CN108345774A - A kind of transfer approach and transfer management system of secure content - Google Patents

A kind of transfer approach and transfer management system of secure content Download PDF

Info

Publication number
CN108345774A
CN108345774A CN201810076635.8A CN201810076635A CN108345774A CN 108345774 A CN108345774 A CN 108345774A CN 201810076635 A CN201810076635 A CN 201810076635A CN 108345774 A CN108345774 A CN 108345774A
Authority
CN
China
Prior art keywords
secure content
watermark
user
secret
divulging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810076635.8A
Other languages
Chinese (zh)
Inventor
易蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Zhong Ring Wit Internet Technology Co Ltd
Original Assignee
Sichuan Zhong Ring Wit Internet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Zhong Ring Wit Internet Technology Co Ltd filed Critical Sichuan Zhong Ring Wit Internet Technology Co Ltd
Priority to CN201810076635.8A priority Critical patent/CN108345774A/en
Publication of CN108345774A publication Critical patent/CN108345774A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

The invention discloses a kind of transfer approach of secure content and transfer management systems, wherein the transfer approach of secure content includes:Secure content is sent to user account;User's login account obtains secure content;Anti- mark of divulging a secret associated with current user information is generated, and prevents mark presentation synchronous with secure content of divulging a secret by described.Secure content transfer approach and transfer management system through the invention are, it can be achieved that safe and efficient transmission to secure content, simultaneously so that the secure content transmitted has the trackability in source of divulging a secret.

Description

A kind of transfer approach and transfer management system of secure content
Technical field
The present invention relates to classified document safety management fields, and in particular to a kind of transfer approach and dispatch tube of secure content Reason system.
Background technology
With the development and popularization and application of information technology, teleworking has begun to have gradually replaced traditional papery office Mode.Although however, with no paper teleworking improves office efficiency to a certain extent, while also bringing certain peace Full hidden danger, because the risk of information leakage also considerably increases.
In current judicial work, electronic office is not popularized also comprehensively.However in the routine work of law court, Case treating capacity is larger, results in that case process cycle is longer, has seriously affected the efficiency of forensic work, is badly in need of intelligent journey Relatively high teleworking is spent to be introduced into judicial work.Currently, the hindering factor for influencing forensic work electronization is more, especially It is safety problem.As a kind of common problem, when law court will be related to file (such as lawsuit relevant law document, the packet of secrecy Include written verdict, court verdict etc.) issue specified multi-party party after, it is understood that there may be party therein is not allowed to keep secrecy criterion, Classified document is revealed, to give other terrible relevant hurtful risks of party.And due to electronic document It is easy to replicate, transmits, it is difficult to track so that often is very difficult to trace or call to account people after information leakage.Therefore, it lacks at present It is weary to carry out safety, leakage-preventing transmit method and the achievable system to maintain secrecy without content.
Invention content
It is an object of the present invention to solve the above problems, a kind of safe and efficient be transmitted for secure content is provided Method and transfer management system.
The object of the present invention is achieved like this, a kind of transfer approach of secure content, is carried out based on client, including with Lower step:
Secure content is sent to user account;
User's login account obtains secure content;
Anti- mark of divulging a secret associated with current user information is generated, and the anti-mark of divulging a secret is synchronous with secure content It presents.
Preferably, the acquisition secure content is specifically included downloads, replicates, prints or checks behaviour to secure content implementation Work at least one of is worked as.
Preferably, when obtaining secure content, synchronous triggering generates the anti-mark of divulging a secret.
Preferably, anti-divulge a secret is identified as watermark.
Preferably, the form of the watermark includes text watermark, picture watermark or shading watermark.
Preferably, the watermark is added in the form of embedded in secure content, and presentation Chong Die with secure content;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
Preferably, described to prevent divulging a secret to be identified by not influenced its information to the privacy amplification information in secure content It is obtained after the variation of meaning expression itself.
Preferably, described to prevent divulging a secret to be identified by not influenced its word itself to the segment word in secure content It is obtained after the variation of meaning expression.
Preferably, include to the change process of the segment word in secure content:The variation of font style, font size Variation or at least one of the variation of font spacing.
The present invention also provides a kind of secure content transfer management systems, which is characterized in that including:
User login validation unit, to be verified to user login management system;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user carries out obtaining secure content When operation, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and It adds a watermark in secure content.
Preferably, user carry out obtain secure content operation specifically include to secure content implement download, replicate, printing Or check that operation is worked as.
Preferably, the system also includes service management unit, to store user information.
Preferably, the service management unit further includes the record storage module for storing record user's operation behavior
Preferably, the user information includes subscriber identity information and account information.
Preferably, the watermark generation unit includes watermark setup module, to be arranged form, the display effect of watermark with And embedded mode.
Compared with prior art, the beneficial effects of the present invention are:
Anti- processing of divulging a secret is carried out to classified document, has trackability after may make classified document to get compromised, including to protecting Download that close content carries out, replicate, check, the approach of divulging a secret such as sectional drawing and screen shot can be traced effectively, from one Determine to contain that the related personnel for having duty of secrecy divulges a secret in degree;The classified document transmission system provided through the invention System, may be implemented safer, the convenient management to classified document;It can be used for assisting forensic work, trial is executed, Classified document transmission in community service and judicial administration work has technical support and help.Share somebody's cares and burdens solution for forensic work Difficulty provides facility for party, improves the safety of electronic office in judicial work.
Description of the drawings
Fig. 1 is the main flow chart of the transfer approach of the secure content of the embodiment of the present invention;
Fig. 2 is the structural schematic diagram of the secure content transfer management system of the embodiment of the present invention.
Specific implementation mode
Below in conjunction with the drawings and specific embodiments, the present invention is further elaborated, it should which explanation is to provide The purpose of following embodiment is the implementation for enabling those skilled in the art the to be more fully apparent from present invention, and can not constitute Restriction to the specific embodiment of the present invention.
Refering to fig. 1 and Fig. 2, embodiment provided by the invention are as follows:
A kind of transfer approach of secure content can be based on client and carry out, include the following steps:
S1. secure content is sent to user account.
Under normal conditions, which can be regarded as sending secure content to specified user, and the reality of the secure content is in Existing carrier can be electronic document.As the understanding of similar concept meaning, can also upload onto the server secure content end, and by referring to Determine user to download or access.
S2. user's login account obtains secure content.
Under normal conditions, user is logged on to by the form that account logs in the account of client, then obtains the guarantor Close content.That is, user after login account only by being possible to get relative secure content.Positive reason Under condition, the secure content can not be then obtained with the user of secure content onrelevant.
As specific mode, the form for obtaining secure content includes implementing to download to secure content, replicating, printing Or check that operation is worked as.
S3. anti-mark of divulging a secret associated with current user information is generated, and prevents divulge a secret mark and secure content by described It is synchronous to present.
As common understanding, the anti-mark of divulging a secret of generation is mark associated with current user information, and will be described The purpose of anti-mark presentation synchronous with secure content of divulging a secret is:Secure content and user information are subjected to binding presentation, to Be conducive to effectively trace divulging a secret for secure content.It should be noted that the current user information should at least wrap The information for showing or being directed toward current user identities is included, for example, name and identification card number information.
As a preferred solution, when obtaining secure content, synchronous triggering generates the anti-mark of divulging a secret.It is specific and Speech, when user carries out implementation download, duplication to secure content, prints or check operation, triggering generates anti-mark of divulging a secret, and The anti-mark of divulging a secret is added in secure content, realizes and the anti-mark of divulging a secret is synchronized into presentation with secure content.By This, it is also understood that being, not including then when user does not obtain secure content, in secure content has and current user information phase Associated anti-mark of divulging a secret.The purpose of the program is accurately to distinguish the source of divulging a secret of classified document.As one Practical application example, when judicial functionary by secure content (such as:Court verdict) it is sent to and associated with the secure content works as thing After people A and party B, party A and party B can log on to client to obtain in secrecy by respective account Hold.If party A logs in client and simultaneously obtains secure content, then will be by the secure content acquired in party A Anti- mark of divulging a secret associated with the information of party A is added, in the case where party B does not go to obtain secure content, such as Fruit includes that the secure content of anti-mark of divulging a secret associated with party's A information is got compromised, for example the secure content is distributed Onto network, then, even if described in cannot directly determining including the secrecy of anti-mark of divulging a secret associated with party's A information Content is directly revealed by party A, still, can at least exclude the responsibility of party B, because party and having not been obtained Secure content, regardless of whether being the secure content directly divulged a secret by party A, party A has a responsibility for, because causing to let out Close source is that party A obtains secure content, and party A, which has a responsibility for ensuring, described includes and party's A information phases Associated anti-mark of divulging a secret is not got compromised.
As a preferred solution, anti-divulge a secret is identified as watermark.Further, the form of the watermark includes text Word watermark, picture watermark or shading watermark.Specifically, the watermark information of the text watermark can be directly disposed as including to work as The cleartext information of the ID card information of preceding user, or it is set as the cipher-text information with subscriber identity information maps mutually.Picture water Print then specifically could be provided as the form of Quick Response Code or bar code.Shading watermark be then the information that will can characterize user identity with The form of shading is added in secure content.
As specific preferred embodiment, the watermark is added in the form of embedded in secure content, and in secrecy Unit weight is folded to be presented;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
The purpose of program design is, user is avoided to pass through screenshot capture or the opposite screen for showing secure content It takes pictures and causes to divulge a secret.
As a preferred solution, the anti-privacy amplification information progress being identified by secure content of divulging a secret It is obtained after not influencing the variation of its information meaning expression itself.Further, it is replaced by the anti-mark of divulging a secret obtained after variation Change the privacy amplification information.
It is further preferred that anti-divulge a secret is identified by that not influenced its to the segment word in secure content literary It is obtained after the variation of word meaning expression itself, the anti-mark of divulging a secret is subjected to specified associations with user information.More specifically, Change process to the segment word in secure content includes:Between the variation of font style, the variation of font size or font Away from least one of variation.It is a kind of specifically, include the variation of type posture to the variation of the font style, such as: Font in secure content is all made of Simplified Chinese, then can replace the font of the segment word in secure content by Simplified Chinese It is changed to Traditional Chinese, on the one hand which is only the font form for changing the segment word, do not change font itself The meaning of expression, on the other hand so that user it is subtle go out the change representated by meaning, so being gone without corresponding motivation The change is eliminated in favor of divulging a secret.It is further preferred that can be carried out to the segment word in the secure content of different user different Change process, the change process of the segment word will be corresponded with user identity as a result, to conveniently divulging a secret Retrospect.As a kind of specific applicating example, secure content is sent to party A and B by judicial functionary, and party A is obtained The anti-mark of divulging a secret being added into the secure content taken is set as:Segment word in its secure content is changed font sample The variation of formula;And the anti-mark of divulging a secret being added into the secure content that party B is obtained then is set as:It will be in its secure content Segment word carries out the variation of font spacing.As a result, after secure content is got compromised, it need to only identify in the secure content got compromised Anti- mark of divulging a secret can confirm that the source of divulging a secret is party A or party B.
The present invention also provides a kind of secure content transfer management systems, including:
User login validation unit is verified to log on to management system to user;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user carries out obtaining secure content When operation, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and It adds a watermark in secure content.
Preferably, user carry out obtain secure content operation specifically include to secure content implement download, replicate, Print or check that operation is worked as.When user obtains secure content, synchronous triggering generates the watermark.Specifically For, when user carries out implementation download, duplication to secure content, prints or check operation, triggering watermark generation unit life It is added in secure content at watermark, and by the watermark.
Preferably, the secure content transfer management system further includes service management unit, to store user's letter Breath, the user information includes subscriber identity information and/or account information.As one kind specifically, the watermark generation unit Current user information is extracted from service management unit, is generated by way of hybrid coding associated with current user information Watermark.It should be noted that the purpose for generating associated with current user information watermark is, by watermark and user information into Row binding, consequently facilitating the retrospect of divulging a secret of secure content.
Further preferred scheme, the service management unit further include the record for storing record user's operation behavior Memory module.As specifically, user's operation behavior includes implementing the behaviour such as to download, replicate, print or check to secure content Make behavior.Further, it by taking user carries out checking the operation behavior of secure content as an example, will be used by the service management unit Family carries out record storage to checking range (e.g., checking number of pages), check duration, check the time etc. for secure content, in favor of auxiliary Help the retrospect of divulging a secret that may subsequently carry out.Specifically, after secure content is got compromised, it first can be by identifying secure content In watermark judge source of divulging a secret, that is, determine that the secure content is divulged a secret after obtaining secure content by the account of which user , then, recall user determined by checking and the operation behavior of secure content recorded, obtain the user to secure content into Which operation behavior went (such as:Download, replicate, print or check), if the user checked secure content, further divide It analyses the user and record is checked to the specific of secure content, thus the possibility that the auxiliary judgment user divulges a secret.As one kind Situation analyzing examples, if the operation that user only checks secure content, and secure content is not replicated, The operations such as export, printing, then, if the user shows that it just looked at secure content to checking in record for secure content In first page (it is assumed that secure content is at least over one page), it is possible to exclude substantially the user for remaining number of pages maintain secrecy The responsibility of divulging a secret of content.
As a preferred option, the form of the watermark includes text watermark, picture watermark or shading watermark.Specifically , the watermark information of the text watermark can be directly disposed as the cleartext information of the ID card information comprising active user, or Person is set as the cipher-text information with subscriber identity information maps mutually.Picture watermark then specifically could be provided as Quick Response Code or bar shaped The form of code.Shading watermark is then to be added to the information that can characterize user identity in secure content in the form of shading.
A kind of preferred scheme, the watermark generation unit include watermark setup module, the form of watermark is arranged, shows Show effect and embedded mode etc..The display effect of the watermark is arranged:The transparency of watermark is arranged, by by watermark phase Suitable range is adjusted to the transparency of the confidential information in secure content, thus while the visibility for ensuring watermark, Normal reading of the user to secure content is not influenced;Alternatively, the indication range setting of watermark, i.e. watermark show boundary in secure content The full screen display in face or the part of specific region are shown, it is preferred that watermark should at least cover the crucial portion of secure content Point, to avoid blabber from being removed the operation of watermark;Alternatively, the closeness display setting of watermark, is not influencing user couple In the case of secure content normal reading, display interface that can be by watermark in secure content carries out intensive display, to avoid letting out Watermark is removed by close person.
In the description of the embodiment of the present invention, term " first ", " second ", " third ", " the 4th " are only used for description mesh , it is not understood to indicate or imply relative importance or implicitly indicates the quantity of indicated technical characteristic.It limits as a result, There are the feature of " first ", " second ", " third ", " the 4th " to can explicitly or implicitly include one or more spy surely Sign.In the description of the present invention, unless otherwise indicated, the meaning of " plurality " is two or more.
In the description of the embodiment of the present invention, the terms "and/or", only it is a kind of description affiliated partner pass Connection relationship indicates may exist three kinds of relationships, for example, A and/or B, can indicate:Individualism A exists simultaneously A and B, individually There are these three situations of B.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with Understanding without departing from the principles and spirit of the present invention can carry out these embodiments a variety of variations, modification, replace And modification, the scope of the present invention is defined by the appended.

Claims (10)

1. a kind of transfer approach of secure content is carried out based on client, which is characterized in that including:
Secure content is sent to user account;
User's login account obtains secure content;
Generate anti-mark of divulging a secret associated with current user information, and by it is described prevent divulging a secret mark and secure content synchronization be in It is existing.
2. transfer approach according to claim 1, it is characterised in that:The acquisition secure content is specifically included in secrecy Hold and implements to download, replicate, print or check that operation is worked as.
3. transfer approach according to claim 1 or 2, it is characterised in that:When obtaining secure content, synchronous triggering generates The anti-mark of divulging a secret.
4. transfer approach according to claim 3, it is characterised in that:Anti- divulge a secret is identified as watermark.
5. transfer approach according to claim 4, it is characterised in that:The form of the watermark includes text watermark, picture Watermark or shading watermark.
6. transfer approach according to claim 4, it is characterised in that:The watermark is added to secrecy in the form of embedded In content, and presentation Chong Die with secure content;
It is shown in the presentation interface of secure content alternatively, the watermark is suspended.
7. transfer approach according to claim 3, it is characterised in that:Anti- divulge a secret is identified by secure content Privacy amplification information do not influenced the variation of its information meaning expression itself after obtain.
8. secure content transfer management system, which is characterized in that including:
User login validation unit, to be verified to user login management system;
Anti- administrative unit of divulging a secret, to monitor operation of the user to secure content, when user obtain the operation of secure content When, triggering watermark generation unit carries out anti-processing of divulging a secret to secure content;
Watermark generation unit generates watermark associated with user information to extract the user information of active user, and by water Print is added in secure content.
9. secure content transfer management system according to claim 7, it is characterised in that:User carries out acquisition secure content Operation specifically include to secure content implementation download, replicate, print or check that operation is worked as.
10. secure content transfer management system according to claim 8, it is characterised in that:The watermark generation unit packet Watermark setup module is included, the form, display effect and embedded mode of watermark is arranged.
CN201810076635.8A 2018-01-26 2018-01-26 A kind of transfer approach and transfer management system of secure content Pending CN108345774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810076635.8A CN108345774A (en) 2018-01-26 2018-01-26 A kind of transfer approach and transfer management system of secure content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810076635.8A CN108345774A (en) 2018-01-26 2018-01-26 A kind of transfer approach and transfer management system of secure content

Publications (1)

Publication Number Publication Date
CN108345774A true CN108345774A (en) 2018-07-31

Family

ID=62960901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810076635.8A Pending CN108345774A (en) 2018-01-26 2018-01-26 A kind of transfer approach and transfer management system of secure content

Country Status (1)

Country Link
CN (1) CN108345774A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102169534A (en) * 2011-02-21 2011-08-31 北京书生国际信息技术有限公司 Method and device for displaying watermark
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN104361268A (en) * 2014-11-28 2015-02-18 广州视源电子科技股份有限公司 Watermark embedding and reading method, device and system
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
US20150150143A1 (en) * 2013-11-27 2015-05-28 Electronics And Telecommunications Research Institute System and method for providing virtual desktop infrastructure (vdi) service
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN102169534A (en) * 2011-02-21 2011-08-31 北京书生国际信息技术有限公司 Method and device for displaying watermark
US20150150143A1 (en) * 2013-11-27 2015-05-28 Electronics And Telecommunications Research Institute System and method for providing virtual desktop infrastructure (vdi) service
CN104361268A (en) * 2014-11-28 2015-02-18 广州视源电子科技股份有限公司 Watermark embedding and reading method, device and system
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625854A (en) * 2020-05-25 2020-09-04 聚好看科技股份有限公司 Document encryption method, access method, server and system

Similar Documents

Publication Publication Date Title
CN107423629B (en) Method and system for file information output anti-disclosure and tracing
CN108491697A (en) File content is divulged a secret management system and retroactive method of divulging a secret
CN100565479C (en) Copy preventing apparatus and duplicate the method for preventing
CN106407820B (en) Method and system for preventing file from being tampered and leaked through watermark encryption
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
CN101763394B (en) Method for searching secret-related files in computer system
CN105912283A (en) Block chain based printer and realization method
CN108664797A (en) It is a kind of for pdf documents into rower it is close and verification method and device
CN110674477A (en) Document source tracing method and device based on electronic file security identification
CN109785222B (en) Method for quickly embedding and extracting information of webpage
CN107871081A (en) A kind of computer information safe system
CN114708133B (en) Universal text watermarking method and device
CN109726348A (en) The method and system of webpage watermark protection
CN109862021A (en) Threaten the acquisition methods and device of information
CN102831570B (en) Webpage watermark generation and authentication method capable of positioning and tampering positions on a browser
EP3579134B1 (en) System, method and program for preventing unauthorized copies of webcomics and tracking replicated webcomics
CN109190339A (en) A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN103559251B (en) Data security protection method based on Information hiding
CN108345774A (en) A kind of transfer approach and transfer management system of secure content
CN104423902B (en) Digital printing control method and system for secret papers
CN116305294B (en) Data leakage tracing method and device, electronic equipment and storage medium
WO2018206373A1 (en) Method for handwritten electronic signature
CN109992984B (en) File identification method and equipment based on two-dimensional code
CN114969684B (en) Document printing and tracing method based on blockchain and anti-printing scanning watermark
CN105704236A (en) Information issuing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180731

RJ01 Rejection of invention patent application after publication