CN108769203A - Legal normative document data encrypted transmission method based on PDF format - Google Patents
Legal normative document data encrypted transmission method based on PDF format Download PDFInfo
- Publication number
- CN108769203A CN108769203A CN201810540970.9A CN201810540970A CN108769203A CN 108769203 A CN108769203 A CN 108769203A CN 201810540970 A CN201810540970 A CN 201810540970A CN 108769203 A CN108769203 A CN 108769203A
- Authority
- CN
- China
- Prior art keywords
- subpackage
- pdf document
- legal
- document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Abstract
The present invention relates to a kind of legal normative document data encrypted transmission method based on PDF format, it is characterised in that include the following steps:Step (1), pdf document recipient and pdf document sender are established by three-way handshake and are connected;Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, sender passes through subpackage, subpackage header information is set, header information is encrypted, recipient carries out header information decryption by key, then it re-groups package again, completes output.Compared with the prior art, the advantages of the present invention are as follows:Pdf document recipient is established by three-way handshake with pdf document sender and is connected, in pdf document transmission process, the header information of subpackage is encrypted, under the premise of not influencing file transmission efficiency, it prevents due to network security etc., pdf document is caused maliciously to be stolen or distorted in internet transmission.
Description
Technical field
The present invention relates to a kind of legal normative document data encrypted transmission method based on PDF format.
Background technology
The Electronic saving form of conventional legal normative document data is pdf document format, with the hair of Internet technology
Exhibition, standard information service largely use on-line purchase, the online mode for providing e-text.But it provides on the internet
In the transmittance process of legal normative document data, if using plaintext transmission exist by disabled user by network interceptor, monitoring,
Packet capturing such as steals at the modes, carries out usurping or changing for legal normative document data, can cause the copyright of legal normative document data
It is lost in;If by the way of conventional encryption and compression, it is contemplated that high quality, the page clearly normative document data, especially
For the number of pages of part of standards documents and materials more than several louvers, pdf document is natively especially big, even if passing through certain side after encryption
Formula is compressed, and transmitted data amount still can be more much larger than in plain text, when especially batch PDF normative documents data is bought, downloads, can be increased
Add the stand-by period of legal normative document data acquisition and network transmission.Especially under the high speed development of current mobile Internet,
Standard based on mobile Internets such as mobile phones extends in the function of line platform, is badly in need of solving normative document data in the legal version of protection
On the basis of power, the contradiction between safe transmission and efficiency of transmission.
Invention content
The technical problem to be solved by the present invention is to provide for the above-mentioned prior art, one kind is safe and efficient, can prevent file
The legal normative document data encrypted transmission method in PDF format maliciously stolen or distorted.
Technical solution is used by the present invention solves above-mentioned technical problem:A kind of legal standard text based on PDF format
Offer data encrypted transmission method, it is characterised in that include the following steps:
Step (1), pdf document recipient and pdf document sender, which establish, to be connected, and is specifically comprised the following steps:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:Direction is received by pdf document
Pdf document sender initiates file transmission request, and after pdf document sender receives file transmission request, consent document transmission is asked
It asks, and verifies the purchase information of legal normative document data to pdf document recipient's feedback request, when purchase information includes purchase
Between and purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction PDF
File sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, and verification is errorless
Afterwards, the ID of legal normative document data is fed back to pdf document recipient;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction PDF
File sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is timely by key
Between stamp send pdf document recipient to;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, tool
Body includes the following steps:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and to legal copy
The pdf document of normative document data carries out subpackage, then adds header information for each subpackage;
The header information of each subpackage is encrypted step (2-2) using key, forms subpackage file, and one by one will
Subpackage file is sent to pdf document recipient, and the key used in this step is the key referred in step 1;
Step (2-3), pdf document recipient first verify that timestamp, if timestamp after receiving subpackage file one by one
It is proved to be successful, then the header information of subpackage file is decrypted using key, after decryption, verify the integrality of subpackage file,
If after subpackage file verification is complete, then the subpackage content in subpackage file kept slow to pdf document recipient
It deposits;After all subpackage files are decrypted and verify complete, subpackage content is packaged according to the header information of subpackage file,
Finally form the pdf document of original legal normative document data;The key and timestamp used in this step is to be referred in step 1
Key and timestamp.
As an improvement, the header information of each subpackage addition includes the following contents:Subpackage sequence, beginning byte position, tail
Byte position and verification;Wherein subpackage sequence includes current subpackage serial number n and total subpackage number N, to indicate each subpackage in PDF
Sequences of packets in file;Beginning byte position and trail byte position are used for position of each subpackage of precise positioning in pdf document, just
In a group Bao Shineng efficient combination subpackages, pdf document is generated;Verification is for verifying subpackage, content in preventing file from transmitting
It malfunctions or is tampered.Encrypted subpackage header information will be without in all senses, even if subpackage file cannot be used for if being intercepted
The recombination of pdf document.
It improves again, after pdf document recipient receives subpackage file, the header information of subpackage file is decrypted, is reduced into
Subpackage sequence, beginning byte position, trail byte position and check information check the good working condition of subpackage file by check bit, if point
APMB package is complete, then is quickly arrived the fills in subpackage file by the beginning byte position of subpackage file and trail byte position
In the caching field of entire pdf document;The caching for judging whether to complete N number of subpackage by subpackage sequence field, if so, will delay
All the elements in depositing are combined, you can the pdf document of original legal normative document data is obtained, it then will be in caching
Hold output.
It improves again, in the step (2-1), actual conditions, efficiency of transmission that pdf document sender need to be according to network transmission
With the pdf document size of legal normative document data, the pdf document of legal normative document data is resolved into the N to differ in size
A subpackage
It improves again, key is that pdf document sender is believed by obtaining the user of pdf document recipient in the step (1)
Breath, the ID of legal normative document data and time buying collectively constitute.
Compared with the prior art, the advantages of the present invention are as follows:Pdf document recipient and pdf document sender pass through three times
Foundation of shaking hands connects, and in pdf document transmission process, the header information of subpackage is encrypted, and is not influencing file transmission effect
It under the premise of rate, prevents due to network security etc., pdf document is caused maliciously to be stolen or usurped in internet transmission
Change.
Description of the drawings
Fig. 1 is the flow chart that pdf document recipient establishes connection with pdf document sender in the embodiment of the present invention.
Fig. 2 is the flow that pdf document recipient directly transmits pdf document with pdf document sender in the embodiment of the present invention
Figure.
Pdf document sender subpackage flow chart in Fig. 3 embodiment of the present invention.
Pdf document receives the side of sending and organizes packet flow chart in Fig. 4 embodiment of the present invention.
Specific implementation mode
Below in conjunction with attached drawing embodiment, present invention is further described in detail.
Legal normative document data encrypted transmission method based on PDF format as shown in Figure 1 comprising following steps:
Step (1), pdf document recipient and pdf document sender are established by TLS/SSL agreements and are connected, and are specifically included
Following steps are participated in described in Fig. 1:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:Direction is received by pdf document
Pdf document sender initiates file transmission request, and after pdf document sender receives file transmission request, consent document transmission is asked
It asks, and verifies the purchase information of legal normative document data to pdf document recipient's feedback request, when purchase information includes purchase
Between and purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction PDF
File sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, and verification is errorless
Afterwards, the ID of legal normative document data is fed back to pdf document recipient;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction PDF
File sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is timely by key
Between stamp send pdf document recipient to;In order to increase safety, above-mentioned key is pdf document sender by obtaining pdf document
The user information of recipient, the ID of legal normative document data and time buying collectively constitute;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, tool
Body includes the following steps, participates in shown in Fig. 2:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and according to net
The actual conditions of network transmission, the pdf document size of efficiency of transmission and legal normative document data, by legal normative document data
Pdf document resolves into the N number of subpackage differed in size, and then adds header information for each subpackage;Each subpackage addition
Header information includes the following contents:Subpackage sequence, beginning byte position, trail byte position and verification;Wherein subpackage sequence is comprising current
Subpackage serial number n and total subpackage number N, to indicate sequences of packets of each subpackage in pdf document;Beginning byte position and trail byte
Position is used for position of each subpackage of precise positioning in pdf document, convenient for group Bao Shineng efficient combination subpackages, generates PDF texts
Part;Verification is for verifying subpackage, and content malfunctions or is tampered in preventing file from transmitting;Encrypted subpackage head letter
Breath, even if subpackage file cannot be used for the recombination of pdf document if being intercepted, will be participated in described in Fig. 3 without in all senses;
The header information of each subpackage file is encrypted step (2-2) using key, formation subpackage file, and by
Subpackage file is sent to pdf document recipient by one, and the key used in this step is the key referred in step 1, encryption side
Method may be used symmetric cryptography mode disclosed in DES, 3DES, AES etc. and carry out efficient cryptographic;
Step (2-3), pdf document recipient first verify that timestamp, if timestamp after receiving subpackage file one by one
It is proved to be successful, then the header information of subpackage file is decrypted using key, after decryption, verify the integrality of subpackage file,
If after subpackage file verification is complete, then the subpackage content in subpackage file kept slow to pdf document recipient
It deposits;After all subpackage files are decrypted and verify complete, subpackage content is packaged according to the header information of subpackage file,
Finally form the pdf document of original legal normative document data;The key and timestamp used in this step is to be referred in step 1
Key and timestamp.Specifically, after pdf document recipient receives subpackage file, the header information of subpackage file is decrypted,
It is reduced into subpackage sequence, beginning byte position, trail byte position and check information, the good working condition of subpackage file is checked by check bit,
If subpackage file is complete, then by the beginning byte position of subpackage file and trail byte position quickly by the content in subpackage file
It is filled into the caching field of entire pdf document;Judge whether to complete the caching of N number of subpackage by subpackage sequence field, if
It is to be combined all the elements in caching, you can obtain the pdf document of original legal normative document data, then will delay
Content output in depositing;It participates in described in Fig. 4, entire group packet procedures are efficiently quick.
Claims (5)
1. a kind of legal normative document data encrypted transmission method based on PDF format, it is characterised in that include the following steps:
Step (1), pdf document recipient and pdf document sender, which establish, to be connected, and is specifically comprised the following steps:
Step (1-1), pdf document recipient and the first time of pdf document sender shake hands:PDF texts in direction are received by pdf document
Part sender initiates file transmission request, after pdf document sender receives file transmission request, consent document transmission request, and
Verify the purchase information of legal normative document data to pdf document recipient's feedback request, purchase information include the time buying and
Purchase order;
Step (1-2), pdf document recipient and pdf document sender second handshake:Pdf document receives direction pdf document
Sender sends the purchase information of legal normative document data;Pdf document sender authentication buys information, after verification is errorless, to
Pdf document recipient feeds back the ID of legal normative document data;
Step (1-3), pdf document recipient and the third time of pdf document sender are shaken hands:Pdf document receives direction pdf document
Sender initiates the key and timestamp of acquisition request legal copy normative document data, and pdf document sender is by key and timestamp
Send pdf document recipient to;
Step (2), pdf document sending direction pdf document recipient transmit the pdf document of legal normative document data, specific to wrap
Include following steps:
The pdf document of legal normative document data is cached to memory by step (2-1), pdf document sender, and to legal standard
The pdf document of documents and materials carries out subpackage, then adds header information for each subpackage;
The header information of each subpackage is encrypted step (2-2) using key, forms subpackage file, and one by one by subpackage
File is sent to pdf document recipient, and the key used in this step is the key referred in step 1;
Step (2-3), pdf document recipient first verify that timestamp after receiving subpackage file one by one, if timestamp is verified
Success, then the header information of subpackage file is decrypted using key, after decryption, the integrality of subpackage file is verified, if
After subpackage file verification is complete, then the subpackage content in subpackage file kept to the caching of pdf document recipient;When
After all subpackage files are decrypted and verified completely, subpackage content is packaged according to the header information of subpackage file, finally
Form the pdf document of original legal normative document data;The key and timestamp used in this step is close to be referred in step 1
Key and timestamp.
2. the legal normative document data encrypted transmission method according to claim 1 based on PDF format, feature exist
In:The header information of each subpackage addition includes the following contents:Subpackage sequence, beginning byte position, trail byte position and verification;Its
Middle subpackage sequence includes current subpackage serial number n and total subpackage number N, to indicate each subpackage grouping in pdf document time
Sequence;Beginning byte position and trail byte position are used for position of each subpackage of precise positioning in pdf document, efficient convenient for group Bao Shineng
Subpackage is combined, pdf document is generated;Verification is for verifying subpackage, and content malfunctions or is tampered in preventing file from transmitting.
3. the legal normative document data encrypted transmission method according to claim 2 based on PDF format, feature exist
In:After pdf document recipient receives subpackage file, the header information of subpackage file is decrypted, is reduced into subpackage sequence, beginning word
Section, trail byte position and check information check the good working condition of subpackage file by check bit, if subpackage file is complete
, then by the beginning byte position of subpackage file and trail byte position quickly by the fills in subpackage file to entire pdf document
Caching field on;Judge whether to complete the caching of N number of subpackage by subpackage sequence field, if so, by all in caching
Content is combined, you can is obtained the pdf document of original legal normative document data, is then exported the content in caching.
4. the legal normative document data encrypted transmission method according to claim 1 based on PDF format, feature exist
In:In the step (2-1), pdf document sender need to be according to the actual conditions of network transmission, efficiency of transmission and legal standard text
The pdf document of legal normative document data is resolved into the N number of subpackage differed in size by the pdf document size for offering data.
5. the legal normative document data encrypted transmission method according to claim 1 or 2 or 3 or 4 based on PDF format,
It is characterized in that:Key is pdf document sender by obtaining the user information, just of pdf document recipient in the step (1)
The ID of version normative document data and time buying collectively constitute.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810540970.9A CN108769203B (en) | 2018-05-30 | 2018-05-30 | Legal normative document data encrypted transmission method based on PDF format |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810540970.9A CN108769203B (en) | 2018-05-30 | 2018-05-30 | Legal normative document data encrypted transmission method based on PDF format |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108769203A true CN108769203A (en) | 2018-11-06 |
CN108769203B CN108769203B (en) | 2019-09-03 |
Family
ID=64004499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810540970.9A Active CN108769203B (en) | 2018-05-30 | 2018-05-30 | Legal normative document data encrypted transmission method based on PDF format |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108769203B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031034A1 (en) * | 2008-07-29 | 2010-02-04 | Samsung Electronics Co., Ltd. | Method and apparatus for protecting file in direct printing |
CN102143232A (en) * | 2011-04-02 | 2011-08-03 | 南京邮电大学 | Peer-to-peer network based digital copyright protection method |
CN103825885A (en) * | 2014-01-23 | 2014-05-28 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Internet content encryption release method and system |
CN103888475A (en) * | 2014-04-11 | 2014-06-25 | 北京鸿达以太文化发展有限公司 | Method and device for protecting multimedia data |
CN105959281A (en) * | 2016-04-29 | 2016-09-21 | 腾讯科技(深圳)有限公司 | File encrypted transmission method and device |
CN106789836A (en) * | 2015-11-20 | 2017-05-31 | 北大方正集团有限公司 | E-sourcing guard method and system |
WO2018006576A1 (en) * | 2016-07-06 | 2018-01-11 | 福建福昕软件开发股份有限公司 | Method for protecting pdf document page-by-page |
-
2018
- 2018-05-30 CN CN201810540970.9A patent/CN108769203B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100031034A1 (en) * | 2008-07-29 | 2010-02-04 | Samsung Electronics Co., Ltd. | Method and apparatus for protecting file in direct printing |
CN102143232A (en) * | 2011-04-02 | 2011-08-03 | 南京邮电大学 | Peer-to-peer network based digital copyright protection method |
CN103825885A (en) * | 2014-01-23 | 2014-05-28 | 广东顺德中山大学卡内基梅隆大学国际联合研究院 | Internet content encryption release method and system |
CN103888475A (en) * | 2014-04-11 | 2014-06-25 | 北京鸿达以太文化发展有限公司 | Method and device for protecting multimedia data |
CN106789836A (en) * | 2015-11-20 | 2017-05-31 | 北大方正集团有限公司 | E-sourcing guard method and system |
CN105959281A (en) * | 2016-04-29 | 2016-09-21 | 腾讯科技(深圳)有限公司 | File encrypted transmission method and device |
WO2018006576A1 (en) * | 2016-07-06 | 2018-01-11 | 福建福昕软件开发股份有限公司 | Method for protecting pdf document page-by-page |
Also Published As
Publication number | Publication date |
---|---|
CN108769203B (en) | 2019-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4472989B2 (en) | Usage rights management method for streaming media | |
KR100480225B1 (en) | Data-securing communication apparatus and method therefor | |
US8782393B1 (en) | Accessing SSL connection data by a third-party | |
CN101640682B (en) | Method for improving safety of Web service | |
US20070266233A1 (en) | Method and apparatus to minimize latency by avoiding small tcp segments in a ssl offload environment | |
CN101742508A (en) | System and method for transmitting files between WAPI terminal and application server | |
HU223910B1 (en) | Method of transmitting information data from a sender to a reciever via a transcoder, method of transcoding information data, method of receiving transcoded information data, sender, receiver and transcoder | |
CN106506552B (en) | HTTP request transmission method and device | |
CN103581683B (en) | Jpeg image encryption transmission method | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN104753925A (en) | Gateway system and method for encrypting and decoding files | |
JP4367546B2 (en) | Mail relay device | |
CN115378660A (en) | Data transmission method, device, equipment and medium | |
US9847958B2 (en) | Network-based service for secure electronic mail delivery on an internet protocol network | |
CN108769203B (en) | Legal normative document data encrypted transmission method based on PDF format | |
CN107579964A (en) | Data transmission method and device | |
CN116743372A (en) | Quantum security protocol implementation method and system based on SSL protocol | |
CN104580129B (en) | A kind of asynchronous Proxy Methods of SSL based on stream process | |
CN101350820A (en) | Safety authentication method for service-feeding proxy gateway to service-feeding initiator | |
CN108111515A (en) | A kind of End-to-End Security communication encrypting method suitable for satellite communication | |
US20090073971A1 (en) | Per-packet quality of service support for encrypted ipsec tunnels | |
CN115052049A (en) | Message forwarding method and system based on IPsec tunnel | |
CN114679265A (en) | Flow obtaining method and device, electronic equipment and storage medium | |
CN103581034A (en) | Message mirroring and encrypted transmitting method | |
CN105162825A (en) | Safe file transmission method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |