CN112329064A - Electronic document safety management system and method based on digital mark - Google Patents

Electronic document safety management system and method based on digital mark Download PDF

Info

Publication number
CN112329064A
CN112329064A CN202011257628.1A CN202011257628A CN112329064A CN 112329064 A CN112329064 A CN 112329064A CN 202011257628 A CN202011257628 A CN 202011257628A CN 112329064 A CN112329064 A CN 112329064A
Authority
CN
China
Prior art keywords
document
electronic document
security
module
digital mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011257628.1A
Other languages
Chinese (zh)
Inventor
余鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Chenya Technology Co ltd
Original Assignee
Wuhan Chenya Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Chenya Technology Co ltd filed Critical Wuhan Chenya Technology Co ltd
Priority to CN202011257628.1A priority Critical patent/CN112329064A/en
Publication of CN112329064A publication Critical patent/CN112329064A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention provides an electronic document safety management system and method based on digital marks, wherein the system comprises: the system comprises a digital mark generation module, a document safe use module, a document safe circulation module and a document safe output module; the method specifically comprises the following steps: generating a security attribute for the electronic document by using the digital mark generation module, and digitally marking the electronic document according to the security attribute; the document security use module is used for carrying out security control and audit on the use of the digitally marked electronic document; the document security circulation module is used for carrying out security control and audit on circulation of the digitally marked electronic document; and utilizing the document safety output module to perform safety control and audit on the output of the digitally marked electronic document. The invention relies on the block chain technology and the digital marking method, solves the problem of the safety management of the electronic document, and greatly improves the overall safety and the use efficiency of the electronic document safety management system.

Description

Electronic document safety management system and method based on digital mark
Technical Field
The invention relates to the field of document security technology management, in particular to an electronic document security management system and method based on digital marks.
Background
Information data such as electronic documents and the like are core assets of companies, are life lines of enterprises, and protect data security is a source basic work for protecting national secrets, business secrets and personal privacy. At present, mainstream schemes for electronic document security protection and data leakage prevention at home and abroad lack a unique identity mark facing data and a uniform security control method based on the mark, so that a uniform data security control 'hand grip' is lacked in the links of data generation, use, circulation, outgoing, filing, output and the like, and trusted transmission and control connection cannot be performed between each business system and a security product. Moreover, the data computing environment lacks the capability of recognizing the 'strange oneself' and the insights and identification methods of behaviors, so that the data of cross-platform, cross-application and cross-service cannot be recognized and audited quickly and efficiently in the processes of data use, network transmission, boundary exchange and the like, and sensitive information and malicious behaviors cannot be blocked quickly.
A blockchain is a non-falsifiable and non-falsifiable distributed book (also called a database) that connects data blocks in sequence in chronological order and is cryptographically secured. It has the characteristics of non-tamper, anti-counterfeiting, traceability and the like. In the block chain, each block contains the data fingerprints (hash values) of all data packets of the previous block, and when the data fingerprint (hash value) of the current block is calculated, the data fingerprint (hash value) of the previous block is also contained, so that a link relation is formed. Therefore, once any chunk is changed, all the data fingerprints (hash values) of the subsequent chunks are changed, all people can see and discover that the data is tampered, and all people cannot recognize invalid data. This ensures that the chunk data is not tampered with in the blockchain.
The existing document marking technology is insufficient in safety of watermarks, signatures and the like, corresponding attribute information is not bound with a document, a centralized database is mostly adopted for storage, document marks and attribute information are easy to separate and tamper, and a data center generally has the risk of single-point faults. By means of the advantages of the block chain technology, the safety problem of the electronic documents can be well solved, and the overall safety and the using efficiency of the system are greatly improved.
Disclosure of Invention
In view of the fact that the mainstream schemes for electronic document security protection and data leakage prevention at home and abroad at present lack of unique identity marks facing data and a uniform security control method based on marks, the existing document marking technology is insufficient in security including watermarks, signatures and the like, corresponding attribute information is not bound with documents, centralized storage is mostly adopted, marks and attributes are easy to separate and are tampered, and the risk of single-point failure of a data center exists. The invention adopts the technical scheme that a digital mark-based electronic document safety management system and a digital mark-based electronic document safety management method are provided based on a block chain technology and a digital mark management and control technology.
The system of the invention comprises: the system comprises a digital mark generation module, a document safe use module, a document safe circulation module and a document safe output module.
The digital mark generation module is used for generating security attributes of the electronic documents, digitally marking the electronic documents according to the security attributes, and respectively outputting the digitally marked electronic documents to the document security use module, the document security circulation module and the document security output module;
the document safe use module is used for carrying out safe control and audit on the use (opening, browsing and the like) of the digitally marked electronic document at the PC end;
the document security circulation module is used for performing security control and audit on circulation (OA, mail and the like) of the digitally marked electronic document at different PC terminals;
the document safety output module is used for carrying out safety control and audit on the output (printing, burning and the like) of the electronic document after the digital mark.
The method specifically comprises the following steps:
s1: generating a security attribute for the electronic document by using the digital mark generation module, and digitally marking the electronic document according to the security attribute; respectively outputting the digitally marked electronic documents to a document safety use module, a document safety circulation module and a document safety output module;
s2: the document security use module is used for carrying out security control and audit on the use of the digitally marked electronic document at the PC end;
the document security circulation module is used for carrying out security control and audit on circulation of the digitally marked electronic document at different PC terminals;
and utilizing the document safety output module to perform safety control and audit on the output of the digitally marked electronic document.
The invention has the beneficial effects that:
(1) the invention relies on the advantages of the block chain technology to design an electronic document security management system based on digital marks, which comprises: the system comprises a mark safety generation module, a document safety use module, a document safety circulation module and a document safety output module, and realizes safety protection and supervision on the whole life cycle of the electronic document based on the identity mark, so that the safety management problem of the electronic document is solved, and the overall safety and the use efficiency of the system are greatly improved.
(2) A method for generating an electronic document identity tag is designed for the system, and the identity tag, attribute information and the electronic document are spliced and fused, so that each electronic document has a globally unique identity tag and corresponding attributes.
Drawings
FIG. 1 is a logical relationship diagram of modules of a digital mark-based electronic document security management system according to an embodiment of the present invention;
FIG. 2 is a flow chart of security attribute generation and binding of an electronic document security management system based on digital mark in the embodiment of the present invention;
FIG. 3 is a diagram illustrating a document chain block of an electronic document security management system based on digital mark in an embodiment of the present invention;
FIG. 4 is a flowchart of document access control in an electronic document security management system based on digital mark-up according to an embodiment of the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be further described with reference to the accompanying drawings.
Please refer to fig. 1, fig. 1 is a logic relationship diagram of modules of an electronic document security management system based on digital mark according to an embodiment of the present invention;
the embodiment provides an electronic document security management system based on digital marks, which comprises: the system comprises a digital mark generation module, a document safe use module, a document safe circulation module and a document safe output module;
the digital mark generation module is used for generating security attributes of the electronic documents, digitally marking the electronic documents according to the security attributes, and respectively outputting the digitally marked electronic documents to the document security use module, the document security circulation module and the document security output module;
the document safety use module is used for carrying out safety control and audit on the use (opening, browsing and the like) of the digitally marked electronic document at the PC end;
the document security circulation module is used for performing security control and audit on circulation (OA, e-mail and the like) of the digitally marked electronic document at different PC terminals;
and the document safety output module is used for carrying out safety control and audit on the output (printing, burning and the like) of the electronic document after the digital mark.
The embodiment also provides an electronic document security management method based on digital marks, which is applied to an electronic document security management system based on digital marks and comprises the following specific steps:
s1: generating security attributes for the electronic documents by using a digital mark generation module, and digitally marking the electronic documents according to the security attributes; respectively outputting the digitally marked electronic documents to a document safety use module, a document safety circulation module and a document safety output module;
in this embodiment, the digital mark generation module generates a security attribute including a unique identity ID, a document content Hash value, and an important Level value of a document for each important electronic document at a PC terminal, writes the security attribute value into a corresponding block in a document chain using a block chain technique, and writes the unique identity ID into Metadata of the electronic document. Each electronic document has a unique identity ID which can be rapidly identified, and the binding and the non-tampering of the identity ID and the electronic document are guaranteed through a block chain technology.
Please refer to fig. 2 for the main steps and flow of generating and binding the security attribute related to the digital mark generating module, wherein the specific flow is as follows:
1) the digital mark generation module monitors the operation of 'setting digital mark' of a PC terminal user, and specifically, the user selects 'setting digital mark' for a certain electronic document through a right-click menu.
2) The digital mark generation module generates a unique identity ID of the electronic document and calculates a Hash value of the document. The Unique ID of the electronic document may be implemented by using UUID, which is an abbreviation of universal Unique Identifier (universal Unique Identifier), and is derived from DCE (Distributed Computing Environment) specification of OSF (Open Software Foundation), and the UUID may enable all elements in the Distributed system to have Unique identification information. To ensure the uniqueness of the UUID, the specification defines elements including the network card MAC address, timestamp, Namespace (Namespace), random or pseudo-random numbers, timing, and the like, as well as algorithms to generate the UUID from these elements. In a specific coding implementation, for example, JDK itself provides the method randomUUID () that generates UUID.
3) The digital mark generation module acquires an 'important Level value' set by a user through a human-computer interaction interface for 'setting digital marks' in the step 1), wherein the Level value can be set to be in the forms of '1, 2, 3' or 'important, common' and the like.
4) After the user finishes the operation of setting a digital mark and closes the man-machine interaction interface, the digital mark generation module writes the identity ID generated in the step 2) into the Metadata of the electronic document by calling a standard interface of an operating system, so as to realize the fusion of the unique identity ID and the electronic document; and (3) taking the identity ID and the Hash value generated in the step 2) and the level value generated in the step 3) as the security attribute value of the electronic document, and writing the security attribute value and the Hash value into a corresponding block in a document chain adopting a block chain technology, referring to fig. 3, thereby realizing the non-falsification of the binding relationship between the identity ID and the electronic document.
S2: the document security use module is used for carrying out security control and audit on the use of the digitally marked electronic document at the PC end;
the document security circulation module is used for carrying out security control and audit on circulation of the digitally marked electronic document at different PC terminals;
and carrying out safety control and audit on the output of the digitally marked electronic document by using a document safety output module.
In the embodiment, the PC terminal of the document safe use module identifies each important electronic document and controls the use authority. Taking a scene that a user opens a certain electronic document by double-click at a PC terminal as an example, the document safe use module monitors double-click operation of the user on the electronic document, intercepts and filters the operation, and increases control over the document opening authority. Referring to fig. 4, the specific steps and processes are as follows:
1) the document safe use module monitors the operation of opening the electronic document by a user, scans Metadata of the electronic document and judges whether the electronic document has a UUID or not;
2) if the UUID exists, the electronic document is an important electronic document set by a user and contains security attributes such as digital marks, and the step 3) is carried out; otherwise, the electronic document is shown to be a common document, the document is normally opened, the process is terminated, and the step 7) is carried out;
3) comparing the read UUID with the UUID of each block of the document chain, and if the same UUID exists, entering the step 4); otherwise, the electronic document is damaged, the user is prompted to be abnormal, the process is terminated, and the step 7) is carried out;
4) calculating a Hash value of the electronic document, comparing the Hash value with the Hash value of the block where the UUID is located in the document chain, and entering the step 5) if the two Hash values are the same; otherwise, the electronic document is damaged, the user is prompted to be abnormal, the process is terminated, and the step 7) is carried out;
5) comparing the Level value of the block where the UUID is located in the document chain with the Level value of the current user (obtained from an identity authentication system such as CA or the like or the existing system such as OA and the like), and entering step 6 if the Level value of the user is greater than the Level value of the document); otherwise, prompting that the access right is not enough, terminating the process and entering the step 7);
6) normally opening the electronic document, and normally browsing the electronic document by a current user;
7) and (6) ending.
The document security circulation module in the embodiment is similar to the document security use module in the working principle, and monitors and controls access to an event that a user circulates by using a document, including but not limited to scenarios such as sending through an OA attachment and sending an email attachment. When the electronic document is uploaded to application systems such as OA and mails as an attachment, the application systems sequentially identify and compare the security attributes of the electronic document through a document security circulation module, firstly judge the type, authenticity and integrity of the electronic document through UUID and Hash values and judge whether the electronic document is damaged or not, and then compare the Level value of the electronic document with the Level value of a receiver. After the comparison is passed, the electronic document can be normally sent to the receiver through application systems such as OA, mail and the like, otherwise, the document is prompted to be damaged or the access authority is not enough, and the divulgence event caused by the fact that high-level important files are transferred to low-level users is prevented.
The document security output module in this embodiment is similar to the document security circulation module in the working principle, and monitors and controls access to an event that a user uses an electronic document to output, including but not limited to, through printing, burning and other scenes. When the electronic document is printed or recorded, the printing and recording auditing system sequentially identifies and compares the security attributes of the electronic document through the document security output module, firstly judges the type, authenticity and integrity of the electronic document through UUID and Hash values and judges whether the electronic document is damaged or not, and then compares the Level value of the electronic document with the Level value of the current printing or recording personnel. After the comparison is passed, the electronic document can be normally output through a printing and recording auditing system, otherwise, the electronic document is prompted to be damaged or the access authority is insufficient, and a secret divulging event caused by outputting high-level important files to low-level users is prevented.
The innovation points of the invention are as follows:
(1) designing a generation method of electronic document identity tags, splicing and fusing the identity tags and attribute information with electronic documents, and realizing that each electronic document has a globally unique identity tag and corresponding attributes.
(2) Designing modules such as an identity mark safety generation module, a document safety use module, a document safety circulation module, a document safety output module and the like, and realizing safety protection and supervision on the whole life cycle of the electronic document based on the identity mark.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A digital mark-based electronic document security management system, the system comprising: the system comprises a digital mark generation module, a document safe use module, a document safe circulation module and a document safe output module;
the digital mark generation module is used for generating security attributes of the electronic documents, digitally marking the electronic documents according to the security attributes, and respectively outputting the digitally marked electronic documents to the document security use module, the document security circulation module and the document security output module;
the document safe use module is used for carrying out safe control and audit on the use of the digitally marked electronic document;
the document security circulation module is used for performing security control and audit on circulation of the digitally marked electronic document;
and the document safety output module is used for carrying out safety control and audit on the output of the digitally marked electronic document.
2. A digital mark-based electronic document security management method applied to the digital mark-based electronic document security management system according to claim 1, wherein the method comprises the following specific steps:
s1: generating a security attribute for the electronic document by using the digital mark generation module, and digitally marking the electronic document according to the security attribute; respectively outputting the digitally marked electronic documents to a document safety use module, a document safety circulation module and a document safety output module;
s2: the document security use module is used for carrying out security control and audit on the use of the digitally marked electronic document;
the document security circulation module is used for carrying out security control and audit on circulation of the digitally marked electronic document;
and utilizing the document safety output module to perform safety control and audit on the output of the digitally marked electronic document.
3. The digital mark-based electronic document security management system according to claim 2, wherein the digital mark module generates security attributes for the electronic document in step S1, the security attributes including: the unique identity ID, the Hash value of the content of the electronic document and the Level value of the important Level of the electronic document;
the unique identity ID of the electronic document is realized by adopting a UUID.
4. The digital mark-based electronic document security management system according to claim 2, wherein in step S2, said use of the electronic document includes: opening the electronic document and browsing the electronic document;
the circulation of the electronic document includes: sending the electronic document through an OA attachment and sending the electronic document through an email attachment;
the outputting of the electronic document includes: printing the electronic document and burning the electronic document.
5. The digital mark-based electronic document security management method according to claim 3, wherein the steps of generating the security attribute for the electronic document by using the digital mark generation module and digitally marking the electronic document according to the security attribute in step S1 are as follows:
s11, the digital mark generation module monitors the operation of 'setting digital mark' of the user;
s12, generating the unique ID of the electronic document by the digital mark generation module, and calculating the Hash value of the electronic document;
s13, the digital mark generation module obtains the ' important Level value ' set by the user through the man-machine interaction interface ' of ' setting digital mark ' in the step S11;
s14, after the operation of 'setting digital mark' is finished and the man-machine interaction interface is closed, the digital mark generating module writes the ID generated in the step S12 into the Metadata of the electronic document by calling the standard interface of the operating system, so as to realize the fusion of the unique ID and the electronic document; and writing the identity ID and the Hash value generated in the step S12 and the level value generated in the step S13 as the security attribute value of the electronic document into a corresponding block in a document chain adopting a block chain technology, so as to realize the binding of the identity ID and the electronic document.
6. The method according to claim 3, wherein the step S2 of using the document security module to perform security control and audit on the digitally signed electronic document includes the specific steps of;
s201, a document safe use module monitors the operation of opening an electronic document by a user, scans Metadata of the electronic document and judges whether the electronic document has a UUID or not;
s202, if the UUID exists, the electronic document is an important document set by a user and contains the security attribute of a digital mark, and the step S203 is executed; otherwise, the electronic document is a general document, and the process directly goes to step S206;
s203, comparing the read UUIDs with the UUIDs of all blocks of the document chain, and if the same UUIDs exist, entering the step S204; otherwise, the electronic document is damaged, an exception is prompted to the user, the process is terminated, and the step S207 is entered;
s204, calculating a Hash value of the electronic document, comparing the Hash value with the Hash value of the block where the UUID is located in the document chain, and if the two Hash values are the same, entering the step S205; otherwise, the electronic document is damaged, an exception is prompted to the user, the process is terminated, and the step S207 is entered;
s205, comparing the Level value of the block where the UUID is located in the document chain with the Level value of the current user, and if the Level value of the user is larger than the Level value of the document, entering S206; otherwise, prompting that the access right is not enough, terminating the process, and entering step S207;
s206, normally opening the electronic document, and normally browsing the electronic document by the current user;
and S207, ending.
7. The method according to claim 3, wherein in step S2, said specific task of performing security control and audit on the circulation of the tagged electronic document by using the document security circulation module is as follows:
s211, the document security circulation module monitors that when a user uploads an electronic document to an OA (office automation) and mail application system as an attachment, the Metadata of the electronic document is scanned, and whether the electronic document has a UUID (user identifier) or not is judged;
s212, if the UUID exists, the electronic document is an important document set by a user and contains the security attribute of the digital mark, and the step S213 is carried out; otherwise, the electronic document is a general document, and the process directly proceeds to step S216;
s213, comparing the read UUIDs with the UUIDs of the blocks of the document chain, and if the same UUIDs exist, entering the step S214; otherwise, the electronic document is damaged, an exception is prompted to the user, the process is terminated, and the step S217 is carried out;
s214, calculating a Hash value of the electronic document, comparing the Hash value with the Hash value of the block where the UUID is located in the document chain, and if the two Hash values are the same, entering the step S215; otherwise, the electronic document is damaged, an exception is prompted to the user, the process is terminated, and the step S217 is carried out;
s215, comparing the Level value of the block where the UUID is located in the document chain with the Level value of the current user, and if the Level value of the user is larger than the Level value of the document, entering the step S216; otherwise, prompting that the access right is not enough, terminating the process, and entering step S217;
s216, normally sending the electronic document;
and S217, ending.
8. The electronic document security management method based on digital mark as claimed in claim 3, wherein in step S2, said document security output module performs security control and audit on the output of the marked electronic document, specifically working as:
s221, when the document safety output module monitors that a user prints or records the electronic document, scanning Metadata of the electronic document, and judging whether the document has a UUID or not;
s222, if the UUID exists, the electronic document is an important document set by a user and contains the security attribute of the digital mark, and the step S223 is executed; otherwise, it indicates that the electronic document is a normal electronic document, and the process goes directly to step S226;
s223, comparing the read UUIDs with the UUIDs of all blocks of the document chain, and if the same UUIDs exist, entering the step S224; otherwise, the document is damaged, an exception is prompted to the user, the process is terminated, and the step S227 is entered;
s224, calculating a Hash value of the electronic document, comparing the Hash value with a Hash value of a block where the UUID is located in the document chain, and if the two Hash values are the same, entering the step S225; otherwise, the electronic document is damaged, an exception is prompted to the user, the process is terminated, and the step S227 is entered;
s225, comparing the Level value of the block where the UUID is located in the document chain with the Level value of the current user, and if the Level value of the user is larger than the Level value of the document, entering the step S226; otherwise, prompting that the access right is not enough, terminating the process, and entering step S227;
s226, normally printing or burning the electronic document;
and S227, ending.
CN202011257628.1A 2020-11-11 2020-11-11 Electronic document safety management system and method based on digital mark Pending CN112329064A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011257628.1A CN112329064A (en) 2020-11-11 2020-11-11 Electronic document safety management system and method based on digital mark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011257628.1A CN112329064A (en) 2020-11-11 2020-11-11 Electronic document safety management system and method based on digital mark

Publications (1)

Publication Number Publication Date
CN112329064A true CN112329064A (en) 2021-02-05

Family

ID=74317903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011257628.1A Pending CN112329064A (en) 2020-11-11 2020-11-11 Electronic document safety management system and method based on digital mark

Country Status (1)

Country Link
CN (1) CN112329064A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113037612A (en) * 2021-03-09 2021-06-25 西安四叶草信息技术有限公司 Method and device for distributing mails
CN116432210A (en) * 2023-06-13 2023-07-14 成都航空职业技术学院 File management method and system based on security protection

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090027553A (en) * 2007-09-12 2009-03-17 한국전자거래진흥원 Electronic document retention method and apparatus, dissemination method and apparatus, and recording medium storing program for performing the method thereof
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file
CN103824031A (en) * 2014-02-28 2014-05-28 江苏敏捷科技股份有限公司 Method and system for guaranteeing security of electronic documents by using electronic document security labels
CN105681034A (en) * 2016-02-24 2016-06-15 山东超越数控电子有限公司 Document secret management method and system based on digital labels
CN107180195A (en) * 2017-05-18 2017-09-19 北京计算机技术及应用研究所 Electronic document Life cycle safety protecting method based on safety label
CN107506366A (en) * 2017-06-27 2017-12-22 北京明朝万达科技股份有限公司 A kind of document life management method and system based on globally unique ID
WO2018139951A1 (en) * 2017-01-25 2018-08-02 Акционерное общество "Кросс технолоджис" System for placing a confidentiality mark in an electronic document
CN109508563A (en) * 2018-12-11 2019-03-22 南京大学 Electronic document authenticity guarantee method based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090027553A (en) * 2007-09-12 2009-03-17 한국전자거래진흥원 Electronic document retention method and apparatus, dissemination method and apparatus, and recording medium storing program for performing the method thereof
CN102006302A (en) * 2010-12-03 2011-04-06 中国软件与技术服务股份有限公司 Method for identifying security classification of electronic file
CN103824031A (en) * 2014-02-28 2014-05-28 江苏敏捷科技股份有限公司 Method and system for guaranteeing security of electronic documents by using electronic document security labels
CN105681034A (en) * 2016-02-24 2016-06-15 山东超越数控电子有限公司 Document secret management method and system based on digital labels
WO2018139951A1 (en) * 2017-01-25 2018-08-02 Акционерное общество "Кросс технолоджис" System for placing a confidentiality mark in an electronic document
CN107180195A (en) * 2017-05-18 2017-09-19 北京计算机技术及应用研究所 Electronic document Life cycle safety protecting method based on safety label
CN107506366A (en) * 2017-06-27 2017-12-22 北京明朝万达科技股份有限公司 A kind of document life management method and system based on globally unique ID
CN109508563A (en) * 2018-12-11 2019-03-22 南京大学 Electronic document authenticity guarantee method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘庆悦: "基于区块链技术的电子档案管理模型探析", 浙江档案, no. 10, 31 October 2018 (2018-10-31), pages 22 - 24 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113037612A (en) * 2021-03-09 2021-06-25 西安四叶草信息技术有限公司 Method and device for distributing mails
CN116432210A (en) * 2023-06-13 2023-07-14 成都航空职业技术学院 File management method and system based on security protection
CN116432210B (en) * 2023-06-13 2023-08-29 成都航空职业技术学院 File management method and system based on security protection

Similar Documents

Publication Publication Date Title
US11989323B1 (en) Information security implementations with extended capabilities
CN107577939B (en) Data leakage prevention method based on keyword technology
US11372994B2 (en) Security application for data security formatting, tagging and control
CA2791794C (en) A method and system for managing confidential information
JP5186363B2 (en) Cascading security architecture
CN103632080B (en) A kind of mobile data applications method for security protection based on USBKey
JP2008541273A5 (en)
WO2022139078A1 (en) Apparatus for providing e-mail security service using hierarchical architecture based on security level and operation method therefor
CN110795753A (en) File security protection system, file security sharing method and security reading method
CN115982764A (en) Method, system, device and medium for storing electronic file based on block chain
CN112329064A (en) Electronic document safety management system and method based on digital mark
EP1935132A2 (en) Processing encumbered electronic communications
CN108390857B (en) Method and device for exporting file from high-sensitivity network to low-sensitivity network
CN117313122A (en) Data sharing and exchanging management system based on block chain
CN111914300A (en) Document encryption device and method for preventing file leakage
CN116340908B (en) Multi-factor electronic watermark generation and tracing method
CN108446543B (en) Mail processing method, system and mail proxy gateway
CN112948870A (en) Electronic document security management method and management system based on big data
CN114254269B (en) System and method for determining rights of biological digital assets based on block chain technology
CN111639355A (en) Data security management method and system
Jain et al. A review on data leakage prevention using image steganography
CN116561777A (en) Data processing method and device
Bhushan et al. An overview on handling anti forensic issues in android devices using forensic automator tool
Stallings Data loss prevention as a privacy-enhancing technology
CN109271811B (en) Group signature-based electronic material evidence tamper-proof storage method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination