CN111475834A - Method for managing synthesized confidential file - Google Patents

Method for managing synthesized confidential file Download PDF

Info

Publication number
CN111475834A
CN111475834A CN202010157267.7A CN202010157267A CN111475834A CN 111475834 A CN111475834 A CN 111475834A CN 202010157267 A CN202010157267 A CN 202010157267A CN 111475834 A CN111475834 A CN 111475834A
Authority
CN
China
Prior art keywords
file
security
synthesized
information
signature information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010157267.7A
Other languages
Chinese (zh)
Other versions
CN111475834B (en
Inventor
朱小军
罗俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Jicheng Shutian Information Technology Co.,Ltd.
Original Assignee
Zhejiang Laibu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Laibu Technology Co ltd filed Critical Zhejiang Laibu Technology Co ltd
Priority to CN202010157267.7A priority Critical patent/CN111475834B/en
Publication of CN111475834A publication Critical patent/CN111475834A/en
Application granted granted Critical
Publication of CN111475834B publication Critical patent/CN111475834B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method for managing a synthesized confidential file. The method is applied to a management system comprising an intelligent terminal and a server, and the synthesized security file is generated by a security file and a security protocol file. The method comprises the following steps: s201, receiving a viewing request by a synthesized confidential file stored on an intelligent terminal; s202, displaying a security protocol file of the synthesized security file according to the viewing request; s203, the security protocol file receives the signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file; and S204, the intelligent terminal displays the security file of the synthesized security file. The invention combines the confidential document and the confidential protocol document into a document, and when a user wants to check the confidential document, the user must sign the confidential protocol first, thereby ensuring that each user checking the confidential document signs the confidential protocol and improving the management level of the confidential document.

Description

Method for managing synthesized confidential file
Technical Field
The invention relates to the field of data management, in particular to a method for managing a synthesized secure file.
Background
The view of the security document needs to sign a security agreement, and only the user who signs the security agreement can view the security document. The traditional paper confidential protocol document needs a user to sign and stamp, but at present, more and more paperless offices and online offices are available, and the on-site signing and stamping mode cannot meet the requirements of the user. Some prior arts adopt electronic signature or online signature to complete signing of the security protocol document, but because the security document and the security protocol document are independent from each other, it cannot be guaranteed that each person viewing the security document signs the security protocol, which brings huge challenge to management of the security document.
Disclosure of Invention
The present invention is directed to a method for managing a composite security file, which overcomes the above-mentioned drawbacks of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for constructing a combined security file management, which is applied to an intelligent terminal, wherein the combined security file is generated by a security file and a security protocol file, and the method comprises the following steps:
s101, receiving a viewing request by the synthesized confidential file;
s102, displaying the security protocol file of the synthesized security file according to the viewing request;
s103, receiving signature information by the security protocol file;
and S104, displaying the security file of the synthesized security file.
Further, the method for managing a combined secure file according to the present invention, after the step S103, further includes:
and S105, storing the signature information in the synthesized secure file.
Further, the method for managing a combined secure file according to the present invention, after the step S105, further includes:
s106, the synthesized secure file receives a first signature viewing request;
and S107, displaying all the signature information stored in the synthesized secure file.
Further, in the method for managing a composite secure file according to the present invention, the step S103 includes:
and S1031, the security protocol file receives at least one of character signature information, picture signature information, audio signature information and video signature information.
In addition, the invention also provides a method for managing the synthesized secure file, which is applied to a management system comprising an intelligent terminal and a server, wherein the synthesized secure file is generated by the secure file and the secure protocol file, and the method comprises the following steps:
s201, receiving a viewing request for the synthesized confidential file stored on the intelligent terminal;
s202, displaying the security protocol file of the synthesized security file according to the viewing request;
s203, the security protocol file receives signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file;
and S204, the intelligent terminal displays the security file of the synthesized security file.
Further, the method for managing a combined secure file according to the present invention, after the step S203, further includes:
s205, the intelligent terminal sends a second signature viewing request to the server, wherein the second signature viewing request comprises the mark information of the synthesized confidential file;
s206, the server issues all the signature information corresponding to the marking information to the intelligent terminal;
and S207, the intelligent terminal receives and displays the signature information.
Further, in the method for managing a composite secure file according to the present invention, the step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the method further includes, after the step S201 and before the step S202:
s2012, uploading the user information and the mark information of the synthesized confidential file to the server;
s2013, the server verifies whether the user information is signed on the synthesized confidential file corresponding to the marking information;
s2014, if not, executing the step S202;
s2015, if yes, execute the step S204.
Further, in the method for managing a composite secure file according to the present invention, the step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the step S203 includes: s2031, the security protocol file receives signature information and sends the signature information and the user information to the server, wherein the signature information contains the mark information of the security protocol file.
Further, in the method for managing a composite secure file according to the present invention, the receiving signature information of the secure protocol file in step S203 includes:
s2032, the security protocol file receives at least one of the character signature information, the picture signature information, the audio signature information and the video signature information.
Further, the method for managing a combined secure file according to the present invention, after the step S204, further includes:
and S208, the intelligent terminal sends operation record information to the server after the confidential file is viewed, wherein the operation record information comprises at least one of viewing starting time, viewing ending time, viewing place, viewing terminal, viewing user, file modification content and data statistical result.
The method for managing the synthesized confidential file has the following beneficial effects: the invention combines the confidential document and the confidential protocol document into a document, and when a user wants to check the confidential document, the user must sign the confidential protocol first, thereby ensuring that each user checking the confidential document signs the confidential protocol and improving the management level of the confidential document.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 2 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 3 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 4 is a flow diagram of a method for composite secure file management according to one embodiment;
FIG. 5 is a flowchart of a method for composite secure file management, according to an embodiment.
Detailed Description
For a more clear understanding of the technical features, objects and effects of the present invention, embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
Example 1
Referring to fig. 1, the method for managing a composite security file of the present embodiment is applied to an intelligent terminal, which includes but is not limited to a computer, a mobile phone, and other terminals having a display screen. The synthesized confidential document is generated by a confidential document and a confidential protocol document which are electronic documents, wherein the confidential document records contents needing confidentiality, such as technical documents, engineering drawings, quotation lists and the like; the file format of the secure file may be in a variety of forms such as a text format, a picture format, an audio format, a video format, and the like. The security agreement document records the security terms which the user needs to comply with, and the security terms are mostly displayed in a text form and can also be displayed in a picture, audio, video and other forms. In the embodiment, the originally independent security file and the security protocol file are combined into an independent combined security file, namely, the combined security file contains the contents contained in the security file and the security protocol file. Because the synthesized security file contains the contents of the security file and the security protocol file, the synchronous transmission and synchronous use of the security file and the security protocol file are realized, and the security file is ensured to carry the security protocol file in real time. Specifically, the method for managing the synthesized secure file comprises the following steps:
s101, the combined secret file receives a viewing request. The method comprises the steps that a check request is received by a composite confidential file of the intelligent terminal through receiving clicking operation of a mouse, touch operation of a touch pad or touch operation of a touch screen, and the check request is used for checking the confidential file in the composite confidential file.
S102, displaying the security protocol file of the synthesized security file according to the viewing request. After the synthesized secure file receives the viewing request of the user, the secure file in the synthesized secure file is not directly displayed, but the secure protocol file of the synthesized secure file is displayed first, and the user needs to read the content of the secure protocol file and sign on the secure protocol file. Through the steps, the user who checks the confidential document is ensured to have to sign, and the signature without omission is realized.
S103, receiving the signature information by the security protocol file. After the user finishes reading the security protocol file, a signature operation is required, and there are many signature modes, and as an option, the step S103 in the method for managing a composite security file in this embodiment includes: and S1031, the security protocol file receives at least one of character signature information, picture signature information, audio signature information and video signature information, for example, a user can sign through an electronic signature pen, sign through a touch screen, sign through an electronic signature, perform voice signature through a microphone, perform video signature through a camera and the like, and the signature mode can be selected according to the needs of the user.
S104, displaying the security document of the synthesized security document. And after the user finishes the signature operation, namely the security protocol file receives the signature information of the user, displaying the security file of the synthesized security file for the user to check and use. Alternatively, the security file still maintains the file format before synthesis, and corresponding software of the intelligent terminal is called to open the security file according to the file format in the process of displaying the security file. Alternatively, the security file is synthesized into a synthesized security file, the file format is converted, the original file format is restored after the signature is completed, and corresponding software of the intelligent terminal is called to open the security file.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol first, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
Example 2
Referring to fig. 2, on the basis of embodiment 1, the method for managing a combined secure file of the present embodiment further includes, after step S103:
and S105, storing the signature information in the synthesized secure file. In order to facilitate the manager to check the user who has used the security document, the signature information of each time needs to be stored in the composite security document. Alternatively, in order to further understand the operation record of each user viewing the file, the embodiment stores the operation record information in the composite secure file after the end of viewing the secure file, where the operation record information includes, but is not limited to, a viewing start time, a viewing end time, a viewing location, a viewing terminal, a viewing user, a file modification content, a data statistics result, and the like.
Alternatively, the signature information can be sent out and sent to a server for storage, the corresponding relation between each synthesized confidential file and the signature information corresponding to the synthesized confidential file is established in the server, and managers can check all the signature information corresponding to each synthesized confidential file. Optionally, in order to further understand the operation record of each user viewing the file, in this embodiment, after the confidential document viewing is finished, the operation record information is also sent to the server, and the corresponding relationship between each signature information and the operation record information thereof is established, where the operation record information includes, but is not limited to, a viewing start time, a viewing end time, a viewing location, a viewing terminal, a viewing user, a file modification content, a data statistics result, and the like.
The embodiment saves the signature information, so that the administrator can check and manage the signature information in the later period, the management efficiency of data is improved, and meanwhile, the signature information can also be used as certification information when needed.
Example 3
Referring to fig. 3, on the basis of embodiment 2, the method for managing a combined secure file of the present embodiment further includes, after step S105:
s106, the first signature viewing request is received by the combined security file. When a user needs to check the signature information of the confidential file, the synthesized confidential file of the intelligent terminal receives a first signature checking request through receiving click operation of a mouse, touch operation of a touch pad or touch operation of a touch screen and the like, and the first signature checking request is used for checking all signature information corresponding to the synthesized confidential file.
Alternatively, if the signature information is stored in the secure file, the first signature view request is used to view all the signature information stored in the composite secure file.
Alternatively, if the signature information is stored in the server, the first signature viewing request is used to view all the signature information stored in the server corresponding to the composite secure file. The combined confidential file sends the first signature viewing request to the server after receiving the first signature viewing request, wherein the first signature information comprises mark information of the combined confidential file, such as file name, file number and the like, and the server searches all signature information corresponding to the combined confidential file and sends the signature information to the intelligent terminal.
S107, displaying all signature information stored in the composite security file. Because the signature information may be one or centralized of character signature information, picture signature information, audio signature information and video signature information, the corresponding display software of the intelligent terminal can be called to display according to the signature information content. Alternatively, if the signature information is stored in the server, all the signature information corresponding to the synthesized confidential file issued by the server is displayed.
Alternatively, all the signature information can be displayed in various manners such as a table manner display, a topological graph manner display, a tree diagram manner display and the like, so that the user can conveniently view the signature information.
In the embodiment, the user can check the signature information stored in the synthesized security file, so that the user who checks the synthesized security file can be mastered, and the management efficiency is improved.
Example 4
Referring to fig. 4, the method for managing a composite security file of the present embodiment is applied to a management system including an intelligent terminal and a server, wherein the intelligent terminal includes, but is not limited to, a computer, a mobile phone, and other terminals having a display screen. The synthesized confidential document is generated by a confidential document and a confidential protocol document which are electronic documents, wherein the confidential document records contents needing confidentiality, such as technical documents, engineering drawings, quotation lists and the like; the file format of the secure file may be in a variety of forms such as a text format, a picture format, an audio format, a video format, and the like. The security agreement document records the security terms which the user needs to comply with, and the security terms are mostly displayed in a text form and can also be displayed in a picture, audio, video and other forms. In the embodiment, the originally independent security file and the security protocol file are combined into an independent combined security file, namely, the combined security file contains the contents contained in the security file and the security protocol file. Because the synthesized security file contains the contents of the security file and the security protocol file, the synchronous transmission and synchronous use of the security file and the security protocol file are realized, and the security file is ensured to carry the security protocol file in real time. Specifically, the method for managing the synthesized secure file comprises the following steps:
s201, receiving a viewing request by the synthesized confidential file stored on the intelligent terminal. The method comprises the steps that a check request is received by a composite confidential file of the intelligent terminal through receiving clicking operation of a mouse, touch operation of a touch pad or touch operation of a touch screen, and the check request is used for checking the confidential file in the composite confidential file.
S202, displaying the security protocol file of the synthesized security file according to the viewing request. After the synthesized secure file receives the viewing request of the user, the secure file in the synthesized secure file is not directly displayed, but the secure protocol file of the synthesized secure file is displayed first, and the user needs to read the content of the secure protocol file and sign on the secure protocol file. Through the steps, the user who checks the confidential document is ensured to have to sign, and the signature without omission is realized.
S203, the security protocol file receives the signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file, and the server establishes the corresponding relation between each synthesized security file and the corresponding signature information. Alternatively, the method for managing a combined secure file according to the present embodiment, wherein the security protocol file reception signature information in step S203 includes: s2032, the security protocol file receives at least one of the text signature information, the picture signature information, the audio signature information and the video signature information, for example, the user can sign through an electronic signature pen, sign through a touch screen, sign through an electronic signature, sign through a microphone, sign through a camera, and the like, and the signature mode can be selected according to the user' S needs.
And S204, the intelligent terminal displays the security file of the synthesized security file. And after the user finishes the signature operation, namely the security protocol file receives the signature information of the user, displaying the security file of the synthesized security file for the user to check and use. Alternatively, the security file still maintains the file format before synthesis, and corresponding software of the intelligent terminal is called to open the security file according to the file format in the process of displaying the security file. Alternatively, the security file is synthesized into a synthesized security file, the file format is converted, the original file format is restored after the signature is completed, and corresponding software of the intelligent terminal is called to open the security file.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol and upload the visa information to the server for storage, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
Example 5
Referring to fig. 5, on the basis of embodiment 4, the method for managing a combined secure file of the present embodiment further includes, after step S203:
s205, the intelligent terminal sends a second signature viewing request to the server, wherein the second signature viewing request comprises mark information of the synthesized confidential files, such as file names, file numbers and the like, and each synthesized confidential file corresponds to one mark information. When a user needs to check the signature information of the confidential file, the intelligent terminal receives a second signature checking request through receiving click operation of a mouse, touch operation of a touch pad or touch operation of a touch screen and the like, wherein the second signature checking request is used for checking all signature information corresponding to the synthesized confidential file.
S206, the server issues all signature information corresponding to the marking information to the intelligent terminal. And after receiving the second signature viewing request, the server extracts the mark information in the second signature viewing request, searches all signature information corresponding to the mark information, and issues all signature information corresponding to the mark information to the intelligent terminal.
And S207, receiving and displaying the signature information by the intelligent terminal. And the intelligent terminal receives all signature information corresponding to the marking information issued by the server and displays the received signature information. Because the signature information may be one or centralized of character signature information, picture signature information, audio signature information and video signature information, the corresponding display software of the intelligent terminal can be called to display according to the signature information content. Alternatively, all the signature information can be displayed in various manners such as a table manner display, a topological graph manner display, a tree diagram manner display and the like, so that the user can conveniently view the signature information.
In the embodiment, the user can check the signature information stored in the synthesized security file, so that the user who checks the synthesized security file can be mastered, and the management efficiency is improved.
Example 6
On the basis of the above embodiment, the step S201 in the combined secure file management method of the present embodiment includes: s2011, receiving a viewing request and user information by a synthesized confidential file stored on the intelligent terminal;
step S203 includes: s2031, the security protocol file receives the signature information and sends the signature information and the user information to the server, wherein the signature information comprises the mark information of the security protocol file. The server correspondingly stores the marking information, the signature information and the user information of the security protocol files and establishes the signature record information of each security protocol file. Alternatively, the combined secure file, the signature information, and the user information may be stored in association with each other, and the signature record information for each combined secure file may be created.
In the embodiment, the signature information of the user and the user information are uploaded to the server, and more signature related information can be recorded.
Example 7
On the basis of the above embodiment, if the user finishes signing when using the composite secure file for the first time, the subsequent user does not need to repeatedly sign, and the embodiment checks whether the user finishes signing through the user information. Specifically, step S201 in the method for managing a combined secure file of the present embodiment includes: s2011, receiving a checking request and user information by a synthesized confidential file stored on the intelligent terminal, wherein the user information is used for marking the identity of a user and can be an account name, a mobile phone number, an identity card number, a job number and the like; alternatively, to enhance security, each user information further includes a corresponding password.
Further, after step S201 and before step S202, the method further includes:
s2012, uploading the user information and the mark information of the synthesized confidential file to a server.
S2013, the server verifies whether the user information is signed on the synthesized confidential file corresponding to the marking information. If the user has finished signing, the signature information is stored in the server and corresponds to the label information of the synthesized secure file. When the user reuses the secret file subsequently, the server only needs to use the user information to verify whether the user finishes signing or not.
S2014, if the user information is not signed on the synthesized secure file corresponding to the mark information, executing S202, displaying the secure protocol file of the synthesized secure file and signing the secure protocol file.
S2015, if the user information is signed on the synthesized secure file corresponding to the marking information, executing the step S204, and directly displaying the secure file in the synthesized secure file instead of displaying the secure protocol file and signing, so that the user operation is facilitated.
The embodiment increases the verification of whether the user has signed or not, avoids the repeated signing of the user, and improves the user experience.
Example 8
On the basis of the above embodiment, in order to further understand the operation record of each user viewing the file, this embodiment also sends the operation record information to the server after the end of viewing the confidential document, and establishes the corresponding relationship between each signature information and the operation record information thereof. Specifically, the method for managing a combined secure file according to this embodiment further includes, after step S204:
s208, the intelligent terminal sends operation record information to the server after the confidential document is checked, the operation record information comprises but is not limited to checking starting time, checking ending time, checking place, checking terminal, checking user, file modification content, data statistical result and the like, and the server establishes the corresponding relation between each signature information and the operation record information.
The embodiment combines the security document and the security protocol document into one document, and when a user wants to check the security document, the user must sign the security protocol first, so that each user checking the security document is guaranteed to sign the security protocol, and the management level of the security document is improved.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above embodiments are merely illustrative of the technical ideas and features of the present invention, and are intended to enable those skilled in the art to understand the contents of the present invention and implement the present invention, and not to limit the scope of the present invention. All equivalent changes and modifications made within the scope of the claims of the present invention should be covered by the claims of the present invention.

Claims (10)

1. A method for managing a synthesized secure file, which is applied to an intelligent terminal, is characterized in that the synthesized secure file is generated by a secure file and a security protocol file, and the method comprises the following steps:
s101, receiving a viewing request by the synthesized confidential file;
s102, displaying the security protocol file of the synthesized security file according to the viewing request;
s103, receiving signature information by the security protocol file;
and S104, displaying the security file of the synthesized security file.
2. The composite secure file management method of claim 1, further comprising, after said step S103:
and S105, storing the signature information in the synthesized secure file.
3. The composite secure file management method of claim 2, further comprising, after said step S105:
s106, the synthesized secure file receives a first signature viewing request;
and S107, displaying all the signature information stored in the synthesized secure file.
4. The compound secure file management method according to claim 1, wherein said step S103 includes:
and S1031, the security protocol file receives at least one of character signature information, picture signature information, audio signature information and video signature information.
5. A method for managing a composite security file, applied to a management system comprising an intelligent terminal and a server, is characterized in that the composite security file is generated from a security file and a security protocol file, and the method comprises the following steps:
s201, receiving a viewing request for the synthesized confidential file stored on the intelligent terminal;
s202, displaying the security protocol file of the synthesized security file according to the viewing request;
s203, the security protocol file receives signature information and sends the signature information to the server, wherein the signature information comprises the mark information of the security protocol file;
and S204, the intelligent terminal displays the security file of the synthesized security file.
6. The composite secure file management method of claim 5, further comprising, after said step S203:
s205, the intelligent terminal sends a second signature viewing request to the server, wherein the second signature viewing request comprises the mark information of the synthesized confidential file;
s206, the server issues all the signature information corresponding to the marking information to the intelligent terminal;
and S207, the intelligent terminal receives and displays the signature information.
7. The compound secure file management method according to claim 5, wherein said step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the method further includes, after the step S201 and before the step S202:
s2012, uploading the user information and the mark information of the synthesized confidential file to the server;
s2013, the server verifies whether the user information is signed on the synthesized confidential file corresponding to the marking information;
s2014, if not, executing the step S202;
s2015, if yes, execute the step S204.
8. The compound secure file management method according to claim 5, wherein said step S201 includes: s2011, the synthesized confidential file stored on the intelligent terminal receives a viewing request and user information;
the step S203 includes: s2031, the security protocol file receives signature information and sends the signature information and the user information to the server, wherein the signature information contains the mark information of the security protocol file.
9. The composite secure file management method of claim 5, wherein said step S203 wherein said secure protocol file receiving signature information includes:
s2032, the security protocol file receives at least one of the character signature information, the picture signature information, the audio signature information and the video signature information.
10. The composite secure file management method of claim 5, further comprising, after said step S204:
and S208, the intelligent terminal sends operation record information to the server after the confidential file is viewed, wherein the operation record information comprises at least one of viewing starting time, viewing ending time, viewing place, viewing terminal, viewing user, file modification content and data statistical result.
CN202010157267.7A 2020-03-09 2020-03-09 Method for managing synthesized confidential file Active CN111475834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010157267.7A CN111475834B (en) 2020-03-09 2020-03-09 Method for managing synthesized confidential file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010157267.7A CN111475834B (en) 2020-03-09 2020-03-09 Method for managing synthesized confidential file

Publications (2)

Publication Number Publication Date
CN111475834A true CN111475834A (en) 2020-07-31
CN111475834B CN111475834B (en) 2023-04-18

Family

ID=71748059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010157267.7A Active CN111475834B (en) 2020-03-09 2020-03-09 Method for managing synthesized confidential file

Country Status (1)

Country Link
CN (1) CN111475834B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070038857A1 (en) * 2005-08-09 2007-02-15 Gosnell Thomas F Data archiving system
US7707642B1 (en) * 2004-08-31 2010-04-27 Adobe Systems Incorporated Document access auditing
JP2013081038A (en) * 2011-10-03 2013-05-02 Hitachi Ltd Data management system and its method
CN104463554A (en) * 2013-09-25 2015-03-25 天津书生投资有限公司 Electronic seal achieving method and device
CN106557707A (en) * 2015-09-29 2017-04-05 苏宁云商集团股份有限公司 A kind of method and system for processing document data
US20170344245A1 (en) * 2016-05-27 2017-11-30 Adobe Systems Incorporated Controlling a Document Electronic-Signing (E-Signing) Workflow Based on Criteria Specified By a Document Sender
WO2018032377A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Read-only security file storage system for block chain, and method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7707642B1 (en) * 2004-08-31 2010-04-27 Adobe Systems Incorporated Document access auditing
US20070038857A1 (en) * 2005-08-09 2007-02-15 Gosnell Thomas F Data archiving system
JP2013081038A (en) * 2011-10-03 2013-05-02 Hitachi Ltd Data management system and its method
CN104463554A (en) * 2013-09-25 2015-03-25 天津书生投资有限公司 Electronic seal achieving method and device
CN106557707A (en) * 2015-09-29 2017-04-05 苏宁云商集团股份有限公司 A kind of method and system for processing document data
US20170344245A1 (en) * 2016-05-27 2017-11-30 Adobe Systems Incorporated Controlling a Document Electronic-Signing (E-Signing) Workflow Based on Criteria Specified By a Document Sender
WO2018032377A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Read-only security file storage system for block chain, and method thereof

Also Published As

Publication number Publication date
CN111475834B (en) 2023-04-18

Similar Documents

Publication Publication Date Title
CN101360100B (en) Digital signing, sealing and authenticating method for PDF document
JP2020517034A (en) System and method for concluding and delivering electronic documents
KR101298879B1 (en) Reduced traceability electronic message system and method
EP3273658B1 (en) Metadata broker
US20010056468A1 (en) Method of information display and communication system using the method
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
US20040225884A1 (en) Electronic signature system and method
US20070079139A1 (en) Signature authentication
CN110766579B (en) Online education management verification system and method based on block chain platform
CN110705236A (en) Electronic contract template dynamic configuration method and system
CN105659324A (en) Collaborative audio conversation attestation
US20040221162A1 (en) Method and systems to facilitate online electronic notary, signatures and time stamping
CN109829317A (en) A kind of method, apparatus and system generating electronic contract based on handwritten signature picture
KR102164413B1 (en) System and Method for Electronic Labor Contract and Labor Management using QR code
CN103246837B (en) Method and the subscriber equipment of identifying code are provided
CN114491462B (en) Method, system, equipment and storage medium for signing multiple electronic files at one time
CN113934993A (en) Electronic seal based on electronic handwriting signature technology
CN111475834B (en) Method for managing synthesized confidential file
EP1397883A1 (en) Digital declaration, method for creating a digital declaration, and a software product for carrying out this method
JP4106875B2 (en) Electronic device, information update system in electronic device, information update method and program thereof
CN109658041A (en) Generating means and its generation method, the equipment and readable storage medium storing program for executing of file
CA2759682A1 (en) System, method and computer program for conducting transactions remotely
CN111125593B (en) Family tree information processing method, equipment and storage medium based on block chain
CN113162770A (en) Online signature method and system
CN100490354C (en) Bank safety card saving method using literal information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 310000, Room 704, Building A, No. 459 Qianmo Road, Xixing Street, Binjiang District, Hangzhou City, Zhejiang Province (self declared)

Patentee after: Hangzhou Jicheng Shutian Information Technology Co.,Ltd.

Country or region after: China

Address before: Room 203-206, Building 4, Qihang Building, No. 586 West Ring Road, Keqiao Economic Development Zone, Qixian Street, Keqiao District, Shaoxing City, Zhejiang Province, 312000

Patentee before: Zhejiang Laibu Technology Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address