CN108769203A - Legal normative document data encrypted transmission method based on PDF format - Google Patents

Legal normative document data encrypted transmission method based on PDF format Download PDF

Info

Publication number
CN108769203A
CN108769203A CN201810540970.9A CN201810540970A CN108769203A CN 108769203 A CN108769203 A CN 108769203A CN 201810540970 A CN201810540970 A CN 201810540970A CN 108769203 A CN108769203 A CN 108769203A
Authority
CN
China
Prior art keywords
subpackage
pdf document
pdf
legal
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810540970.9A
Other languages
Chinese (zh)
Other versions
CN108769203B (en
Inventor
吴建港
国玉宝
鲍俊
阮晓华
崔绍辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Institute Of Standardization
Original Assignee
Ningbo Institute Of Standardization
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Institute Of Standardization filed Critical Ningbo Institute Of Standardization
Priority to CN201810540970.9A priority Critical patent/CN108769203B/en
Publication of CN108769203A publication Critical patent/CN108769203A/en
Application granted granted Critical
Publication of CN108769203B publication Critical patent/CN108769203B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Abstract

The present invention relates to a kind of legal normative document data encrypted transmission method based on PDF format, it is characterised in that include the following steps:Step (1), pdf document recipient and pdf document sender are established by three-way handshake and are connected;Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, sender passes through subpackage, subpackage header information is set, header information is encrypted, recipient carries out header information decryption by key, then it re-groups package again, completes output.Compared with the prior art, the advantages of the present invention are as follows:Pdf document recipient is established by three-way handshake with pdf document sender and is connected, in pdf document transmission process, the header information of subpackage is encrypted, under the premise of not influencing file transmission efficiency, it prevents due to network security etc., pdf document is caused maliciously to be stolen or distorted in internet transmission.

Description

Legal normative document data encrypted transmission method based on PDF format
Technical field
The present invention relates to a kind of legal normative document data encrypted transmission method based on PDF format.
Background technology
The Electronic saving form of conventional legal normative document data is pdf document format, with the hair of Internet technology Exhibition, standard information service largely use on-line purchase, the online mode for providing e-text.But it provides on the internet In the transmittance process of legal normative document data, if using plaintext transmission exist by disabled user by network interceptor, monitoring, Packet capturing such as steals at the modes, carries out usurping or changing for legal normative document data, can cause the copyright of legal normative document data It is lost in;If by the way of conventional encryption and compression, it is contemplated that high quality, the page clearly normative document data, especially For the number of pages of part of standards documents and materials more than several louvers, pdf document is natively especially big, even if passing through certain side after encryption Formula is compressed, and transmitted data amount still can be more much larger than in plain text, when especially batch PDF normative documents data is bought, downloads, can be increased Add the stand-by period of legal normative document data acquisition and network transmission.Especially under the high speed development of current mobile Internet, Standard based on mobile Internets such as mobile phones extends in the function of line platform, is badly in need of solving normative document data in the legal version of protection On the basis of power, the contradiction between safe transmission and efficiency of transmission.
Invention content
The technical problem to be solved by the present invention is to provide for the above-mentioned prior art, one kind is safe and efficient, can prevent file The legal normative document data encrypted transmission method in PDF format maliciously stolen or distorted.
Technical solution is used by the present invention solves above-mentioned technical problem:A kind of legal standard text based on PDF format Offer data encrypted transmission method, it is characterised in that include the following steps:
Step (1), pdf document recipient and pdf document sender, which establish, to be connected, and is specifically comprised the following steps:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:Direction is received by pdf document Pdf document sender initiates file transmission request, and after pdf document sender receives file transmission request, consent document transmission is asked It asks, and verifies the purchase information of legal normative document data to pdf document recipient's feedback request, when purchase information includes purchase Between and purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction PDF File sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, and verification is errorless Afterwards, the ID of legal normative document data is fed back to pdf document recipient;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction PDF File sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is timely by key Between stamp send pdf document recipient to;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, tool Body includes the following steps:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and to legal copy The pdf document of normative document data carries out subpackage, then adds header information for each subpackage;
The header information of each subpackage is encrypted step (2-2) using key, forms subpackage file, and one by one will Subpackage file is sent to pdf document recipient, and the key used in this step is the key referred in step 1;
Step (2-3), pdf document recipient first verify that timestamp, if timestamp after receiving subpackage file one by one It is proved to be successful, then the header information of subpackage file is decrypted using key, after decryption, verify the integrality of subpackage file, If after subpackage file verification is complete, then the subpackage content in subpackage file kept slow to pdf document recipient It deposits;After all subpackage files are decrypted and verify complete, subpackage content is packaged according to the header information of subpackage file, Finally form the pdf document of original legal normative document data;The key and timestamp used in this step is to be referred in step 1 Key and timestamp.
As an improvement, the header information of each subpackage addition includes the following contents:Subpackage sequence, beginning byte position, tail Byte position and verification;Wherein subpackage sequence includes current subpackage serial number n and total subpackage number N, to indicate each subpackage in PDF Sequences of packets in file;Beginning byte position and trail byte position are used for position of each subpackage of precise positioning in pdf document, just In a group Bao Shineng efficient combination subpackages, pdf document is generated;Verification is for verifying subpackage, content in preventing file from transmitting It malfunctions or is tampered.Encrypted subpackage header information will be without in all senses, even if subpackage file cannot be used for if being intercepted The recombination of pdf document.
It improves again, after pdf document recipient receives subpackage file, the header information of subpackage file is decrypted, is reduced into Subpackage sequence, beginning byte position, trail byte position and check information check the good working condition of subpackage file by check bit, if point APMB package is complete, then is quickly arrived the fills in subpackage file by the beginning byte position of subpackage file and trail byte position In the caching field of entire pdf document;The caching for judging whether to complete N number of subpackage by subpackage sequence field, if so, will delay All the elements in depositing are combined, you can the pdf document of original legal normative document data is obtained, it then will be in caching Hold output.
It improves again, in the step (2-1), actual conditions, efficiency of transmission that pdf document sender need to be according to network transmission With the pdf document size of legal normative document data, the pdf document of legal normative document data is resolved into the N to differ in size A subpackage
It improves again, key is that pdf document sender is believed by obtaining the user of pdf document recipient in the step (1) Breath, the ID of legal normative document data and time buying collectively constitute.
Compared with the prior art, the advantages of the present invention are as follows:Pdf document recipient and pdf document sender pass through three times Foundation of shaking hands connects, and in pdf document transmission process, the header information of subpackage is encrypted, and is not influencing file transmission effect It under the premise of rate, prevents due to network security etc., pdf document is caused maliciously to be stolen or usurped in internet transmission Change.
Description of the drawings
Fig. 1 is the flow chart that pdf document recipient establishes connection with pdf document sender in the embodiment of the present invention.
Fig. 2 is the flow that pdf document recipient directly transmits pdf document with pdf document sender in the embodiment of the present invention Figure.
Pdf document sender subpackage flow chart in Fig. 3 embodiment of the present invention.
Pdf document receives the side of sending and organizes packet flow chart in Fig. 4 embodiment of the present invention.
Specific implementation mode
Below in conjunction with attached drawing embodiment, present invention is further described in detail.
Legal normative document data encrypted transmission method based on PDF format as shown in Figure 1 comprising following steps:
Step (1), pdf document recipient and pdf document sender are established by TLS/SSL agreements and are connected, and are specifically included Following steps are participated in described in Fig. 1:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:Direction is received by pdf document Pdf document sender initiates file transmission request, and after pdf document sender receives file transmission request, consent document transmission is asked It asks, and verifies the purchase information of legal normative document data to pdf document recipient's feedback request, when purchase information includes purchase Between and purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction PDF File sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, and verification is errorless Afterwards, the ID of legal normative document data is fed back to pdf document recipient;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction PDF File sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is timely by key Between stamp send pdf document recipient to;In order to increase safety, above-mentioned key is pdf document sender by obtaining pdf document The user information of recipient, the ID of legal normative document data and time buying collectively constitute;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, tool Body includes the following steps, participates in shown in Fig. 2:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and according to net The actual conditions of network transmission, the pdf document size of efficiency of transmission and legal normative document data, by legal normative document data Pdf document resolves into the N number of subpackage differed in size, and then adds header information for each subpackage;Each subpackage addition Header information includes the following contents:Subpackage sequence, beginning byte position, trail byte position and verification;Wherein subpackage sequence is comprising current Subpackage serial number n and total subpackage number N, to indicate sequences of packets of each subpackage in pdf document;Beginning byte position and trail byte Position is used for position of each subpackage of precise positioning in pdf document, convenient for group Bao Shineng efficient combination subpackages, generates PDF texts Part;Verification is for verifying subpackage, and content malfunctions or is tampered in preventing file from transmitting;Encrypted subpackage head letter Breath, even if subpackage file cannot be used for the recombination of pdf document if being intercepted, will be participated in described in Fig. 3 without in all senses;
The header information of each subpackage file is encrypted step (2-2) using key, formation subpackage file, and by Subpackage file is sent to pdf document recipient by one, and the key used in this step is the key referred in step 1, encryption side Method may be used symmetric cryptography mode disclosed in DES, 3DES, AES etc. and carry out efficient cryptographic;
Step (2-3), pdf document recipient first verify that timestamp, if timestamp after receiving subpackage file one by one It is proved to be successful, then the header information of subpackage file is decrypted using key, after decryption, verify the integrality of subpackage file, If after subpackage file verification is complete, then the subpackage content in subpackage file kept slow to pdf document recipient It deposits;After all subpackage files are decrypted and verify complete, subpackage content is packaged according to the header information of subpackage file, Finally form the pdf document of original legal normative document data;The key and timestamp used in this step is to be referred in step 1 Key and timestamp.Specifically, after pdf document recipient receives subpackage file, the header information of subpackage file is decrypted, It is reduced into subpackage sequence, beginning byte position, trail byte position and check information, the good working condition of subpackage file is checked by check bit, If subpackage file is complete, then by the beginning byte position of subpackage file and trail byte position quickly by the content in subpackage file It is filled into the caching field of entire pdf document;Judge whether to complete the caching of N number of subpackage by subpackage sequence field, if It is to be combined all the elements in caching, you can obtain the pdf document of original legal normative document data, then will delay Content output in depositing;It participates in described in Fig. 4, entire group packet procedures are efficiently quick.

Claims (5)

1. a kind of legal normative document data encrypted transmission method based on PDF format, it is characterised in that include the following steps:
Step (1), pdf document recipient and pdf document sender, which establish, to be connected, and is specifically comprised the following steps:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:PDF texts in direction are received by pdf document Part sender initiates file transmission request, after pdf document sender receives file transmission request, consent document transmission request, and Verify the purchase information of legal normative document data to pdf document recipient's feedback request, purchase information include the time buying and Purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction pdf document Sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, after verification is errorless, to Pdf document recipient feeds back the ID of legal normative document data;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction pdf document Sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is by key and timestamp Send pdf document recipient to;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, specific to wrap Include following steps:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and to legal standard The pdf document of documents and materials carries out subpackage, then adds header information for each subpackage;
The header information of each subpackage is encrypted step (2-2) using key, forms subpackage file, and one by one by subpackage File is sent to pdf document recipient, and the key used in this step is the key referred in step 1;
Step (2-3), pdf document recipient first verify that timestamp after receiving subpackage file one by one, if timestamp is verified Success, then the header information of subpackage file is decrypted using key, after decryption, the integrality of subpackage file is verified, if After subpackage file verification is complete, then the subpackage content in subpackage file kept to the caching of pdf document recipient;When After all subpackage files are decrypted and verified completely, subpackage content is packaged according to the header information of subpackage file, finally Form the pdf document of original legal normative document data;The key and timestamp used in this step is close to be referred in step 1 Key and timestamp.
2. the legal normative document data encrypted transmission method according to claim 1 based on PDF format, feature exist In:The header information of each subpackage addition includes the following contents:Subpackage sequence, beginning byte position, trail byte position and verification;Its Middle subpackage sequence includes current subpackage serial number n and total subpackage number N, to indicate each subpackage grouping in pdf document time Sequence;Beginning byte position and trail byte position are used for position of each subpackage of precise positioning in pdf document, efficient convenient for group Bao Shineng Subpackage is combined, pdf document is generated;Verification is for verifying subpackage, and content malfunctions or is tampered in preventing file from transmitting.
3. the legal normative document data encrypted transmission method according to claim 2 based on PDF format, feature exist In:After pdf document recipient receives subpackage file, the header information of subpackage file is decrypted, is reduced into subpackage sequence, beginning word Section, trail byte position and check information check the good working condition of subpackage file by check bit, if subpackage file is complete , then by the beginning byte position of subpackage file and trail byte position quickly by the fills in subpackage file to entire pdf document Caching field on;Judge whether to complete the caching of N number of subpackage by subpackage sequence field, if so, by all in caching Content is combined, you can is obtained the pdf document of original legal normative document data, is then exported the content in caching.
4. the legal normative document data encrypted transmission method according to claim 1 based on PDF format, feature exist In:In the step (2-1), pdf document sender need to be according to the actual conditions of network transmission, efficiency of transmission and legal standard text The pdf document of legal normative document data is resolved into the N number of subpackage differed in size by the pdf document size for offering data.
5. the legal normative document data encrypted transmission method according to claim 1 or 2 or 3 or 4 based on PDF format, It is characterized in that:Key is pdf document sender by obtaining the user information, just of pdf document recipient in the step (1) The ID of version normative document data and time buying collectively constitute.
CN201810540970.9A 2018-05-30 2018-05-30 Legal normative document data encrypted transmission method based on PDF format Active CN108769203B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810540970.9A CN108769203B (en) 2018-05-30 2018-05-30 Legal normative document data encrypted transmission method based on PDF format

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810540970.9A CN108769203B (en) 2018-05-30 2018-05-30 Legal normative document data encrypted transmission method based on PDF format

Publications (2)

Publication Number Publication Date
CN108769203A true CN108769203A (en) 2018-11-06
CN108769203B CN108769203B (en) 2019-09-03

Family

ID=64004499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810540970.9A Active CN108769203B (en) 2018-05-30 2018-05-30 Legal normative document data encrypted transmission method based on PDF format

Country Status (1)

Country Link
CN (1) CN108769203B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100031034A1 (en) * 2008-07-29 2010-02-04 Samsung Electronics Co., Ltd. Method and apparatus for protecting file in direct printing
CN102143232A (en) * 2011-04-02 2011-08-03 南京邮电大学 Peer-to-peer network based digital copyright protection method
CN103825885A (en) * 2014-01-23 2014-05-28 广东顺德中山大学卡内基梅隆大学国际联合研究院 Internet content encryption release method and system
CN103888475A (en) * 2014-04-11 2014-06-25 北京鸿达以太文化发展有限公司 Method and device for protecting multimedia data
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
CN106789836A (en) * 2015-11-20 2017-05-31 北大方正集团有限公司 E-sourcing guard method and system
WO2018006576A1 (en) * 2016-07-06 2018-01-11 福建福昕软件开发股份有限公司 Method for protecting pdf document page-by-page

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100031034A1 (en) * 2008-07-29 2010-02-04 Samsung Electronics Co., Ltd. Method and apparatus for protecting file in direct printing
CN102143232A (en) * 2011-04-02 2011-08-03 南京邮电大学 Peer-to-peer network based digital copyright protection method
CN103825885A (en) * 2014-01-23 2014-05-28 广东顺德中山大学卡内基梅隆大学国际联合研究院 Internet content encryption release method and system
CN103888475A (en) * 2014-04-11 2014-06-25 北京鸿达以太文化发展有限公司 Method and device for protecting multimedia data
CN106789836A (en) * 2015-11-20 2017-05-31 北大方正集团有限公司 E-sourcing guard method and system
CN105959281A (en) * 2016-04-29 2016-09-21 腾讯科技(深圳)有限公司 File encrypted transmission method and device
WO2018006576A1 (en) * 2016-07-06 2018-01-11 福建福昕软件开发股份有限公司 Method for protecting pdf document page-by-page

Also Published As

Publication number Publication date
CN108769203B (en) 2019-09-03

Similar Documents

Publication Publication Date Title
JP4472989B2 (en) Usage rights management method for streaming media
KR100480225B1 (en) Data-securing communication apparatus and method therefor
US8782393B1 (en) Accessing SSL connection data by a third-party
CN101640682B (en) Method for improving safety of Web service
US20070266233A1 (en) Method and apparatus to minimize latency by avoiding small tcp segments in a ssl offload environment
CN101742508A (en) System and method for transmitting files between WAPI terminal and application server
HU223910B1 (en) Method of transmitting information data from a sender to a reciever via a transcoder, method of transcoding information data, method of receiving transcoded information data, sender, receiver and transcoder
CN106506552B (en) HTTP request transmission method and device
CN103581683B (en) Jpeg image encryption transmission method
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN104753925A (en) Gateway system and method for encrypting and decoding files
JP4367546B2 (en) Mail relay device
CN115378660A (en) Data transmission method, device, equipment and medium
US9847958B2 (en) Network-based service for secure electronic mail delivery on an internet protocol network
CN108769203B (en) Legal normative document data encrypted transmission method based on PDF format
CN107579964A (en) Data transmission method and device
CN116743372A (en) Quantum security protocol implementation method and system based on SSL protocol
CN104580129B (en) A kind of asynchronous Proxy Methods of SSL based on stream process
CN101350820A (en) Safety authentication method for service-feeding proxy gateway to service-feeding initiator
CN108111515A (en) A kind of End-to-End Security communication encrypting method suitable for satellite communication
US20090073971A1 (en) Per-packet quality of service support for encrypted ipsec tunnels
CN115052049A (en) Message forwarding method and system based on IPsec tunnel
CN114679265A (en) Flow obtaining method and device, electronic equipment and storage medium
CN103581034A (en) Message mirroring and encrypted transmitting method
CN105162825A (en) Safe file transmission method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant