CN108108632A - A kind of multifactor file watermark generation extracting method and system - Google Patents

A kind of multifactor file watermark generation extracting method and system Download PDF

Info

Publication number
CN108108632A
CN108108632A CN201711237184.3A CN201711237184A CN108108632A CN 108108632 A CN108108632 A CN 108108632A CN 201711237184 A CN201711237184 A CN 201711237184A CN 108108632 A CN108108632 A CN 108108632A
Authority
CN
China
Prior art keywords
information
file
user
digital watermarking
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711237184.3A
Other languages
Chinese (zh)
Inventor
牟琳
王川
张士存
孙华
贺婷婷
何彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CRRC Qingdao Sifang Co Ltd
Original Assignee
CRRC Qingdao Sifang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CRRC Qingdao Sifang Co Ltd filed Critical CRRC Qingdao Sifang Co Ltd
Priority to CN201711237184.3A priority Critical patent/CN108108632A/en
Publication of CN108108632A publication Critical patent/CN108108632A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Abstract

The invention discloses a kind of multifactor file watermark generation extracting methods, by to user's client information, include the acquisition of information of mobile terminal, application information and user information, according to user's client information, the sensitive information generated at random and distribution sequence number generation digital watermarking, in the file that digital watermark embedding is distributed, by accessing file content by logging in specific user during the information in user's client information sum number word watermark is matched in mobile terminal come application program on the mobile terminal device.After file is leaked, by comparing the sensitive information obtained in reserved sensitive information and digital watermarking in the database, to judge whether the content of file watermark is true, so as to the source of the trace files of preparation.

Description

A kind of multifactor file watermark generation extracting method and system
Technical field
The present invention relates to field of computer information security, for the distribution of file highly effective and safe and effective tracking of file, Specifically, it is related to a kind of multifactor file watermark generation extracting method and system.
Background technology
With the development of mobile terminal technology, mobile terminal becomes increasingly popular, and is widely applied to enterprise mobile working ring In border.In enterprise mobile working, the distribution of enterprise document is carried out by managing system, can realize that efficient information is shared, and has Imitate enterprise office efficiency.
Simultaneously as enterprise document usually contains enterprise's sensitive information, application of the mobile terminal in enterprise mobile working Exacerbate the leakage of enterprise's sensitive information, as mobile subscriber actively reveal enterprise document, apply it is unwitting in user Leakage enterprise document, the security breaches of mobile terminal are utilized diffusion for causing enterprise document etc..How to ensure that enterprise document can It is one of major issue that enterprise mobile working needs solve by distributing and tracking.
In order to ensure that file in the safe to use of terminal, can stamp digital watermarking using file digital watermark to file.It is existing There is the method for thering is the conversion based on file format to provide a kind of online preview of file in technology, but this method needs progress more The conversion of secondary file format, it is less efficient, and realized based on PC machine, mobile terminal can not be applied to well;It is and another Multi-layer framework based on cryptographic algorithm realizes embedding algorithm and extraction, but its algorithm steps is more, and is a kind of pervasive The algorithm of property, is not realized for the characteristics of mobile terminal, therefore efficiency on mobile terminals and security are short of.
In view of this, it is special to propose the present invention.
The content of the invention
The technical problem to be solved in the present invention is to overcome the deficiencies of the prior art and provide a kind of multifactor file watermark life Into extracting method.By to user's client information, including the acquisition of information of mobile terminal, application information and user information, root According to user's client information, the sensitive information generated at random and distribution sequence number generation digital watermarking, by digital watermark embedding distribution In file, by matching the information in user's client information sum number word watermark in mobile terminal come the application journey on this mobile terminal In sequence file content is accessed by logging in specific user.
In order to solve the above technical problems, the basic conception of the technical solution adopted by the present invention is:
A kind of multifactor file watermark generation extracting method, including:
User's client information is obtained, digital watermarking is generated according to user's client information, digital watermarking is inseparable to be attached to point In the file of hair,
When user terminal opens file, in the user terminal acquisition of information file in matching user's client information and digital watermarking Hold, user's client information includes at least terminal device information and application information.
Further, digital watermarking is embedded in distribution single cent part.
Further, the sensitive information generated when also including distribution of document in digital watermarking, wherein being sentenced according to sensitive information Whether disconnected digital watermarking is tampered.
Further, further include, key-pair file is generated according to user's client information and digital watermarking is encrypted;
When user terminal opens file, match secret key decryption file described in user terminal information acquisition and obtain file content.
Further, further include, by the sensitive information generated in distribution of document storage in the database, deposited by comparing Whether the sensitive information in the digital watermarking that the sensitive information reconciliation ciphertext part of storage in the database obtains is consistent, judges digital water Whether print is changed.
Further, the distribution sequence number generated when also including distribution of document in the digital watermarking of generation, wherein, distribute sequence Row number storage corresponds in the database and with sensitive information,
Preferably, distribution sequence number is automatically generated in distribution of document, and distribution sequence number is incrementally generated according to distribution order.
Further, terminal device information, application information, respectively by terminal device and being arranged on terminal device Application program obtains;
Preferably, terminal device information is terminal device unique mark, and application information is application program unique mark;
It is furthermore preferred that terminal device unique mark is IMEI number or MAC Address etc., application program unique mark is using journey Program-package name or program signature cryptographic Hash of sequence etc..
Further, user's client information further includes user information, and the user information is obtained after user logs in;
Preferably, user information is user's unique mark;
It is furthermore preferred that user's unique mark is the user name or personal code work in specific application.
Further, acquisition terminal device information, application information and user information with it is each in digital watermarking When accordingly factor is consistent, user logs in the application program of counterpart terminal equipment and obtains file content.
Further, tracked by obtaining the terminal device information in digital watermarking, application information and user information The source of file.
A kind of multifactor file watermark using the above method generates extraction system, is given birth to including file distributing device, watermark Into extraction element, file reception device, wherein, file distributing device obtains user's client information of file reception device, watermark life Digital watermarking is generated according to user's client information of acquisition into extraction element, file distributing device is inseparable attached by digital watermarking Add hereof, and be distributed to file reception device, the user in the matching user's client information sum number word watermark of file reception device Client information obtains file content.
Multifactor file watermark generation extracting method using the present invention, can bring following benefit:
1st, enterprise is used for the distribution of enterprise document by deployment management system.Management system is to using specific mobile terminal During user's distribution of document of middle specific application, user information, information of mobile terminal, application information and reserved sensitivity are used The Multiple factors such as information generate digital watermarking;File is realized by user information, information of mobile terminal and application information Effectively tracking;Whether it is tampered by reserved sensitive information verifying digital watermark, whether tracking result is reliable.Both enterprise is ensured The efficient distribution of file, while the reliable tracking of enterprise document is realized again.
2nd, according to using user information, information of mobile terminal, three factors of application information generation keys, three because Element could access to the content of the file of distribution in the case of all meeting, and can ensure the security of file well, simultaneously These three factors are also readily available, and can acquisition content quickly be decrypted to encryption file.
Description of the drawings
A part of the attached drawing as the application, for providing further understanding of the invention, of the invention is schematic Embodiment and its explanation do not form inappropriate limitation of the present invention for explaining the present invention.Obviously, the accompanying drawings in the following description Only some embodiments, to those skilled in the art, without creative efforts, can be with Other accompanying drawings are obtained according to these attached drawings.In the accompanying drawings:
Fig. 1 is multifactor file watermark generation extracting method block diagram in one embodiment of the invention;
Fig. 2 is multifactor file watermark generation extracting method block diagram in another embodiment of the present invention;
Fig. 3 is the structure diagram of the multifactor file watermark generation extraction system of the present invention.
It should be noted that these attached drawings and word description are not intended to the design model limiting the invention in any way It encloses, but idea of the invention is illustrated for those skilled in the art by reference to specific embodiment.
Specific embodiment
The specific embodiment of the present invention is described in further detail below in conjunction with the accompanying drawings.
For make present invention solves the technical problem that, the technical solution that uses and the technique effect that reaches it is clearer, below The technical solution of the embodiment of the present invention will be described in further detail with reference to attached drawing, it is clear that described embodiment is only It is part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art exist All other embodiments obtained under the premise of creative work are not made, belong to the scope of protection of the invention.
Embodiment one
Fig. 1 is that the multifactor file watermark described in the specific embodiment of the invention one generates extracting method block diagram, this implementation Example is applicable to file distributing device, database, watermark generating means, the file distributing of file reception device management system, The method of the present invention can manage system to perform by above-mentioned file distributing, as shown in Figure 1, more factors text described in the present embodiment Part watermark generation extracting method can manage system to perform by above-mentioned file distributing.
S11, obtain user's client information and generate the sensitive information that file is this time distributed;
File management system before distribution of document, to all file receiving device i.e. information of user terminal to be distributed into Row obtains, and user terminal is the application-specific on particular terminal device, and acquired user's client information is specifically can uniquely really Determine the mark of particular terminal device and application program.In the present embodiment, file reception device is mobile terminal device, then text The program-package name or journey of IMEI number or MAC Address of the acquisition mobile terminal device of part management system safety etc. and application program Sequence signature cryptographic Hash etc..Meanwhile sensitive information is generated at random for this distribution of document, sensitive information prestores in the database.
The digital watermarking of the sensitive information of S12, generation comprising user's client information and file is simultaneously attached in a manner of inseparable It is added in the file of distribution;
The user's client information that will be obtained in step S11, the i.e. IMEI number of mobile terminal device or MAC Address and using journey Sequence program-package name or program signature cryptographic Hash, the sensitive information also generated at random, by the use of above-mentioned two parts information as Input, generates the digital watermarking of this file, and digital watermarking is attached in a manner of inseparable in the file of distribution.Generation Digital watermarking can be various forms, such as file types such as word, picture, binary code.In the present embodiment, digital watermarking It is added in a manner of visual hereof, it is so-called visually to refer to that user can see the letter included in watermark when browsing file Breath, then even if the content of file is to be leaked out by clapping in a manner of, still the information in watermark can be obtained It takes to be tracked the document source of leakage.
S13, when user terminal opens file, match in user's client information sum number word watermark user's client information for storing to obtain Take file content;
When user is in file reception device, i.e., after receiving file in the mobile terminal device in the present embodiment, mobile end Component on end can match the IMEI number of current mobile terminal equipment or the program-package name or program of MAC Address and application program Cryptographic Hash of signing and the corresponding informance in file digital watermarking, if the corresponding information of two parts is identical, then user can obtain Get the content of file.
Such benefit is can to specify the specific mobile terminal device to wanting distribution and the priority to each file The setting of batch is made, even if accidentally mistaking to mobile terminal device, as long as mobile terminal device and preset number Information matches in watermark, the content of file is still safe, and the leakage of file content will not be caused because file is mistaken.
S14, by comparing the sensitive information of sensitive information in digital watermarking and storage in the database, to judge number Whether watermark is tampered, and the user's client information obtained from digital watermarking comes trace files source.
And the sensitive information set in digital watermarking is as a safety device, is sentenced by checking whether safety device is intact The integrality of disconnected file in itself.And when file is revealed, be in the content for ensuring digital watermarking it is reliable, can be with The IMEI number or MAC Address of mobile terminal device simply in digital watermarking uniquely determine mobile terminal device, tracking text Part source.
It is pointed out that the mobile terminal device in the present embodiment can be mobile phone, tablet computer, can be with screen and key Laptop or smartwatch that disk is separated, intelligent glasses etc..And in the IMEI number or MAC Address to mobile terminal device Acquisition on, acquisition of the open source system such as Android is more efficient and convenient, and for such as IOS close source system then will Complexity trouble, however technically still can be achieved on.
The embodiment of the present invention is by obtaining two factors of unique mark of mobile terminal device unique mark and application program It generates digital watermarking, and in file acquisition needs to check the information of two factors, to match, so to add file Security.It also ensures that the acquisition priority of file is bound with mobile terminal device simultaneously, can easily so limit secret text The acquiring way of part reduces the risk of file leakage.File distributing manages access rights of the system according to the file set Automatically different digital watermarkings is set, and is automatically distributed on the mobile terminal device specified, wherein artificial operation is not required, Realize intelligentized safely and fast file distributing.It, can also be according to the information in digital watermarking even if file is revealed Fast track document source so as to clearly assert responsibility, finds loophole and is filled up in time.
Embodiment two
The present embodiment is the explanation that embodiment is further optimized on the basis of embodiment one, is implemented to be preferred Scheme, the present embodiment are the operating system platforms carried using android system by mobile terminal device, have invoked Android Program in system completes the generation of digital watermarking and extraction.
Fig. 2 is that the step of multifactor file watermark of the present embodiment generates extracting method is schemed, multifactor text as described in Figure 2 Part watermark generation extracting method includes:
S21, terminal device information, application information and user information are obtained, and generates the sensitivity that file is this time distributed Information;
File distributing management system extraction user's unique mark (user name of such as specific application), terminal device unique mark (such as IMEI number, MAC Address) and mobile application unique mark (program-package name, the program signature cryptographic Hash of such as mobile application Deng), the reserved sensitive information that enterprise document is set this time to distribute is distributed after determining the mobile terminal device to be distributed.
The corresponding distribution sequence number of S22, generation this time distribution is simultaneously corresponded with the sensitive information of existence, is stored in data In storehouse;
File distributing management system carries setting distribution sequence number (automatic incremental), by distribution sequence number and reserved sensitive letter Breath storage by distributing sequence number is inquired about into database, can uniquely determine reserved sensitive information in the database.
By setting file distributing sequence number, can system management file distributing historical data, while can be to dividing every time The file of hair is controlled.
S23, existence include terminal device information, application information, user information, sensitive information and distribution sequence number Digital watermarking is attached in a manner of inseparable in file;
File distributing management system using the user information of Administrator, terminal device information, application information and Distribute sequence number, reserved sensitive information as input, call reversible algorithm SymFunc, will be output as digital watermarking, with can not Separated mode attachment is into file f ile.
User's client information in the present embodiment in addition to terminal device information and application information in embodiment one, User information is further comprised, becomes three factors in two factors of embodiment one, it so can be more careful to file Accessibility make differentiation.Carry out processing generation digital watermarking to the information of input using reversible algorithm simultaneously, it can be more square Being extracted afterwards to the information in digital watermarking just.
S24, key is generated using user information, terminal device information and application information, encryption file and corresponding Encrypted file is issued to specific mobile terminal device by digital watermarking;
File distributing management system is made using the user information of Administrator, mobile facility information and mobile application information For input, using Salt, hash algorithm is called, obtains encryption key EncKey;Management system encrypts file using EncKey File and digital watermarking, and output is distributed to mobile terminal device.
The file that Encryption Algorithm is added on the basis of embodiment one to distribution is encrypted, and is to further increase text The security of part and can not cracking, encrypted algorithm is using conventional technology, and details are not described herein.
S25, terminal device information and application information are extracted, verify and extracts subscriber identity information, utilization is above-mentioned Key in three information acquisition S24 obtains file content and digital watermarking using key.
Before user reads the document using the mobile application on mobile terminal device, input the user name and password carries out identity Verification;
The component being integrated in the mobile application is according to subscriber authentication as a result, and extracting mobile terminal device information And application information, using the Salt built in the component, hash algorithm is called, obtains decruption key DecKey;
The component being integrated in the mobile application decrypts to obtain file f ile and digital watermarking using DecKey, and user can be with Normal reading file f ile.
Using the scheme described in the present embodiment, the quick, the batch of realization file under Android platform that can be safe divides Hair, while reliable tracking is realized, it can allow enterprise is quickly differentiated in file distributing to be distributed to confidential document And management.
Embodiment three
The present embodiment and the difference of embodiment two are, when the file of system discovery leakage, to extract digital watermarking, pass through Reversible algorithm obtains embedded user information, terminal device information, application information, distribution sequence number and sensitive information.
The sensitive information that is stored is retrieved in the database using series number is distributed, and compares the sensitive letter in digital watermarking The sensitive information stored in breath and database.If the two is consistent, the reliable results of this tracking.
Specifically, during file distributing management system discovery file f ile leakages, the inseparable of this document attachment is extracted From digital watermarking, call reversible algorithm SymFunc converted, obtain user information, mobile terminal device information, using journey Sequence information, distribution sequence number and sensitive information;
Administrator extracts distribution sequence number, and with its searching database, obtains the sensitive information of this distributive reservation, and with The sensitive information obtained from digital watermarking compares.If the two is consistent, this time tracking reliable results are proved.
Example IV
A kind of multifactor file watermark using the above method as shown in Figure 3 generates extraction system, including file distributing Device, watermark generation extraction element, file reception device, wherein, file distributing device obtains the user terminal of file reception device Information, watermark generate extraction element and generate digital watermarking according to user's client information of acquisition, and file distributing device is by digital watermarking It is inseparable to add hereof, and file reception device is distributed to, file reception device matching user's client information sum number word User terminal acquisition of information file content in watermark.
The above is only presently preferred embodiments of the present invention, not makees limitation in any form to the present invention, though So the present invention is disclosed above with preferred embodiment, however is not limited to the present invention, any technology people for being familiar with this patent Member without departing from the scope of the present invention, when the technology contents using above-mentioned prompting make it is a little change or be modified to The equivalent embodiment of equivalent variations, as long as being the content without departing from technical solution of the present invention, technical spirit pair according to the invention Any simple modification, equivalent change and modification that above example is made, in the range of still falling within the present invention program.

Claims (10)

1. a kind of multifactor file watermark generation extracting method, which is characterized in that including:
User's client information is obtained, digital watermarking is generated according to user's client information, digital watermarking is inseparable to be attached to distribution In file,
When user terminal opens file, matching user's client information and the user terminal acquisition of information file content in digital watermarking, institute User's client information is stated including at least terminal device information and application information.
2. extracting method is generated according to a kind of multifactor file watermark in claim 1, which is characterized in that in digital watermarking also The sensitive information generated during comprising distribution of document, wherein judging whether digital watermarking is tampered according to sensitive information.
3. a kind of multifactor file watermark generation extracting method according to claim 1, which is characterized in that further include, according to Family client information generation key-pair file and digital watermarking are encrypted;
When user terminal opens file, match secret key decryption file described in user terminal information acquisition and obtain file content.
4. a kind of multifactor file watermark generation extracting method in claim 1 or 2, which is characterized in that it further includes, it will The sensitive information storage generated in distribution of document in the database, is conciliate by comparing the sensitive information of storage in the database Whether the sensitive information in the digital watermarking that ciphertext part obtains is consistent, judges whether digital watermarking is changed.
5. any multifactor file watermark generation extracting method in Claims 1-4, which is characterized in that generation Digital watermarking in the distribution sequence number that generates when also including distribution of document, wherein, the storage of distribution sequence number is in the database simultaneously It is corresponded with sensitive information.
6. any multifactor file watermark generation extracting method in Claims 1-4, which is characterized in that terminal Facility information, application information are obtained respectively by terminal device with the application program for being arranged on terminal device;
Preferably, terminal device information is terminal device unique mark, and application information is application program unique mark.
7. extracting method is generated according to a kind of multifactor file watermark of right 6, which is characterized in that user's client information further includes use Family information obtains the user information after user logs in;
Preferably, user information is user's unique mark.
8. extracting method is generated according to any multifactor file watermark in claim 1 to 7, which is characterized in that obtaining Terminal device information, application information and user information it is consistent to each corresponding factor in digital watermarking when, user logs in File content is obtained in the application program of counterpart terminal equipment.
9. extracting method is generated according to any multifactor file watermark of claim 1 to 7, which is characterized in that pass through acquisition The source of terminal device information, application information and user information trace files in digital watermarking.
10. a kind of usage right requires the multifactor file watermark generation extraction system of 1 to 9 any method, including file Diostribution device, watermark generation extraction element, file reception device, wherein, file distributing device obtains the use of file reception device Family client information, watermark generate extraction element and generate digital watermarking according to user's client information of acquisition, and file distributing device is by number Watermark it is inseparable it is additional and be distributed to file reception device hereof, file reception device matching user's client information and User terminal acquisition of information file content in digital watermarking.
CN201711237184.3A 2017-11-30 2017-11-30 A kind of multifactor file watermark generation extracting method and system Pending CN108108632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711237184.3A CN108108632A (en) 2017-11-30 2017-11-30 A kind of multifactor file watermark generation extracting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711237184.3A CN108108632A (en) 2017-11-30 2017-11-30 A kind of multifactor file watermark generation extracting method and system

Publications (1)

Publication Number Publication Date
CN108108632A true CN108108632A (en) 2018-06-01

Family

ID=62207900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711237184.3A Pending CN108108632A (en) 2017-11-30 2017-11-30 A kind of multifactor file watermark generation extracting method and system

Country Status (1)

Country Link
CN (1) CN108108632A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379642A (en) * 2018-12-14 2019-02-22 连尚(新昌)网络科技有限公司 It is a kind of for adding and detecting the method and apparatus of video watermark
CN109492349A (en) * 2018-10-30 2019-03-19 连尚(新昌)网络科技有限公司 A kind of method and apparatus with management document distribution channel for identification
US20200228347A1 (en) * 2019-01-14 2020-07-16 Alibaba Group Holding Limited Data Security Processing and Data Source Tracing Method, Apparatus, and Device
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN113177193A (en) * 2021-04-23 2021-07-27 深圳依时货拉拉科技有限公司 Watermark adding method, watermark verifying method and terminal equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812541A (en) * 2005-12-27 2006-08-02 浪潮电子信息产业股份有限公司 Digital copyright and digital watermark protecting method for video program
CN101165699A (en) * 2006-10-20 2008-04-23 中国科学院微电子研究所 Digital product content protection system and method based on digital water mark
CN101197857A (en) * 2007-12-26 2008-06-11 腾讯科技(深圳)有限公司 Document downloading method and device
CN101945093A (en) * 2010-07-01 2011-01-12 武汉理工大学 Digital right protection method based on virus detection and watermark embedding
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen
US20120036350A1 (en) * 2010-08-09 2012-02-09 Sony Corporation Information processing apparatus, information processing method, and program
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN107229843A (en) * 2016-03-23 2017-10-03 福建福昕软件开发股份有限公司 A kind of method of automatic alarm after encrypted document is divulged a secret

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1812541A (en) * 2005-12-27 2006-08-02 浪潮电子信息产业股份有限公司 Digital copyright and digital watermark protecting method for video program
CN101165699A (en) * 2006-10-20 2008-04-23 中国科学院微电子研究所 Digital product content protection system and method based on digital water mark
CN101197857A (en) * 2007-12-26 2008-06-11 腾讯科技(深圳)有限公司 Document downloading method and device
CN101945093A (en) * 2010-07-01 2011-01-12 武汉理工大学 Digital right protection method based on virus detection and watermark embedding
US20120036350A1 (en) * 2010-08-09 2012-02-09 Sony Corporation Information processing apparatus, information processing method, and program
CN101980240A (en) * 2010-11-19 2011-02-23 北京巨网汇通信息技术有限公司 Method and equipment for preventing data from being stolen
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN107229843A (en) * 2016-03-23 2017-10-03 福建福昕软件开发股份有限公司 A kind of method of automatic alarm after encrypted document is divulged a secret
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109492349A (en) * 2018-10-30 2019-03-19 连尚(新昌)网络科技有限公司 A kind of method and apparatus with management document distribution channel for identification
CN109379642A (en) * 2018-12-14 2019-02-22 连尚(新昌)网络科技有限公司 It is a kind of for adding and detecting the method and apparatus of video watermark
CN109379642B (en) * 2018-12-14 2020-12-08 连尚(新昌)网络科技有限公司 Method and device for adding and detecting video watermark and computer readable medium
US20200228347A1 (en) * 2019-01-14 2020-07-16 Alibaba Group Holding Limited Data Security Processing and Data Source Tracing Method, Apparatus, and Device
CN111510421A (en) * 2019-01-31 2020-08-07 金联汇通信息技术有限公司 Data processing method and device, electronic equipment and computer readable storage medium
CN113177193A (en) * 2021-04-23 2021-07-27 深圳依时货拉拉科技有限公司 Watermark adding method, watermark verifying method and terminal equipment

Similar Documents

Publication Publication Date Title
CN108108632A (en) A kind of multifactor file watermark generation extracting method and system
JP6275653B2 (en) Data protection method and system
AU2013101722A4 (en) Data security management system
CN108833114A (en) A kind of decentralization identity authorization system and method based on block chain
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN105760764B (en) Encryption and decryption method and device for embedded storage device file and terminal
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
KR20230157929A (en) Transfer cryptocurrency from a remote access restricted wallet
CN202795383U (en) Device and system for protecting data
CN103745164B (en) A kind of file safety storage method based on environmental and system
CN103220295A (en) Document encryption and decryption method, device and system
CN110138754B (en) Multi-cloud-end information processing system and resource sharing method thereof
CN106055936A (en) Method and device for encryption/decryption of executable program data package
CN103580868A (en) Secure transmission method of electronic official document secure transmission system
CN103152425A (en) Safety management system for mobile device based on cloud technology
CN110555310B (en) Method and device for safely storing and sharing private data
CN107426223A (en) Cloud file encryption and decryption method, encryption and decryption device and processing system
CN115270182A (en) Power grid project closed-loop control file management system
CN103095482A (en) Program development maintenance system
CN113761488A (en) Content network copyright tracing encryption system and encryption method
JP5781678B1 (en) Electronic data utilization system, portable terminal device, and method in electronic data utilization system
CN105515959A (en) Implementation method of CMS technology-based instant messenger security system
KR101680536B1 (en) Method for Service Security of Mobile Business Data for Enterprise and System thereof
CN114065148A (en) Block chain-based security management and disclosure tracing method for confidential documents
CN103914642A (en) USB (universal serial bus) KEY-based security suite structure system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601

RJ01 Rejection of invention patent application after publication