cryptographic Hash are entered Row processing generation signing messages, signing messages and mobile office file are formed to the centre of mobile office file File, symmetric encipherment algorithm is called to be added using the encryption secret key pair intermediate file of mobile office file It is close, generation encryption file.
Further, file sending module is additionally operable to extract the text control clothes of client in file access request Business public key, the encryption key of corresponding encryption file is searched, service public key using text control enters to encrypting key Row encryption, the encryption key after encryption is transmitted to client.
The invention provides a kind of client for mobile office, it includes:
Information storage module, for the access information on services received and storage service end is sent;
File read module, for according to information on services is accessed to service end initiation file access request, connecing Receive the corresponding with accessing information on services of service end return and encrypt file, decryption encryption file and watermarking exhibition Show.
Further, information storage module is additionally operable to obtain the period generation strategy and authorization policy of encryption file, Storage management is carried out to encryption file and its Crypted password.
Further, file read module is additionally operable to initiating file to service end according to access information on services Before access request, judge whether to be stored with to access and file is encrypted corresponding to information on services, if so, then straight Connect calling.
Further, file access request carries text control service public key;File read module is used for using text Processing is decrypted in encryption key after the encryption that control service public key returns to service end, and it is secret to obtain encryption Key, call symmetric encipherment algorithm to be decrypted using encryption secret key pair encryption file, obtain intermediate file, Intermediate file includes signing messages and mobile office file, and call number Signcryption Algorithm is taken using text control Private key be engaged in signing messages progress signature check, signature check is by rear, according to watermark configuration information to moving Dynamic office document carries out watermark processing, the mobile office file after displaying processing.
The invention provides a kind of system for mobile office, it include service end provided by the invention, And client provided by the invention.
Beneficial effects of the present invention:
The invention provides a kind of mobile office method, service end after mobile office file is received, Encrypted signature processing is carried out to mobile office file, generation encryption file is simultaneously stored, subsequently moved Office document is in use, service end calls the encryption file cocurrent of the mobile office file of client request to send To client, in whole process, client can not directly access mobile office file, and then can not The mobile office file of mobile office application service end memory storage is directly obtained, and it is modified, is made Obtain file security to greatly enhance, solve file security caused by existing directly acquisition mobile office file The problem of property is relatively low, enhance the usage experience of user.
Brief description of the drawings
Fig. 1 is the structural representation for the mobile office system that first embodiment of the invention provides;
Fig. 2 is the flow chart for the mobile office method that second embodiment of the invention provides;
Fig. 3 is the structural representation for the mobile office system that third embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describing, it is clear that described embodiment is part of the embodiment in the present invention, and The embodiment being not all of.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out under the premise of creative work the every other embodiment obtained, belong to the scope of protection of the invention.
Further annotation explanation is now made to the present invention by way of embodiment combination accompanying drawing.
First embodiment:
Fig. 1 is the structural representation for the mobile office system that first embodiment of the invention provides, can by Fig. 1 Know, in the present embodiment, mobile office system provided by the invention includes:
Service end 1, the door for being provided by application server receives mobile office file, to movement Office document carries out encrypted signature processing, generates and stores encryption file, generates the visit of mobile office file Information on services is asked, sends and accesses information on services to client 2, be additionally operable to receive client 2 according to access The file access request that information on services is initiated, call encryption file corresponding to file access request, transmission pair The encryption file answered is to client 2;
Client 2, for the access information on services received and storage service end 1 is sent, it is additionally operable to basis Access information on services and initiate file access request to service end 1, receive being serviced with accessing for service end return Encryption file corresponding to information, decryption encryption file and watermarking displaying.
Labor is carried out to service end 1 and client 2 in conjunction with Fig. 1.
Specifically, service end 1 is directed to, as shown in figure 1, in the present embodiment, clothes provided by the invention Business end 1 includes:
Document management module 11, for receiving mobile office file, signature is carried out to mobile office file and is added Close processing, generate and store encryption file, generate the access information on services of mobile office file, send and visit Ask information on services to client;
File sending module 12, please according to the file access for accessing information on services initiation for receiving client Ask, call encryption file corresponding to file access request, send corresponding encryption file to client.
In certain embodiments, the document management module 11 in above-described embodiment is additionally operable to receive mobile do Authorization policy and period generation strategy corresponding to official document part, authorization policy include access profile and file level of confidentiality;Root According to authorization policy and period generation strategy, set encryption file the access term of validity and/or expired post processing pattern and / or trusted application list.
In certain embodiments, the document management module 11 in above-described embodiment is used to use predetermined Hash Algorithm calculates the cryptographic Hash of mobile office file, and call number Signcryption Algorithm services private key using text control Processing generation signing messages is carried out to predetermined Hash algorithm and cryptographic Hash, by signing messages and mobile office text Part forms the intermediate file of mobile office file, calls symmetric encipherment algorithm adding using mobile office file Close secret key pair intermediate file is encrypted, generation encryption file.
In certain embodiments, the file sending module 12 in above-described embodiment is additionally operable in file access The text control service public key of client is extracted in request, the encryption key of encryption file, is used corresponding to lookup Encryption key is encrypted text control service public key, the encryption key after transmission encryption to client.
Specifically, client 2 is directed to, as shown in figure 1, in the present embodiment, visitor provided by the invention Family end 2 includes:
Information storage module 21, for the access information on services received and storage service end is sent;
File read module 22, for initiating file access request to service end according to access information on services, Receive the corresponding with accessing information on services of service end return and encrypt file, decryption encryption file and watermarking Displaying.
In certain embodiments, the information storage module 21 in above-described embodiment is additionally operable to obtain encryption text The period generation strategy and authorization policy of part, storage management is carried out to encryption file and its Crypted password.
In certain embodiments, the file read module 22 in above-described embodiment is additionally operable to according to access Before information on services initiates file access request to service end, judge whether to be stored with access information on services pair The encryption file answered, if so, then directly invoking.
In certain embodiments, the file access request in above-described embodiment carries text control service public key;Text The encryption key that part read module 22 is used to control using text after servicing the encryption that public key returns to service end is entered Row decryption processing, encryption key is obtained, call symmetric encipherment algorithm to enter using encryption secret key pair encryption file Row decryption, obtains intermediate file, and intermediate file includes signing messages and mobile office file, call number Signcryption Algorithm services private key using text control and carries out signature check to signing messages, and signature check passes through Afterwards, watermark processing is carried out to mobile office file according to watermark configuration information, the movement after displaying processing is done Official document part.
Second embodiment:
Fig. 2 is the flow chart for the mobile office implementation method that second embodiment of the invention provides, can by Fig. 2 Know, in the present embodiment, mobile office implementation method provided by the invention comprises the following steps:
S201:Service end receives mobile office file, and encrypted signature processing is carried out to mobile office file, Generate and store encryption file, generate the access information on services of mobile office file, send and access service letter Cease to client;
S202:The access information on services that client is received and storage service end is sent, letter is serviced according to accessing Cease to service end and initiate file access request;
S203:Service end receives the file access request that client is initiated according to information on services is accessed, and calls Encryption file corresponding to file access request, corresponding encryption file is sent to client;
S204:Client receives the corresponding with accessing information on services of service end return and encrypts file, decryption Encrypt file and watermarking displaying.
Specifically, include for embodiment of the mobile office method in service end 1:
Receive mobile office file, to mobile office file carry out encrypted signature processing, generate and store plus Ciphertext part, the access information on services of mobile office file is generated, send and access information on services to client;
The file access request that client is initiated according to information on services is accessed is received, calls file access request Corresponding encryption file, corresponding encryption file is sent to client.
In certain embodiments, the method in above-described embodiment also includes:It is corresponding to receive mobile office file Authorization policy and period generation strategy, authorization policy include access profile and file level of confidentiality;According to authorization policy And period generation strategy, set encryption file the access term of validity and/or expired post processing pattern and/or it is credible should Use list.
In certain embodiments, encrypted signature processing is carried out to mobile office file in above-described embodiment, Generating and storing encryption file includes:The cryptographic Hash of mobile office file is calculated using predetermined Hash algorithm, Call number Signcryption Algorithm using text control service private key to predetermined Hash algorithm and cryptographic Hash at Reason generation signing messages, signing messages and mobile office file are formed to the middle text of mobile office file Part, symmetric encipherment algorithm is called to be encrypted using the encryption secret key pair intermediate file of mobile office file, Generation encryption file.
In certain embodiments, the method in above-described embodiment is receiving client according to access information on services After the file access request of initiation, in addition to:The text control clothes of client are extracted in file access request Business public key, the encryption key of corresponding encryption file is searched, service public key using text control enters to encrypting key Row encryption, the encryption key after encryption is transmitted to client.
Specifically, include for embodiment of the mobile office method in client 2:
Receive the access information on services that simultaneously storage service end is sent;
According to access information on services to service end initiate file access request, receive service end return with visit Ask encryption file corresponding to information on services, decryption encryption file and watermarking displaying.
In certain embodiments, the method in above-described embodiment also includes:Obtain the cycle plan of encryption file Summary and authorization policy, storage management is carried out to encryption file and its Crypted password.
In certain embodiments, the method in above-described embodiment is being sent out according to access information on services to service end Before playing file access request, in addition to:Judge whether to be stored with and access encryption text corresponding to information on services Part, if so, then directly invoking.
In certain embodiments, the file access request in above-described embodiment carries text control service public key;Solution It is close encryption file and show include:The encryption controlled using text after servicing the encryption that public key returns to service end is secret Processing is decrypted in key, obtains encryption key, calls symmetric encipherment algorithm to use encryption secret key pair encryption text Part is decrypted, and obtains intermediate file, and intermediate file includes signing messages and mobile office file, calls Digital signature encryption algorithm services private key using text control and carries out signature check to signing messages, and signature check is led to Later, watermark processing, the movement after displaying processing are carried out to mobile office file according to watermark configuration information Office document.
3rd embodiment:
Further annotation explanation is done to the present invention in conjunction with concrete application scene.
For mobile trend most very swift and violent over the past two years, equipment vendor, software developer etc. are paying close attention to this The change in individual market, also excavating the new chance of enterprise market application.Many enterprises have been carried out moving at present Dynamic office, the operation flow mobile that some frequent routines are used, substantially increases office efficiency.Enterprise Industry realizes that mobile needs a process, and document security is most important for mechanism of government and enterprises, but some weights The document information wanted also fails to fully achieve mobile in many enterprises, and its reason includes:
1) mobile device be different from the equipment such as ordinary PC, be easily lost, document security risk it is higher.
2) not in government and enterprises' Administrative Area, document content is easy to artificially be leaked to other people for mobile device office As evidence, it is difficult to trace.
3) managing and control system at traditional PC ends is not easy to be transplanted to mobile terminal, needs to combine mobile terminal safety Management and control scheme is implemented together.
4) it is related to move document reader to mobile system scheme and related API and plug-in unit also constantly complete Kind, many functions do not possess also.
At present, although many governments and enterprise have been carried out the mobile in operation flow in office, For still holding conservative strategy on document.For example, may only it be plucked after some important document mobiles Want the form of document to show to check, and need attendant to safeguard summary info, so that leader's examination & approval are examined Core;Content can be seen in Move Mailbox, but attachment content can not check.
In view of the above problems, the present embodiment is based on Android system, implements effective management and control for document security Method, facilitate it is easy-to-use in the case of with mobile security managing and control system be combined guarantee document security, can root According to the security management and control for needing to set different document security strategies to realize different stage.
The purpose of the present embodiment, which is to provide one kind, can help enterprise quickly to realize Android Mobile solution content The method of security management and control, and Mobile solution fast integration can be allowed to use, ensure that application content is safely controllable. The present embodiment provides mobile client component and service end security management component device, can easily by Enterprise applies fast integration, is conveniently realized using that itself need not pay close attention to security management and control detail can Document content encryption and authority managing and controlling and file life cycle management safely.It can be realized by the present embodiment The on-line/off-line of mobile content browses, and supports secure watermark, the anti-falsification of content-encrypt, access rights strategy Regularly update, it is expired self destroy etc. security management and control function.
In actual applications, the present embodiment mainly provides text by client and service end two parts, client Control service, encryption and decryption service, service end provide file content management, key management, authorization policy plus Decrypt life cycle and document Transformation Service.Client carries out two-way certificate verification and safety with service end Coded communication.Service end provides encryption storage, priority assignation, security strategy and the life cycle of document Management.Service end provides application service interface and document content associated permissions strategy and life cycle is set, And symmetric encipherment algorithm is signed and then reused to content and is encrypted, each encrypted document distribution one Individual key is stored in service end, and cipher key delivery is encrypted using client public key, can only have the client to decrypt Key is obtained, return to application service end is text control information on services, does not expose the tool such as storage location directly Body information.Authorization policy includes document access scope, read and write access authority, level of confidentiality classification, trusted application List is set.Client provides text control service, ensures that document security is downloaded, key obtains safely, management and control The safety that strategy execution and content are read, support online and offline browse and watermark is shown.Client document Reader assembly communication encrypts controlled, document function pattern by client text control service to drive, to application For unaware, ensure using safety.
It is complicated without application using the mobile content management-control method of the present embodiment in enterprise mobile application Transformation, it is possible to allow user to conveniently realize the mobile safety of content.The present embodiment can be widely used in In government and enterprises' Mobile solution, it can also apply in PC sides, by setting the modes such as transparent encryption and decryption to realize text The security management and control of shelves content.
As shown in figure 3, the mobile office that the present embodiment provides realizes that system includes two parts:Part I For service end 1, Part II is client 2.Security management and control service and application, the reading of client 2 The unified communication set packing safe to use such as device assembly is in enterprise security desktop or sandbox, with individual Using isolation, the security management and control service of client services for client application app.Service end 1 includes should With service end 11 and content safety management and control service end 12, content safety management and control service end is application service end File security management and control service is provided.The communication of terminal and service end is using certificate two-way authentication and safety encryption Transmission.Service end application server uploads content and carries out relative set, and invoking content management service is realized Content safety management and control function.Client check document be downloaded by client text control service, decrypt and Browse.
In actual applications, including administrative staff file upload and client user file download and pipe Reason, concrete methods of realizing and process are described with reference to concrete scene.
The upload of mobile office file comprises the following steps:
In application server door, selection needs the content uploaded for step 1, first administrative staff, and Authorization policy, period generation strategy are set, then uploaded.
Step 2, application server first establishes two-way Credential-Security certification and encryption with literary control service during upload Passage, then recall content management and control service end content management service and carry out document security processing.
Step 3, content management server carries out priority assignation to document according to priority assignation, including accesses Scope, document security level etc..
Step 4, content management server are configured according to period generation strategy, are such as included, the access term of validity, Expired post processing pattern (renewal, auto-destruct again), trusted application list.
Step 5, set according to system, content document is changed, such as switch to pdf, picture lattice Formula.
Step 6, content management server calls cipher key management services, to the content assignment encryption key, Each content assignment one.
Step 7, content management server call cryptographic services, and encrypted signature is carried out to the content,
Hash algorithm is specifically distributed first the calculating of hash values is carried out to content, then by hash values and hash Algorithm controls the private key of service using text and RSA cryptographic algorithms are signed, and signs and is generated together with content One new format content, symmetric encipherment algorithm then is used with the key distributed in step 6 again, such as Aes algorithm carries out content-encrypt, generates final encrypted document.
Step 8, content management server to encrypted document carry out storage management, and establish with authorization policy, Lifecycle Policies corresponding relation simultaneously stores.
The access information on services of the content is returned to application service end and protected by step 9, content management server Deposit.The access information on services is not access to content direct address, but can pass through client by the service End text control service provides indirectly.
Said process completes a typical content uploading encryption flow, then corresponding, client Safety read encrypted document comprise the following steps:
Step 1, using mobile client by content access information come literary to client text control service request Shelves are read.The escape way of certification is first established in application with text control service before reading.
Step 2, whether after client text control service receives application, first checking locally has had copy etc. Information, if then preferential processing locality, into step 5, handled if not into step 3.
Step 3, client text control service, establishes secure communication to service end content management server and carries The content is handed over to read application.
Step 4, service end content management server, it is effective to carry out user right, credit application and content Phase etc. verifies, and verifies content and authority and key information secure encrypted transmission after passing through to client.
Wherein key will be encrypted with text control service client public key and be transferred to text control service.
If online browse, then content and key etc. are not preserved in local, it is necessary to which online every time obtain.
Step 5, text control service, using the private key decruption key of oneself, are then decrypted according to content information Document, and signature check is carried out to document to prevent being tampered.
Step 6, call security reader component to read decryption file, and read according to watermark configuration information The watermark information of reader's correlation added in component view plus a stacking is read, such as job number name watermark is believed Breath.
The text control service of client also provides related strategy inspection in addition to the service in above-mentioned reading process The tasks such as execution, key updating are looked into, such as:
Content Management:Mainly it is responsible for the download of encrypted content and management, signature check, peace is locally stored The storage management of full strategy, and corresponding key management, mutually isolated independence.
Authority updates:Be responsible for whether updated according to the authority of the tactful scope of examination, if any renewal then in time more Newly.
Cyclic check:According to authorization policy, check whether local content is expired, and expired, auto-destruct is deleted Remove, if checking whether discovery is expired, can update or refuse according to strategy decision in read request Access and auto-destruct absolutely.
Key obtains:Safety obtains contents encryption key, so that subsequent document is decrypted.
Encryption and decryption:Using the private key of itself to content key decryption during reading, and with decryption after key pair Content is decrypted.
Safety is read:In enterprise security container, safe reading service is provided for application, calling is read Read safe reading mode of device and open decrypted document, and according to setting further user watermark information.
So far, whole embodiment description is completed.From the point of view of said process, client text control service, answer With and service end content management service and service end application effectively combine, ensured that content safety is controllable. For corresponding use, content encryption and decryption and signature process, deposit position and key safety management transmission are all It is unaware, only need to uses interface.Client text control service is handed over service end content management service Mutual mode is safe and effective, and document security signature and encryption process are safe and reliable, document and key and peace Complete tactful separation management and transmission safety are flexible.
Device service end is controlled in text, system safety manager can carry out system parameter setting, encryption and decryption is set And content document batch updating, backup etc. are safeguarded, do not describing individually here.The present embodiment carries To feature operation be comparatively perfect, and safety, it is possible to reduce using retrofit work amount, to be real Existing content mobile provides safely a kind of implementation.This programme selectively can also suitably be become Change to meet to be actually needed.The mobile content security management and control device that the present embodiment is realized, it is a kind of novel Mode, effectively can be combined with digital certificate, safety desktop container etc., it is convenient using aligning Mobile e-government, mobile office in development propulsion etc. will be significant.
In the present embodiment, the content application APP of client refers to the mobile office being arranged in terminal Only it is the action pane of user, user can select the file that office needs, now, interior using APP Hold and request initiated to text control service module according to the access information on services of user's select file using APP, Text control service module forwards requests to service end;Corresponding, the application server of service end refers to provide shifting The server of dynamic office application, in the present invention, only uploaded as user the window of mobile office file with And the window to be communicated with client, mobile office file are handled by content managing module completely, application Server no longer possesses the management function of mobile office file, and so, service end is receiving mobile office After file, encrypted signature processing is carried out to mobile office file, generation encryption file simultaneously stores, rear It is continuous to move office document in use, the encryption of the mobile office file of service end calling client request File cocurrent gives client, and in whole process, client can not directly access mobile office file, And then the mobile office file of mobile office application service end memory storage can not be directly obtained, and it is entered Row modification so that file security greatly enhances.
In summary, by the implementation of the present invention, following beneficial effect at least be present:
The invention provides a kind of mobile office method, service end after mobile office file is received, Encrypted signature processing is carried out to mobile office file, generation encryption file is simultaneously stored, subsequently moved Office document is in use, service end calls the encryption file cocurrent of the mobile office file of client request to send To client, in whole process, client can not directly access mobile office file, and then can not The mobile office file of mobile office application service end memory storage is directly obtained, and it is modified, is made Obtain file security to greatly enhance, solve file security caused by existing directly acquisition mobile office file The problem of property is relatively low, enhance the usage experience of user.
It the above is only the embodiment of the present invention, any formal limit not done to the present invention Make, every any simple modification made according to technical spirit of the invention to embodiment of above, be equal Change, combination or modification, still fall within the protection domain of technical solution of the present invention.

