CN108664797A - It is a kind of for pdf documents into rower it is close and verification method and device - Google Patents
It is a kind of for pdf documents into rower it is close and verification method and device Download PDFInfo
- Publication number
- CN108664797A CN108664797A CN201710199941.6A CN201710199941A CN108664797A CN 108664797 A CN108664797 A CN 108664797A CN 201710199941 A CN201710199941 A CN 201710199941A CN 108664797 A CN108664797 A CN 108664797A
- Authority
- CN
- China
- Prior art keywords
- information
- document
- encryption
- access request
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a kind of for pdf documents into the method and device that rower is close and verifies, and the method for the present invention includes:For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, and obtains encryption information, is then stored to encryption information;When document receives access request, carry out whether matching judgment responds the request according to the essential information of access request and encryption information;The present invention can carry out classifying rationally to various pdf by importance;The legal access users of pdf are set, the safety of document is enhanced;When document external circulation, the mandate of specification is needed, it is therefore prevented that document leaks caused by various mismanagements;So as to reduce pdf documents divulge a secret and the loss that brings.
Description
Technical field
The present invention relates to Computer Data Security fields, and in particular to it is a kind of for pdf documents into rower it is close and verification
Method and device.
Background technology
Currently, being dispersed with a large amount of pdf reading tools in the market, it can quickly open, browse, check, annotate, sign
The pdf files of administration and printing mainstream;Meanwhile there is also part pdf edit tools in the market, they can complete to create, add
Add the tasks such as textual image, setting watermark.
These technologies can substantially solve the reading of ordinary user, editor functional requirement, have publicity.It is benefited
Object is numerous ordinary users, but can not fully meet secrecy enterprise, public institution or a Man's Demands.For it is this kind of by
Many groups often will appear the leakage (in the form of pdf leak) because of confidential information, if in enterprise, important information leakage
To opponent or opportunist, that can bring massive losses to company's benefit, if in country, important information leaks to other country, that
Loss can not just be estimated.
Therefore for pdf other than needing the basic functions such as reading, editor, copyright authentication, safety is also must satisfy one
Attribute, otherwise technology will become a double-edged sword, while offering convenience, also the moment will appear risk.
Invention content
It is an object of the present invention to which in order to solve the above technical problems, offer is a kind of to have the literary for pdf of tight security
Shelves into rower it is close and verification method and device.
The present invention adopts the following technical scheme that:A method of for pdf documents into rower it is close and verify, step packet
It includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand,
And encryption information is obtained, then the encryption information is stored;
When the document receives access request, carried out according to the essential information of the access request and the encryption information
Whether matching judgment responds the request.
It is foregoing for pdf documents into rower is close and the method for verification, the encryption, specific method include:
Addition includes the document head security level identification of security information, user information and machine information and to described in document head
Storage is encrypted in document head security level identification, while storing corresponding key by certain rule;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes
Text, picture, mark and the documentation page being embedded in document;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information, when by document outgoing, the safety of the document after control mark is close are added in document head;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
The foregoing pdf documents that are directed to are into the method that rower is close and verifies, after the document responds access request, also
Including:Whether have while monitoring the access request and file transmission, the action of copy and screenshotss occurs, the action is occurring
Afterwards, record carries out the access request originator identity information and machine information.
The foregoing pdf documents that are directed to are described according to the basic of the access request into the method that rower is close and verifies
Information carries out whether matching judgment responds the request with the encryption information, specifically includes:The document is believed according to the encryption
Breath is respectively by the security information of the security information of access request promoter, identity information and machine information and document, user information
It corresponds and matches with machine information, if matching, the document can be opened, otherwise open failure.
The foregoing pdf documents that are directed to are described according to the basic of the access request into the method that rower is close and verifies
Information carries out whether matching judgment responds the request with the encryption information, further includes:The document receives the visit of access request
When asking, the key is issued to the access request;So that it is obtained the control of file, and access to the document head, solves
Security information, user information and machine information in confidential document head security level identification.
The present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit, for personnel demand of filing to the attribute information of document, security information, user information and machine information
It is encrypted, and obtains encryption information, then the encryption information is stored;
Response unit adds according to the essential information of the access request with described when the document receives access request
Confidential information carries out whether matching judgment responds the request.
Into the device that rower is close and verifies, the encryption unit further includes the foregoing pdf documents that are directed to:
First document head encryption unit, for including security information, user information and machine letter being added in document head
Simultaneously storage is encrypted to the document head security level identification in the document head security level identification of breath, while corresponding by certain rule storage
Key;
File encryption unit identifies associated for addition document security level mark in a document and with the document security level
Label, the label include the text being embedded in document, picture, mark and documentation page;
Text encryption unit identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit, for adding external readable information, when by document outgoing, control in document head
Mark it is close after document safety;
Document icon encryption unit, in document icon add level of confidentiality picture, for show document whether concerning security matters and
Concerning security matters degree.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Detection is single
Whether member has while for monitoring the access request and file transmission, the action of copy and screenshotss occurs, and described move is occurring
After work, record carries out the access request originator identity information and machine information.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Matching is single
Member, the document is according to the encryption information respectively by the security information of access request promoter, identity information and machine information
It is matched with the security information of document, user information and machine information one-to-one correspondence, if matching, the document can be opened,
Otherwise failure is opened.
Into the device that rower is close and verifies, the response unit further includes the foregoing pdf documents that are directed to:Under key
Bill member when access for receiving access request in the document, issues the key to the access request;It is set to obtain text
The control of part, and access to the document head, security information, user information and machine in decrypted document head security level identification
Device information.
Compared with prior art, the present invention by for personnel demand of filing to the attribute information of document, security information, use
Family information and machine information are encrypted, and obtain encryption information, are then stored to encryption information;Access is received in document
When request, carry out whether matching judgment responds the request according to the essential information of access request and encryption information;Have with following
Beneficial effect:
1, security level identification is introduced, classifying rationally can be carried out by importance to various pdf;
2, the legal access users of pdf are set, the safety of document is enhanced;
3, when document external circulation, the mandate of specification is needed, it is therefore prevented that document leaks caused by various mismanagements;
So as to reduce pdf documents divulge a secret and the loss that brings.
Description of the drawings
Fig. 1 is method flow schematic diagram in an embodiment of the present invention;
Fig. 2 is the secure access flow of an embodiment of the present invention acceptance of the bid confidential document;
Fig. 3 is apparatus structure schematic diagram in an embodiment of the present invention;
Fig. 4 is apparatus structure schematic diagram in another embodiment in the present invention.
The present invention is further illustrated with reference to the accompanying drawings and detailed description.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical solution in the embodiment of the present invention is explicitly described, it is clear that described embodiment is the present invention
A part of the embodiment, instead of all the embodiments.
The embodiment of the present invention 1, as shown in Figures 1 and 2, the present invention adopts the following technical scheme that:One kind being directed to pdf documents
Into rower is close and the method for verification, which is characterized in that step includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand,
And encryption information is obtained, then the encryption information is stored;
When the document receives access request, carried out according to the essential information of the access request and the encryption information
Whether matching judgment responds the request.
The present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit, for personnel demand of filing to the attribute information of document, security information, user information and machine information
It is encrypted, and obtains encryption information, then the encryption information is stored;
Response unit adds according to the essential information of the access request with described when the document receives access request
Confidential information carries out whether matching judgment responds the request.
The embodiment of the present invention 2, as shown in Figures 1 to 4, a method of for pdf documents into rower it is close and verify, step
Including:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand:
Addition includes the document head security level identification of security information, user information and machine information in document head, such as:" make
With crowd ", " authorized machine (group) ", " document security level ", and storage is encrypted to the document head security level identification, while pressing one
Set pattern then stores corresponding key;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes
Text, picture, mark and the documentation page being embedded in document;User one, which opens, can see that document security level mark judges text with this
Shelves importance;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information " external readable user group ", " external readable machine group ", " external readable are added in document head
Level of confidentiality permission " simultaneously obtains mark confidential document, and when by document outgoing, control adds level of confidentiality mark by above-mentioned various pieces in a document
The safety of document after knowledge mark is close;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
Preferably, the addition of each security level identification is realized using third party library;Including being possible to maturation on the market now
Increase income library or commercial library (such as libHaru, pdfsharp, podofo, pdflib), can preferably realize editor's work(of pdf
Can, when user is close into rower to internal pdf documents, text, picture, mark or text can be dynamically generated according to different levels of confidentiality
Shelves page, is then inserted into current document.
Then encryption information is obtained, then the encryption information is stored;
When the document receives access request, after the document responds access request, further include:Monitor the access
Whether have while request and file transmission, the action of copy and screenshotss occurs, after the action occurs, record carries out the visit
Ask request originator identity information (User ID and user's security information) and machine information.
It carries out whether matching judgment responds the request according to the essential information of the access request and the encryption information, has
Body includes:The document is according to the encryption information respectively by the security information of access request promoter, identity information and machine
Information is matched with the security information of document, user information and machine information one-to-one correspondence, if matching, can open the text
Otherwise shelves open failure;The document further includes key, and the key is in certain rule deposit document head;The document
When receiving the access of access request, the key is issued to the access request;It is set to obtain the control of file, and to the text
Shelves head accesses, security information, user information and machine information in decrypted document head security level identification.
For the above method, the present invention also provides a kind of for pdf documents into the device that rower is close and verifies, including:
Encryption unit 1, for filing, personnel demand believes the attribute information of document, security information, user information and machine
Breath is encrypted, and obtains encryption information, is then stored to the encryption information;The encryption unit 1 further includes:
First document head encryption unit 11, for including security information, user information and machine being added in document head
Simultaneously storage is encrypted to the document head security level identification in the document head security level identification of information, while corresponding by certain rule storage
Key;
File encryption unit 12 is associated with for addition document security level mark in a document and with document security level mark
Label, the label includes the text being embedded in document, picture, mark and documentation page;
Text encryption unit 13 identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit 14, for adding external readable information, when by document outgoing, control in document head
The safety of document after system mark is close;
Document icon encryption unit 15, in document icon add level of confidentiality picture, for show document whether concerning security matters
And concerning security matters degree.
Response unit 2 adds according to the essential information of the access request with described when the document receives access request
Confidential information carries out whether matching judgment responds the request.The response unit 2 further includes:Detection unit 21, it is described for monitoring
Whether have while access request and file transmission, the action of copy and screenshotss occurs, after the action occurs, record carries out institute
State access request originator identity information and machine information.The response unit 2 further includes:Matching unit 22, the documentation root
The level of confidentiality of the security information of access request promoter, identity information and machine information and document is believed respectively according to the encryption information
Breath, user information and machine information correspond matching, if matching, can open the document, otherwise open failure.Also
Including:Cipher key unit 23, it further includes key to state document, and the key is in certain rule deposit document head;The document is received
To access request access when, issue the key give the access request;It is set to obtain the control of file, and to the document
Head accesses, security information, user information and machine information in decrypted document head security level identification.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in
It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of the claims
It is accurate.
Claims (10)
1. it is a kind of for pdf documents into rower is close and the method for verification, which is characterized in that step includes:
For filing, the attribute information of document, security information, user information and machine information is encrypted in personnel demand, and obtains
Encryption information is obtained, then the encryption information is stored;
When the document receives access request, matched with the encryption information according to the essential information of the access request
Judge whether to respond the request.
2. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that the encryption, tool
Body method includes:
Addition includes the document head security level identification of security information, user information and machine information and to the document in document head
Storage is encrypted in head security level identification, while storing corresponding key by certain rule;
Addition document security level identifies and identifies associated label with the document security level in a document, and the label includes insertion
Text, picture, mark in document and documentation page;
Watermark is added in the body of the email, identifies the legal person of affiliated side and personal copyright information;
External readable information, when by document outgoing, the safety of the document after control mark is close are added in document head;
In document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters degree.
3. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that in the document
After responding access request, further include:Whether have while monitoring the access request and the dynamic of file transmission, copy and screenshotss occurs
Make, after the action occurs, record carries out the access request originator identity information and machine information.
4. being directed to pdf documents as described in claim 1 into the method that rower is close and verifies, which is characterized in that described according to institute
The essential information and the encryption information for stating access request carry out whether matching judgment responds the request, specifically include:The text
Shelves are according to the encryption information respectively by the close of the security information of access request promoter, identity information and machine information and document
Grade information, user information and machine information correspond matching, if matching, can open the document, otherwise open and lose
It loses.
5. being directed to pdf documents as claimed in claim 2 into the method that rower is close and verifies, which is characterized in that described according to institute
The essential information and the encryption information for stating access request carry out whether matching judgment responds the request, further include:The document
When receiving the access of access request, the key is issued to the access request;It is set to obtain the control of file, and to the text
Shelves head accesses, security information, user information and machine information in decrypted document head security level identification.
6. a kind of pdf documents that are directed to are into the device that rower is close and verifies, which is characterized in that including:
Encryption unit, for filing, personnel demand carries out the attribute information of document, security information, user information and machine information
Encryption, and encryption information is obtained, then the encryption information is stored;
Response unit is believed when the document receives access request according to the essential information of the access request and the encryption
Breath carries out whether matching judgment responds the request.
7. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the encryption is single
Member further includes:
First document head encryption unit is used for the text that the addition in document head includes security information, user information and machine information
Simultaneously storage is encrypted to the document head security level identification in shelves head security level identification, while storing corresponding key by certain rule;
File encryption unit identifies associated mark for addition document security level mark in a document and with the document security level
Label, the label includes the text being embedded in document, picture, mark and documentation page;
Text encryption unit identifies the legal person of affiliated side and personal copyright information for adding watermark in the body of the email;
Second document head encryption unit, for adding external readable information in document head, when by document outgoing, control mark is close
The safety of document afterwards;
Document icon encryption unit, in document icon add level of confidentiality picture, for show document whether concerning security matters and concerning security matters
Degree.
8. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the response is single
Member further includes:Whether detection unit has while for monitoring the access request and file transmission, copy and screenshotss occurs
Action, after the action occurs, record carries out the access request originator identity information and machine information.
9. being directed to pdf documents as claimed in claim 6 into the method that rower is close and verifies, which is characterized in that the response is single
Member further includes:Matching unit, the document is according to the encryption information respectively by the security information of access request promoter, body
Part information and machine information are matched with the security information of document, user information and machine information one-to-one correspondence, can if matching
To open the document, failure is otherwise opened.
10. being directed to pdf documents as claimed in claim 7 into the method that rower is close and verifies, which is characterized in that the response is single
Member further includes:Delivering key unit when access for receiving access request in the document, issues the key and gives the visit
Ask request;So that it is obtained the control of file, and accesses to the document head, the level of confidentiality in decrypted document head security level identification
Information, user information and machine information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710199941.6A CN108664797A (en) | 2017-03-30 | 2017-03-30 | It is a kind of for pdf documents into rower it is close and verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710199941.6A CN108664797A (en) | 2017-03-30 | 2017-03-30 | It is a kind of for pdf documents into rower it is close and verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108664797A true CN108664797A (en) | 2018-10-16 |
Family
ID=63786933
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710199941.6A Pending CN108664797A (en) | 2017-03-30 | 2017-03-30 | It is a kind of for pdf documents into rower it is close and verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108664797A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110059488A (en) * | 2018-01-19 | 2019-07-26 | 普天信息技术有限公司 | Security level identification management method and device |
CN110674477A (en) * | 2019-09-24 | 2020-01-10 | 北京溯斐科技有限公司 | Document source tracing method and device based on electronic file security identification |
CN111783158A (en) * | 2020-07-06 | 2020-10-16 | 杭州天谷信息科技有限公司 | Method for guaranteeing safety of electronic contract |
CN111931244A (en) * | 2020-10-13 | 2020-11-13 | 北京世纪好未来教育科技有限公司 | Method and device for preventing document from divulging, electronic equipment and storage medium |
CN112214262A (en) * | 2020-12-09 | 2021-01-12 | 南京中孚信息技术有限公司 | Method and system for realizing online content marking of document based on browser plug-in |
CN112801629A (en) * | 2021-02-04 | 2021-05-14 | 江西清能高科技术有限公司 | Science and technology innovation platform project declaration method and system based on multi-level encryption |
CN113806785A (en) * | 2021-10-11 | 2021-12-17 | 北京晓航众芯科技有限公司 | Method and system for carrying out safety protection on electronic document |
CN117473537A (en) * | 2023-12-27 | 2024-01-30 | 北京亿赛通科技发展有限责任公司 | File security level calibration method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101710380A (en) * | 2009-12-22 | 2010-05-19 | 中国软件与技术服务股份有限公司 | Electronic document safety protection method |
CN102930225A (en) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | Electronic document access control method based on confidential identifier |
CN102999732A (en) * | 2012-11-23 | 2013-03-27 | 富春通信股份有限公司 | Multi-stage domain protection method and system based on information security level identifiers |
CN103530570A (en) * | 2013-09-24 | 2014-01-22 | 国家电网公司 | Electronic document safety management system and method |
CN103544446A (en) * | 2012-07-16 | 2014-01-29 | 航天信息股份有限公司 | Method and device for security classification calibration of files |
US20160041784A1 (en) * | 2010-04-29 | 2016-02-11 | International Business Machines Corporation | Performing authorization control in a cloud storage system |
-
2017
- 2017-03-30 CN CN201710199941.6A patent/CN108664797A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101710380A (en) * | 2009-12-22 | 2010-05-19 | 中国软件与技术服务股份有限公司 | Electronic document safety protection method |
US20160041784A1 (en) * | 2010-04-29 | 2016-02-11 | International Business Machines Corporation | Performing authorization control in a cloud storage system |
CN103544446A (en) * | 2012-07-16 | 2014-01-29 | 航天信息股份有限公司 | Method and device for security classification calibration of files |
CN102930225A (en) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | Electronic document access control method based on confidential identifier |
CN102999732A (en) * | 2012-11-23 | 2013-03-27 | 富春通信股份有限公司 | Multi-stage domain protection method and system based on information security level identifiers |
CN103530570A (en) * | 2013-09-24 | 2014-01-22 | 国家电网公司 | Electronic document safety management system and method |
Non-Patent Citations (1)
Title |
---|
卢宏 等: "涉密电子文件全生命周期管理探索", 《保密科学技术》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110059488A (en) * | 2018-01-19 | 2019-07-26 | 普天信息技术有限公司 | Security level identification management method and device |
CN110674477A (en) * | 2019-09-24 | 2020-01-10 | 北京溯斐科技有限公司 | Document source tracing method and device based on electronic file security identification |
CN111783158B (en) * | 2020-07-06 | 2024-01-09 | 杭州天谷信息科技有限公司 | Method for guaranteeing security of electronic contract |
CN111783158A (en) * | 2020-07-06 | 2020-10-16 | 杭州天谷信息科技有限公司 | Method for guaranteeing safety of electronic contract |
CN111931244A (en) * | 2020-10-13 | 2020-11-13 | 北京世纪好未来教育科技有限公司 | Method and device for preventing document from divulging, electronic equipment and storage medium |
CN111931244B (en) * | 2020-10-13 | 2021-07-13 | 北京世纪好未来教育科技有限公司 | Method and device for preventing document from divulging, electronic equipment and storage medium |
CN112214262A (en) * | 2020-12-09 | 2021-01-12 | 南京中孚信息技术有限公司 | Method and system for realizing online content marking of document based on browser plug-in |
CN112214262B (en) * | 2020-12-09 | 2021-03-02 | 南京中孚信息技术有限公司 | Method and system for realizing online content marking of document based on browser plug-in |
CN112801629A (en) * | 2021-02-04 | 2021-05-14 | 江西清能高科技术有限公司 | Science and technology innovation platform project declaration method and system based on multi-level encryption |
CN113806785B (en) * | 2021-10-11 | 2023-12-08 | 北京晓航众芯科技有限公司 | Method and system for carrying out security protection on electronic document |
CN113806785A (en) * | 2021-10-11 | 2021-12-17 | 北京晓航众芯科技有限公司 | Method and system for carrying out safety protection on electronic document |
CN117473537A (en) * | 2023-12-27 | 2024-01-30 | 北京亿赛通科技发展有限责任公司 | File security level calibration method and device |
CN117473537B (en) * | 2023-12-27 | 2024-06-25 | 北京亿赛通科技发展有限责任公司 | File security level calibration method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108664797A (en) | It is a kind of for pdf documents into rower it is close and verification method and device | |
CA2306500C (en) | System and method for handling permits | |
US8364980B2 (en) | System for selective encryption within documents | |
US7581105B2 (en) | Electronic signing apparatus and methods | |
US20160078247A1 (en) | Security evaluation systems and methods for secure document control | |
CN106778325B (en) | A kind of information privacy system and its operating method | |
CN101430752B (en) | Sensitive data switching control module and method for computer and movable memory device | |
EP2110975A1 (en) | Method and system for digital signatures | |
US20110231666A1 (en) | Electronic signature method and device | |
CN102930225A (en) | Electronic document access control method based on confidential identifier | |
PL182163B1 (en) | System for and method of verifying a document | |
CN100337423C (en) | Method of handling secrecy, authentication, authority management and dispersion control for electronic files | |
CN107871081A (en) | A kind of computer information safe system | |
CN106407820A (en) | Method and system for preventing document from being tampered and leaked through watermark encryption | |
KR101223427B1 (en) | Apparatus for safely distributing an internal document and methods thereof | |
CN104537313B (en) | A kind of data guard method, terminal and server | |
JPWO2005031560A1 (en) | Output information management system | |
CN113987581A (en) | Method for data security protection and traceability check of intelligent security community platform | |
CN107003831A (en) | The safety estimation system and method controlled for security document | |
CN101099207B (en) | Portable data support with watermark function | |
CN111859423A (en) | Information security encryption method and device | |
CA2366562A1 (en) | Secure electronic document creation, approval and distribution method in an open and distributed network environment | |
Chaudhary et al. | An elucidation on steganography and cryptography | |
CN100525176C (en) | Preventing system for information leakage under cooperative work environment and its realizing method | |
TWI444849B (en) | System for monitoring personal data file based on server verifying and authorizing to decrypt and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181016 |
|
RJ01 | Rejection of invention patent application after publication |