CN113704828A - System and method for preventing file from being tampered and leaked through watermark encryption - Google Patents

System and method for preventing file from being tampered and leaked through watermark encryption Download PDF

Info

Publication number
CN113704828A
CN113704828A CN202010441968.3A CN202010441968A CN113704828A CN 113704828 A CN113704828 A CN 113704828A CN 202010441968 A CN202010441968 A CN 202010441968A CN 113704828 A CN113704828 A CN 113704828A
Authority
CN
China
Prior art keywords
document
file
watermark
tampered
leaked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010441968.3A
Other languages
Chinese (zh)
Inventor
葛诚
蒋超
翟凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yozosoft Co ltd
Original Assignee
Yozosoft Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yozosoft Co ltd filed Critical Yozosoft Co ltd
Priority to CN202010441968.3A priority Critical patent/CN113704828A/en
Publication of CN113704828A publication Critical patent/CN113704828A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Abstract

The invention discloses a system and a method for preventing a file from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built file needs to be encrypted according to the requirement of a filing worker, and performing subsequent steps if the built file needs to be encrypted; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The method encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.

Description

System and method for preventing file from being tampered and leaked through watermark encryption
Technical Field
The invention relates to the technical field of electronic document encryption, in particular to a system and a method for preventing a file from being tampered and leaked through watermark encryption.
Background
In the 21 st century of rapid development of informatization, computer technology is changed day by day and is closely related to daily life of people, and the privacy information stored in an electronic document is maliciously stolen, which often brings endless troubles and troubles to individuals and even enterprise units; how to ensure the safety of the electronic document after the outgoing becomes a topic which is very important to the current society.
When a document is previewed through the SVG, excessive use of the DOM can be caused, so that the rendering speed of the complex SVG is influenced. In this context, Canvas shows the advantage that firstly it acts as a container only, does not contain any elements, and secondly renders pixel by pixel while drawing, once the graphics drawing is complete, without the browser continuing to focus on it. The Canvas, as part of the HTML5, allows scripting language dynamic rendering, and is therefore more flexible in the processing of complex images.
Therefore, in combination with the above-mentioned technical problems, there is a need to provide a new technical solution.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a system and a method for preventing a file from being tampered and leaked through watermark encryption, and the specific technical scheme is as follows:
the invention relates to a system for preventing a file from being tampered and leaked through watermark encryption, which comprises:
the security document establishing module is used for establishing a security document with watermark encryption;
the document anti-tampering module is used for preventing a document from being tampered or leaked after being established;
and the document tracing module is used for tracing the document after the document is tampered or leaked.
The invention also discloses a method for preventing the file from being tampered and leaked through watermark encryption, which comprises the following steps:
the method comprises the following steps: acquiring a document type, wherein the document is divided into internal data and public data;
step two: adding a watermark to the document according to the document type;
step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document;
step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology.
Further, in the second step, the watermarks include a common watermark and an encrypted watermark, and if the document is common public data, the common watermark is added to the document; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
Furthermore, in the fourth step, the information of the person who creates the file is encrypted by means of watermark encryption and attached to the bottom of the document by means of watermark.
Furthermore, when the encrypted documenting personnel information is attached to the bottom of the document, the color, the size, the rotation angle and the transparency attribute of the font can be configured.
Further, in the sixth step, the document content is drawn through JS, one page in the browser is identified as a Canvas node, the content in the node cannot be expanded, and the user cannot view and modify the content of the preview page through the developer mode of the browser.
The system and the method for preventing the file from being tampered and leaked through the watermark encryption encrypt the file more humanly, so that the file is encrypted, the leaked secret can be traced, and the high security of the electronic document is realized.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The present invention will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings, wherein like reference numerals designate like structural elements, and in which:
FIG. 1 is a diagram of a watermarked effect of a document preview in an embodiment of the present invention;
FIG. 2 is an interface screenshot of a browser open developer option without Canvas preview technology in one embodiment of the invention;
FIG. 3 is an interface screenshot of a browser open developer option in one embodiment of the invention using Canvas preview technology;
FIG. 4 is a screenshot 1 of an embodiment of embedding the font;
FIG. 5 is a screenshot 2 of an embodiment operation embedding the font;
FIG. 6 is a screenshot 3 of an operation of an embodiment embedding the font;
FIG. 7 is a screenshot 4 of an embodiment operation embedding the font;
FIG. 8 is a screenshot 5 of an operation of an embodiment embedding the font;
FIG. 9 is a screenshot 6 of an operation of an embodiment embedding the font;
FIG. 10 is a screenshot 7 of an embodiment operation embedding this font;
fig. 11 is a screenshot 8 of the operation of the embodiment embedding the font.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least an implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Examples
The embodiment provides a method and a system for preventing file contents from being tampered and leaked through watermark encryption, wherein the method comprises the steps of judging whether a built document needs to be encrypted according to the requirements of a filing worker, and performing subsequent steps if the built document needs to be encrypted; acquiring information of a filing worker, including filing time and a filing IP; the obtained information of the filing staff is encrypted in a reversible way, and the whole file is paved; the filing is completed and the entire document is displayed. The system comprises a security document establishing module, a document anti-tampering module and a document tracing module, wherein the security document establishing module is used for establishing a security document with watermark encryption, the document anti-tampering module is used for preventing a document from being tampered or leaked after the document is established, and the document tracing module is used for tracing the document after the document is tampered or leaked. The method encrypts the file more humanizedly, so that the file is encrypted, the leakage can be traced, and the high security of the electronic document is realized.
The method for preventing the file from being tampered and leaked through watermark encryption in the embodiment specifically comprises the following steps:
the method comprises the following steps: acquiring a document type, and dividing the document into internal data and open data according to the requirement of a filing worker;
step two: adding watermarks to the document according to the document type, wherein the watermarks include common watermarks and encrypted watermarks, and if the document is common public data, adding the common watermarks to the document; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
Step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP (Internet protocol) which are provided by the filing worker;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document; the reversible encryption is watermark encryption, information of a filing person is encrypted in a watermark encryption mode, and the information is attached to the bottom of a document in a watermark mode. When the encrypted documenting personnel information is attached to the bottom of the document, the attributes such as the color, the size, the rotation angle, the transparency and the like of the font can be configured. Referring to FIG. 1, the effect of watermarking a preview of a document is shown.
Step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology. The document content is drawn through JS, a page in the browser is identified as a Canvas node, the content in the node cannot be expanded, and the user cannot view and modify the content of the preview page through the developer mode of the browser, as shown in fig. 2. In the normal page, the user can view and modify the contents of the preview page through F12 (developer mode of the browser), as shown in fig. 3.
Aiming at the uncommon fonts which are lacked at the user side, the technical scheme supports embedding the fonts, and the specific implementation mode is as follows:
illustrated in a Canvas data structure: json, which is the attribute of the document, is used as an entry, and the page data is 0 json and 1 json … …, respectively, and the total number is the total number of pages of the document.
Attributes of a document, such as page number, document paper size, and font attributes of fonts contained in the document, as shown in fig. 4-6, fig. 4 shows that the total page number of the document is 20, fig. 5 shows that the document has a default size of 960 × 720, and the page size with index 1 is 720 × 960; FIG. 6 shows a font property with sequence number 0;
content operations in the page; such as text, pictures, discretionary graphics, animation data; as shown in fig. 7-10, the front end uses this technique to extract data structures contained in the document, such as information of related fonts used by the document, format structures, animation information, and the like, from the data; requesting document attributes and page data by means of axios, as shown in fig. 11;
the specific drawing method is as follows:
and (3) drawing characters:
the text attributes of fig. 4 are analyzed, the corresponding text attributes as in fig. 3 are fetched, and the text attributes are set to the canvas object and then are set on the canvas object by the text drawing method
Drawing a picture:
draw image (img, x, y, width, height) by parsing the picture attributes of FIG. 5 and then calling canvas to draw the picture method
Drawing a graph:
stroke () is called by parsing the graph attributes of fig. 6 and then canvas, the method of drawing a graph.
The system and the method for preventing the file from being tampered and leaked through the watermark encryption encrypt the file more humanly, so that the file is encrypted, the leaked secret can be traced, and the high security of the electronic document is realized.
The foregoing description has disclosed fully preferred embodiments of the present invention. It should be noted that those skilled in the art can make modifications to the embodiments of the present invention without departing from the scope of the appended claims. Accordingly, the scope of the appended claims is not to be limited to the specific embodiments described above.

Claims (6)

1. A system for preventing a file from being tampered and leaked through watermark encryption, comprising:
the security document establishing module is used for establishing a security document with watermark encryption;
the document anti-tampering module is used for preventing a document from being tampered or leaked after being established;
and the document tracing module is used for tracing the document after the document is tampered or leaked.
2. A method for preventing a file from being tampered and leaked through watermark encryption is characterized by comprising the following steps:
the method comprises the following steps: acquiring a document type, wherein the document is divided into internal data and public data;
step two: adding a watermark to the document according to the document type;
step three: acquiring information of a filing worker, wherein the information comprises filing time and a filing IP;
step four: reversibly encrypting the information of the filing staff obtained in the step three, and paving the whole document;
step five: the document content is converted and encrypted through a background server and the whole document is displayed;
step six: the front end displays and previews the whole document through Canvas preview technology.
3. The method for preventing the file from being tampered and leaked through the watermark encryption according to claim 2, wherein in the second step, the watermark comprises a common watermark and an encrypted watermark, and if the file is common public material, the common watermark is added to the file; if the document is internal data, judging whether the established document needs to be encrypted according to the security level, and if so, continuing to perform the subsequent steps.
4. The method for preventing file from being tampered and leaked through watermark encryption according to claim 2, wherein in step four, the information of the documenting personnel is encrypted through watermark encryption and attached to the bottom of the file in a watermark manner.
5. The method for preventing file from being tampered and leaked through watermark encryption according to claim 4, wherein the encrypted documenting personnel information can configure the color, size, rotation angle and transparency of the font when attached to the bottom of the document.
6. The method for preventing the file from being tampered and disclosed through the watermark encryption according to claim 2, wherein in the sixth step, the content of the document is drawn through JS, a page is identified as a Canvas node in a browser, the content in the node cannot be expanded, and a user cannot view and modify the content of the preview page through a developer mode of the browser.
CN202010441968.3A 2020-05-22 2020-05-22 System and method for preventing file from being tampered and leaked through watermark encryption Pending CN113704828A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010441968.3A CN113704828A (en) 2020-05-22 2020-05-22 System and method for preventing file from being tampered and leaked through watermark encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010441968.3A CN113704828A (en) 2020-05-22 2020-05-22 System and method for preventing file from being tampered and leaked through watermark encryption

Publications (1)

Publication Number Publication Date
CN113704828A true CN113704828A (en) 2021-11-26

Family

ID=78646369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010441968.3A Pending CN113704828A (en) 2020-05-22 2020-05-22 System and method for preventing file from being tampered and leaked through watermark encryption

Country Status (1)

Country Link
CN (1) CN113704828A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115618806A (en) * 2022-09-01 2023-01-17 睿智合创(北京)科技有限公司 PPT document processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541817A (en) * 2010-12-26 2012-07-04 上海量明科技发展有限公司 Method and device for previewing digital files
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN106502506A (en) * 2016-11-01 2017-03-15 上海爱数信息技术股份有限公司 The mask method of document, system and electronic equipment in webpage
US20180137300A1 (en) * 2016-11-17 2018-05-17 Barracuda Networks, Inc. Method and apparatus for document preview and delivery with password protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541817A (en) * 2010-12-26 2012-07-04 上海量明科技发展有限公司 Method and device for previewing digital files
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN106502506A (en) * 2016-11-01 2017-03-15 上海爱数信息技术股份有限公司 The mask method of document, system and electronic equipment in webpage
US20180137300A1 (en) * 2016-11-17 2018-05-17 Barracuda Networks, Inc. Method and apparatus for document preview and delivery with password protection

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115618806A (en) * 2022-09-01 2023-01-17 睿智合创(北京)科技有限公司 PPT document processing method and device
CN115618806B (en) * 2022-09-01 2023-06-27 睿智合创(北京)科技有限公司 PPT document processing method and device

Similar Documents

Publication Publication Date Title
CN109767375B (en) Image watermark embedding and tracing method and system
US9141332B2 (en) Masking sensitive information in a screen sharing session
US11640498B2 (en) Method and system for selective document redaction
US10049421B2 (en) Secure content and document watermarking
CN108052491A (en) A kind of automatic processing method and device of certificate document
US10929597B2 (en) Techniques and systems for storing and protecting signatures and images in electronic documents
US20030167334A1 (en) Provision of content to a client device
US20130073942A1 (en) Method, System, and Computer-Readable Medium To Uniformly Render Document Annotation Across Different Comuter Platforms
US20150244897A1 (en) Security mark with copyable and non-copyable elements
US10936791B2 (en) Dynamically changing text wherein if text is altered unusual shapes appear
EP2758919B1 (en) Apparatus for tracing a document in an electronic publication
CN110489943B (en) Page watermark tamper-proofing method and system
CN107301046B (en) Icon processing method and device, computer equipment and storage medium
Garfinkel Leaking Sensitive Information in Complex Document Files--and How to Prevent It
US6429881B1 (en) Method and system for transitioning graphic elements of a network interface description document
CN113704828A (en) System and method for preventing file from being tampered and leaked through watermark encryption
KR20100043140A (en) Improved method and system for producing documents, websites, and the like having security features
US20230153402A1 (en) System and method for deterring data leakage through photographing of display screen by external camera
JP2009505133A (en) Data encryption and decryption method using pixels
US9116643B2 (en) Retrieval of electronic document using hardcopy document
US10891432B2 (en) System and process for generating an internet application
JP7374958B2 (en) Original document management system
Rog et al. PDF Guidelines Recommendations for the creation of PDF files for long-term preservation and access
Sikos et al. Optimized Appearance
Davies Using Word Boundaries for Automatic Reflowing of Text within an Image

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination