CN109145632A - For generating the method and device of traceable file - Google Patents

For generating the method and device of traceable file Download PDF

Info

Publication number
CN109145632A
CN109145632A CN201710505755.0A CN201710505755A CN109145632A CN 109145632 A CN109145632 A CN 109145632A CN 201710505755 A CN201710505755 A CN 201710505755A CN 109145632 A CN109145632 A CN 109145632A
Authority
CN
China
Prior art keywords
file
user
downloading
downloaded
method
Prior art date
Application number
CN201710505755.0A
Other languages
Chinese (zh)
Inventor
赵增俊
Original Assignee
北京京东尚科信息技术有限公司
北京京东世纪贸易有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京京东尚科信息技术有限公司, 北京京东世纪贸易有限公司 filed Critical 北京京东尚科信息技术有限公司
Priority to CN201710505755.0A priority Critical patent/CN109145632A/en
Publication of CN109145632A publication Critical patent/CN109145632A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/06Network-specific arrangements or communication protocols supporting networked applications adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using a plurality of keys or algorithms

Abstract

The application discloses a kind of for generating the method and device of traceable file.This method comprises: response user's operation obtains file to be downloaded;It obtains user information and generates user data;The file to be downloaded is written by LSB algorithm in the user data, generates downloading file;And the downloading file is sent to the user.The method and device disclosed in the present application for being used to generate traceable file can add tracing information to file in the case where not influencing file normal reading.

Description

For generating the method and device of traceable file

Technical field

The present invention relates to computer information processing fields, in particular to a kind of for generating the side of traceable file Method and device.

Background technique

The office of IT application in enterprises at present has been popularized, and a large amount of enterprises document is stored in the form of electronic document.Again For the needs in working, these internal files will also provide conveniently necessary not only for storage and management for office, be supplied in Portion employee, which downloads etc., to be used.For common enterprises file, it is this reading and downloading can with it is normal File use is not different.But enterprises can also have the electronics text for largely belonging to business or enterprises secret Shelves, for this classified papers if not being subject to monitoring, it is likely that can be leaked to outside company, in addition by business or other Opponent obtains, to bring the loss in huge economic or reputation to enterprise.These classified papers are with greater need for special prison Tube mechanism, and method is mainly the following for the management of classified papers at present: (1) permission is carried out by file management system Control, this mode are to carry out permission control from software view, are needed using information such as the dedicated account of enterprises, employee's accounts Login system, and the operation information of employee is recorded, the visible range of employee is limited by authority control system.(2) pass through Hardware interface is physically separated, and this mode is mainly isolated from hardware view, such as: disable the USB of office computer Interface is forbidden dismantling and replacing the modes such as computer components privately.

But the existing means solved the problems, such as, either software mode or hardware mode, main purpose are to prevent machine Close outflow of document, and more or less meeting brings unnecessary trouble to user.Moreover, even if in the case where supervision, Or unavoidable data leaks, once and file flow out, there is no effective methods, and tracking to be gone to leak Root.

Therefore, it is necessary to a kind of new method and devices for being used to generate traceable file.

Above- mentioned information are only used for reinforcing the understanding to background of the invention, therefore it disclosed in the background technology part It may include the information not constituted to the prior art known to persons of ordinary skill in the art.

Summary of the invention

In view of this, the present invention provides a kind of for generating the method and device of traceable file, text can not influenced In the case where part normal reading, tracing information is added to file.

Other characteristics and advantages of the invention will be apparent from by the following detailed description, or partially by the present invention Practice and acquistion.

According to an aspect of the invention, it is proposed that a kind of method for generating traceable file, this method comprises: response is used Family operation obtains file to be downloaded;It obtains user information and generates user data;The user data is calculated by least significant bit The file to be downloaded is written in method, generates downloading file;And the downloading file is sent to the user.

In a kind of exemplary embodiment of the disclosure, further includes: generate the file to be downloaded according to original document.

It is described that the file to be downloaded is generated according to original document in a kind of exemplary embodiment of the disclosure, comprising: Obtain original document;The every page of the original document is converted into picture;And the picture is subjected to assembling and generates institute State file to be downloaded.

In a kind of exemplary embodiment of the disclosure, further includes: chased after by the downloading file to downloading user It traces back.

It is described that downloading user is traced by the downloading file in a kind of exemplary embodiment of the disclosure, It include: to obtain the downloading file;The downloading file is decrypted, to obtain user information;And pass through the user Information traces downloading user.

In a kind of exemplary embodiment of the disclosure, the acquisition user information generates user data, comprising: by adding Close algorithm encrypts the user information to generate the user data.

In a kind of exemplary embodiment of the disclosure, the Encryption Algorithm, comprising: public key encryption algorithm, data encryption Algorithm, triple data encryption algorithm, international data encryption algorithm, conventional symmetrical block encryption algorithm, the variable stream of key length Encryption Algorithm.

It is described that the user data is written by LSB algorithm in a kind of exemplary embodiment of the disclosure The file to be downloaded generates downloading file, comprising: determine the least significant bit data of the file to be downloaded;And use institute It states user data and replaces the least significant bit data.

It is described that the user data is written by LSB algorithm in a kind of exemplary embodiment of the disclosure The file to be downloaded generates downloading file, further includes: carry out the least significant bit data between binary system and the decimal system Mutual conversion.

In a kind of exemplary embodiment of the disclosure, the file to be downloaded is pdf document.

According to an aspect of the invention, it is proposed that a kind of for generating the device of traceable file, which includes: reception mould Block obtains file to be downloaded for responding user's operation;Data module generates user data for obtaining user information;File Module generates downloading file for the file to be downloaded to be written by LSB algorithm in the user data;And Sending module, for the downloading file to be sent to the user.

In a kind of exemplary embodiment of the disclosure, further includes: processing module, described in being generated according to original document File to be downloaded.

In a kind of exemplary embodiment of the disclosure, further includes: trace back block, for passing through the downloading file under User is carried to trace.

According to an aspect of the invention, it is proposed that a kind of electronic equipment, which includes: one or more processors; Storage device, for storing one or more programs;When one or more programs are executed by one or more processors, so that one A or multiple processors realize such as methodology above.

According to an aspect of the invention, it is proposed that a kind of computer-readable medium, is stored thereon with computer program, feature It is, method as mentioned in the above is realized when program is executed by processor.

The method and device according to the present invention for being used to generate traceable file, can not influence file normal reading In the case of, tracing information is added to file.

It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Invention.

Detailed description of the invention

Its example embodiment is described in detail by referring to accompanying drawing, above and other target of the invention, feature and advantage will It becomes more fully apparent.Drawings discussed below is only some embodiments of the present invention, for the ordinary skill of this field For personnel, without creative efforts, it is also possible to obtain other drawings based on these drawings.

Fig. 1 is shown according to an exemplary embodiment a kind of for generating the flow chart of the method for traceable file.

Fig. 2 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file.

Fig. 3 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file.

Fig. 4 be show according to another exemplary embodiment it is a kind of for generating the schematic diagram of the method for traceable file.

Fig. 5 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file.

Fig. 6 is shown according to an exemplary embodiment a kind of for generating the block diagram of the device of traceable file.

Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.

Fig. 8 is a kind of computer-readable medium schematic diagram shown according to an exemplary embodiment.

Specific embodiment

Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.

In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to the embodiment of the present invention.However, It will be appreciated by persons skilled in the art that technical solution of the present invention can be practiced without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy each aspect of the present invention.

Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.

Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.

It should be understood that although herein various assemblies may be described using term first, second, third, etc., these groups Part should not be limited by these terms.These terms are to distinguish a component and another component.Therefore, first group be discussed herein below Part can be described as the second component without departing from the teaching of disclosure concept.As used herein, term " and/or " include associated All combinations for listing any of project and one or more.

It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, module or process in attached drawing Necessary to not necessarily implementing the present invention, therefore it cannot be used for limiting the scope of the invention.

Disclosure example embodiment is described in detail with reference to the accompanying drawing.

Fig. 1 is shown according to an exemplary embodiment a kind of for generating the flow chart of the method for traceable file.

As shown in Figure 1, response user's operation obtains file to be downloaded in S102.According to the instruction of the user of operation, obtain Take family file to be downloaded.File to be downloaded can for example store in the server, also the company such as storing beyond the clouds In the storage location of internal control.File to be downloaded may be, for example, pdf file, also may be, for example, the electronic documents such as picture, Invention is not limited thereto.

