CN113704708A - Method and system for watermarking online preview of document based on browser - Google Patents
Method and system for watermarking online preview of document based on browser Download PDFInfo
- Publication number
- CN113704708A CN113704708A CN202110995538.0A CN202110995538A CN113704708A CN 113704708 A CN113704708 A CN 113704708A CN 202110995538 A CN202110995538 A CN 202110995538A CN 113704708 A CN113704708 A CN 113704708A
- Authority
- CN
- China
- Prior art keywords
- file
- operation log
- watermark
- user
- preview
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 claims description 12
- 238000006243 chemical reaction Methods 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 6
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method and a system for watermarking on-line preview of a document based on a browser, which receive a preview request of a user terminal; judging whether the user is legal or not; judging whether the user has the authority to preview the request file; extracting a unique preview file identifier from the request; acquiring a file from a database according to the unique identifier; acquiring metadata of a file, wherein the metadata comprises a file name, a file type and a file size; judging the file type and converting the file type into a picture set; converting the jpg picture set into a jpg picture set with a watermark; responding to a user request, and displaying the jpg picture set with the watermark to the user; and recording a browsing operation log. The method can be used for some confidential documents and pages for displaying intellectual property or confidential information, when the documents are captured, photographed or downloaded, the watermarks can be left on the surfaces of the documents, so that a divulgent can be warned to stop the divulging action, and even if the documents are leaked, the divulgent can be traced to a responsible person.
Description
Technical Field
The invention relates to the technical field of online browsing file confidentiality, in particular to a method and a system for watermarking online preview of a document based on a browser.
Background
With the continuous development of the current society, the requirement of many enterprises on information security is higher and higher, and the leakage of confidential information may cause huge loss to the enterprises. As long as the enterprise staff has certain authority, the confidential files can be easily acquired by means of screenshot, photographing or downloading and the like, and therefore the files can be leaked out in various manners. In addition, after the secret-related information is leaked, enterprises cannot trace the reason of the leakage.
In this age, the importance of intellectual property rights is self-evident, and the related areas are becoming wider and wider, such as design, literature and art works, and signs and images used in business, all of which can be regarded as intellectual property rights owned by a person or organization. In real life and virtual networks, it is common that various intellectual property rights are stolen. The theft of intellectual property not only causes economic loss to enterprises, but also can cause the brand effectiveness to be greatly reduced, intangible assets are greatly discounted, and more serious, civil disputes and even legal actions can be involved.
Therefore, in order to prevent information leakage or infringement of intellectual property rights, it is necessary to add watermarking to pages, pictures, and the like.
Disclosure of Invention
In order to overcome the defects, the invention aims to provide a method and a system for watermarking on-line preview of a document based on a browser.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a method for watermarking on-line preview of a document based on a browser comprises the following steps:
s1, receiving a preview request of a user terminal;
s2, judging whether the user is legal, if so, performing step S3, and if not, ending the request;
s3, judging whether the user has the authority to preview the request file, if so, performing step S4, and if not, ending the request;
s4, extracting the unique identification of the preview file from the request;
s5, acquiring a file from a database according to the unique identifier;
s6, obtaining metadata of the file, wherein the metadata comprises a file name, a file type and a file size;
s7, judging the file type and converting the file type into a picture set, if the file is a png, svg, bpm, jpg and other picture type file, directly converting the file into a jpg picture set, if the file is a pdf type file, converting each page of the direct pdf file into a picture to form a jpg picture set, if the file is other type files, if the file is a word, ppt and excel format office file, calling a jodconverter to convert the file into a pdf file, and converting each page of the pdf file into a picture to form a jpg picture set;
s8, converting the jpg picture set into a jpg picture set with a watermark;
s9, responding to a user request, and displaying the jpg picture set with the watermark to the user;
and S10, recording the browsing operation logs, sending the operation logs and the operation log digests of the browsing files to a block chain network by a private key signature, decrypting the operation logs signed by the private key by using a public key after the block chain network receives the operation logs, generating data blocks from the operation logs if decryption is successful, and storing the data blocks into a block chain account book.
S11, browsing the operation log for inquiry, searching the user operation log record by taking the watermark ID as a data table index, sending the operation log abstract to block chain network verification, feeding back the operation log to be true and effective through the block chain network verification, and preventing the operation log from being tampered.
A system for online previewing and watermarking a document based on a browser comprises a user request processing module, a file information acquisition module, a file type conversion module, an image conversion module and a watermark image generation module;
the user request processing module is used for receiving a user terminal request, carrying a unique preview file identifier and a user identity identifier in the request, judging whether the user identity is legal or not and whether the user has the preview authority of the file requested to be previewed or not, and rejecting the request if the identity is illegal or the preview authority is not available;
the file information taking module is used for searching a corresponding file storage position in a database through a preview file unique identifier carried by a user terminal request, and acquiring a required file name, a file size and a file type;
the file type conversion module converts different file types into a uniform picture set;
the watermark image generating module reads each image of the image set and adds a watermark to form a watermark image;
the operation log tamper-proof module utilizes the operation log of the block chain storage browsing file to prevent tampering;
the browsing log query module supports searching user operation log records by taking watermark ID as a data table index, and sends the operation log abstract to block chain network verification, and the block chain network verification feeds back the operation log to be real and effective and can prevent the operation log from being tampered.
Specifically, the watermark image generating module calculates the height and width of the watermark and the placement position according to the height and width of the image, and adds the user name, the browsing time and the watermark ID as watermark characters to the image by using an imagecopy method to form the image with the watermark.
Specifically, the watermark ID is used as an index of a user operation log, the watermark ID can be used as key query information of a background browsing log, a file preview date and a previewer can be queried through the watermark ID, the watermark ID is composed of 32-bit numeric letters, and the watermark ID is not repeated.
Specifically, the operation log tamper-proof module sends the operation log of the browsing file and the operation log abstract to the block chain network with a private key signature, the block chain network decrypts the operation log with a public key after receiving the operation log with the private key signature, and if decryption is successful, the operation log generates a data block, and the data block is stored in a block chain book.
Specifically, the data block includes a block body and a block header, the block header includes operation log information and an operation log digest of the browsing file, the operation log information includes information such as a watermark ID, a browsing user name, a browsing file name, and browsing time, and the block header includes a data block hash value and a timestamp.
The invention has the following beneficial effects: the JODConverter file converter is a Java Opendocument file converter, can convert a plurality of file formats, depends on services provided by OpenOffice.org or LibreOffice to convert, and can convert Microsoft Office documents (Word, Excel and PowerPoint) into PDF format; storing a browsing operation log by using a block chain, sending the operation log information and the summary information signed by a private key to a block chain network by the system, and storing the log into a block after the block chain network verifies that the signature is not problematic by using a public key; and verifying whether the operation log is valid or not by using the block chain, sending the operation log information and the summary information signed by the system through a private key to a block chain network, and feeding back the operation log to be true and valid if the block chain network verifies that the signature is problem-free through a public key and the summary information is the same as the summary of the book record. By the system and the method, the user specific watermark is required to be added when each user checks the resources under the condition that the resources can be checked by a plurality of users, the system and the method can be used for some confidential documents and pages for displaying intellectual property or confidential information, and when the documents are captured, photographed or downloaded, the watermark is left on the surface of the documents, so that a divulger can be warned to stop the divulging action. Even if the document is leaked, the person in charge can be traced.
Drawings
FIG. 1 is a diagram of a module call relationship of the present invention.
FIG. 2 is a flow chart of the present invention.
Detailed Description
The present invention will now be described in further detail with reference to the accompanying drawings.
According to the method for watermarking the online preview of the document based on the browser shown in the figures 1 and 2, the method comprises the following steps:
s1, receiving a preview request of a user terminal;
s2, judging whether the user is legal, if so, performing step S3, and if not, ending the request;
s3, judging whether the user has the authority to preview the request file, if so, performing step S4, and if not, ending the request;
s4, extracting the unique identification of the preview file from the request;
s5, acquiring a file from a database according to the unique identifier;
s6, obtaining metadata of the file, wherein the metadata comprises a file name, a file type and a file size;
s7, judging the file type and converting the file type into a picture set, if the file is a png, svg, bpm, jpg and other picture type file, directly converting the file into a jpg picture set, if the file is a pdf type file, converting each page of the direct pdf file into a picture to form a jpg picture set, if the file is other type files, if the file is a word, ppt and excel format office file, calling a jodconverter to convert the file into a pdf file, and converting each page of the pdf file into a picture to form a jpg picture set;
s8, converting the jpg picture set into a jpg picture set with a watermark;
s9, responding to a user request, and displaying the jpg picture set with the watermark to the user;
and S10, recording the browsing operation logs, sending the operation logs and the operation log digests of the browsing files to a block chain network by a private key signature, decrypting the operation logs signed by the private key by using a public key after the block chain network receives the operation logs, generating data blocks from the operation logs if decryption is successful, and storing the data blocks into a block chain account book.
S11, browsing the operation log for inquiry, searching the user operation log record by taking the watermark ID as a data table index, sending the operation log abstract to block chain network verification, feeding back the operation log to be true and effective through the block chain network verification, and preventing the operation log from being tampered.
A system for watermarking online preview of a document based on a browser comprises a user request processing module, a file information acquisition module, a file type conversion module, an image conversion module and a watermark image generation module, wherein php is selected as a development language.
The user request processing module is used for receiving a user terminal request, carrying the unique identification of the preview file and the user identity identification in the request, judging whether the user identity is legal or not and whether the user has the preview authority of the file requested to be previewed or not, and rejecting the request if the identity is illegal or has no preview authority;
the file information taking module is used for searching a corresponding file storage position in a database through a preview file unique identifier carried by a user terminal request, and acquiring a required file name, a file size and a file type, wherein the file type is distinguished by a file suffix name;
the file type conversion module converts different file types into a uniform picture set, specifically, if the file is a picture format file such as png, svg, bpm or jpg, the file is directly converted into a jpg picture, if the file is a word, ppt or excel format office file, the jodconverter is called to be converted into a pdf file, and then each page of the pdf is converted into one picture; if the pdf file exists, each page is directly converted into a picture;
the method comprises the steps that a watermark picture generation module reads each picture of a picture set, the height and width of a watermark and the placement position of the watermark are calculated according to the height and width of the picture, the user name, the browsing time and the watermark ID are used as watermark characters and added to the picture through an imagecopymerge method to form a picture with the watermark, the watermark ID is used as an index of a user operation log, the watermark ID can be used as key query information of a background browsing log, the file preview date and a previewer can be queried through the watermark ID, the watermark ID is composed of 32-digit letters, and the watermark ID is not repeated;
the operation log tamper-proof module utilizes a block chain to store operation logs of browsed files to prevent tampering, the system sends the operation logs and operation log abstracts of the browsed files to a block chain network through private key signatures, the block chain network decrypts the operation logs after receiving the operation logs signed by the private key, if decryption is successful, the operation logs are generated into data blocks, the data blocks are stored in a block chain account book, the data blocks comprise block bodies and block heads, the block heads comprise operation log information and operation log abstracts of the browsed files, the operation log information comprises information such as watermark IDs, browsing user names, browsing file names and browsing time, and the block heads comprise data block hash values and timestamps.
The browsing log query module supports searching user operation log records by taking watermark ID as a data table index, and sends the operation log abstract to block chain network verification, and the block chain network verification feeds back the operation log to be real and effective and can prevent the operation log from being tampered.
The present invention is not limited to the above embodiments, and any structural changes made under the teaching of the present invention shall fall within the protection scope of the present invention, which is similar or similar to the technical solutions of the present invention.
The techniques, shapes, and configurations not described in detail in the present invention are all known techniques.
Claims (7)
1. A method for watermarking on-line preview of a document based on a browser is characterized in that: the method comprises the following steps:
s1, receiving a preview request of a user terminal;
s2, judging whether the user is legal, if so, performing step S3, and if not, ending the request;
s3, judging whether the user has the authority to preview the request file, if so, performing step S4, and if not, ending the request;
s4, extracting the unique identification of the preview file from the request;
s5, acquiring a file from a database according to the unique identifier;
s6, obtaining metadata of the file, wherein the metadata comprises a file name, a file type and a file size;
s7, judging the file type and converting the file type into a picture set, if the file is a picture type file, directly converting the file into a jpg picture set, if the file is a pdf file, converting each page of the direct pdf file into a picture to form a jpg picture set, if the file is other types, calling a jodconverter to convert the file into a pdf file, and converting each page of the pdf file into a picture to form a jpg picture set;
s8, converting the jpg picture set into a jpg picture set with a watermark;
s9, responding to a user request, and displaying the jpg picture set with the watermark to the user;
and S10, recording the browsing operation logs, sending the operation logs and the operation log digests of the browsing files to a block chain network by a private key signature, decrypting the operation logs signed by the private key by using a public key after the block chain network receives the operation logs, generating data blocks from the operation logs if decryption is successful, and storing the data blocks into a block chain account book.
2. The method of claim 2, wherein the method for watermarking the online preview of the document based on the browser comprises the following steps: and providing browsing operation log query, searching a user operation log record by taking a watermark as a data table index, sending the operation log abstract to block chain network verification, feeding back the operation log to be true and effective through the block chain network verification, and preventing the operation log from being tampered.
3. A system for watermarking on-line preview of a document based on a browser is characterized in that: the system comprises a user request processing module, a file information acquisition module, a file type conversion module, an image conversion module and a watermark image generation module;
the user request processing module is used for receiving a user terminal request, carrying a unique preview file identifier and a user identity identifier in the request, judging whether the user identity is legal or not and whether the user has the preview authority of the file requested to be previewed or not, and rejecting the request if the identity is illegal or the preview authority is not available;
the file information taking module is used for searching a corresponding file storage position in a database through a preview file unique identifier carried by a user terminal request, and acquiring a required file name, a file size and a file type;
the file type conversion module converts different file types into a uniform picture set;
the watermark image generating module reads each image of the image set and adds a watermark to form a watermark image;
the operation log tamper-proof module utilizes the operation log of the block chain storage browsing file to prevent tampering;
the browsing log query module supports searching user operation log records by taking watermark ID as a data table index, and sends the operation log abstract to block chain network verification, and the block chain network verification feeds back the operation log to be real and effective and can prevent the operation log from being tampered.
4. The system for watermarking an online preview of a document based on a browser according to claim 1, wherein: and the watermark image generating module calculates the height and width of the watermark and the placement position according to the height and width of the image, and adds the user name, the browsing time and the watermark ID as watermark characters to the image to form the image with the watermark.
5. The system for watermarking an online preview of a document based on a browser of claim 4, wherein: the watermark ID is composed of 32-digit numerical letters, and the watermark ID is not repeated.
6. A system for browser-based watermarking of online previews of documents according to claim 3, wherein: the operation log tamper-proof module sends the operation log of the browsing file and the operation log abstract to the block chain network by using a private key signature, the block chain network decrypts the operation log signed by the private key by using a public key after receiving the operation log, and if the decryption is successful, the operation log generates a data block, and the data block is stored in a block chain account book.
7. The system for watermarking an online preview of a document based on a browser of claim 6, wherein: the data block comprises a block main body and a block head, the block head comprises operation log information and an operation log abstract of a browsing file, the operation log information comprises information such as a watermark ID, a browsing user name, a browsing file name and browsing time, and the block head comprises a data block hash value and a time stamp.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110995538.0A CN113704708A (en) | 2021-08-27 | 2021-08-27 | Method and system for watermarking online preview of document based on browser |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110995538.0A CN113704708A (en) | 2021-08-27 | 2021-08-27 | Method and system for watermarking online preview of document based on browser |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113704708A true CN113704708A (en) | 2021-11-26 |
Family
ID=78655939
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110995538.0A Pending CN113704708A (en) | 2021-08-27 | 2021-08-27 | Method and system for watermarking online preview of document based on browser |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113704708A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114547564A (en) * | 2022-04-25 | 2022-05-27 | 北京国隐科技有限公司 | Document processing method, device and equipment |
CN114707126A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Method and device for adding watermark to network disk document, network disk and storage medium |
-
2021
- 2021-08-27 CN CN202110995538.0A patent/CN113704708A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114547564A (en) * | 2022-04-25 | 2022-05-27 | 北京国隐科技有限公司 | Document processing method, device and equipment |
CN114547564B (en) * | 2022-04-25 | 2022-09-23 | 北京国隐科技有限公司 | Document processing method, device and equipment |
CN114707126A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Method and device for adding watermark to network disk document, network disk and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8977860B2 (en) | Method and apparatus for tamper proof camera logs | |
US10313360B2 (en) | PEDDaL blockchaining for document integrity verification preparation | |
US8549303B2 (en) | Apparatus, system and method for electronically signing electronic transcripts | |
US6796489B2 (en) | Processing electronic documents with embedded digital signatures | |
US7069443B2 (en) | Creating and verifying electronic documents | |
JP3803378B2 (en) | Secure copy of confidential documents | |
KR100653512B1 (en) | System for managing and storaging electronic document and method for registering and using the electronic document performed by the system | |
US8572049B2 (en) | Document authentication | |
US20010034835A1 (en) | Applied digital and physical signatures over telecommunications media | |
CN113704708A (en) | Method and system for watermarking online preview of document based on browser | |
CN110855428A (en) | Movie copyright protection method based on block chain | |
US20230161886A1 (en) | Distributed ledger-based digital content tracing | |
KR20200088995A (en) | Document security and integrity verification based on blockchain in image forming device | |
US7689900B1 (en) | Apparatus, system, and method for electronically signing electronic transcripts | |
US11301823B2 (en) | System and method for electronic deposit and authentication of original electronic information objects | |
US20070013961A1 (en) | Original document verification system and method in an electronic document transaction | |
CN117632855A (en) | Single-system electronic archive filing system, method, equipment and storage medium based on four-package structure | |
CN112100685A (en) | Encryption and tamper-proof processing method for checking and detecting electronic report | |
CN111984957A (en) | Confidential document identification and tracking system based on fingerprint anti-counterfeiting | |
KR20090001457A (en) | System and method for providing of custody and certification and version management service of stipulation in certified electronic data authority | |
Salama et al. | Metadata based forensic analysis of digital information in the web | |
CN109271811B (en) | Group signature-based electronic material evidence tamper-proof storage method | |
US20090044018A1 (en) | Section Inclusion and Section Order Authentication Method for Computer Electronic Documents | |
US20210303640A1 (en) | Document management system, processing terminal device, and control device | |
CN117763567A (en) | Electronic data solidification method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |