CN108664797A - It is a kind of for pdf documents into rower it is close and verification method and device - Google Patents

It is a kind of for pdf documents into rower it is close and verification method and device Download PDF

Info

Publication number
CN108664797A
CN108664797A CN201710199941.6A CN201710199941A CN108664797A CN 108664797 A CN108664797 A CN 108664797A CN 201710199941 A CN201710199941 A CN 201710199941A CN 108664797 A CN108664797 A CN 108664797A
Authority
CN
China
Prior art keywords
information
document
encryption
access request
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710199941.6A
Other languages
Chinese (zh)
Inventor
余猛
杜军
王斌
刘明斗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN201710199941.6A priority Critical patent/CN108664797A/en
Publication of CN108664797A publication Critical patent/CN108664797A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a kind of for pdf documents into the method and device that rower is close and verifies, and the method for the present invention includes:For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, and obtains encryption information, is then stored to encryption information;When document receives access request, carry out whether matching judgment responds the request according to the essential information of access request and encryption information;The present invention can carry out classifying rationally to various pdf by importance;The legal access users of pdf are set, the safety of document is enhanced;When document external circulation, the mandate of specification is needed, it is therefore prevented that document leaks caused by various mismanagements;So as to reduce pdf documents divulge a secret and the loss that brings.

Description

It is a kind of for pdf documents into rower it is close and verification method and device
Technical field
The present invention relates to Computer Data Security fields, and in particular to it is a kind of for pdf documents into rower it is close and verification Method and device.
Background technology
Currently, being dispersed with a large amount of pdf reading tools in the market, it can quickly open, browse, check, annotate, sign The pdf files of administration and printing mainstream;Meanwhile there is also part pdf edit tools in the market, they can complete to create, add Add the tasks such as textual image, setting watermark.
These technologies can substantially solve the reading of ordinary user, editor functional requirement, have publicity.It is benefited Object is numerous ordinary users, but can not fully meet secrecy enterprise, public institution or a Man's Demands.For it is this kind of by Many groups often will appear the leakage (in the form of pdf leak) because of confidential information, if in enterprise, important information leakage To opponent or opportunist, that can bring massive losses to company's benefit, if in country, important information leaks to other country, that Loss can not just be estimated.
Therefore for pdf other than needing the basic functions such as reading, editor, copyright authentication, safety is also must satisfy one Attribute, otherwise technology will become a double-edged sword, while offering convenience, also the moment will appear risk.
Invention content
It is an object of the present invention to which in order to solve the above technical problems, offer is a kind of to have the literary for pdf of tight security Shelves into rower it is close and verification method and device.
The present invention adopts the following technical scheme that:A method of for pdf documents into rower it is close and verify, step packet It includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, And encryption information is obtained, then the encryption information is stored;
When the document receives access request, carried out according to the essential information of the access request and the encryption information Whether matching judgment responds the request.
It is foregoing for pdf documents into rower is close and the method for verification, the encryption, specific method include:
Addition includes the document head security level identification of security information, user information and machine information and to described in document head Storage is encrypted in document head security level identification, while storing corresponding key by certain rule;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes Text, picture, mark and the documentation page being embedded in document;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information, when by document outgoing, the safety of the document after control mark is close are added in document head;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
The foregoing pdf documents that are directed to are into the method that rower is close and verifies, after the document responds access request, also Including:Whether have while monitoring the access request and file transmission, the action of copy and screenshotss occurs, the action is occurring Afterwards, record carries out the access request originator identity information and machine information.
The foregoing pdf documents that are directed to are described according to the basic of the access request into the method that rower is close and verifies Information carries out whether matching judgment responds the request with the encryption information, specifically includes:The document is believed according to the encryption Breath is respectively by the security information of the security information of access request promoter, identity information and machine information and document, user information It corresponds and matches with machine information, if matching, the document can be opened, otherwise open failure.
The foregoing pdf documents that are directed to are described according to the basic of the access request into the method that rower is close and verifies Information carries out whether matching judgment responds the request with the encryption information, further includes:The document receives the visit of access request When asking, the key is issued to the access request;So that it is obtained the control of file, and access to the document head, solves Security information, user information and machine information in confidential document head security level identification.
The present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit, for personnel demand of filing to the attribute information of document, security information, user information and machine information It is encrypted, and obtains encryption information, then the encryption information is stored;
Response unit adds according to the essential information of the access request with described when the document receives access request Confidential information carries out whether matching judgment responds the request.
Into the device that rower is close and verifies, the encryption unit further includes the foregoing pdf documents that are directed to:
First document head encryption unit, for including security information, user information and machine letter being added in document head Simultaneously storage is encrypted to the document head security level identification in the document head security level identification of breath, while corresponding by certain rule storage Key;
File encryption unit identifies associated for addition document security level mark in a document and with the document security level Label, the label include the text being embedded in document, picture, mark and documentation page;
Text encryption unit identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit, for adding external readable information, when by document outgoing, control in document head Mark it is close after document safety;
Document icon encryption unit, in document icon add level of confidentiality picture, for show document whether concerning security matters and Concerning security matters degree.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Detection is single Whether member has while for monitoring the access request and file transmission, the action of copy and screenshotss occurs, and described move is occurring After work, record carries out the access request originator identity information and machine information.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Matching is single Member, the document is according to the encryption information respectively by the security information of access request promoter, identity information and machine information It is matched with the security information of document, user information and machine information one-to-one correspondence, if matching, the document can be opened, Otherwise failure is opened.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Under key Bill member when access for receiving access request in the document, issues the key to the access request;It is set to obtain text The control of part, and access to the document head, security information, user information and machine in decrypted document head security level identification Device information.
Compared with prior art, the present invention by for personnel demand of filing to the attribute information of document, security information, use Family information and machine information are encrypted, and obtain encryption information, are then stored to encryption information;Access is received in document When request, carry out whether matching judgment responds the request according to the essential information of access request and encryption information;Have with following Beneficial effect:
1, security level identification is introduced, classifying rationally can be carried out by importance to various pdf;
2, the legal access users of pdf are set, the safety of document is enhanced;
3, when document external circulation, the mandate of specification is needed, it is therefore prevented that document leaks caused by various mismanagements;
So as to reduce pdf documents divulge a secret and the loss that brings.
Description of the drawings
Fig. 1 is method flow schematic diagram in an embodiment of the present invention;
Fig. 2 is the secure access flow of an embodiment of the present invention acceptance of the bid confidential document;
Fig. 3 is apparatus structure schematic diagram in an embodiment of the present invention;
Fig. 4 is apparatus structure schematic diagram in another embodiment in the present invention.
The present invention is further illustrated with reference to the accompanying drawings and detailed description.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical solution in the embodiment of the present invention is explicitly described, it is clear that described embodiment is the present invention A part of the embodiment, instead of all the embodiments.
The embodiment of the present invention 1, as shown in Figures 1 and 2, the present invention adopts the following technical scheme that:One kind being directed to pdf documents Into rower is close and the method for verification, which is characterized in that step includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, And encryption information is obtained, then the encryption information is stored;
When the document receives access request, carried out according to the essential information of the access request and the encryption information Whether matching judgment responds the request.
The present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit, for personnel demand of filing to the attribute information of document, security information, user information and machine information It is encrypted, and obtains encryption information, then the encryption information is stored;
Response unit adds according to the essential information of the access request with described when the document receives access request Confidential information carries out whether matching judgment responds the request.
The embodiment of the present invention 2, as shown in Figures 1 to 4, a method of for pdf documents into rower it is close and verify, step Including:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand:
Addition includes the document head security level identification of security information, user information and machine information in document head, such as:" make With crowd ", " authorized machine (group) ", " document security level ", and storage is encrypted to the document head security level identification, while pressing one Set pattern then stores corresponding key;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes Text, picture, mark and the documentation page being embedded in document;User one, which opens, can see that document security level mark judges text with this Shelves importance;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information " external readable user group ", " external readable machine group ", " external readable are added in document head Level of confidentiality permission " simultaneously obtains mark confidential document, and when by document outgoing, control adds level of confidentiality mark by above-mentioned various pieces in a document The safety of document after knowledge mark is close;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
Preferably, the addition of each security level identification is realized using third party library;Including being possible to maturation on the market now Increase income library or commercial library (such as libHaru, pdfsharp, podofo, pdflib), can preferably realize editor's work(of pdf Can, when user is close into rower to internal pdf documents, text, picture, mark or text can be dynamically generated according to different levels of confidentiality Shelves page, is then inserted into current document.
Then encryption information is obtained, then the encryption information is stored;
When the document receives access request, after the document responds access request, further include:Monitor the access Whether have while request and file transmission, the action of copy and screenshotss occurs, after the action occurs, record carries out the visit Ask request originator identity information (User ID and user's security information) and machine information.
It carries out whether matching judgment responds the request according to the essential information of the access request and the encryption information, has Body includes:The document is according to the encryption information respectively by the security information of access request promoter, identity information and machine Information is matched with the security information of document, user information and machine information one-to-one correspondence, if matching, can open the text Otherwise shelves open failure;The document further includes key, and the key is in certain rule deposit document head;The document When receiving the access of access request, the key is issued to the access request;It is set to obtain the control of file, and to the text Shelves head accesses, security information, user information and machine information in decrypted document head security level identification.
For the above method, the present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit 1, for filing, personnel demand believes the attribute information of document, security information, user information and machine Breath is encrypted, and obtains encryption information, is then stored to the encryption information;The encryption unit 1 further includes:
First document head encryption unit 11, for including security information, user information and machine being added in document head Simultaneously storage is encrypted to the document head security level identification in the document head security level identification of information, while corresponding by certain rule storage Key;
File encryption unit 12 is associated with for addition document security level mark in a document and with document security level mark Label, the label includes the text being embedded in document, picture, mark and documentation page;
Text encryption unit 13 identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit 14, for adding external readable information, when by document outgoing, control in document head The safety of document after system mark is close;
Document icon encryption unit 15, in document icon add level of confidentiality picture, for show document whether concerning security matters And concerning security matters degree.
Response unit 2 adds according to the essential information of the access request with described when the document receives access request Confidential information carries out whether matching judgment responds the request.The response unit 2 further includes:Detection unit 21, it is described for monitoring Whether have while access request and file transmission, the action of copy and screenshotss occurs, after the action occurs, record carries out institute State access request originator identity information and machine information.The response unit 2 further includes:Matching unit 22, the documentation root The level of confidentiality of the security information of access request promoter, identity information and machine information and document is believed respectively according to the encryption information Breath, user information and machine information correspond matching, if matching, can open the document, otherwise open failure.Also Including:Cipher key unit 23, it further includes key to state document, and the key is in certain rule deposit document head;The document is received To access request access when, issue the key give the access request;It is set to obtain the control of file, and to the document Head accesses, security information, user information and machine information in decrypted document head security level identification.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of the claims It is accurate.

Claims (10)

1. it is a kind of for pdf documents into rower is close and the method for verification, which is characterized in that step includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, and obtains Encryption information is obtained, then the encryption information is stored;
When the document receives access request, matched with the encryption information according to the essential information of the access request Judge whether to respond the request.
2. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that the encryption, tool Body method includes:
Addition includes the document head security level identification of security information, user information and machine information and to the document in document head Storage is encrypted in head security level identification, while storing corresponding key by certain rule;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes insertion Text, picture, mark in document and documentation page;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information, when by document outgoing, the safety of the document after control mark is close are added in document head;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
3. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that in the document After responding access request, further include:Whether have while monitoring the access request and the dynamic of file transmission, copy and screenshotss occurs Make, after the action occurs, record carries out the access request originator identity information and machine information.
4. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that described according to institute The essential information and the encryption information for stating access request carry out whether matching judgment responds the request, specifically include:The text Shelves are according to the encryption information respectively by the close of the security information of access request promoter, identity information and machine information and document Grade information, user information and machine information correspond matching, if matching, can open the document, otherwise open and lose It loses.
5. being directed to pdf documents as claimed in claim 2 into the method that rower is close and verifies, which is characterized in that described according to institute The essential information and the encryption information for stating access request carry out whether matching judgment responds the request, further include:The document When receiving the access of access request, the key is issued to the access request;It is set to obtain the control of file, and to the text Shelves head accesses, security information, user information and machine information in decrypted document head security level identification.
6. a kind of pdf documents that are directed to are into the device that rower is close and verifies, which is characterized in that including:
Encryption unit, for filing, personnel demand carries out the attribute information of document, security information, user information and machine information Encryption, and encryption information is obtained, then the encryption information is stored;
Response unit is believed when the document receives access request according to the essential information of the access request and the encryption Breath carries out whether matching judgment responds the request.
7. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the encryption is single Member further includes:
First document head encryption unit is used for the text that the addition in document head includes security information, user information and machine information Simultaneously storage is encrypted to the document head security level identification in shelves head security level identification, while storing corresponding key by certain rule;
File encryption unit identifies associated mark for addition document security level mark in a document and with the document security level Label, the label includes the text being embedded in document, picture, mark and documentation page;
Text encryption unit identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit, for adding external readable information in document head, when by document outgoing, control mark is close The safety of document afterwards;
Document icon encryption unit, in document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters Degree.
8. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the response is single Member further includes:Whether detection unit has while for monitoring the access request and file transmission, copy and screenshotss occurs Action, after the action occurs, record carries out the access request originator identity information and machine information.
9. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the response is single Member further includes:Matching unit, the document is according to the encryption information respectively by the security information of access request promoter, body Part information and machine information are matched with the security information of document, user information and machine information one-to-one correspondence, can if matching To open the document, failure is otherwise opened.
10. being directed to pdf documents as claimed in claim 7 into the method that rower is close and verifies, which is characterized in that the response is single Member further includes:Delivering key unit when access for receiving access request in the document, issues the key and gives the visit Ask request;So that it is obtained the control of file, and accesses to the document head, the level of confidentiality in decrypted document head security level identification Information, user information and machine information.
CN201710199941.6A 2017-03-30 2017-03-30 It is a kind of for pdf documents into rower it is close and verification method and device Pending CN108664797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710199941.6A CN108664797A (en) 2017-03-30 2017-03-30 It is a kind of for pdf documents into rower it is close and verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710199941.6A CN108664797A (en) 2017-03-30 2017-03-30 It is a kind of for pdf documents into rower it is close and verification method and device

Publications (1)

Publication Number Publication Date
CN108664797A true CN108664797A (en) 2018-10-16

Family

ID=63786933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710199941.6A Pending CN108664797A (en) 2017-03-30 2017-03-30 It is a kind of for pdf documents into rower it is close and verification method and device

Country Status (1)

Country Link
CN (1) CN108664797A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059488A (en) * 2018-01-19 2019-07-26 普天信息技术有限公司 Security level identification management method and device
CN110674477A (en) * 2019-09-24 2020-01-10 北京溯斐科技有限公司 Document source tracing method and device based on electronic file security identification
CN111783158A (en) * 2020-07-06 2020-10-16 杭州天谷信息科技有限公司 Method for guaranteeing safety of electronic contract
CN111931244A (en) * 2020-10-13 2020-11-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium
CN112214262A (en) * 2020-12-09 2021-01-12 南京中孚信息技术有限公司 Method and system for realizing online content marking of document based on browser plug-in
CN112801629A (en) * 2021-02-04 2021-05-14 江西清能高科技术有限公司 Science and technology innovation platform project declaration method and system based on multi-level encryption
CN113806785A (en) * 2021-10-11 2021-12-17 北京晓航众芯科技有限公司 Method and system for carrying out safety protection on electronic document
CN117473537A (en) * 2023-12-27 2024-01-30 北京亿赛通科技发展有限责任公司 File security level calibration method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101710380A (en) * 2009-12-22 2010-05-19 中国软件与技术服务股份有限公司 Electronic document safety protection method
CN102930225A (en) * 2012-10-25 2013-02-13 中国航天科工集团第二研究院七〇六所 Electronic document access control method based on confidential identifier
CN102999732A (en) * 2012-11-23 2013-03-27 富春通信股份有限公司 Multi-stage domain protection method and system based on information security level identifiers
CN103530570A (en) * 2013-09-24 2014-01-22 国家电网公司 Electronic document safety management system and method
CN103544446A (en) * 2012-07-16 2014-01-29 航天信息股份有限公司 Method and device for security classification calibration of files
US20160041784A1 (en) * 2010-04-29 2016-02-11 International Business Machines Corporation Performing authorization control in a cloud storage system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101710380A (en) * 2009-12-22 2010-05-19 中国软件与技术服务股份有限公司 Electronic document safety protection method
US20160041784A1 (en) * 2010-04-29 2016-02-11 International Business Machines Corporation Performing authorization control in a cloud storage system
CN103544446A (en) * 2012-07-16 2014-01-29 航天信息股份有限公司 Method and device for security classification calibration of files
CN102930225A (en) * 2012-10-25 2013-02-13 中国航天科工集团第二研究院七〇六所 Electronic document access control method based on confidential identifier
CN102999732A (en) * 2012-11-23 2013-03-27 富春通信股份有限公司 Multi-stage domain protection method and system based on information security level identifiers
CN103530570A (en) * 2013-09-24 2014-01-22 国家电网公司 Electronic document safety management system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
卢宏 等: "涉密电子文件全生命周期管理探索", 《保密科学技术》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059488A (en) * 2018-01-19 2019-07-26 普天信息技术有限公司 Security level identification management method and device
CN110674477A (en) * 2019-09-24 2020-01-10 北京溯斐科技有限公司 Document source tracing method and device based on electronic file security identification
CN111783158B (en) * 2020-07-06 2024-01-09 杭州天谷信息科技有限公司 Method for guaranteeing security of electronic contract
CN111783158A (en) * 2020-07-06 2020-10-16 杭州天谷信息科技有限公司 Method for guaranteeing safety of electronic contract
CN111931244A (en) * 2020-10-13 2020-11-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium
CN111931244B (en) * 2020-10-13 2021-07-13 北京世纪好未来教育科技有限公司 Method and device for preventing document from divulging, electronic equipment and storage medium
CN112214262A (en) * 2020-12-09 2021-01-12 南京中孚信息技术有限公司 Method and system for realizing online content marking of document based on browser plug-in
CN112214262B (en) * 2020-12-09 2021-03-02 南京中孚信息技术有限公司 Method and system for realizing online content marking of document based on browser plug-in
CN112801629A (en) * 2021-02-04 2021-05-14 江西清能高科技术有限公司 Science and technology innovation platform project declaration method and system based on multi-level encryption
CN113806785B (en) * 2021-10-11 2023-12-08 北京晓航众芯科技有限公司 Method and system for carrying out security protection on electronic document
CN113806785A (en) * 2021-10-11 2021-12-17 北京晓航众芯科技有限公司 Method and system for carrying out safety protection on electronic document
CN117473537A (en) * 2023-12-27 2024-01-30 北京亿赛通科技发展有限责任公司 File security level calibration method and device
CN117473537B (en) * 2023-12-27 2024-06-25 北京亿赛通科技发展有限责任公司 File security level calibration method and device

Similar Documents

Publication Publication Date Title
CN108664797A (en) It is a kind of for pdf documents into rower it is close and verification method and device
CA2306500C (en) System and method for handling permits
US8364980B2 (en) System for selective encryption within documents
US7581105B2 (en) Electronic signing apparatus and methods
US20160078247A1 (en) Security evaluation systems and methods for secure document control
CN106778325B (en) A kind of information privacy system and its operating method
CN101430752B (en) Sensitive data switching control module and method for computer and movable memory device
EP2110975A1 (en) Method and system for digital signatures
US20110231666A1 (en) Electronic signature method and device
CN102930225A (en) Electronic document access control method based on confidential identifier
PL182163B1 (en) System for and method of verifying a document
CN100337423C (en) Method of handling secrecy, authentication, authority management and dispersion control for electronic files
CN107871081A (en) A kind of computer information safe system
CN106407820A (en) Method and system for preventing document from being tampered and leaked through watermark encryption
KR101223427B1 (en) Apparatus for safely distributing an internal document and methods thereof
CN104537313B (en) A kind of data guard method, terminal and server
JPWO2005031560A1 (en) Output information management system
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
CN107003831A (en) The safety estimation system and method controlled for security document
CN101099207B (en) Portable data support with watermark function
CN111859423A (en) Information security encryption method and device
CA2366562A1 (en) Secure electronic document creation, approval and distribution method in an open and distributed network environment
Chaudhary et al. An elucidation on steganography and cryptography
CN100525176C (en) Preventing system for information leakage under cooperative work environment and its realizing method
TWI444849B (en) System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181016

RJ01 Rejection of invention patent application after publication