In S104, obtains user information and generate user data.User information may be, for example, the login intra-company of user The dedicated account of the enterprises of system, can also name for example including user, login time etc. relevant information.It can be for example, will Above-mentioned user information pass through data processing, generate user data, data processing can be changed into for example including decimal system information two into The processing such as information processed, can also be for example, original user related information be encrypted, by encrypted data active subscriber letter Breath.

In S106, the file to be downloaded is written by LSB algorithm in the user data, generates downloading File.LSB algorithm (LeastSignificant Bits, LSB), is embedded into carrier image pixel value for secret information Least significant bit, also referred to as least significant position changes this position to the smallest algorithm of the qualitative effects of carrier image.LSB is calculated The basic principle of method: replacing the LSB in airspace, is exactly the watermark information for needing to be added, watermark for replacing the sequence of LSB Digital digest or the pseudo-random sequence generated by watermark.The content in user data is written to be downloaded by LSB algorithm File least significant bit in, by the inclusion of user data file to be downloaded generate downloading file.Due to the use being newly added User data instead data in least significant bit, so the downloading file generated is compared with original document, the text of downloading Part does not influence the reading of user.

In S108, the downloading file is sent to the user.

Method according to the present invention for generating traceable file, user data is written by LSB algorithm The mode of file is downloaded, tracing information can be added to file in the case where not influencing file normal reading.

It will be clearly understood that the present disclosure describe how being formed and using particular example, but the principle of the present invention is not limited to These exemplary any details.On the contrary, the introduction based on present disclosure, these principles can be applied to many other Embodiment.

In a kind of exemplary embodiment of the disclosure, further includes: generate the file to be downloaded according to original document.Institute It states and the file to be downloaded is generated according to original document, comprising: obtain original document;The every page of the original document is turned It is changed to picture;And the picture is subjected to assembling and generates the file to be downloaded.In a kind of exemplary embodiment of the disclosure In, the file to be downloaded is pdf document.

Fig. 2 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file. Fig. 2 is to the exemplary description for generating file to be downloaded.

As shown in Fig. 2, original document is uploaded in S202, can for example be uploaded to scheduled processing file server.

In S204, translate the file into as pdf form.

In S206, com component is called.Based on the file handler of windows platform, COM (component) group is called Part come realize file convert.

In S208, OpenOffice, Itext are called.Based on Linux platform, OpenOffice, Itext is called to realize File conversion.

In S210, judge whether file converts success.Enter S212 if file is converted successfully, if do not converted Success, then continue the conversion operation of S206 or S208.

In S212, pfd is converted into picture.Due to the file that the processing core based on LSB method is graphic form, institute To need to convert text to graphic form.

In S214, picture is converted into pdf.The file of graphic form is again converted to pdf form, so generate to Download file.

In a kind of exemplary embodiment of the disclosure, further includes: chased after by the downloading file to downloading user It traces back.Downloading user is traced by downloading file, comprising: obtain the downloading file;The downloading file is solved It is close, to obtain user information;And downloading user is traced by the user information.

Fig. 3 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file. Fig. 3 is the exemplary description to file trace back process.

In S302, the file divulged a secret is obtained.When intra-company's file is leaked to outside company, obtain first The file divulged a secret.

In S304, file is decrypted.Due to the generating mode of known the said firm's internal file, the party can be passed through The inverse operation of formula carries out the decryption of this document.

In S306, the user information being written when downloading is obtained.By further obtaining the letter of write-in in the file that decrypts Breath can also be for example, the data to user be decrypted, in turn if the information is written in downloading file by cryptographic means Obtain the user information being written at that time.

In S308, process of calling to account is investigated in starting.According to user information, starts relevant process and carry out processing of calling to account.

Method according to the present invention for generating traceable file obtains downloading use by decrypting traceable file The mode of family information can reinforce the safety management of file come what is called to account to the file divulged a secret.

In a kind of exemplary embodiment of the disclosure, the acquisition user information generates user data, comprising: by adding Close algorithm encrypts the user information to generate the user data.The Encryption Algorithm, comprising: RSA public key encryption Algorithm, DES data encryption algorithm, the triple data encryption algorithm of 3DES, IDEA international data encryption algorithm, RC2 conventional symmetrical point Group encryption algorithm, the variable stream cipher algorithm of RC4 key length.

It is described that the user data is written by LSB algorithm in a kind of exemplary embodiment of the disclosure The file to be downloaded generates downloading file, comprising: determine the least significant bit data of the file to be downloaded;And use institute It states user data and replaces the least significant bit data.Further include: by the least significant bit data carry out binary system and ten into Mutual conversion between system.

In bitmap picture, each pixel is made of (RGB) three primary colors, and every kind of primary colors is by 8 (8 bits Position) it identifies, that is, RGB has 256 tones respectively.And LSB algorithm be exactly modify primary colors 8 last position it is (minimum to have Imitate position), 0 is changed to by 1, or is changed to 1 or constant for 0.The combination of the least significant bit of each byte indicates insertion after modification Hide content.

In embodiments of the present invention, user data is written by LSB algorithm can be for example by as follows in file to be downloaded Mode:

1) the airspace pixel value of the carrier image in original file to be downloaded, is converted into binary system by the decimal system;

2), corresponding load is replaced with each bit information in the binary user data obtained after encryption The least significant bit of volume data;

3) the obtained binary data comprising user data, is converted into decimal system pixel value, to obtain comprising using The image of user data.

It can also be for example, further converting the image into pdf form.

Method according to the present invention for generating traceable file, using the generation retrospective file of LSB algorithm Hiding information is written in picture, i.e., does not influence to read, and can store information in the sightless situation of naked eyes for form.

Fig. 4 be show according to another exemplary embodiment it is a kind of for generating the schematic diagram of the method for traceable file. With reference to the example of Fig. 4, original image is the picture of a black, and the RGB primary color value of each pixel is in picture: 0, binary system It is expressed as #00000000.Alphabetical a is changed into binary system: 01100001, appoint 8 primary color values taken in upper figure, and by the 8 of alphabetical a Position binary digit is sequentially written in the lowest order of 8 primary color values, as follows:

With reference to the example of Fig. 4, picture after above-mentioned modification, can not visually perceive picture has any variation, still Information has been hidden into picture and has suffered.

Fig. 5 be show according to another exemplary embodiment it is a kind of for generating the flow chart of the method for traceable file.

As shown, being encrypted using RSA Algorithm to user information in S502.It can also be for example, by using described above Other cipher modes user information is encrypted, invention is not limited thereto.

It, will be in the picture that encrypt later user information write-in file using LSB algorithm in S504.It can also be for example, by using The relevant improvement of LSB algorithm or enhancing algorithm, invention is not limited thereto.

In S506, downloading is completed.

Method according to the present invention for generating traceable file, can be divulged a secret later tracking with effective solution file Increase file encryption on the basis of guaranteeing file upload, browsing file, file download with confirmation of responsibility problem and file chases after Track function increases for file security control and insures together.

It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as being executed by CPU Computer program.When the computer program is executed by CPU, above-mentioned function defined by the above method provided by the invention is executed Energy.The program can store in a kind of computer readable storage medium, which can be read-only memory, magnetic Disk or CD etc..

Further, it should be noted that above-mentioned attached drawing is only place included by method according to an exemplary embodiment of the present invention Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.

Following is apparatus of the present invention embodiment, can be used for executing embodiment of the present invention method.For apparatus of the present invention reality Undisclosed details in example is applied, embodiment of the present invention method is please referred to.

Fig. 6 is shown according to an exemplary embodiment a kind of for generating the block diagram of the device of traceable file.

Receiving module 602 obtains file to be downloaded for responding user's operation.

Data module 604 generates user data for obtaining user information.

File module 606 is used to the user data file to be downloaded is written by LSB algorithm, raw At downloading file.

Sending module 608 is used to the downloading file being sent to the user.

In a kind of exemplary embodiment of the disclosure, further includes: processing module (not shown) is used for according to original File to be downloaded described in file generated;Trace back block (not shown) is used to carry out downloading user by the downloading file Retrospect.

The device according to the present invention for being used to generate traceable file, user data is written by LSB algorithm The mode of file is downloaded, tracing information can be added to file in the case where not influencing file normal reading.

Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.

The electronic equipment 700 of this embodiment according to the present invention is described referring to Fig. 7.The electronics that Fig. 7 is shown Equipment 700 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.

As shown in fig. 7, electronic equipment 700 is showed in the form of universal computing device.The component of electronic equipment 700 can wrap It includes but is not limited to: at least one processing unit 710, at least one storage unit 720, (including the storage of the different system components of connection Unit 720 and processing unit 710) bus 730, display unit 740 etc..

Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 710 Row, so that the processing unit 710 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of inventing various illustrative embodiments.For example, the processing unit 710 can execute step as shown in fig. 1.

The storage unit 720 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 7201 and/or cache memory unit 7202 can further include read-only memory unit (ROM) 7203.

The storage unit 720 can also include program/practical work with one group of (at least one) program module 7205 Tool 7204, such program module 7205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.

Bus 730 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.

Electronic equipment 700 can also be with one or more external equipments 800 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 700 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 700 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 750.Also, electronic equipment 700 can be with By network adapter 760 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 760 can be communicated by bus 730 with other modules of electronic equipment 700.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 700, including but unlimited In: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..

Fig. 8 is a kind of computer-readable medium schematic diagram shown according to an exemplary embodiment.

Refering to what is shown in Fig. 8, describing the program product for realizing the above method of embodiment according to the present invention 800, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.

Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.

The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.

The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).

In an exemplary embodiment of the disclosure, a kind of electronic equipment is also provided, which may include processor, And the memory of the executable instruction for storing the processor.Wherein, the processor is configured to via described in execution Executable instruction is come the step of executing the circulation processing method of electronic prescription described in any one above-mentioned embodiment.

Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".

It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.

By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implement according to the present invention The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present invention.

By above detailed description, those skilled in the art is it can be readily appreciated that according to an embodiment of the present invention for giving birth to It is had one or more of the following advantages at the method and device of traceable file.

According to some embodiments, the method for generating traceable file of the invention will by LSB algorithm The mode of user data write-in downloading file can add retrospect letter to file in the case where not influencing file normal reading Breath.

According to other embodiments, the method for generating traceable file of the invention, by decrypting traceable file And then the mode for obtaining downloading user information can reinforce the safety management of file come what is called to account to the file divulged a secret.

According to other embodiments, the method for generating traceable file of the invention can using the generation of LSB algorithm Hiding information is written in picture, i.e., does not influence to read, and energy in the sightless situation of naked eyes for the form of the file of retrospect Store information.

It is particularly shown and described exemplary embodiment of the present invention above.It should be appreciated that the present invention is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, it is intended to cover included in appended claims Various modifications and equivalence setting in spirit and scope.

In addition, structure shown by this specification Figure of description, ratio, size etc., only to cooperate specification institute Disclosure, for skilled in the art realises that be not limited to the enforceable qualifications of the disclosure with reading, therefore Do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size are not influencing the disclosure Under the technical effect and achieved purpose that can be generated, it should all still fall in technology contents disclosed in the disclosure and obtain and can cover In the range of.Meanwhile cited such as "upper" in this specification, " first ", " second " and " one " term, be also only and be convenient for Narration is illustrated, rather than to limit the enforceable range of the disclosure, relativeness is altered or modified, without substantive change Under technology contents, when being also considered as the enforceable scope of the present invention.

Claims (15)

1. a kind of method for generating traceable file characterized by comprising
It responds user's operation and obtains file to be downloaded;
It obtains user information and generates user data;
The file to be downloaded is written by LSB algorithm in the user data, generates downloading file;And
The downloading file is sent to the user.
2. the method as described in claim 1, which is characterized in that further include:
The file to be downloaded is generated according to original document.
3. method according to claim 2, which is characterized in that described to generate the file to be downloaded, packet according to original document It includes:
Obtain original document;
The every page of the original document is converted into picture;And
The picture is subjected to assembling and generates the file to be downloaded.
4. the method as described in claim 1, which is characterized in that further include:
Downloading user is traced by the downloading file.
5. method as claimed in claim 4, which is characterized in that described to be chased after by the downloading file to downloading user It traces back, comprising:
Obtain the downloading file;
The downloading file is decrypted, to obtain user information;And
Downloading user is traced by the user information.
6. the method as described in claim 1, which is characterized in that the acquisition user information generates user data, comprising:
The user information is encrypted to generate the user data by Encryption Algorithm.
7. method as claimed in claim 6, which is characterized in that the Encryption Algorithm, comprising:
Public key encryption algorithm, data encryption algorithm, triple data encryption algorithm, international data encryption algorithm, conventional symmetrical grouping Encryption Algorithm, the variable stream cipher algorithm of key length.
8. the method as described in claim 1, which is characterized in that described to write the user data by LSB algorithm Enter the file to be downloaded, generate downloading file, comprising:
Determine the least significant bit data of the file to be downloaded;And
The least significant bit data are replaced with the user data.
9. the method as described in claim 1, which is characterized in that described to write the user data by LSB algorithm Enter the file to be downloaded, generate downloading file, further includes:
The least significant bit data are subjected to the mutual conversion between binary system and the decimal system.
10. the method as described in claim 1, which is characterized in that the file to be downloaded is pdf document.
11. a kind of for generating the device of traceable file characterized by comprising
Receiving module obtains file to be downloaded for responding user's operation;
Data module generates user data for obtaining user information;
File module generates downloading for the file to be downloaded to be written by LSB algorithm in the user data File;And
Sending module, for the downloading file to be sent to the user.
12. device as claimed in claim 11, which is characterized in that further include:
Processing module, for generating the file to be downloaded according to original document.
13. device as claimed in claim 11, which is characterized in that further include:
Trace back block, for being traced by the downloading file to downloading user.
14. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-10.
15. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1-10 is realized when row.
CN201710505755.0A 2017-06-28 2017-06-28 For generating the method and device of traceable file CN109145632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710505755.0A CN109145632A (en) 2017-06-28 2017-06-28 For generating the method and device of traceable file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710505755.0A CN109145632A (en) 2017-06-28 2017-06-28 For generating the method and device of traceable file

Publications (1)

Publication Number Publication Date
CN109145632A true CN109145632A (en) 2019-01-04

Family

ID=64805466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710505755.0A CN109145632A (en) 2017-06-28 2017-06-28 For generating the method and device of traceable file

Country Status (1)

Country Link
CN (1) CN109145632A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945093A (en) * 2010-07-01 2011-01-12 武汉理工大学 Digital right protection method based on virus detection and watermark embedding
CN102622545A (en) * 2012-03-01 2012-08-01 重庆大学 Picture file tracking method
CN103632106A (en) * 2013-12-18 2014-03-12 北京明朝万达科技有限公司 OA (office automation) data protection method and system based on OA flow
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
US9607134B2 (en) * 2013-10-24 2017-03-28 Cyber-Ark Software Ltd. System and method for protected publication of sensitive documents

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945093A (en) * 2010-07-01 2011-01-12 武汉理工大学 Digital right protection method based on virus detection and watermark embedding
CN102622545A (en) * 2012-03-01 2012-08-01 重庆大学 Picture file tracking method
US9607134B2 (en) * 2013-10-24 2017-03-28 Cyber-Ark Software Ltd. System and method for protected publication of sensitive documents
CN103632106A (en) * 2013-12-18 2014-03-12 北京明朝万达科技有限公司 OA (office automation) data protection method and system based on OA flow
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption

Similar Documents

Publication Publication Date Title
JP6257754B2 (en) Data protection
EP3229397A1 (en) Method for fulfilling a cryptographic request requiring a value of a private key
US8595488B2 (en) Apparatus, system and method for securing digital documents in a digital appliance
CN105051750B (en) System and method for encrypted file system layer
CN103455764B (en) A kind of file encryption based on file division folding and decryption system
US9331856B1 (en) Systems and methods for validating digital signatures
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
CN102760219B (en) A kind of Android platform software protection system, method and apparatus
CN1326027C (en) Print data communication with data encryption and decryption
US9369443B1 (en) Field level data protection for cloud services using asymmetric cryptography
CN101340279B (en) Method, system and apparatus for data ciphering and deciphering
US20130254536A1 (en) Secure server side encryption for online file sharing and collaboration
US7159112B1 (en) Decryption of graphics data in a graphics processing pipeline
CN105453481B (en) Calculating equipment including table network
CN100508451C (en) Apparatus and method for generating data for detecting false alteration of encrypted data during processing
CN104717198B (en) Oftware updating method and equipment on safety element
CN103107995B (en) A kind of cloud computing environment date safety storing system and method
US8165305B2 (en) Enhanced relational database security through encryption of table indices
JP2005050162A (en) Hardware protection key and method for reissuing it
KR20050058488A (en) Apparatus, system and method for securing digital documents in a digital appliance
US8175268B2 (en) Generating and securing archive keys
CN103051600A (en) File access control method and system
CN103843006A (en) Provisioning of operating systems to user terminals
US20030159053A1 (en) Secure reconfigurable input device with transaction card reader
JP4256415B2 (en) Encryption device, decryption device, information system, encryption method, decryption method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination