CN108345774A - A kind of transfer approach and transfer management system of secure content - Google Patents
A kind of transfer approach and transfer management system of secure content Download PDFInfo
- Publication number
- CN108345774A CN108345774A CN201810076635.8A CN201810076635A CN108345774A CN 108345774 A CN108345774 A CN 108345774A CN 201810076635 A CN201810076635 A CN 201810076635A CN 108345774 A CN108345774 A CN 108345774A
- Authority
- CN
- China
- Prior art keywords
- secure content
- watermark
- user
- secret
- divulging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012546 transfer Methods 0.000 title claims abstract description 28
- 238000013459 approach Methods 0.000 title claims abstract description 17
- 230000001360 synchronised effect Effects 0.000 claims abstract description 9
- 230000003321 amplification Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 claims description 4
- 238000003199 nucleic acid amplification method Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 238000010200 validation analysis Methods 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 3
- 230000006399 behavior Effects 0.000 description 9
- 238000000034 method Methods 0.000 description 7
- 230000001010 compromised effect Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000008450 motivation Effects 0.000 description 1
- 230000003362 replicative effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses a kind of transfer approach of secure content and transfer management systems, wherein the transfer approach of secure content includes:Secure content is sent to user account;User's login account obtains secure content;Anti- mark of divulging a secret associated with current user information is generated, and prevents mark presentation synchronous with secure content of divulging a secret by described.Secure content transfer approach and transfer management system through the invention are, it can be achieved that safe and efficient transmission to secure content, simultaneously so that the secure content transmitted has the trackability in source of divulging a secret.
Description
Technical field
The present invention relates to classified document safety management fields, and in particular to a kind of transfer approach and dispatch tube of secure content
Reason system.
Background technology
With the development and popularization and application of information technology, teleworking has begun to have gradually replaced traditional papery office
Mode.Although however, with no paper teleworking improves office efficiency to a certain extent, while also bringing certain peace
Full hidden danger, because the risk of information leakage also considerably increases.
In current judicial work, electronic office is not popularized also comprehensively.However in the routine work of law court,
Case treating capacity is larger, results in that case process cycle is longer, has seriously affected the efficiency of forensic work, is badly in need of intelligent journey
Relatively high teleworking is spent to be introduced into judicial work.Currently, the hindering factor for influencing forensic work electronization is more, especially
It is safety problem.As a kind of common problem, when law court will be related to file (such as lawsuit relevant law document, the packet of secrecy
Include written verdict, court verdict etc.) issue specified multi-party party after, it is understood that there may be party therein is not allowed to keep secrecy criterion,
Classified document is revealed, to give other terrible relevant hurtful risks of party.And due to electronic document
It is easy to replicate, transmits, it is difficult to track so that often is very difficult to trace or call to account people after information leakage.Therefore, it lacks at present
It is weary to carry out safety, leakage-preventing transmit method and the achievable system to maintain secrecy without content.
Invention content
It is an object of the present invention to solve the above problems, a kind of safe and efficient be transmitted for secure content is provided
Method and transfer management system.
The object of the present invention is achieved like this, a kind of transfer approach of secure content, is carried out based on client, including with
Lower step:
Secure content is sent to user account;
User's login account obtains secure content;
Anti- mark of divulging a secret associated with current user information is generated, and the anti-mark of divulging a secret is synchronous with secure content
It presents.
Preferably, the acquisition secure content is specifically included downloads, replicates, prints or checks behaviour to secure content implementation
Work at least one of is worked as.
Preferably, when obtaining secure content, synchronous triggering generates the anti-mark of divulging a secret.
Preferably, anti-divulge a secret is identified as watermark.
Preferably, the form of the watermark includes text watermark, picture watermark or shading watermark.
Preferably, the watermark is added in the form of embedded in secure content, and presentation Chong Die with secure content;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
Preferably, described to prevent divulging a secret to be identified by not influenced its information to the privacy amplification information in secure content
It is obtained after the variation of meaning expression itself.
Preferably, described to prevent divulging a secret to be identified by not influenced its word itself to the segment word in secure content
It is obtained after the variation of meaning expression.
Preferably, include to the change process of the segment word in secure content:The variation of font style, font size
Variation or at least one of the variation of font spacing.
The present invention also provides a kind of secure content transfer management systems, which is characterized in that including:
User login validation unit, to be verified to user login management system;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user carries out obtaining secure content
When operation, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and
It adds a watermark in secure content.
Preferably, user carry out obtain secure content operation specifically include to secure content implement download, replicate, printing
Or check that operation is worked as.
Preferably, the system also includes service management unit, to store user information.
Preferably, the service management unit further includes the record storage module for storing record user's operation behavior
Preferably, the user information includes subscriber identity information and account information.
Preferably, the watermark generation unit includes watermark setup module, to be arranged form, the display effect of watermark with
And embedded mode.
Compared with prior art, the beneficial effects of the present invention are:
Anti- processing of divulging a secret is carried out to classified document, has trackability after may make classified document to get compromised, including to protecting
Download that close content carries out, replicate, check, the approach of divulging a secret such as sectional drawing and screen shot can be traced effectively, from one
Determine to contain that the related personnel for having duty of secrecy divulges a secret in degree;The classified document transmission system provided through the invention
System, may be implemented safer, the convenient management to classified document;It can be used for assisting forensic work, trial is executed,
Classified document transmission in community service and judicial administration work has technical support and help.Share somebody's cares and burdens solution for forensic work
Difficulty provides facility for party, improves the safety of electronic office in judicial work.
Description of the drawings
Fig. 1 is the main flow chart of the transfer approach of the secure content of the embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the secure content transfer management system of the embodiment of the present invention.
Specific implementation mode
Below in conjunction with the drawings and specific embodiments, the present invention is further elaborated, it should which explanation is to provide
The purpose of following embodiment is the implementation for enabling those skilled in the art the to be more fully apparent from present invention, and can not constitute
Restriction to the specific embodiment of the present invention.
Refering to fig. 1 and Fig. 2, embodiment provided by the invention are as follows:
A kind of transfer approach of secure content can be based on client and carry out, include the following steps:
S1. secure content is sent to user account.
Under normal conditions, which can be regarded as sending secure content to specified user, and the reality of the secure content is in
Existing carrier can be electronic document.As the understanding of similar concept meaning, can also upload onto the server secure content end, and by referring to
Determine user to download or access.
S2. user's login account obtains secure content.
Under normal conditions, user is logged on to by the form that account logs in the account of client, then obtains the guarantor
Close content.That is, user after login account only by being possible to get relative secure content.Positive reason
Under condition, the secure content can not be then obtained with the user of secure content onrelevant.
As specific mode, the form for obtaining secure content includes implementing to download to secure content, replicating, printing
Or check that operation is worked as.
S3. anti-mark of divulging a secret associated with current user information is generated, and prevents divulge a secret mark and secure content by described
It is synchronous to present.
As common understanding, the anti-mark of divulging a secret of generation is mark associated with current user information, and will be described
The purpose of anti-mark presentation synchronous with secure content of divulging a secret is:Secure content and user information are subjected to binding presentation, to
Be conducive to effectively trace divulging a secret for secure content.It should be noted that the current user information should at least wrap
The information for showing or being directed toward current user identities is included, for example, name and identification card number information.
As a preferred solution, when obtaining secure content, synchronous triggering generates the anti-mark of divulging a secret.It is specific and
Speech, when user carries out implementation download, duplication to secure content, prints or check operation, triggering generates anti-mark of divulging a secret, and
The anti-mark of divulging a secret is added in secure content, realizes and the anti-mark of divulging a secret is synchronized into presentation with secure content.By
This, it is also understood that being, not including then when user does not obtain secure content, in secure content has and current user information phase
Associated anti-mark of divulging a secret.The purpose of the program is accurately to distinguish the source of divulging a secret of classified document.As one
Practical application example, when judicial functionary by secure content (such as:Court verdict) it is sent to and associated with the secure content works as thing
After people A and party B, party A and party B can log on to client to obtain in secrecy by respective account
Hold.If party A logs in client and simultaneously obtains secure content, then will be by the secure content acquired in party A
Anti- mark of divulging a secret associated with the information of party A is added, in the case where party B does not go to obtain secure content, such as
Fruit includes that the secure content of anti-mark of divulging a secret associated with party's A information is got compromised, for example the secure content is distributed
Onto network, then, even if described in cannot directly determining including the secrecy of anti-mark of divulging a secret associated with party's A information
Content is directly revealed by party A, still, can at least exclude the responsibility of party B, because party and having not been obtained
Secure content, regardless of whether being the secure content directly divulged a secret by party A, party A has a responsibility for, because causing to let out
Close source is that party A obtains secure content, and party A, which has a responsibility for ensuring, described includes and party's A information phases
Associated anti-mark of divulging a secret is not got compromised.
As a preferred solution, anti-divulge a secret is identified as watermark.Further, the form of the watermark includes text
Word watermark, picture watermark or shading watermark.Specifically, the watermark information of the text watermark can be directly disposed as including to work as
The cleartext information of the ID card information of preceding user, or it is set as the cipher-text information with subscriber identity information maps mutually.Picture water
Print then specifically could be provided as the form of Quick Response Code or bar code.Shading watermark be then the information that will can characterize user identity with
The form of shading is added in secure content.
As specific preferred embodiment, the watermark is added in the form of embedded in secure content, and in secrecy
Unit weight is folded to be presented;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
The purpose of program design is, user is avoided to pass through screenshot capture or the opposite screen for showing secure content
It takes pictures and causes to divulge a secret.
As a preferred solution, the anti-privacy amplification information progress being identified by secure content of divulging a secret
It is obtained after not influencing the variation of its information meaning expression itself.Further, it is replaced by the anti-mark of divulging a secret obtained after variation
Change the privacy amplification information.
It is further preferred that anti-divulge a secret is identified by that not influenced its to the segment word in secure content literary
It is obtained after the variation of word meaning expression itself, the anti-mark of divulging a secret is subjected to specified associations with user information.More specifically,
Change process to the segment word in secure content includes:Between the variation of font style, the variation of font size or font
Away from least one of variation.It is a kind of specifically, include the variation of type posture to the variation of the font style, such as:
Font in secure content is all made of Simplified Chinese, then can replace the font of the segment word in secure content by Simplified Chinese
It is changed to Traditional Chinese, on the one hand which is only the font form for changing the segment word, do not change font itself
The meaning of expression, on the other hand so that user it is subtle go out the change representated by meaning, so being gone without corresponding motivation
The change is eliminated in favor of divulging a secret.It is further preferred that can be carried out to the segment word in the secure content of different user different
Change process, the change process of the segment word will be corresponded with user identity as a result, to conveniently divulging a secret
Retrospect.As a kind of specific applicating example, secure content is sent to party A and B by judicial functionary, and party A is obtained
The anti-mark of divulging a secret being added into the secure content taken is set as:Segment word in its secure content is changed font sample
The variation of formula;And the anti-mark of divulging a secret being added into the secure content that party B is obtained then is set as:It will be in its secure content
Segment word carries out the variation of font spacing.As a result, after secure content is got compromised, it need to only identify in the secure content got compromised
Anti- mark of divulging a secret can confirm that the source of divulging a secret is party A or party B.
The present invention also provides a kind of secure content transfer management systems, including:
User login validation unit is verified to log on to management system to user;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user carries out obtaining secure content
When operation, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and
It adds a watermark in secure content.
Preferably, user carry out obtain secure content operation specifically include to secure content implement download, replicate,
Print or check that operation is worked as.When user obtains secure content, synchronous triggering generates the watermark.Specifically
For, when user carries out implementation download, duplication to secure content, prints or check operation, triggering watermark generation unit life
It is added in secure content at watermark, and by the watermark.
Preferably, the secure content transfer management system further includes service management unit, to store user's letter
Breath, the user information includes subscriber identity information and/or account information.As one kind specifically, the watermark generation unit
Current user information is extracted from service management unit, is generated by way of hybrid coding associated with current user information
Watermark.It should be noted that the purpose for generating associated with current user information watermark is, by watermark and user information into
Row binding, consequently facilitating the retrospect of divulging a secret of secure content.
Further preferred scheme, the service management unit further include the record for storing record user's operation behavior
Memory module.As specifically, user's operation behavior includes implementing the behaviour such as to download, replicate, print or check to secure content
Make behavior.Further, it by taking user carries out checking the operation behavior of secure content as an example, will be used by the service management unit
Family carries out record storage to checking range (e.g., checking number of pages), check duration, check the time etc. for secure content, in favor of auxiliary
Help the retrospect of divulging a secret that may subsequently carry out.Specifically, after secure content is got compromised, it first can be by identifying secure content
In watermark judge source of divulging a secret, that is, determine that the secure content is divulged a secret after obtaining secure content by the account of which user
, then, recall user determined by checking and the operation behavior of secure content recorded, obtain the user to secure content into
Which operation behavior went (such as:Download, replicate, print or check), if the user checked secure content, further divide
It analyses the user and record is checked to the specific of secure content, thus the possibility that the auxiliary judgment user divulges a secret.As one kind
Situation analyzing examples, if the operation that user only checks secure content, and secure content is not replicated,
The operations such as export, printing, then, if the user shows that it just looked at secure content to checking in record for secure content
In first page (it is assumed that secure content is at least over one page), it is possible to exclude substantially the user for remaining number of pages maintain secrecy
The responsibility of divulging a secret of content.
As a preferred option, the form of the watermark includes text watermark, picture watermark or shading watermark.Specifically
, the watermark information of the text watermark can be directly disposed as the cleartext information of the ID card information comprising active user, or
Person is set as the cipher-text information with subscriber identity information maps mutually.Picture watermark then specifically could be provided as Quick Response Code or bar shaped
The form of code.Shading watermark is then to be added to the information that can characterize user identity in secure content in the form of shading.
A kind of preferred scheme, the watermark generation unit include watermark setup module, the form of watermark is arranged, shows
Show effect and embedded mode etc..The display effect of the watermark is arranged:The transparency of watermark is arranged, by by watermark phase
Suitable range is adjusted to the transparency of the confidential information in secure content, thus while the visibility for ensuring watermark,
Normal reading of the user to secure content is not influenced;Alternatively, the indication range setting of watermark, i.e. watermark show boundary in secure content
The full screen display in face or the part of specific region are shown, it is preferred that watermark should at least cover the crucial portion of secure content
Point, to avoid blabber from being removed the operation of watermark;Alternatively, the closeness display setting of watermark, is not influencing user couple
In the case of secure content normal reading, display interface that can be by watermark in secure content carries out intensive display, to avoid letting out
Watermark is removed by close person.
In the description of the embodiment of the present invention, term " first ", " second ", " third ", " the 4th " are only used for description mesh
, it is not understood to indicate or imply relative importance or implicitly indicates the quantity of indicated technical characteristic.It limits as a result,
There are the feature of " first ", " second ", " third ", " the 4th " to can explicitly or implicitly include one or more spy surely
Sign.In the description of the present invention, unless otherwise indicated, the meaning of " plurality " is two or more.
In the description of the embodiment of the present invention, the terms "and/or", only it is a kind of description affiliated partner pass
Connection relationship indicates may exist three kinds of relationships, for example, A and/or B, can indicate:Individualism A exists simultaneously A and B, individually
There are these three situations of B.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
Understanding without departing from the principles and spirit of the present invention can carry out these embodiments a variety of variations, modification, replace
And modification, the scope of the present invention is defined by the appended.
Claims (10)
1. a kind of transfer approach of secure content is carried out based on client, which is characterized in that including:
Secure content is sent to user account;
User's login account obtains secure content;
Generate anti-mark of divulging a secret associated with current user information, and by it is described prevent divulging a secret mark and secure content synchronization be in
It is existing.
2. transfer approach according to claim 1, it is characterised in that:The acquisition secure content is specifically included in secrecy
Hold and implements to download, replicate, print or check that operation is worked as.
3. transfer approach according to claim 1 or 2, it is characterised in that:When obtaining secure content, synchronous triggering generates
The anti-mark of divulging a secret.
4. transfer approach according to claim 3, it is characterised in that:Anti- divulge a secret is identified as watermark.
5. transfer approach according to claim 4, it is characterised in that:The form of the watermark includes text watermark, picture
Watermark or shading watermark.
6. transfer approach according to claim 4, it is characterised in that:The watermark is added to secrecy in the form of embedded
In content, and presentation Chong Die with secure content;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
7. transfer approach according to claim 3, it is characterised in that:Anti- divulge a secret is identified by secure content
Privacy amplification information do not influenced the variation of its information meaning expression itself after obtain.
8. secure content transfer management system, which is characterized in that including:
User login validation unit, to be verified to user login management system;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user obtain the operation of secure content
When, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and by water
Print is added in secure content.
9. secure content transfer management system according to claim 7, it is characterised in that:User carries out acquisition secure content
Operation specifically include to secure content implementation download, replicate, print or check that operation is worked as.
10. secure content transfer management system according to claim 8, it is characterised in that:The watermark generation unit packet
Watermark setup module is included, the form, display effect and embedded mode of watermark is arranged.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810076635.8A CN108345774A (en) | 2018-01-26 | 2018-01-26 | A kind of transfer approach and transfer management system of secure content |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810076635.8A CN108345774A (en) | 2018-01-26 | 2018-01-26 | A kind of transfer approach and transfer management system of secure content |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108345774A true CN108345774A (en) | 2018-07-31 |
Family
ID=62960901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810076635.8A Pending CN108345774A (en) | 2018-01-26 | 2018-01-26 | A kind of transfer approach and transfer management system of secure content |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108345774A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625854A (en) * | 2020-05-25 | 2020-09-04 | 聚好看科技股份有限公司 | Document encryption method, access method, server and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102169534A (en) * | 2011-02-21 | 2011-08-31 | 北京书生国际信息技术有限公司 | Method and device for displaying watermark |
CN102622560A (en) * | 2011-01-27 | 2012-08-01 | 昆山玛斯特软件有限公司 | Method for preventing electronic secret documents from being divulged in shooting or printing mode |
CN104361268A (en) * | 2014-11-28 | 2015-02-18 | 广州视源电子科技股份有限公司 | Watermark embedding and reading method, device and system |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
US20150150143A1 (en) * | 2013-11-27 | 2015-05-28 | Electronics And Telecommunications Research Institute | System and method for providing virtual desktop infrastructure (vdi) service |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
-
2018
- 2018-01-26 CN CN201810076635.8A patent/CN108345774A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102622560A (en) * | 2011-01-27 | 2012-08-01 | 昆山玛斯特软件有限公司 | Method for preventing electronic secret documents from being divulged in shooting or printing mode |
CN102169534A (en) * | 2011-02-21 | 2011-08-31 | 北京书生国际信息技术有限公司 | Method and device for displaying watermark |
US20150150143A1 (en) * | 2013-11-27 | 2015-05-28 | Electronics And Telecommunications Research Institute | System and method for providing virtual desktop infrastructure (vdi) service |
CN104361268A (en) * | 2014-11-28 | 2015-02-18 | 广州视源电子科技股份有限公司 | Watermark embedding and reading method, device and system |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111625854A (en) * | 2020-05-25 | 2020-09-04 | 聚好看科技股份有限公司 | Document encryption method, access method, server and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107423629B (en) | Method and system for file information output anti-disclosure and tracing | |
CN108491697A (en) | File content is divulged a secret management system and retroactive method of divulging a secret | |
CN100565479C (en) | Copy preventing apparatus and duplicate the method for preventing | |
CN106407820B (en) | Method and system for preventing file from being tampered and leaked through watermark encryption | |
US20010034835A1 (en) | Applied digital and physical signatures over telecommunications media | |
CN101763394B (en) | Method for searching secret-related files in computer system | |
CN105912283A (en) | Block chain based printer and realization method | |
CN108664797A (en) | It is a kind of for pdf documents into rower it is close and verification method and device | |
CN110674477A (en) | Document source tracing method and device based on electronic file security identification | |
CN109785222B (en) | Method for quickly embedding and extracting information of webpage | |
CN107871081A (en) | A kind of computer information safe system | |
CN114708133B (en) | Universal text watermarking method and device | |
CN109726348A (en) | The method and system of webpage watermark protection | |
CN109862021A (en) | Threaten the acquisition methods and device of information | |
CN102831570B (en) | Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser | |
EP3579134B1 (en) | System, method and program for preventing unauthorized copies of webcomics and tracking replicated webcomics | |
CN109190339A (en) | A kind of webpage digital watermarking image generates, identification, Method of printing and device | |
CN103559251B (en) | Data security protection method based on Information hiding | |
CN108345774A (en) | A kind of transfer approach and transfer management system of secure content | |
CN104423902B (en) | Digital printing control method and system for secret papers | |
CN116305294B (en) | Data leakage tracing method and device, electronic equipment and storage medium | |
WO2018206373A1 (en) | Method for handwritten electronic signature | |
CN109992984B (en) | File identification method and equipment based on two-dimensional code | |
CN114969684B (en) | Document printing and tracing method based on blockchain and anti-printing scanning watermark | |
CN105704236A (en) | Information issuing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180731 |
|
RJ01 | Rejection of invention patent application after publication |