Claims (18)

  1. A kind of 1. mobile office method, it is characterised in that including:
    Mobile office file is received, encrypted signature processing is carried out to the mobile office file, generates and deposits Storage encryption file, the access information on services of the mobile office file is generated, send described access and service letter Cease to client;
    The file access request that the client is initiated according to the access information on services is received, described in calling Encryption file corresponding to file access request, the corresponding encryption file is sent to the client.
  2. 2. mobile office method as claimed in claim 1, it is characterised in that also include:Described in reception Authorization policy and period generation strategy corresponding to mobile office file, the authorization policy include access profile and text Part level of confidentiality;According to the authorization policy and period generation strategy, set the encryption file the access term of validity and / or expired post processing pattern and/or trusted application list.
  3. 3. mobile office method as claimed in claim 1 or 2, it is characterised in that described to the shifting Dynamic office document carries out encrypted signature processing, and generating and storing encryption file includes:Calculated using predetermined Hash Method calculates the cryptographic Hash of the mobile office file, and call number Signcryption Algorithm is private using text control service Key to the predetermined Hash algorithm and cryptographic Hash carry out processing generation signing messages, by the signing messages with The mobile office file forms the intermediate file of the mobile office file, calls symmetric encipherment algorithm to make The intermediate file described in the encryption secret key pair of the mobile office file is encrypted, and generates the encryption text Part.
  4. 4. mobile office method as claimed in claim 3, it is characterised in that receiving the client After the file access request initiated according to the access information on services, in addition to:In the file access The text control service public key of the client is extracted in request, the encryption for searching the corresponding encryption file is secret Key, control service public key using the text and the encryption key is encrypted, adding after transmission encryption Close key is to the client.
  5. A kind of 5. mobile office method, it is characterised in that including:
    Receive the access information on services that simultaneously storage service end is sent;
    File access request is initiated to the service end according to the access information on services, receives the service The corresponding with the access information on services of end return encrypts file, decrypts the encryption file and watermarking Displaying.
  6. 6. mobile office method as claimed in claim 5, it is characterised in that also include:Described in acquisition The period generation strategy and authorization policy of file are encrypted, storage tube is carried out to the encryption file and its Crypted password Reason.
  7. 7. mobile office method as claimed in claim 5, it is characterised in that taken according to described access Before information of being engaged in initiates file access request to the service end, in addition to:Judge whether to be stored with described Encryption file corresponding to information on services is accessed, if so, then directly invoking.
  8. 8. the mobile office method as described in any one of claim 5 to 7, it is characterised in that the text Part access request carries text control service public key;It is described decryption it is described encryption file and show include:Using institute State the encryption key after the encryption that text control service public key returns to the service end and processing is decrypted, obtain Key is encrypted, calls symmetric encipherment algorithm to be decrypted using encryption file described in the encryption secret key pair, Intermediate file is obtained, the intermediate file includes signing messages and mobile office file, call number signature AES services private key using text control and carries out signature check to the signing messages, and signature check passes through Afterwards, watermark processing, the shifting after displaying processing are carried out to the mobile office file according to watermark configuration information Dynamic office document.
  9. A kind of 9. mobile office method, it is characterised in that including:
    Service end receives mobile office file, and encrypted signature processing is carried out to the mobile office file, raw Into and store encryption file, generate the access information on services of the mobile office file, send the access Information on services is to client;
    The access information on services that the client is received and storage service end is sent, serviced according to described access Information initiates file access request to the service end;
    The service end receives the file access that the client is initiated according to the access information on services please Ask, call encryption file corresponding to the file access request, send the corresponding encryption file to institute State client;
    The client receives the encryption text corresponding with the access information on services that the service end returns Part, decrypt the encryption file and watermarking displaying.
  10. A kind of 10. service end for mobile office, it is characterised in that including:
    Document management module, for receiving mobile office file, the mobile office file is signed Encryption, generate and store encryption file, generate the access information on services of the mobile office file, The access information on services is sent to client;
    File sending module, the file initiated for receiving the client according to the access information on services Access request, encryption file corresponding to the file access request is called, send the corresponding encryption text Part is to the client.
  11. 11. service end as claimed in claim 10, it is characterised in that the document management module is also For receiving authorization policy and period generation strategy corresponding to the mobile office file, the authorization policy includes Access profile and file level of confidentiality;According to the authorization policy and period generation strategy, the encryption file is set Access the term of validity and/or expired post processing pattern and/or trusted application list.
  12. 12. the service end as described in claim 10 or 11, it is characterised in that the file management Module is used for the cryptographic Hash that the mobile office file is calculated using predetermined Hash algorithm, call number signature AES controls service private key using text and processing generation label is carried out to the predetermined Hash algorithm and cryptographic Hash Name information, the signing messages and the mobile office file are formed to the centre of the mobile office file File, symmetric encipherment algorithm is called to use intermediate file described in the encryption secret key pair of the mobile office file It is encrypted, generates the encryption file.
  13. 13. service end as claimed in claim 12, it is characterised in that the file sending module is also For extracting the text control service public key of the client in the file access request, the correspondence is searched Encryption file encryption key, using it is described text control service public key to it is described encryption key place is encrypted Reason, the encryption key after encryption is transmitted to the client.
  14. A kind of 14. client for mobile office, it is characterised in that including:
    Information storage module, for the access information on services received and storage service end is sent;
    File read module, for initiating file access to the service end according to the access information on services Request, receive the corresponding with the access information on services of the service end return and encrypt file, decrypt institute State encryption file and watermarking displaying.
  15. 15. client as claimed in claim 14, it is characterised in that described information memory module is also It is close to the encryption file and its encryption for obtaining the period generation strategy and authorization policy of the encryption file Code carries out storage management.
  16. 16. client as claimed in claim 14, it is characterised in that the file read module is also For before file access request is initiated to the service end according to the access information on services, judgement to be It is no to be stored with encryption file corresponding to the access information on services, if so, then directly invoking.
  17. 17. the client as described in any one of claim 14 to 16, it is characterised in that the text Part access request carries text control service public key;The file read module is used for public using the text control service Processing is decrypted in encryption key after the encryption that key returns to the service end, obtains encryption key, adjusts It is decrypted with symmetric encipherment algorithm using encryption file described in the encryption secret key pair, obtains middle text Part, the intermediate file include signing messages and mobile office file, and call number Signcryption Algorithm makes Service private key being controlled with text signature check being carried out to the signing messages, signature check is by rear, according to watermark Configuration information carries out watermark processing, the mobile office file after displaying processing to the mobile office file.
  18. 18. a kind of system for mobile office, it is characterised in that including such as claim 10 to 13 Service end described in any one and the client as described in any one of claim 14 to 17.
CN201610309349.2A 2016-05-11 2016-05-11 A kind of mobile office method, service end, client and system Pending CN107368747A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610309349.2A CN107368747A (en) 2016-05-11 2016-05-11 A kind of mobile office method, service end, client and system
PCT/CN2017/083869 WO2017193950A1 (en) 2016-05-11 2017-05-11 Mobile office method, server, client, and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610309349.2A CN107368747A (en) 2016-05-11 2016-05-11 A kind of mobile office method, service end, client and system

Publications (1)

Publication Number Publication Date
CN107368747A true CN107368747A (en) 2017-11-21

Family

ID=60267491

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610309349.2A Pending CN107368747A (en) 2016-05-11 2016-05-11 A kind of mobile office method, service end, client and system

Country Status (2)

Country Link
CN (1) CN107368747A (en)
WO (1) WO2017193950A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229137A (en) * 2017-12-29 2018-06-29 北京长御科技有限公司 A kind of method and device for distributing document permission
CN110011799A (en) * 2019-04-02 2019-07-12 河南管软信息技术有限公司 Communication security method in mobile office
CN111651786A (en) * 2020-05-22 2020-09-11 北京中兴恒工程咨询有限公司 Office information management method and system
US11327665B2 (en) 2019-09-20 2022-05-10 International Business Machines Corporation Managing data on volumes
US11328089B2 (en) * 2019-09-20 2022-05-10 International Business Machines Corporation Built-in legal framework file management
US11443056B2 (en) 2019-09-20 2022-09-13 International Business Machines Corporation File access restrictions enforcement
CN115168889A (en) * 2022-09-08 2022-10-11 北京中宏立达科技发展有限公司 Method for using secret piece of electronic secret cabinet and authorizing secret piece of secret room
CN115484353A (en) * 2021-06-16 2022-12-16 中移动信息技术有限公司 Processing method suitable for watermark picture, electronic equipment and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711689B (en) * 2020-06-16 2023-06-23 深圳市思迪信息技术股份有限公司 Method, system, equipment and storage medium for live image-text of consultation system
CN112114922A (en) * 2020-09-15 2020-12-22 安徽长泰信息安全服务有限公司 Desktop security isolation system and method
CN112258373B (en) * 2020-11-17 2024-06-21 珠海大横琴科技发展有限公司 Data processing method and device
CN112434339A (en) * 2020-12-01 2021-03-02 北京五八信息技术有限公司 Information processing method and device
CN115913560B (en) * 2022-09-08 2023-06-16 北京中宏立达科技发展有限公司 System for authorizing and using secret piece
CN116882945B (en) * 2023-09-05 2023-12-26 圣奥科技股份有限公司 Collaborative office method, equipment and medium based on office area station information

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101655946B (en) * 2009-09-24 2012-08-01 青岛海信移动通信技术股份有限公司 Method, system and equipment for realizing electronic seal
CN103795780A (en) * 2013-12-06 2014-05-14 中国科学院深圳先进技术研究院 Cloud storage data protection method and device
CN104239814B (en) * 2014-09-17 2017-10-20 上海斐讯数据通信技术有限公司 A kind of mobile office safety method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229137A (en) * 2017-12-29 2018-06-29 北京长御科技有限公司 A kind of method and device for distributing document permission
CN108229137B (en) * 2017-12-29 2020-04-03 北京长御科技有限公司 Method and device for distributing document permission
CN110011799A (en) * 2019-04-02 2019-07-12 河南管软信息技术有限公司 Communication security method in mobile office
US11327665B2 (en) 2019-09-20 2022-05-10 International Business Machines Corporation Managing data on volumes
US11328089B2 (en) * 2019-09-20 2022-05-10 International Business Machines Corporation Built-in legal framework file management
US11443056B2 (en) 2019-09-20 2022-09-13 International Business Machines Corporation File access restrictions enforcement
CN111651786A (en) * 2020-05-22 2020-09-11 北京中兴恒工程咨询有限公司 Office information management method and system
CN111651786B (en) * 2020-05-22 2024-04-23 北京中兴恒工程咨询有限公司 Office information management method and system
CN115484353A (en) * 2021-06-16 2022-12-16 中移动信息技术有限公司 Processing method suitable for watermark picture, electronic equipment and storage medium
CN115168889A (en) * 2022-09-08 2022-10-11 北京中宏立达科技发展有限公司 Method for using secret piece of electronic secret cabinet and authorizing secret piece of secret room
CN115168889B (en) * 2022-09-08 2022-11-29 北京中宏立达科技发展有限公司 Method for using secret piece of electronic secret cabinet and authorizing secret piece of secret room

Also Published As

Publication number Publication date
WO2017193950A1 (en) 2017-11-16

Similar Documents

Publication Publication Date Title
CN107368747A (en) A kind of mobile office method, service end, client and system
CN102710633B (en) Cloud security management system of security electronic documents and method
CN103457733B (en) A kind of cloud computing environment data sharing method and system
CN104520805B (en) According to the security application ecosystem with key and data exchange of company information control strategy
CN103530570B (en) A kind of electronic document safety management system and method
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
CN107197037B (en) A kind of data access method and system with audit function based on Cloud Server
CN104104692B (en) A kind of virtual machine encryption method, decryption method and encryption and decryption control system
CN110034924A (en) A kind of data processing method and device
CN108259169A (en) A kind of file security sharing method and system based on block chain cloud storage
CN103390124B (en) Safety input and the equipment, system and method for processing password
US20120290850A1 (en) Data management
CN110519049A (en) A kind of cloud data protection system based on credible performing environment
CN107465689A (en) The key management system and method for virtual credible platform module under cloud environment
KR101648364B1 (en) Method for improving encryption/decryption speed by complexly applying for symmetric key encryption and asymmetric key double encryption
CN106304040A (en) The management method of Mobile solution, device
CN108141626A (en) Utilize the system and method for the hardware auxiliary protection to media content
CN109587101A (en) A kind of digital certificate management method, device and storage medium
CN105122265A (en) Data security service system
CN109948322A (en) Localize the personal cloud storage data assurance case apparatus and method of encryption protection
CN104462998B (en) Cloud storage encryption system and its implementation based on domestic commercial cipher algorithm
CN107040520A (en) A kind of cloud computing data-sharing systems and method
JP2022542095A (en) Hardened secure encryption and decryption system
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN109309645A (en) A kind of software distribution security guard method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171121

WD01 Invention patent application deemed withdrawn after publication