CN112307498A - Risk management and control method and device based on printed file and integrated detection equipment - Google Patents

Risk management and control method and device based on printed file and integrated detection equipment Download PDF

Info

Publication number
CN112307498A
CN112307498A CN202011190115.3A CN202011190115A CN112307498A CN 112307498 A CN112307498 A CN 112307498A CN 202011190115 A CN202011190115 A CN 202011190115A CN 112307498 A CN112307498 A CN 112307498A
Authority
CN
China
Prior art keywords
file
printing
identification
identification code
printed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011190115.3A
Other languages
Chinese (zh)
Inventor
王安亚
李晓倩
叶兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202011190115.3A priority Critical patent/CN112307498A/en
Publication of CN112307498A publication Critical patent/CN112307498A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The application relates to a block chain technology and provides a risk management and control method and device based on a printed file and integrated detection equipment. The method comprises the following steps: and acquiring the user identification carried by the detected file printing instruction and the user information input when the login operation is triggered. When the user information coincides with the user identification, an identification code identification is added to the detected printing paper. And when a file random inspection instruction is detected, randomly extracting the record of the printed file to be inspected from the historical printing records, and acquiring the corresponding target identification code identifier. And acquiring the identification code identification carried by the detected printed file according to the scanning equipment, comparing the target identification code identification with the identification code identification, and carrying out security risk management and control on the printed file. User information may be stored in the block chain. According to the method, the risk control of the printed file is realized by adding the identification code identification to the printing paper, information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.

Description

Risk management and control method and device based on printed file and integrated detection equipment
Technical Field
The application relates to the technical field of block chains, in particular to a risk management and control method and device based on a printed file and integrated detection equipment.
Background
With the development of block chain technology and information technology and the increase of service digitization demand in financial industry, a mode of modifying and upgrading the original service mode by using a new generation of information technology, such as artificial intelligence, big data, cloud computing, block chain and other technologies, appears.
With the deep application of the new generation of information technology, the information security risk related to each business of the financial industry is increasingly concerned. The information data of each enterprise belongs to intangible assets unique to the enterprise, the enterprise information data can comprise enterprise sensitive information, business secrets and the like, and if printed files containing the company sensitive information or the business secrets and the like are not managed, the company sensitive information or the business secrets are leaked, so that information security risks are generated.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a risk management and control method and apparatus based on a print file, and an integrated detection device, which can improve the security of enterprise information.
A method for risk management and control based on printed files, the method comprising:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
when a login operation triggered by a printing device is detected, acquiring user information input by the printing device;
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-checked printed file record from a historical printed record according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-checked printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment;
and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk management and control on the printed file according to the comparison result.
In one embodiment, when it is determined that the user information is consistent with the user identifier, acquiring a printing operation instruction triggered by the printing device, and adding a preset identifier to the detected printing paper in response to the printing operation instruction includes:
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment;
acquiring a file identifier carried by the printing operation instruction;
determining the importance degree of the content to be printed corresponding to the file identification according to the file identification;
determining a corresponding identification code identifier according to the importance degree of the content to be printed;
and when the printing paper to be printed is detected, responding to the printing operation instruction, and adding the corresponding identification code identification to the detected printing paper.
In one embodiment, the identification code mark comprises an explicit mark and an invisible mark; when detecting a printed file carrying print content, acquiring an identification code identifier carried by the printed file according to scanning equipment, including:
when a printing file carrying printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file;
and according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
In one embodiment, the method further comprises:
when a destruction instruction for printing paper carrying an identification code identifier is detected, responding to the destruction instruction, executing a printing file destruction operation, and deleting a file printing record corresponding to the identification code identifier from a historical printing record; the file printing record and the history printing record are stored in the block chain.
In one embodiment, the method further comprises:
when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction;
extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records;
and when the user information and the audit record are confirmed to pass the audit, responding to the print file monitoring canceling instruction, marking the file identification as desensitized use, and canceling the monitoring mechanism of the print file record corresponding to the user identification.
In one embodiment, the comparing the target identifier with the identifier to generate a comparison result, and performing security risk control on the printed document according to the comparison result includes:
comparing the target identification code identification with the identification code identification to generate a corresponding comparison result;
when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, acquiring the printing content corresponding to the to-be-audited printing file record;
and detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
A risk management and control apparatus based on printed files, the apparatus comprising:
the user identification acquisition module is used for acquiring a user identification carried by a file printing instruction when the file printing instruction is detected;
the system comprises a user information acquisition module, a login control module and a login control module, wherein the user information acquisition module is used for acquiring user information input based on printing equipment when login operation triggered based on the printing equipment is detected;
a printing operation instruction acquisition module, which is used for acquiring a printing operation instruction triggered based on the printing equipment when the fact that the user information is consistent with the user identification is determined, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
the target identification code identification acquisition module is used for randomly extracting a printing file record to be checked from a historical printing record according to a file random inspection instruction when the file random inspection instruction is detected in a preset audit period, and acquiring a target identification code identification corresponding to the printing file record to be checked;
the identification code identification acquisition module is used for acquiring an identification code identification carried by a printed file according to scanning equipment when the printed file carrying the printing content is detected;
and the risk management and control module is used for comparing the target identification code identification with the identification code identification, generating a comparison result and carrying out security risk management and control on the printed file according to the comparison result.
In one embodiment, the apparatus further comprises:
and the printing file destroying module is used for responding to a destroying instruction when the destroying instruction for the printing paper carrying the identification code identification is detected, executing the printing file destroying operation and deleting the file printing record corresponding to the identification code identification from the historical printing record.
An integrated detection device comprises a detection device main body, an image acquisition device, a scanning device, a magnetic induction instrument, a printing device, a display panel, a communication device, a paper shredding device, a memory and a processor, wherein the image acquisition device, the scanning device, the magnetic induction instrument, the printing device, the display panel, the communication device, the paper shredding device, the memory and the processor are arranged on the detection device main body; the memory stores a computer program which when executed by the processor performs the steps of:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
when a login operation triggered by a printing device is detected, acquiring user information input by the printing device;
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-checked printed file record from a historical printed record according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-checked printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment;
and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk management and control on the printed file according to the comparison result.
A computer storage medium having a computer program stored thereon, the computer program when executed by a processor implementing the steps of:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
when a login operation triggered by a printing device is detected, acquiring user information input by the printing device;
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-checked printed file record from a historical printed record according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-checked printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment;
and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk management and control on the printed file according to the comparison result.
According to the risk management and control method and device based on the printed file and the integrated detection device, when a file printing instruction is detected, the user identification carried by the file printing instruction is obtained, and when login operation triggered by the printing device is detected, user information input by the printing device is obtained. And when the user information is determined to be consistent with the user identification, adding a preset identification code identification to the detected printing paper according to the printing operation instruction. When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printing file record from the historical printing records, and acquiring a target identification code identifier of the to-be-audited printing file record. And when a printed file carrying the printing content is detected, acquiring an identification code identifier carried by the printed file according to the scanning equipment, and further carrying out security risk management and control on the printed file according to a comparison result of the target identification code identifier and the identification code identifier. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
Drawings
FIG. 1 is a diagram illustrating an embodiment of a risk management method based on a print file;
FIG. 2 is a schematic flowchart of a risk management method based on a print file according to an embodiment;
FIG. 3 is a schematic diagram illustrating a process of adding a preset identification code to a detected piece of printing paper according to an embodiment;
FIG. 4 is a flowchart illustrating a risk management method based on a print file according to still another embodiment;
FIG. 5 is a block diagram of a risk management device based on a print file according to an embodiment;
FIG. 6 is a diagram illustrating the internal structure of the integrated sensing device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The risk management and control method based on the print file can be applied to the application environment shown in fig. 1. The user terminal device 102 communicates with the printing device 104 and the scanning device 106 via a network. When a file printing instruction triggered by the user based on the user terminal device 102 is detected, the user identifier carried by the file printing instruction is acquired. When a login operation triggered by the user based on the printing apparatus 104 is detected, user information input by the user based on the printing apparatus 104 is acquired. Comparing the user identifier with the user information, acquiring a printing operation instruction triggered based on the printing device 104 when the user information is determined to be consistent with the user identifier, and adding a preset identification code identifier to the printing paper detected by the printing device 104 according to the printing operation instruction. When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printed file record from the historical printed records according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-audited printed file record. When a printed file carrying printing content is detected in the printing device 104, the identification code identifier carried by the printed file is acquired according to the scanning device 106, the target identification code identifier is compared with the identification code identifier to generate a comparison result, and then the printed file is subjected to security risk management and control according to the comparison result. The user terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
In one embodiment, as shown in fig. 2, there is provided a risk management and control method based on a print file, which is described by taking the method as an example applied to the printing apparatus in fig. 1, and includes the following steps:
step S202, when a file printing instruction is detected, a user identification carried by the file printing instruction is obtained.
Specifically, the printing device and the user terminal device communicate through an intranet, when a file printing instruction triggered by the user based on the user terminal device is detected on the printing device, a file identifier and a user identifier carried by the file printing instruction are obtained, and the content of a file to be printed sent by the user from the user terminal device is determined according to the file identifier. The file identification is used for determining a file to be printed of the electronic file, and the user identification comprises a user ID.
And determining the content of the file to be printed sent by the user from the user terminal equipment according to the file identifier, wherein the content is used for printing on the printing paper added with the identification code identifier.
In step S204, when a login operation triggered by the printing apparatus is detected, user information input by the printing apparatus is acquired.
Specifically, the login operation triggered by the user based on the printing apparatus includes a login operation triggered by the user based on a display panel of the printing apparatus. When login operation triggered by a user based on a display panel of printing equipment is detected, user information input by the user based on the display panel of the printing equipment is acquired, wherein the user information comprises a user ID account and a user password, and whether login is successful or not is determined by verifying the user ID account and the user password.
Furthermore, the user logs in based on the login operation triggered by the printing equipment, and the method further comprises the steps of receiving an on-site communication signal corresponding to the work card of the user according to a near field communication module arranged on the printing equipment, reading work card information carried by the work card of the user, and further logging in according to the work card information. The work card information comprises a work number and a login password of the work card of the user.
And step S206, when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction.
Specifically, when the work number of the user work card of the user ID account or the work card information is determined to be consistent with the user identification, a printing operation instruction triggered by the user based on the printing device is obtained, wherein the user can click a printing key on a display panel of the printing device to trigger the printing operation instruction, and can click a printing button arranged on a shell of the printing device to trigger the printing operation instruction.
Further, the printing apparatus responds to a printing operation instruction triggered by a user, and adds a preset identification code identifier to the detected printing paper. The identification code mark comprises an explicit mark, such as a two-dimensional code, a font mark, an imprint mark, a watermark and the like, which can be recognized by human eyes, and also comprises a recessive mark, such as a magnetic mark which needs to be scanned and recognized by a magnetic sensor and needs to be displayed by ultraviolet rays.
The importance degree of the printed file can be indicated through different types of identification features, for example, two or more types of identifications are added to printing paper corresponding to a higher printed file according to the importance degree, and the identifications are identified in different identification modes by combining multiple types of identifications.
And step S208, when a file random inspection instruction is detected in a preset audit period, randomly extracting a to-be-audited printing file record from the historical printing records according to the file random inspection instruction, and acquiring a target identification code identifier corresponding to the to-be-audited printing file record.
Specifically, a preset audit period is obtained, and a file random inspection instruction is detected in the preset audit period. The file spot check instruction can be triggered by a manager, such as an auditor, in real time based on the user terminal equipment, or can be triggered at regular time by presetting a spot check task. When a file random inspection instruction is detected, randomly extracting a print file record to be audited from the historical print records according to the file random inspection instruction, and acquiring a target identification code identifier corresponding to the print file record to be audited.
Step S210, when a printed file carrying the printing content is detected, acquiring an identification code identifier carried by the printed file according to the scanning equipment.
Specifically, since the identification operations of different identifiers can be performed simultaneously, the addition positions of different identifier identifiers can be distinguished, and thus different scanning devices can be respectively adopted to perform identifier detection and identification on different positions of a printed file.
Wherein, scanning equipment includes image scanning equipment, magnetism feels scanning equipment and light system printing ink scanning equipment etc. and image scanning equipment is used for showing the sign like two-dimensional code, typeface sign, seal of a government organization in old china sign, watermark etc. and scan the discernment, and magnetism feels scanning equipment is used for discerning the magnetism sign, and light system printing ink scanning equipment is provided with ultraviolet emitter for carry out ultraviolet irradiation to printed file, carry out recessive printing ink sign discernment to printed file after carrying out the ultraviolet irradiation.
Further, when a print file carrying print content is detected, the placement position of the print file is corrected to obtain a corrected print file, different display positions on the corrected print file are identified according to the scanning device, identification codes on the different display positions are obtained, and the identification codes are determined to be identification codes carried by the printed file.
In one embodiment, the target identification code identifier is determined by obtaining a user identifier corresponding to the print file record to be examined and obtaining the associated identification code identifier according to the user identifier. And sending the notice to be detected to the user terminal equipment where the user identifier is located by sending the notice to be detected to the user terminal equipment where the user identifier is located in a form of mail, short message or signature. The user can convey the printed file carrying the identification code identification to the scanning device according to the notice to be detected, and when the scanning device detects the printed file carrying the printing content, the identification code identification carried by the printed file is acquired by scanning the printed file.
Step S212, comparing the target identification code identification with the identification code identification to generate a comparison result, and performing security risk control on the printed file according to the comparison result.
Specifically, the target identification code identification and the identification code identification are compared to generate a corresponding comparison result, and when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, the printing content corresponding to the printing file record to be audited is obtained. And carrying out security risk management and control on the printed file according to the information sensitivity by detecting the information sensitivity of the printing content. The comparison result comprises a target identification code mark consistent with the identification code mark and a target identification code mark inconsistent with the identification code mark.
Further, when the target identification code identifier is determined to be inconsistent with the identification code identifier according to the comparison result, it indicates that the user cannot issue the printed file, that is, the printed file carrying the print content is not detected in the preset audit period, which indicates that the user may lose or leave the printed file from the company, and can acquire the print content corresponding to the record of the print file to be audited. The confidentiality risk control of the printed file is realized by detecting the information sensitivity of the printed content and determining whether deep inspection is needed or not according to the information sensitivity.
It should be emphasized that, in order to further ensure the privacy and security of the user information, the pending print file record, and the comparison result, the user information, the pending print file record, and the comparison result may also be stored in a node of a block chain.
According to the risk management and control method based on the printed file, when a file printing instruction is detected, a user identifier carried by the file printing instruction is obtained, and when login operation triggered based on the printing equipment is detected, user information input based on the printing equipment is obtained. And when the user information is determined to be consistent with the user identification, adding a preset identification code identification to the detected printing paper according to the printing operation instruction. When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printing file record from the historical printing records, and acquiring a target identification code identifier of the to-be-audited printing file record. And when a printed file carrying the printing content is detected, acquiring an identification code identifier carried by the printed file according to the scanning equipment, and further carrying out security risk management and control on the printed file according to a comparison result of the target identification code identifier and the identification code identifier. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
In one embodiment, as shown in fig. 3, the step of adding the preset identification code identifier to the detected printing paper, that is, when it is determined that the user information is consistent with the user identifier, acquiring a printing operation instruction triggered by the printing device, and adding the preset identification code identifier to the detected printing paper in response to the printing operation instruction, specifically includes:
in step S302, when it is determined that the user information is consistent with the user identification, a print operation instruction triggered based on the printing apparatus is acquired.
Specifically, after the user information is compared with the user identification information, when the user information is determined to be consistent with the user identification, a printing operation instruction triggered by the user based on the printing device is obtained. The user can click a printing key on a display panel of the printing equipment to trigger a printing operation instruction, and can click a printing button arranged on a shell of the printing equipment to trigger the printing operation instruction.
And step S304, acquiring the file identification carried by the printing operation instruction.
Specifically, the printing operation instruction carries a file identifier corresponding to the file content to be printed, and the file content to be printed can be determined according to the file identifier.
Step S306, according to the file identification, determining the importance degree of the content to be printed corresponding to the file identification.
Specifically, the file identification is associated with the number of the printing paper, which is used to determine the usage of the printing paper, including what importance level of the content to be printed is specifically printed on each numbered printing paper. And then determining the importance degree of the content to be printed according to the file identification and the number of the associated printing paper.
Step S308, determining the corresponding identification code identification according to the importance degree of the content to be printed.
Specifically, preset importance degree levels and the types and the number of the identification code identifications corresponding to different importance degree levels are obtained, and then the types and the number of the corresponding identification code identifications are determined according to the importance degrees of the contents to be printed. The identification code mark comprises an explicit mark, such as a two-dimensional code, a font mark, an imprint mark, a watermark and the like, which can be recognized by human eyes, and also comprises a recessive mark, such as a magnetic mark which needs to be scanned and recognized by a magnetic sensor and needs to be displayed by ultraviolet rays.
The importance degree of the printed file can be indicated through different types of identification features, for example, two or more types of identifications are added to printing paper corresponding to a higher printed file according to the importance degree, and the identifications are identified in different identification modes by combining multiple types of identifications. The importance degree of the printed file can be indicated through the single identification feature, for example, common explicit identification such as one of two-dimensional codes, fonts, watermarks and the like is added to printing paper of the printed file with lower importance degree, and similarly, the identification mode is simpler. And the printing paper for printing files with higher importance degree is added with magnetic marks or invisible ink marks and the like which need to be identified by a magnetic induction instrument or a scanning device carrying ultraviolet light.
In step S310, when the printing paper to be printed is detected, the corresponding identification code identifier is added to the detected printing paper in response to the printing operation instruction.
Specifically, when detecting the blank printing paper to be printed on the printing equipment, the determined identification code identifier is added to the corresponding position of the detected printing paper according to the preset position corresponding to different identification code identifiers, and the content to be printed corresponding to the file identifier is printed on the printing paper with the identification code identifier added.
In this embodiment, when it is determined that the user information is consistent with the user identifier, the printing operation instruction triggered based on the printing device and the carried file identifier are acquired, the importance degree of the content to be printed corresponding to the file identifier is determined according to the file identifier, and then the identifier corresponding to the importance degree of the content to be printed is determined. When the printing paper to be printed is detected, the corresponding identification code identification is added to the detected printing paper in response to a printing operation instruction. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
In one embodiment, a risk management and control method based on a print file is provided, which further includes:
when a destruction instruction for printing paper carrying the identification code identification is detected, responding to the destruction instruction, executing the printing file destruction operation, and deleting the file printing record corresponding to the identification code identification from the historical printing record.
Specifically, the printed file destruction operation includes paper shredding destruction and copying destruction, the paper shredding can be used for destroying the printed files at different angles, the vertical direction is changed into an oblique direction, and the copying destruction can be carried out in a mode of directly covering with pure colors or images.
Because the file printed in the file printing stage is printed, the printed paper has the unique identification code identification and also comprises a corresponding historical printing record. When the shredder detects the record in the process of shredding paper, the corresponding printed file record is turned over at the background server, and the file printed record corresponding to the unique identification code identifier is deleted from the historical printed record or marked as destroyed.
In this embodiment, when detecting to trigger the destruction instruction to the printing paper that carries the identification code sign, respond to and destroy the instruction, carry out and print file and destroy the operation to the file printing record that corresponds with the identification code sign is deleted from the history printing record, destroys the file through in time having printed, avoids printing the file and uses the problem that the management and control is improper and lead to information leakage, thereby promotes enterprise information security.
In one embodiment, a risk management and control method based on a print file is provided, which further includes:
when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction;
extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records;
and when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification.
Specifically, when a print file monitoring canceling instruction triggered by a user based on user terminal equipment is detected, a user identifier and a file identifier corresponding to the print file monitoring canceling instruction are obtained, and user information and an audit record corresponding to the user identifier and printed content corresponding to the file identifier are extracted. The method comprises the steps of auditing and checking user information and audit records, auditing sensitive information of printed contents, responding to a printed file monitoring cancellation instruction when the user information and the audit records are confirmed to pass the audit and the sensitive information of the printed contents meets the requirements, namely the printed contents do not affect the information safety of enterprises, marking file identification as desensitized use, and removing a monitoring mechanism of the printed file records corresponding to user identification.
In this embodiment, when a print file monitoring cancellation instruction triggered by a user is detected, a user identifier and a file identifier corresponding to the print file monitoring cancellation instruction are obtained, user information and an audit record corresponding to the user identifier are extracted, and the user information and the audit record are subjected to audit verification. And when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification. When the user information and the audit record are confirmed to pass the audit, the monitoring of the print file record corresponding to the user identification is timely released, unnecessary detection work is avoided for a long time, and therefore resource consumption is reduced.
In one embodiment, as shown in fig. 4, a risk management and control method based on a print file is provided, which specifically includes the following steps:
1) and when the file printing instruction is detected, acquiring the user identification and the file identification carried by the file printing instruction.
2) When a login operation triggered based on a printing apparatus is detected, user information input based on the printing apparatus is acquired.
3) When it is determined that the user information coincides with the user identification, a print operation instruction triggered based on the printing apparatus is acquired.
4) Acquiring a file identifier carried by a printing operation instruction, determining the importance degree of the content to be printed corresponding to the file identifier according to the file identifier, and determining a corresponding identification code identifier according to the importance degree of the content to be printed.
5) When the printing paper to be printed is detected, the corresponding identification code identification is added to the detected printing paper in response to a printing operation instruction.
6) And acquiring the content to be printed corresponding to the file identifier, and printing the content to be printed onto the printing paper added with the identification code identifier.
7) When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printed file record from the historical printed records according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-audited printed file record.
8) And when the printing file carrying the printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file.
9) And according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on the different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
10) And comparing the target identification code identification with the identification code identification to generate a comparison result, and acquiring the printing content corresponding to the printing file record to be audited when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result.
11) And detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
12) When a destruction instruction for printing paper carrying the identification code identification is detected, responding to the destruction instruction, executing the printing file destruction operation, and deleting the file printing record corresponding to the identification code identification from the historical printing record.
13) And when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction.
14) And extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records.
15) And when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification.
According to the risk management and control method based on the printed file, when a file printing instruction is detected, a user identifier carried by the file printing instruction is obtained, and when login operation triggered based on the printing equipment is detected, user information input based on the printing equipment is obtained. And when the user information is determined to be consistent with the user identification, adding a preset identification code identification to the detected printing paper according to the printing operation instruction. When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printing file record from the historical printing records, and acquiring a target identification code identifier of the to-be-audited printing file record. And when a printed file carrying the printing content is detected, acquiring an identification code identifier carried by the printed file according to the scanning equipment, and further carrying out security risk management and control on the printed file according to a comparison result of the target identification code identifier and the identification code identifier. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
It should be understood that although the various steps in the flow charts of fig. 2-4 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-4 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 5, there is provided a risk management apparatus based on a print file, including: a user identifier obtaining module 502, a user information obtaining module 504, a printing operation instruction obtaining module 506, a target identification code identifier obtaining module 508, an identification code identifier obtaining module 510, and a risk management and control module 512, wherein:
the user identifier obtaining module 502 is configured to, when a file printing instruction is detected, obtain a user identifier carried in the file printing instruction.
A user information obtaining module 504, configured to obtain user information input based on the printing device when a login operation triggered based on the printing device is detected.
A printing operation instruction obtaining module 506, configured to obtain a printing operation instruction triggered based on the printing device when it is determined that the user information is consistent with the user identifier, and add a preset identification code identifier to the detected printing paper according to the printing operation instruction.
And the target identification code identification obtaining module 508 is configured to, when a file random check instruction is detected within a preset audit period, randomly extract a to-be-audited print file record from the historical print records according to the file random check instruction, and obtain a target identification code identification corresponding to the to-be-audited print file record.
An identification code identifier obtaining module 510, configured to, when a printed file carrying print content is detected, obtain an identification code identifier carried by the printed file according to a scanning device.
And the risk management and control module 512 is configured to compare the target identification code identifier with the identification code identifier, generate a comparison result, and perform security risk management and control on the printed file according to the comparison result.
In the risk management and control device based on the printed file, when a file printing instruction is detected, a user identifier carried by the file printing instruction is acquired, and when a login operation triggered based on the printing equipment is detected, user information input based on the printing equipment is acquired. And when the user information is determined to be consistent with the user identification, adding a preset identification code identification to the detected printing paper according to the printing operation instruction. When a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printing file record from the historical printing records, and acquiring a target identification code identifier of the to-be-audited printing file record. And when a printed file carrying the printing content is detected, acquiring an identification code identifier carried by the printed file according to the scanning equipment, and further carrying out security risk management and control on the printed file according to a comparison result of the target identification code identifier and the identification code identifier. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
In one embodiment, the print operation instruction obtaining module is further configured to:
in this embodiment, when it is determined that the user information is consistent with the user identifier, the printing operation instruction triggered based on the printing device and the carried file identifier are acquired, the importance degree of the content to be printed corresponding to the file identifier is determined according to the file identifier, and then the identifier corresponding to the importance degree of the content to be printed is determined. When the printing paper to be printed is detected, the corresponding identification code identification is added to the detected printing paper in response to a printing operation instruction. According to the method, the corresponding identification code identification is added to the printing paper, so that the full life cycle of the printed file is monitored and risk control is realized, the problem of information leakage caused by improper use and control of the printed file is avoided, and the information security of enterprises is improved.
In one embodiment, a risk management and control device based on a print file is provided, further comprising:
and the printing file destroying module is used for responding to a destroying instruction when the destroying instruction for the printing paper carrying the identification code identification is detected, executing the printing file destroying operation and deleting the file printing record corresponding to the identification code identification from the historical printing record.
In this embodiment, when detecting to trigger the destruction instruction to the printing paper that carries the identification code sign, respond to and destroy the instruction, carry out and print file and destroy the operation to the file printing record that corresponds with the identification code sign is deleted from the history printing record, destroys the file through in time having printed, avoids printing the file and uses the problem that the management and control is improper and lead to information leakage, thereby promotes enterprise information security.
In one embodiment, a risk management and control device based on a print file is provided, further comprising:
the printing file monitoring cancellation instruction detection module is used for acquiring a user identifier and a file identifier corresponding to a printing file monitoring cancellation instruction when the printing file monitoring cancellation instruction triggered by a user is detected;
the auditing and checking module is used for extracting the user information and the auditing record corresponding to the user identification and auditing and checking the user information and the auditing record;
and the monitoring mechanism removing module is used for responding to a printing file monitoring canceling instruction when the user information and the audit record are confirmed to pass the audit, marking the file identification as desensitized use, and removing the monitoring mechanism of the printing file record corresponding to the user identification.
In this embodiment, when a print file monitoring cancellation instruction triggered by a user is detected, a user identifier and a file identifier corresponding to the print file monitoring cancellation instruction are obtained, user information and an audit record corresponding to the user identifier are extracted, and the user information and the audit record are subjected to audit verification. And when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification. When the user information and the audit record are confirmed to pass the audit, the monitoring of the print file record corresponding to the user identification is timely released, unnecessary detection work is avoided for a long time, and therefore resource consumption is reduced.
In one embodiment, the risk management module is further to:
comparing the target identification code identification with the identification code identification to generate a corresponding comparison result; when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, acquiring the printing content corresponding to the printing file record to be audited; and detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
In one embodiment, the target identifier obtaining module is further configured to:
when a printing file carrying printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file; and according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on the different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
For the specific definition of the risk management device based on the print file, reference may be made to the above definition of the risk management method based on the print file, and details are not repeated here. The various modules in the above-described print file-based risk management apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be an all-in-one detection device, the internal structure of which may be as shown in FIG. 6. The integrated detection device comprises a detection device main body, and an image acquisition device, a scanning device, a magnetic induction instrument, a printing device, a display panel, a communication device, a paper shredding device, a memory and a processor which are arranged on the detection device main body. Wherein the processor of the integrated sensing device is configured to provide computational and control capabilities. The memory of the integrated detection device comprises a storage medium and an internal memory. The storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-storage medium. The communication equipment of the integrated detection equipment is used for being connected and communicated with an external terminal through a network. The computer program is executed by a processor to implement a method for risk management based on a printed document. The display panel of the integrated detection device can be a liquid crystal display screen or an electronic ink display screen covered with a touch screen. The image acquisition device of the integrated detection device may be a camera. This integral type check out test set's scanning device and magnetism are felt the appearance and are used for discerning the identification code sign that detects, and printing device is used for beating printing paper and adds the identification code sign to and will wait to print the content and print to beating printing paper that has added the identification code sign on, shredded paper equipment is used for destroying the processing to having printed the file.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, an integrated detection device is provided, which comprises a detection device main body, an image acquisition device, a scanning device, a magnetic induction instrument, a printing device, a display panel, a communication device, a paper shredding device, a memory and a processor, wherein the image acquisition device, the scanning device, the magnetic induction instrument, the printing device, the display panel, the communication device, the paper shredding device, the memory and the processor are arranged on the detection device main body; the memory stores a computer program that when executed by the processor performs the steps of:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
acquiring user information input based on a printing device when a login operation triggered based on the printing device is detected;
when the user information is determined to be consistent with the user identification, a printing operation instruction triggered based on the printing equipment is obtained, and a preset identification code identification is added to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printed file record from the historical printed records according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-audited printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment; and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk control on the printed file according to the comparison result.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
when the user information is determined to be consistent with the user identification, a printing operation instruction triggered based on the printing equipment is obtained;
acquiring a file identifier carried by a printing operation instruction; determining the importance degree of the content to be printed corresponding to the file identification according to the file identification;
determining a corresponding identification code identifier according to the importance degree of the content to be printed; when the printing paper to be printed is detected, the corresponding identification code identification is added to the detected printing paper in response to a printing operation instruction.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
when a printing file carrying printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file; and according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on the different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
when a destruction instruction for printing paper carrying an identification code identifier is detected, responding to the destruction instruction, executing a printing file destruction operation, and deleting a file printing record corresponding to the identification code identifier from a historical printing record; the file printing record and the history printing record are stored in the block chain.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction;
extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records;
and when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
comparing the target identification code identification with the identification code identification to generate a corresponding comparison result;
when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, acquiring the printing content corresponding to the printing file record to be audited;
and detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
In one embodiment, a computer storage medium is provided, having a computer program stored thereon, the computer program, when executed by a processor, implementing the steps of:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
acquiring user information input based on a printing device when a login operation triggered based on the printing device is detected;
when the user information is determined to be consistent with the user identification, a printing operation instruction triggered based on the printing equipment is obtained, and a preset identification code identification is added to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-audited printed file record from the historical printed records according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-audited printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment; and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk control on the printed file according to the comparison result.
In one embodiment, the computer program when executed by the processor further performs the steps of:
when the user information is determined to be consistent with the user identification, a printing operation instruction triggered based on the printing equipment is obtained;
acquiring a file identifier carried by a printing operation instruction; determining the importance degree of the content to be printed corresponding to the file identification according to the file identification; determining a corresponding identification code identifier according to the importance degree of the content to be printed;
when the printing paper to be printed is detected, the corresponding identification code identification is added to the detected printing paper in response to a printing operation instruction.
In one embodiment, the computer program when executed by the processor further performs the steps of:
when a printing file carrying printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file; and according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on the different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
In one embodiment, the computer program when executed by the processor further performs the steps of:
when a destruction instruction for printing paper carrying an identification code identifier is detected, responding to the destruction instruction, executing a printing file destruction operation, and deleting a file printing record corresponding to the identification code identifier from a historical printing record; the file printing record and the history printing record are stored in the block chain.
In one embodiment, the computer program when executed by the processor further performs the steps of:
when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction;
extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records;
and when the user information and the audit record are confirmed to pass the audit, responding to a print file monitoring canceling instruction, marking the file identification as desensitized use, and removing a monitoring mechanism of the print file record corresponding to the user identification.
In one embodiment, the computer program when executed by the processor further performs the steps of:
comparing the target identification code identification with the identification code identification to generate a corresponding comparison result;
when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, acquiring the printing content corresponding to the printing file record to be audited;
and detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for risk management and control based on printed files, the method comprising:
when a file printing instruction is detected, acquiring a user identifier carried by the file printing instruction;
when a login operation triggered by a printing device is detected, acquiring user information input by the printing device;
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
when a file random check instruction is detected in a preset audit period, randomly extracting a to-be-checked printed file record from a historical printed record according to the file random check instruction, and acquiring a target identification code identifier corresponding to the to-be-checked printed file record;
when a printed file carrying printing content is detected, acquiring an identification code identifier carried by the printed file according to scanning equipment;
and comparing the target identification code identification with the identification code identification to generate a comparison result, and carrying out security risk management and control on the printed file according to the comparison result.
2. The method according to claim 1, wherein when it is determined that the user information coincides with the user identifier, acquiring a print operation instruction triggered based on the printing apparatus, and adding a preset identifier to the detected printing paper in response to the print operation instruction, comprises:
when the user information is determined to be consistent with the user identification, acquiring a printing operation instruction triggered based on the printing equipment;
acquiring a file identifier carried by the printing operation instruction;
determining the importance degree of the content to be printed corresponding to the file identification according to the file identification;
determining a corresponding identification code identifier according to the importance degree of the content to be printed;
and when the printing paper to be printed is detected, responding to the printing operation instruction, and adding the corresponding identification code identification to the detected printing paper.
3. The method according to claim 2, wherein when detecting a printed file carrying print content, acquiring an identification code identifier carried by the printed file according to a scanning device comprises:
when a printing file carrying printing content is detected, correcting the placement position of the printing file to obtain a corrected printing file;
and according to the scanning equipment, identifying different display positions on the corrected printed file, acquiring identification codes on different display positions, and determining the identification codes as identification code identifiers carried by the printed file.
4. The method according to any one of claims 1 or 3, further comprising:
when a destruction instruction for printing paper carrying an identification code identifier is detected, responding to the destruction instruction, executing a printing file destruction operation, and deleting a file printing record corresponding to the identification code identifier from a historical printing record; and the file printing record and the historical printing record are stored in a block chain.
5. The method according to any one of claims 1 or 3, further comprising:
when a print file monitoring canceling instruction triggered by a user is detected, acquiring a user identifier and a file identifier corresponding to the print file monitoring canceling instruction;
extracting user information and audit records corresponding to the user identification, and performing audit verification on the user information and the audit records;
and when the user information and the audit record are confirmed to pass the audit, responding to the print file monitoring canceling instruction, marking the file identification as desensitized use, and canceling the monitoring mechanism of the print file record corresponding to the user identification.
6. The method according to any one of claims 1 or 3, wherein comparing the target identifier with the identifier to generate a comparison result, and performing security risk control on the printed document according to the comparison result comprises:
comparing the target identification code identification with the identification code identification to generate a corresponding comparison result;
when the identification code identification is determined to be inconsistent with the target identification code identification according to the comparison result, acquiring the printing content corresponding to the to-be-audited printing file record;
and detecting the information sensitivity of the printing content, and carrying out security risk control on the printed file according to the information sensitivity.
7. A risk management and control apparatus based on a printed document, the apparatus comprising:
the user identification acquisition module is used for acquiring a user identification carried by a file printing instruction when the file printing instruction is detected;
the system comprises a user information acquisition module, a login control module and a login control module, wherein the user information acquisition module is used for acquiring user information input based on printing equipment when login operation triggered based on the printing equipment is detected;
a printing operation instruction acquisition module, which is used for acquiring a printing operation instruction triggered based on the printing equipment when the fact that the user information is consistent with the user identification is determined, and adding a preset identification code identification to the detected printing paper according to the printing operation instruction;
the target identification code identification acquisition module is used for randomly extracting a printing file record to be checked from a historical printing record according to a file random inspection instruction when the file random inspection instruction is detected in a preset audit period, and acquiring a target identification code identification corresponding to the printing file record to be checked;
the identification code identification acquisition module is used for acquiring an identification code identification carried by a printed file according to scanning equipment when the printed file carrying the printing content is detected;
and the risk management and control module is used for comparing the target identification code identification with the identification code identification, generating a comparison result and carrying out security risk management and control on the printed file according to the comparison result.
8. The apparatus of claim 7, further comprising:
and the printing file destroying module is used for responding to a destroying instruction when the destroying instruction for the printing paper carrying the identification code identification is detected, executing the printing file destroying operation and deleting the file printing record corresponding to the identification code identification from the historical printing record.
9. An integrated detection device comprises a detection device main body, an image acquisition device, a scanning device, a magnetic induction instrument, a printing device, a display panel, a communication device, a paper shredding device, a memory and a processor, wherein the image acquisition device, the scanning device, the magnetic induction instrument, the printing device, the display panel, the communication device, the paper shredding device, the memory and the processor are arranged on the detection device main body; the memory stores a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A computer storage medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202011190115.3A 2020-10-30 2020-10-30 Risk management and control method and device based on printed file and integrated detection equipment Pending CN112307498A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011190115.3A CN112307498A (en) 2020-10-30 2020-10-30 Risk management and control method and device based on printed file and integrated detection equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011190115.3A CN112307498A (en) 2020-10-30 2020-10-30 Risk management and control method and device based on printed file and integrated detection equipment

Publications (1)

Publication Number Publication Date
CN112307498A true CN112307498A (en) 2021-02-02

Family

ID=74332772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011190115.3A Pending CN112307498A (en) 2020-10-30 2020-10-30 Risk management and control method and device based on printed file and integrated detection equipment

Country Status (1)

Country Link
CN (1) CN112307498A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969842A (en) * 2022-07-29 2022-08-30 江苏羽驰区块链科技研究院有限公司 Credible file approval and printing method based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1849813A (en) * 2003-09-12 2006-10-18 冲电气工业株式会社 Printed matter processing system, watermark-containing document printing device, watermark-containing document read device, printed matter processing method, information read device, and information r
CN101652744A (en) * 2007-12-07 2010-02-17 日立软件工程株式会社 Printing management system, printing management method, and program
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
US20160154615A1 (en) * 2014-12-01 2016-06-02 Brother Kogyo Kabushiki Kaisha Printing system, printer, and information processing apparatus
CN110851085A (en) * 2019-10-11 2020-02-28 杭州珐珞斯科技有限公司 Cloud printing method, server, cloud box, system and computer equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1849813A (en) * 2003-09-12 2006-10-18 冲电气工业株式会社 Printed matter processing system, watermark-containing document printing device, watermark-containing document read device, printed matter processing method, information read device, and information r
CN101652744A (en) * 2007-12-07 2010-02-17 日立软件工程株式会社 Printing management system, printing management method, and program
CN102541482A (en) * 2010-12-27 2012-07-04 北大方正集团有限公司 Method and system for document printing control and document tracing
US20160154615A1 (en) * 2014-12-01 2016-06-02 Brother Kogyo Kabushiki Kaisha Printing system, printer, and information processing apparatus
CN110851085A (en) * 2019-10-11 2020-02-28 杭州珐珞斯科技有限公司 Cloud printing method, server, cloud box, system and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114969842A (en) * 2022-07-29 2022-08-30 江苏羽驰区块链科技研究院有限公司 Credible file approval and printing method based on block chain

Similar Documents

Publication Publication Date Title
CA2925325C (en) Document authentication based on expected wear
JP5396852B2 (en) Signature system, signature device, signature verification device, and program
US11899816B2 (en) Batch tokenization service
CN102271927A (en) System and processes for protection of paper documents against falsification, adulteration and leakage
US20130161387A1 (en) Method and apparatus for generating printed documents with invisible printed conductive patterns as security features for detecting unauthorized copying and alterations
CN115238286A (en) Data protection method and device, computer equipment and storage medium
JP2013025571A (en) Card issue system and card issue method
JP5659505B2 (en) Authentication apparatus and authentication method
JP4960023B2 (en) Image reading apparatus, authentication method, evaluation system, evaluation method, and program
CN115270186A (en) Method, device, computer equipment and storage medium for desensitizing log
CN112307498A (en) Risk management and control method and device based on printed file and integrated detection equipment
CN114626079A (en) File viewing method, device, equipment and storage medium based on user permission
US11537737B2 (en) De-tokenization patterns and solutions
US20080307233A1 (en) Encoded Data Security Mechanism
JP2020135690A (en) Electronic approval device, method and program
CN115544566A (en) Log desensitization method, device, equipment and storage medium
JP5044936B2 (en) Server and program
WO2023172190A1 (en) Method and apparatus for accessing data in a plurality of machine readable medium
CN102880831A (en) Method for securely copying confidential paper
EP1116176B1 (en) Information card
CN111712831A (en) Signature method, system and/or device
JP7083055B1 (en) Issuing device, authentication device, authentication system, issuing method, and information code
JP6167671B2 (en) Image forming apparatus, program, and examination system
JP3375111B2 (en) Inspection method and method of program in IC card
US11966488B2 (en) De-tokenization patterns and solutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210202

WD01 Invention patent application deemed withdrawn after publication