CN114357511A - Method and device for marking key content of document and user terminal - Google Patents

Method and device for marking key content of document and user terminal Download PDF

Info

Publication number
CN114357511A
CN114357511A CN202111663862.9A CN202111663862A CN114357511A CN 114357511 A CN114357511 A CN 114357511A CN 202111663862 A CN202111663862 A CN 202111663862A CN 114357511 A CN114357511 A CN 114357511A
Authority
CN
China
Prior art keywords
marking
document
strategy
key content
specified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111663862.9A
Other languages
Chinese (zh)
Inventor
李枝广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TIP TECHNOLOGY CO LTD
Original Assignee
BEIJING TIP TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TIP TECHNOLOGY CO LTD filed Critical BEIJING TIP TECHNOLOGY CO LTD
Priority to CN202111663862.9A priority Critical patent/CN114357511A/en
Publication of CN114357511A publication Critical patent/CN114357511A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Document Processing Apparatus (AREA)

Abstract

The invention discloses a method and a device for marking key contents of a document and a user terminal. The method comprises the following steps: receiving a corresponding strategy created by a user according to the document sensitive words, and sending the corresponding strategy to a trusted platform server; receiving a marking strategy issued by the credit platform server and formulated according to the corresponding strategy; and calling a corresponding plug-in the document editing software to mark the key content of the document according to the marking strategy. The method provided by the invention can realize convenient and efficient marking of key contents in the confidential documents, thereby providing a basis for management of the confidential documents; specifically, the marking method provided by the invention can flexibly mark the keywords appearing in the document or the character strings appearing in the document and related to the sensitive words according to the corresponding strategy formulated by the user, and can clearly distinguish and mark the key contents in the document.

Description

Method and device for marking key content of document and user terminal
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for marking key content of a document, and a user terminal.
Background
The keywords of the national secret-related documents are the keys for determining the secret of an item, have the characteristic of distinguishing and belong to the national secret. The key words for determining the national secrets need to be screened out from the key and minimum information contents which really have the essential attribute of the national secrets and can damage the national security and benefits after being leaked.
Such critical, minimized information may be distinguished from other content in terms of form and content, or may be specifically described in the form of text or the like. Sometimes, the key contents are relatively independent and self-integrated, such as a segment of text, a sentence, a password, etc. Sometimes, the key contents need to be mutually verified and associated, and are composed of several parts, such as a code number and the contents, requirements, or a number and the meaning, trend, etc. represented by the number. With the information, the related matters need to be encrypted and corresponding encryption management measures are taken, and without the information, the related matters do not need to be managed as the national secrets. These key, minimized information contents are the key words to be marked, and are the real security management target. Of course, not all the national secrets can distinguish the minimized confidential information unit, and the contents of each part of the national secrets are not divisible or the whole national secret is a complete national secret.
With the development of network technology, the content of confidential documents needs to be better distinguished and identified which are keywords, and a convenient and effective method for distinguishing and identifying the keywords is lacking at present.
Disclosure of Invention
Based on the technical problem, a method, a device and a user terminal for marking the key content of the document are provided.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, a method of tagging document key content, the method comprising:
receiving a corresponding strategy created by a user according to a document sensitive word, and sending the corresponding strategy to a trusted platform server;
receiving a marking strategy issued by the trusted platform server and formulated according to the corresponding strategy;
and step three, calling a corresponding plug-in the document editing software to mark the key content of the document according to the marking strategy.
Preferably, the corresponding policy in the step one includes a keyword, a matching rule, and a specified tag range.
Further preferably, the keywords are fixed words formulated according to sensitive words; the matching rule is used for searching a character string associated with the sensitive word in the document; the specified marking range is a specific range in which the set document is subjected to a marking operation.
Further preferably, the marking strategy in step two includes:
marking strategies are formulated according to the keywords and the specified marking ranges;
marking strategies formulated according to the matching rules and the specified marking ranges;
and marking strategies are established according to the keywords, the matching rules and the specified marking range.
Further preferably, when the marking policy is prepared, the matching rule is converted into a corresponding regular expression according to a regular principle, and the regular expression is used for searching a character string in the document, which accords with the matching rule, when marking is performed in the next step.
Preferably, the form of the marker includes a dotted and underlined form.
Further preferably, the corresponding plug-in described in step three is a plug-in for dotting provided by WPS.
In a second aspect, an apparatus for marking key content of a document, the apparatus comprising:
the user strategy receiving module is used for receiving a corresponding strategy created by a user according to the document sensitive words and sending the corresponding strategy to the trusted platform server;
the server marking strategy receiving module is used for receiving a marking strategy which is issued by the information creation platform server and is made according to the corresponding strategy;
and the key content marking module is used for calling a corresponding plug-in the document editing software to mark the key content of the document according to the marking strategy.
In a third aspect, a trusted platform user terminal includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the method for marking key content of a document according to the first aspect when executing the computer program.
In a fourth aspect, a computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of a method of tagging key content of a document according to the first aspect.
The invention has at least the following beneficial effects:
the embodiment of the invention realizes convenient and efficient marking of key contents in the confidential documents by receiving the corresponding strategy created by the user according to the sensitive words of the documents, sending the corresponding strategy to the trusted platform server, receiving the marking strategy issued by the trusted platform server and formulated according to the corresponding strategy and calling the corresponding plug-in the document editing software to mark the key contents of the documents according to the marking strategy, thereby providing a basis for managing the confidential documents.
Drawings
FIG. 1 is a diagram illustrating an application environment of a method for marking key content of a document according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for marking key content of a document according to an embodiment of the present invention;
FIG. 3 is a detailed flowchart of a method for marking key contents of a document according to an embodiment of the present invention;
FIG. 4 is a block diagram of a module architecture of an apparatus for marking key content of a document according to an embodiment of the present invention;
fig. 5 is an internal block diagram of a user terminal of a trusted platform in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The method for marking the key content of the document can be applied to the application environment shown in FIG. 1. The user terminal 101 of the trusted platform and the service end 102 of the trusted platform communicate through a network. The terminal 101 may be, but not limited to, various personal computers, notebook computers and tablet computers, and the server 102 may be implemented by an independent server or a server cluster formed by a plurality of servers.
The first embodiment is as follows:
in one embodiment, as shown in fig. 2, there is provided a method for marking the key content of a document, which is applied to the user terminal of the trust platform in fig. 1, and the method includes the following steps:
step S201, receiving a corresponding strategy created by a user according to a document sensitive word, and sending the corresponding strategy to a trusted platform server;
step S202, receiving a marking strategy issued by the trusted platform server and formulated according to the corresponding strategy;
step S203, calling corresponding plug-ins in the document editing software to mark the key contents of the document according to the marking strategy.
Specifically, the corresponding policy described in step S201 includes a keyword, a matching rule, and a specified tag range.
Further, the keywords are fixed important words formulated according to the sensitive words; the matching rule is used for searching a character string associated with the sensitive word in the document; the specified marking range is a specific range in which the set document is subjected to a marking operation.
Further, the marking policy described in step S202 includes:
marking strategies are formulated according to the keywords and the specified marking ranges;
marking strategies formulated according to the matching rules and the specified marking ranges;
and marking strategies are established according to the keywords, the matching rules and the specified marking range.
Specifically, in step S203, when a document is marked according to a marking policy established based on a keyword and a prescribed marking range, keywords appearing in the range are marked; when a document is marked according to a marking strategy formulated according to a matching rule and a specified marking range, marking character strings which are present in the range and meet the matching rule; when a document is marked according to a marking strategy formulated according to keywords, matching rules and a specified marking range, the keywords appearing in the range and character strings meeting the matching rules are marked at the same time.
Further, when a marking policy is made, the matching rule is converted into a corresponding regular expression according to a regular principle, and the regular expression is used for searching a character string conforming to the matching rule when marking is performed in the next step. For example, the matching rule of the user is "all numbers in the document", and when the marking policy is made, the matching rule is converted into the regular expression "\ d \" for the subsequent marking work.
For example, in practical applications, the keyword created by the user may be "policy", the matching rule created by the user may be "all numbers in the document", the specified mark range may be the local content of the document, or the entire content of the document, for example, the specified mark range is 2000 words in a certain part of the document.
Furthermore, marking according to a marking strategy made according to the keyword 'policy' and a certain local 2000 word of a document for defining the marking range, namely marking two words of 'policy' appearing in the local 2000 word; marking according to a marking strategy made according to a matching rule of 'all numbers in a document' and a specified marking range document 'a certain local 2000 word', namely marking all numbers appearing in the local 2000 word; in the above, the marking is performed according to the marking policy made based on the keyword "policy", the matching rule "all the numbers in the document" and the "some local 2000 word" in the document defining the marking range, that is, the "policy" appearing in the local 2000 word and all the numbers are marked.
Specifically, the form of the mark includes a dotted form and an underlined form.
Further, the corresponding plug-in step S103 is a plug-in for adding points provided by the WPS, and the part of the interface involved by the plug-in includes:
wps, filesystem, exists (), and is used for judging whether the file exists;
wps, File System, ReadFile (), used for reading file contents
wps, application, active document, Charactters, Parent, content, text, for reading the contents of the files currently opened by wps;
font, email mark 1, for operating (dotting) on a text style;
application, active document, selection, for obtaining the currently selected text content;
application, active document selection, full storage (), for selecting full text.
Further, a detailed flow of the method for marking the key content of the document may be as shown in fig. 3.
In the method for marking the key content of the document provided by the embodiment of the invention, the key content of the document is marked by receiving the corresponding strategy created by a user according to the sensitive words of the document, sending the corresponding strategy to the trusted platform server, receiving the marking strategy issued by the trusted platform server and made according to the corresponding strategy and calling the corresponding plug-in the document editing software according to the marking strategy, so that the key content of the document is conveniently and efficiently marked in the confidential document, and a basis is provided for the management of the confidential document.
Specifically, the marking method provided by the embodiment of the invention can flexibly mark the keywords appearing in the document or the character strings appearing in the document and related to the sensitive words according to the corresponding strategy formulated by the user, and can clearly distinguish and identify the key contents in the document.
It should be understood that although the steps in the flowcharts of fig. 2 and 3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
Example two:
in the embodiment, as shown in fig. 4, corresponding to the method for marking the key content of the document provided in the first embodiment, an apparatus 400 for marking the key content of the document is provided, which includes the following program modules:
the user policy receiving module 401 is configured to receive a corresponding policy created by a user according to a document sensitive word, and send the corresponding policy to a trusted platform server;
a server marking policy receiving module 402, configured to receive a marking policy issued by the trusted platform server and formulated according to the corresponding policy;
and a key content marking module 403, configured to invoke a corresponding plug-in the document editing software to mark the key content of the document according to the marking policy.
Specifically, for the user policy receiving module 401, the corresponding policy includes a keyword, a matching rule, and a specified tag range.
Further, the keywords are fixed important words formulated according to the sensitive words; the matching rule is used for searching a character string associated with the sensitive word in the document; the specified marking range is a specific range of the set document for marking operation, and the range can be local content of the document, such as local 2000 words of the document, or the whole content of the document.
Further, for the server marking policy receiving module 402, the marking policy includes:
marking strategies are formulated according to the keywords and the specified marking ranges;
marking strategies formulated according to the matching rules and the specified marking ranges;
and marking strategies are established according to the keywords, the matching rules and the specified marking range.
Specifically, the key content marking module 403 marks the keywords appearing in the specified marking range when marking the document according to the marking policy established according to the keywords and the specified marking range; when a document is marked according to a marking strategy formulated according to a matching rule and a specified marking range, marking character strings which are present in the range and meet the matching rule; when a document is marked according to a marking strategy formulated according to keywords, matching rules and a specified marking range, the keywords appearing in the range and character strings meeting the matching rules are marked at the same time.
Further, when a marking policy is made, the matching rule is converted into a corresponding regular expression according to a regular principle, and the regular expression is used for searching the character string which accords with the matching rule. For example, the matching rule of the user is "all numbers in the document", and when the marking policy is made, the matching rule is converted into the regular expression "\ d \" for the subsequent marking work.
For example, in practical applications, the keyword created by the user may be "policy", the matching rule created by the user may be "all numbers in the document", the specified mark range may be the local content of the document, or the entire content of the document, for example, the specified mark range is 2000 words in a certain part of the document.
Furthermore, marking according to a marking strategy made according to the keyword 'policy' and a certain local 2000 word of a document for defining the marking range, namely marking two words of 'policy' appearing in the local 2000 word; marking according to a marking strategy made according to a matching rule of 'all numbers in a document' and a specified marking range document 'a certain local 2000 word', namely marking all numbers appearing in the local 2000 word; in the above, the marking is performed according to the marking policy made based on the keyword "policy", the matching rule "all the numbers in the document" and the "some local 2000 word" in the document defining the marking range, that is, the "policy" appearing in the local 2000 word and all the numbers are marked.
Specifically, the form of the mark includes a dotted form and an underlined form.
Further, the corresponding plug-in is a plug-in for adding points provided by the WPS, and the part of the interface involved by the plug-in includes:
wps, filesystem, exists (), and is used for judging whether the file exists;
wps, File System, ReadFile (), used for reading file contents
wps, application, active document, Charactters, Parent, content, text, for reading the contents of the files currently opened by wps;
font, email mark 1, for operating (dotting) on a text style;
application, active document, selection, for obtaining the currently selected text content;
application, active document selection, full storage (), for selecting full text.
The technical effects of the embodiments of the present invention are consistent with the embodiments, and are not described herein.
The modules in the device for marking the key content of the document can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
Example three:
in one embodiment, a trusted platform user terminal is provided, the internal structure of which can be as shown in fig. 5. The terminal comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the terminal is configured to provide computing and control capabilities. The memory of the terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the terminal is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements all or part of the process of the method for marking the key content of the document as described in the first embodiment. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device of the terminal can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the terminal, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the configuration shown in fig. 5 is a block diagram of only a portion of the configuration associated with the present application and does not constitute a limitation on the terminal to which the present application is applied, and that a particular terminal may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Example four:
in this embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements all or part of the process of a method for marking key content of a document as described in the first embodiment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for marking key content of a document is applied to a user terminal of a trusted platform, and comprises the following steps:
receiving a corresponding strategy created by a user according to a document sensitive word, and sending the corresponding strategy to a trusted platform server;
receiving a marking strategy issued by the trusted platform server and formulated according to the corresponding strategy;
and step three, calling a corresponding plug-in the document editing software to mark the key content of the document according to the marking strategy.
2. The method for marking key contents of documents according to claim 1, wherein said corresponding policy in the first step includes keywords, matching rules, and specified marking range.
3. The method of claim 2, wherein the keywords are fixed words formulated from sensitive words; the matching rule is used for searching a character string associated with the sensitive word in the document; the specified marking range is a specific range in which the set document is subjected to a marking operation.
4. The method for marking the key content of the document as recited in claim 3, wherein the marking strategy in the second step comprises:
marking strategies are formulated according to the keywords and the specified marking ranges;
marking strategies formulated according to the matching rules and the specified marking ranges;
and marking strategies are established according to the keywords, the matching rules and the specified marking range.
5. The method according to claim 4, wherein when a marking policy is created, the matching rule is converted into a corresponding regular expression according to a regular principle, and the regular expression is used for searching for a character string in the document, which meets the matching rule, when marking is performed in the next step.
6. The method of claim 1, wherein the markup format includes a dotted and underlined format.
7. The method for marking the key content of the document as recited in claim 6, wherein the corresponding plug-in step three is a plug-in for adding points provided by WPS.
8. An apparatus for tagging key content of a document, the apparatus comprising:
the user strategy receiving module is used for receiving a corresponding strategy created by a user according to the document sensitive words and sending the corresponding strategy to the trusted platform server;
the server marking strategy receiving module is used for receiving a marking strategy which is issued by the information creation platform server and is made according to the corresponding strategy;
and the key content marking module is used for calling a corresponding plug-in the document editing software to mark the key content of the document according to the marking strategy.
9. A trusted platform user terminal comprising a memory and a processor, said memory storing a computer program, characterized in that said processor, when executing said computer program, implements the steps of the method according to any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202111663862.9A 2021-12-30 2021-12-30 Method and device for marking key content of document and user terminal Pending CN114357511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111663862.9A CN114357511A (en) 2021-12-30 2021-12-30 Method and device for marking key content of document and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111663862.9A CN114357511A (en) 2021-12-30 2021-12-30 Method and device for marking key content of document and user terminal

Publications (1)

Publication Number Publication Date
CN114357511A true CN114357511A (en) 2022-04-15

Family

ID=81106243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111663862.9A Pending CN114357511A (en) 2021-12-30 2021-12-30 Method and device for marking key content of document and user terminal

Country Status (1)

Country Link
CN (1) CN114357511A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201805447U (en) * 2010-08-11 2011-04-20 北京鼎普科技股份有限公司 Electronic information management platform system of Intranet
CN109918548A (en) * 2019-04-08 2019-06-21 上海凡响网络科技有限公司 A kind of methods and applications of automatic detection document sensitive information
US20200150780A1 (en) * 2017-04-25 2020-05-14 Microsoft Technology Licensing, Llc Input method editor
CN112016317A (en) * 2020-09-07 2020-12-01 平安科技(深圳)有限公司 Sensitive word recognition method and device based on artificial intelligence and computer equipment
CN113095076A (en) * 2021-04-20 2021-07-09 平安银行股份有限公司 Sensitive word recognition method and device, electronic equipment and storage medium
CN113806491A (en) * 2021-09-28 2021-12-17 上海航空工业(集团)有限公司 Information processing method, device, equipment and medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201805447U (en) * 2010-08-11 2011-04-20 北京鼎普科技股份有限公司 Electronic information management platform system of Intranet
US20200150780A1 (en) * 2017-04-25 2020-05-14 Microsoft Technology Licensing, Llc Input method editor
CN109918548A (en) * 2019-04-08 2019-06-21 上海凡响网络科技有限公司 A kind of methods and applications of automatic detection document sensitive information
CN112016317A (en) * 2020-09-07 2020-12-01 平安科技(深圳)有限公司 Sensitive word recognition method and device based on artificial intelligence and computer equipment
CN113095076A (en) * 2021-04-20 2021-07-09 平安银行股份有限公司 Sensitive word recognition method and device, electronic equipment and storage medium
CN113806491A (en) * 2021-09-28 2021-12-17 上海航空工业(集团)有限公司 Information processing method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN110447035B (en) User content obfuscation in structured user data files
CN110506271B (en) Configurable annotations for privacy-sensitive user content
US8943603B2 (en) System and method for document policy enforcement
US20090292930A1 (en) System, method and apparatus for assuring authenticity and permissible use of electronic documents
US9003542B1 (en) Systems and methods for replacing sensitive information stored within non-secure environments with secure references to the same
CN111897786B (en) Log reading method, device, computer equipment and storage medium
CN103166911B (en) A kind of version management server right management method and equipment
WO2022237046A1 (en) Data encryption method and computing device
CN107111649B (en) Uploading user and system data from a source location to a destination location
CN108108633A (en) A kind of data file and its access method, device and equipment
US20230315846A1 (en) System and method for detecting leaked documents on a computer network
CN113157315A (en) Method, device, equipment and medium for identifying difference information of different versions of software
CN114356968A (en) Query statement generation method and device, computer equipment and storage medium
CN114580008A (en) Document access control based on document component layout
US20130332989A1 (en) Watermarking Detection and Management
CN112364022B (en) Information deduction management method, device, computer equipment and readable storage medium
US10572672B2 (en) Modification of data elements using a semantic relationship
CN105354506B (en) The method and apparatus of hidden file
CN114357511A (en) Method and device for marking key content of document and user terminal
US11741163B2 (en) Mapping of personally-identifiable information to a person based on natural language coreference resolution
CN113591162B (en) Block chain evidence storing method and device and computer equipment
CN111460760B (en) PDF document editing method and device
US9646171B2 (en) Method and apparatus for correctly binding form objects to encrypted XML data
CN113627938B (en) Data deleting method, device and equipment of block chain and storage medium
US20230418786A1 (en) Method for maintaining meta information of secure document, apparatus for the same, computer program for the same, and recording medium storing computer program thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination