CN114896609A - Electronic document system and operation monitoring method thereof - Google Patents

Electronic document system and operation monitoring method thereof Download PDF

Info

Publication number
CN114896609A
CN114896609A CN202210299782.8A CN202210299782A CN114896609A CN 114896609 A CN114896609 A CN 114896609A CN 202210299782 A CN202210299782 A CN 202210299782A CN 114896609 A CN114896609 A CN 114896609A
Authority
CN
China
Prior art keywords
electronic document
electronic
document
key
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210299782.8A
Other languages
Chinese (zh)
Inventor
刘万政
王肖嵬
李玉平
王立军
马晓莉
迟玉莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaneng Shandong Power Generation Co Ltd
Huaneng Information Technology Co Ltd
Shandong Rizhao Power Generation Co Ltd
Original Assignee
Huaneng Shandong Power Generation Co Ltd
Huaneng Information Technology Co Ltd
Shandong Rizhao Power Generation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaneng Shandong Power Generation Co Ltd, Huaneng Information Technology Co Ltd, Shandong Rizhao Power Generation Co Ltd filed Critical Huaneng Shandong Power Generation Co Ltd
Priority to CN202210299782.8A priority Critical patent/CN114896609A/en
Publication of CN114896609A publication Critical patent/CN114896609A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Educational Administration (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of electronic documents, and discloses an electronic document system and an operation monitoring method thereof, which comprise an analysis unit, an execution unit, a processing unit and an operation monitoring unit, wherein the received electronic documents are analyzed and classified in grades, different codes are generated according to different grades, the first-grade electronic document is not encrypted, a signature is input when extraction is needed, the second-grade electronic document is encrypted and a first secret key is generated, the first secret key is input for extraction, the third-grade electronic document is encrypted to generate a second secret key, an anti-counterfeiting file is embedded, when the wrong secret key is input, the anti-counterfeiting file hides the third-grade electronic document, and the operation monitoring unit tracks and monitors the electronic document according to the codes to prevent the electronic document from being leaked. The invention can generate the anti-counterfeiting file through the secret, can carry out different treatments aiming at the electronic bulletins with different importance degrees, can better protect the three-level electronic document, and improves the safety of the electronic document.

Description

Electronic document system and operation monitoring method thereof
Technical Field
The invention relates to the technical field of electronic documents, in particular to an electronic document system and an operation monitoring method thereof.
Background
With the development and progress of the society, the office business of enterprises gradually develops towards the automation level, the electronic documents are important components in the office business, the office efficiency is obviously accelerated through the transmission, sharing and the like of the electronic documents, and the cross-platform resource sharing is realized. The development trend improves the office efficiency on one hand, and brings about that the security of the electronic document cannot be guaranteed on the other hand, the storage mode in the prior art is single, and the electronic document can be unscented and searchable after modification, which can cause the security of the electronic document to be greatly discounted, especially confidential documents which need to be transmitted to courts, inspection yards and the like. In the prior art, different encryption protection can not be carried out according to the importance level of the electronic document.
Therefore, an electronic document system and an operation monitoring method thereof are provided to solve the above problems.
Disclosure of Invention
In order to overcome the defects of the prior art, in some embodiments of the present application, an electronic document system and an operation monitoring method thereof are provided, in which a three-level electronic document to be protected is doubly encrypted, an access file is embedded in the three-level electronic document, and when a key is input incorrectly, a storage carrier automatically hides the three-level electronic document and displays an anti-counterfeiting ciphertext. The problem of among the prior art can't carry out different encryptions according to the important degree of electron official document, influenced electron official document security greatly is solved.
In some embodiments of the application, the step of classifying the electronic document grades is added, the electronic document is divided into a first-level electronic document, a second-level electronic document and a third-level electronic document, different encryption can be well performed according to the importance degree of the electronic document, the three-level electronic document can be better protected while being convenient to extract and read, and other people can be prevented from stealing the electronic document.
In some embodiments of the application, the encryption processing of the electronic documents in different levels is improved, the encryption processing is not performed on the first-level electronic document, the processing process of the electronic documents is accelerated, the first key is formed on the second-level electronic document, the second key is formed on the third-level electronic document, and the anti-counterfeiting file is embedded in the third-level electronic document, so that the third-level electronic document can be better protected from being stolen and stolen.
In some embodiments of the application, the operation monitoring of the electronic documents is improved, the operation monitoring unit can track and monitor the electronic documents according to codes, the electronic documents are prevented from being omitted, each electronic document is guaranteed to be correspondingly processed, and when abnormity occurs, an abnormal data report can be generated in time, so that the leakage of the content of the electronic documents is avoided.
In some embodiments of the present application, there is provided an electronic document system and an operation monitoring unit thereof, the system including:
the analysis unit is used for analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades;
the execution unit is used for calling the grade classification of the electronic document, and when the grade of the electronic document is a first-grade electronic document, encryption processing is not carried out; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document;
the processing unit is used for generating a signature input box when a primary electronic official document instruction is input, inputting signature information and extracting an electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document;
and the operation monitoring unit is used for monitoring and tracking the electronic document according to the codes so as to protect the safety of the primary electronic document, the secondary electronic document and the tertiary electronic document.
In some embodiments of the present application, the security document further comprises: the storage carrier is used for storing the anti-counterfeiting ciphertext; the storage carrier can automatically hide the three-level electronic official document and display the anti-counterfeiting ciphertext; the anti-counterfeiting ciphertext is an automatically generated picture or character.
In some embodiments of the present application, the executing unit further includes judging whether the input key is equal to the first key when the first key is input in the key input box, and extracting the secondary electronic document if the input key is equal to the first key; and if not, locking the secondary electronic document.
In some embodiments of the present application, the keywords carried by the cover of the electronic document are parsed; generating different codes for the electronic document according to the keywords; the keywords specifically comprise a first-level electronic document, a second-level electronic document and a third-level electronic document.
In some embodiments of the present application, the processing unit further comprises: checking whether the electronic document has a form problem; if the form problem does not exist, the electronic document is transmitted to the client; and if the form problem exists, annotating the form problem to form an annotation file, and transmitting the annotation file to the database. The form problem comprises font format, improper vocabulary, wrongly written words, grammar mistakes, signature and paragraph format.
In some embodiments of the present application, the method is applied to an electronic document system, and the method includes: analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades; calling the grade classification of the electronic official document, and not performing encryption processing when the grade of the electronic official document is a first-grade electronic official document; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document; when a first-level electronic official document instruction is input, a signature input box is generated, and signature information is input to extract an electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document; and monitoring and tracking the electronic document according to the codes so as to protect the safety of the primary electronic document, the secondary electronic document and the tertiary electronic document.
In some embodiments of the present application, the security document further comprises: and storing the anti-counterfeiting ciphertext, and when the second secret key is input incorrectly, automatically hiding the three-level electronic document by the storage carrier and displaying the anti-counterfeiting ciphertext.
In some embodiments of the present application, when a first key is input in a key input box, determining whether the input key is equal to the first key, and if so, extracting the secondary electronic document; and if not, locking the secondary electronic document.
In some embodiments of the present application, the keywords carried by the cover of the electronic document are parsed; generating different codes for the electronic document according to the keywords; the keywords specifically comprise a first-level electronic document, a second-level electronic document and a third-level electronic document.
In some embodiments of the present application, checking the electronic document for a form issue; if the form problem does not exist, the electronic document is transmitted to the client; and if the form problem exists, annotating the form problem to form an annotation file, and transmitting the annotation file to the database. The form problem comprises font format, improper vocabulary, wrongly written words, grammar mistakes, signature and paragraph format.
The technical scheme of this application beneficial effect lies in:
the invention relates to the technical field of electronic documents, and discloses an electronic document system and an operation monitoring method thereof, which comprise an analysis unit, an execution unit, a processing unit and an operation monitoring unit, wherein the received electronic documents are analyzed and classified in grades, different codes are generated according to different grades, the first-grade electronic document is not encrypted, a signature is input when extraction is needed, the second-grade electronic document is encrypted and a first secret key is generated, the first secret key is input for extraction, the third-grade electronic document is encrypted to generate a second secret key, an anti-counterfeiting file is embedded, when the wrong secret key is input, the anti-counterfeiting file hides the third-grade electronic document, and the operation monitoring unit tracks and monitors the electronic document according to the codes to prevent the electronic document from being leaked. The invention can generate the anti-counterfeiting file through the secret, can carry out different treatments aiming at the electronic bulletins with different importance degrees, can better protect the three-level electronic document, and improves the safety of the electronic document.
Drawings
FIG. 1 is a functional block diagram of an electronic document system;
FIG. 2 is a flow chart of a method for monitoring the operation of an electronic document.
Detailed Description
The following detailed description of embodiments of the present invention is provided in connection with the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
In the description of the present application, it is to be understood that the terms "center", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referred device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be construed as limiting the present application.
The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present application, "a plurality" means two or more unless otherwise specified.
Specific implementations of the present invention are described in detail below with reference to specific embodiments.
As shown in fig. 1, an embodiment of the present invention provides an electronic document system, including:
the analysis unit is used for analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades;
the execution unit is used for calling the grade classification of the electronic document, and when the grade of the electronic document is a first-grade electronic document, encryption processing is not carried out; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document;
the processing unit is used for generating a signature input box when a primary electronic official document instruction is input, inputting signature information and extracting the electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document;
it should be noted that, with the development and progress of science and technology, office business has gradually advanced to automation processing, wherein electronic documents are the most important components in the automation office, which has become an important concern for the security management and transmission of electronic documents, and the development of computer network technology brings a good environment for the development of office automation. Office automation is an important component of enterprise informatization, is increasingly emphasized by enterprises and public institutions, and is preferentially implemented in most enterprise informatization construction. Electronic documents are widely used in office automation systems as an important part of office automation, for example, the electronic documents may be electronic data in a standardized format formed by processing the electronic documents in various regions and departments through an electronic document transmission system configured in a unified manner. For example, an arbitrary job request, an arbitrary job notification, a promotion alert request, an arbitrary job command, etc. may be generated through the electronic document transmission system or the electronic document system.
At present, the electronic document is not subjected to secret processing or is subjected to unified encryption processing during transmission, the encryption mode is single, different secrets cannot be performed according to the importance degree of the electronic document in the prior art, and the embodiment of the invention aims to solve the problems.
And the operation monitoring unit is used for monitoring and tracking the electronic document according to the codes so as to protect the safety of the primary electronic document, the secondary electronic document and the tertiary electronic document.
Example 1, the present invention was achieved by the following steps,
after the contributor finishes writing the electronic document, the contributor writes a primary electronic document on the cover of the electronic document, and transmits the primary electronic document to the analysis unit, and the analysis unit analyzes the primary electronic document to generate a corresponding code, such as A1, wherein the code can be any code.
It should be noted that, through the above steps, by adding the parser, the parser parses the target file to be parsed, which not only solves the problem of low file parsing flexibility in the related art, but also achieves the effect of improving the flexibility of parsing the file, thereby improving the file parsing efficiency. The problem of analysis errors is not easy to occur, and the flexibility and the accuracy of file analysis are improved.
When the execution unit receives the first-level electronic official document, the first-level electronic official document is not subjected to confidential processing, the first-level electronic official document is directly transmitted to the processing unit, when a user needs to extract the first-level electronic official document, a first-level electronic official document instruction is input at a client side, a signature frame is popped up at the client side at the moment, the user needs to input own signature information in the signature frame, the extraction of the first-level electronic official document can be completed, and when the document is extracted, the form problems of the first-level electronic official document, such as font format, improper vocabulary, wrongly written or mispronounced characters, grammar errors, signature and paragraph format, can be automatically checked. If the form problem is wrong, the annotation is automatically carried out to form an annotation file, the spleen master file is returned to the hand of the contributor, the contributor carries out reprocessing on the electronic official document, and the processed electronic official document enters the database again to wait for the next processing. The processing unit has a trace retaining function and is used for recording whether the electronic document has modification traces in the whole circulation process.
In the embodiment of the invention, when the electronic official document has a form problem, the electronic official document needs to be annotated, and the revision marking function is automatically started at the same time, so that the content subsequently modified by a contributor can be marked, and the contributor can conveniently carry out secondary processing work.
The operation monitoring unit tracks and monitors the primary electronic document according to the generated codes to ensure that the electronic document can be correctly processed, and can carry out safety control and behavior monitoring on the operation of the target unit, record illegal behaviors in detail and finish tracking, examination and evidence collection. The login behavior can be registered, managed, authorized and de-authorized. And ensuring that the electronic document is effectively authorized to the specified user. The system is characterized in that supervision and handling of the whole process are achieved based on a client platform, functions of graphically displaying the specific process of a target unit, generating log monitoring, analyzing handling efficiency of electronic documents and the like are achieved, an operation monitoring unit mainly carries out comprehensive detection and management, inquires, analyzes and reports conditions within a certain range, and meanwhile, a visual process monitoring platform is arranged for monitoring, managing and reporting the operation state of the target unit. The user can know the corresponding stage completion condition of the process according to the own authority, and inquire the task processing condition of each node in the process. The method has the advantages of being safe, efficient, light in weight, capable of enabling the electronic official document to be used as digital information to be transmitted through a network and rapidly reach an addressee, capable of keeping the official document receiving and sending process and the existing official document manual process basically the same, convenient to operate and easy to file, and strong in secrecy safety due to the fact that the encryption mode takes the passwords and the random numbers as parameters.
Example 2, the invention was carried out by the following procedure,
after the contributor finishes writing the electronic document, the contributor writes a secondary electronic document on the cover of the electronic document, and transmits the secondary electronic document to the analysis unit, and the analysis unit analyzes the secondary electronic document to generate a corresponding code, such as A1, wherein the code can be any code.
It should be noted that, through the above steps, by adding the parser, the parser parses the target file to be parsed, which not only solves the problem of low file parsing flexibility in the related art, but also achieves the effect of improving the flexibility of parsing the file, thereby improving the file parsing efficiency. The problem of analysis errors is not easy to occur, and the flexibility and the accuracy of file analysis are improved.
When the execution unit receives the secondary electronic document, a first key is formed on the secondary electronic document, then the secondary electronic document is transmitted to the processing unit, when a user needs to extract the secondary electronic document, a secondary electronic document instruction is input at the client, a key input frame is popped up at the client, the user needs to input the first key in the key input frame, the extraction of the secondary electronic document can be completed, if the key is input wrongly, the secondary electronic document can be automatically locked and needs to be reprocessed, and when the document is extracted, formal problems of the secondary electronic document, such as font format, improper vocabulary, wrongly written or mispronounced words, grammar error, signature and paragraph format, can be automatically checked. If the form problem is wrong, the annotation is automatically carried out to form an annotation file, the spleen master file is returned to the hand of the contributor, the contributor carries out reprocessing on the electronic official document, the processed electronic official document enters the database again to wait for the next processing, and the processing unit has a trace retaining function and is used for recording whether the electronic official document has modification traces in the whole circulation process.
In the embodiment of the invention, when the electronic official document has a form problem, the electronic official document needs to be annotated, and the revision marking function is automatically started at the same time, so that the content subsequently modified by a contributor can be marked, and the contributor can conveniently carry out secondary processing work.
The operation monitoring unit tracks and monitors the secondary electronic document according to the generated code, ensures that the electronic document can be correctly processed, ensures that the secondary electronic document randomly generates a first key, can carry out safety control and behavior monitoring on the operation of the target unit, can carry out detailed recording on illegal behaviors, and finishes tracking, examination and evidence obtaining. The login behavior can be registered, managed, authorized and de-authorized. And ensuring that the electronic document is effectively authorized to the specified user. The operation monitoring unit mainly performs comprehensive detection management, inquires, analyzes and reports conditions in a certain range, and simultaneously has a visual process monitoring platform for monitoring, managing and reporting the operation state of the target unit. The user can know the corresponding stage completion condition of the process according to the own authority, and inquire the task processing condition of each node in the process.
The method has the advantages of being safe, efficient and light in weight, enabling the electronic official document to be used as digital information and transmitted through a network to quickly reach an addressee, enabling the official document receiving and sending process to be kept the same as the existing official document manipulation process, being convenient to operate and easy to store, and being strong in secrecy and safety due to the fact that the encryption mode takes the passwords and the random numbers as parameters.
Example 3, the invention was carried out by the following procedure,
after the contributor completes the writing of the electronic document, the contributor writes a three-level electronic document on the cover of the electronic document, and transmits the three-level electronic document to the analysis unit, and the analysis unit analyzes the three-level electronic document to generate a corresponding code, such as A1, wherein the code can be any code.
It should be noted that, through the above steps, by adding the parser, the parser parses the target file to be parsed, which not only solves the problem of low file parsing flexibility in the related art, but also achieves the effect of improving the flexibility of parsing the file, thereby improving the file parsing efficiency. The problem of analysis errors is not easy to occur, and the flexibility and the accuracy of file analysis are improved.
When the execution unit receives the three-level electronic document, a first secret key is formed for the three-level electronic document, a second secret key is generated on the basis of the first secret key, and an anti-counterfeiting file is embedded into the three-level electronic document, wherein the anti-counterfeiting file comprises: the storage carrier is used for storing the anti-counterfeiting ciphertext; the storage carrier can automatically hide the three-level electronic official document and display the anti-counterfeiting ciphertext; the anti-counterfeiting ciphertext is an automatically generated picture or character.
It should be noted that the anti-counterfeiting ciphertext can be a segment of text, a picture or an unimportant electronic document. And is not particularly limited herein.
When a user needs to extract the three-level electronic document, a three-level electronic document instruction is input at a client, a key input box is popped up at the client, the user needs to input a first key in the key input box, a second key is input on the basis of the first key, and if the key is input incorrectly, the anti-counterfeiting ciphertext can be automatically loaded by a storage carrier on the anti-counterfeiting file at the moment, and the anti-counterfeiting ciphertext is displayed at the client, so that the three-level electronic document is prevented from being leaked. When extracting the file, the formal problems of the three-level electronic official document, such as font format, improper vocabulary, wrongly written words, grammar mistake, signature and paragraph format, are automatically checked. If the form problem is wrong, the annotation is automatically carried out to form an annotation file, the spleen master file is returned to the hand of the contributor, the contributor carries out reprocessing on the electronic official document, the processed electronic official document enters the database again to wait for the next processing, and the processing unit has a trace retaining function and is used for recording whether the electronic official document has modification traces in the whole circulation process.
In the embodiment of the invention, when the electronic official document has a form problem, the electronic official document needs to be annotated, and the revision marking function is automatically started at the same time, so that the content subsequently modified by a contributor can be marked, and the contributor can conveniently carry out secondary processing work.
The operation monitoring unit tracks and monitors the three-level electronic document according to the generated code, so that the electronic document can be correctly processed, a first secret key is randomly generated by the three-level electronic document, the first secret key is generated, an anti-counterfeiting file is embedded in the three-level electronic document, if one step is incorrect, the operation monitoring unit stops the operation of the target file and the target unit in time, the operation monitoring unit can perform safety control and behavior monitoring on the operation of the target unit, records illegal behaviors in detail, and completes tracking, examination and evidence obtaining. The login behavior can be registered, managed, authorized and de-authorized. And ensuring that the electronic document is effectively authorized to the specified user. The operation monitoring unit mainly performs comprehensive detection management, inquires, analyzes and reports conditions in a certain range, and simultaneously has a visual process monitoring platform for monitoring, managing and reporting the operation state of the target unit. The user can know the corresponding stage completion condition of the process according to the own authority, and inquire the task processing condition of each node in the process.
The method has the advantages of being safe, efficient and light in weight, enabling the electronic official document to be used as digital information and transmitted through a network to quickly reach an addressee, enabling the official document receiving and sending process to be kept the same as the existing official document manipulation process, being convenient to operate and easy to store, and being strong in secrecy and safety due to the fact that the encryption mode takes the passwords and the random numbers as parameters.
Fig. 2 is a method for monitoring the operation of an electronic document, the method comprising the steps of:
s101, analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades;
s102, calling the grade classification of the electronic official document, and not performing encryption processing when the grade of the electronic official document is a first-grade electronic official document; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document;
s103, when a first-level electronic official document instruction is input, a signature input box is generated, and signature information is input to extract the electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document;
and S104, monitoring and tracking the electronic document according to the codes so as to protect the safety of the primary electronic document, the secondary electronic document and the tertiary electronic document.
It should be noted that, for the first-level electronic document, no encryption processing is required, the first-level electronic document is a common document, and is convenient for reading and review, and no processing is performed, and only when the first-level electronic document is acquired, the signature information of the first-level electronic document is input, so that the subsequent tracking management is convenient. For the second-level electronic official document, a first-level key needs to be input, for ensuring the safety of the second-level electronic official document, for the third-level electronic official document, the second-level key is input on the basis of inputting the first-level key, and an anti-counterfeiting file can be embedded in the third-level electronic official document to prevent the third-level electronic official document from being leaked.
It should be noted that, in the invention, when the client inputs the signature, the signature information can be directly handwritten on the screen, the handwritten input command can be directly selected, and the extraction and calling of the electronic document can be completed after the handwritten input command passes, thereby effectively ensuring the safety of the information.
In some embodiments of the application, when a first key is input into a key input box, whether the input key is equal to the first key is judged, and if yes, the secondary electronic document is extracted; and if not, locking the secondary electronic document.
When the secondary electronic document is extracted, if the input key is equal to the input first key, the user can finish the extraction and calling of the electronic document at the client, and if the input is wrong, the secondary electronic document is directly locked; and returning to the database again for processing by the contributor. The electronic document transmission mode can effectively realize the distribution and the reception of the electronic document between units in an open network environment, and replaces the traditional paper document transmission mode with the modern electronic document transmission mode. The method has the advantages of being safe, efficient and light in weight, enabling electronic official documents to be used as digital information and transmitted through a network to quickly reach addressees, enabling the official document receiving and sending process to be basically kept the same as the existing official document manual process, being convenient to operate and easy to file, and being strong in confidentiality and safety due to the fact that the encryption mode takes passwords and random numbers as parameters.
To sum up, the embodiment of the present invention provides an electronic document system and an operation monitoring method thereof, including an analysis unit, an execution unit, a processing unit and an operation monitoring unit, wherein the received electronic documents are analyzed and classified into different grades, different codes are generated according to different grades, the first-grade electronic document is not encrypted, a signature is input when extraction is required, the second-grade electronic document is encrypted and a first key is generated, the first key is input for extraction, the third-grade electronic document is encrypted to generate a second key, and an anti-counterfeiting file is embedded. The invention can generate the anti-counterfeiting file through the secret, can carry out different treatments aiming at the electronic bulletins with different importance degrees, can better protect the three-level electronic document, and improves the safety of the electronic document.
It should be noted that, in the encryption method adopted in the present application, because the randomly generated numbers are relied on, the numbers are difficult to be identified and difficult to be covered or forged, so that the identifiability of the file is substantially improved, meanwhile, the outstanding effect of the present invention is also in the identification technology, besides manual identification, the embedded anti-counterfeiting file technology is adopted, so that the file is more difficult to steal and steal, and because the specially obtained first key and the second key can also be completed by a machine, few people knowing the decoding rule exist, so that the security of the system is improved. The method of the invention has the advantages of good effect, large amount of hidden information, high reliability, and high generation and identification efficiency, and can further improve the reliability and effectively resist various interference conditions such as copying, photographing, pollution, damage, crease and the like by adopting the coding. The whole processes of analyzing, coding, generating the first key, generating the second key and embedding the anti-counterfeiting file into the three-level electronic document are complete and high in automation degree, a large amount of electronic documents can be quickly processed, the processing speed of the electronic documents is obviously increased, communication and review among units can be faster and more convenient, the communication efficiency is greatly improved, and automatic office work is promoted.
According to the first concept of the application, the step of classifying the electronic official document grades is added, the electronic official document is divided into the first-level electronic official document, the second-level electronic official document and the third-level electronic official document, different encryption can be well carried out according to the importance degree of the electronic official document, the three-level electronic official document can be better protected while the electronic official document is convenient to extract and read, and the electronic official document can be prevented from being stolen by others.
According to the second concept of the application, the encryption processing of the electronic documents of different grades is improved, the encryption processing is not carried out on the first-grade electronic document, the processing process of the electronic documents is accelerated, the first secret key is formed on the second-grade electronic document, the second secret key is formed on the third-grade electronic document, the anti-fake file is embedded in the third-grade electronic document, and the third-grade electronic document can be better protected from being stolen and stolen.
According to the third concept of the application, the operation monitoring of the electronic documents is improved, the operation monitoring unit can track and monitor the electronic documents according to codes, the electronic documents are prevented from being processed and omitted, each electronic document is guaranteed to be correspondingly processed, and when abnormity occurs, an abnormal data report can be generated in time, so that the leakage of the content of the electronic documents is avoided.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in various embodiments may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art will understand that various changes, modifications and substitutions can be made without departing from the spirit and scope of the invention as defined by the appended claims. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An electronic document system, the system comprising:
the analysis unit is used for analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades;
the execution unit is used for calling the grade classification of the electronic document, and when the grade of the electronic document is a first-grade electronic document, encryption processing is not carried out; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document;
the processing unit is used for generating a signature input box when a primary electronic official document instruction is input, inputting signature information and extracting the electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document;
and the operation monitoring unit is used for monitoring and tracking the electronic document according to the codes.
2. The system of claim 1, wherein the security document further comprises:
the storage carrier is used for storing the anti-counterfeiting ciphertext;
the storage carrier can automatically hide the three-level electronic official document and display the anti-counterfeiting ciphertext;
the anti-counterfeiting ciphertext is an automatically generated picture or character.
3. The system of claim 1, wherein the execution unit further comprises determining whether the input key is authenticated when the first key is input in the key input box,
if the second-level electronic document can pass the authentication, extracting the second-level electronic document;
and if the authentication cannot be passed, locking the secondary electronic document.
4. The system of claim 1, further comprising:
analyzing keywords carried by the cover of the electronic document;
generating different codes for the electronic official document according to the keywords;
the keywords specifically comprise a first-level electronic document, a second-level electronic document and a third-level electronic document.
5. The system of claim 1, wherein the processing unit further comprises:
checking whether the electronic document has a form problem;
if the form problem does not exist, the electronic document is transmitted to the client;
if the form problem exists, annotating the form problem to form an annotation file, and transmitting the annotation file to the database;
the form problem comprises font format, improper vocabulary, wrongly written words, grammar mistakes, signature and paragraph format.
6. An electronic document operation monitoring method is applied to an electronic document system, and comprises the following steps:
analyzing the electronic documents received from the database, classifying the analyzed electronic documents in grades, and generating different codes for the electronic documents in different grades;
calling the grade classification of the electronic official document, and not performing encryption processing when the grade of the electronic official document is a first-grade electronic official document; when the grade of the electronic document is a secondary electronic document, encrypting the secondary electronic document and generating a first secret key; when the grade of the electronic document is a three-level electronic document, encrypting the three-level electronic document to generate a second secret key, and embedding an anti-counterfeiting file in the three-level electronic document, wherein the anti-counterfeiting file is used for hiding the three-level electronic document;
when a first-level electronic official document instruction is input, a signature input box is generated, and signature information is input to extract an electronic official document; when a secondary electronic official document instruction is input, a key input box is generated, and the first key is input to complete the extraction of the electronic official document; when a three-level electronic official document instruction is input, a key input box is generated, and the first key and the second key are input to finish the extraction of the electronic official document;
and monitoring and tracking the electronic document according to the codes.
7. The method of claim 6, wherein the security document further comprises:
and storing the anti-counterfeiting ciphertext, and when the second secret key is input incorrectly, automatically hiding the three-level electronic document by the storage carrier and displaying the anti-counterfeiting ciphertext.
8. The method of claim 6, further comprising:
when the first key is inputted in the key input box, whether the inputted key can pass the authentication is judged,
if the electronic document can pass the authentication, extracting the secondary electronic document;
and if the authentication can not be passed, locking the secondary electronic document.
9. The method of claim 6, further comprising:
analyzing the keywords carried by the cover of the electronic document;
generating different codes for the electronic official document according to the keywords;
the keywords specifically comprise a first-level electronic document, a second-level electronic document and a third-level electronic document.
10. The method of claim 6, further comprising:
checking whether the electronic document has a form problem;
if the form problem does not exist, the electronic document is transmitted to the client;
if the form problem exists, annotating the form problem to form an annotation file, and transmitting the annotation file to the database;
the form problem comprises font format, improper vocabulary, wrongly written words, grammar mistakes, signature and paragraph format.
CN202210299782.8A 2022-03-25 2022-03-25 Electronic document system and operation monitoring method thereof Pending CN114896609A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210299782.8A CN114896609A (en) 2022-03-25 2022-03-25 Electronic document system and operation monitoring method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210299782.8A CN114896609A (en) 2022-03-25 2022-03-25 Electronic document system and operation monitoring method thereof

Publications (1)

Publication Number Publication Date
CN114896609A true CN114896609A (en) 2022-08-12

Family

ID=82714847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210299782.8A Pending CN114896609A (en) 2022-03-25 2022-03-25 Electronic document system and operation monitoring method thereof

Country Status (1)

Country Link
CN (1) CN114896609A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002215827A (en) * 2001-01-17 2002-08-02 Soriton Syst:Kk Storage and utilization method of electoronic document
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN103886098A (en) * 2014-04-04 2014-06-25 浙江大学城市学院 Word document format checking method
CN107633177A (en) * 2017-09-22 2018-01-26 苏州大成有方数据科技有限公司 A kind of file management method of graded encryption
CN113221155A (en) * 2021-05-29 2021-08-06 合肥学院 Multi-level and multi-level encrypted cloud storage system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002215827A (en) * 2001-01-17 2002-08-02 Soriton Syst:Kk Storage and utilization method of electoronic document
CN101005352A (en) * 2007-01-23 2007-07-25 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN103886098A (en) * 2014-04-04 2014-06-25 浙江大学城市学院 Word document format checking method
CN107633177A (en) * 2017-09-22 2018-01-26 苏州大成有方数据科技有限公司 A kind of file management method of graded encryption
CN113221155A (en) * 2021-05-29 2021-08-06 合肥学院 Multi-level and multi-level encrypted cloud storage system

Similar Documents

Publication Publication Date Title
Hauer Data and information leakage prevention within the scope of information security
US8635458B2 (en) Method and a system for embedding textual forensic information
US8869299B2 (en) Method and system for generating trusted security labels for electronic documents
KR101598738B1 (en) Control program management system and method for changing control program
CN110795450A (en) SQL processing method and device
US20200274895A1 (en) System and method for creating a data protection map and remediating vulnerabilities
CN110889130A (en) Database-based fine-grained data encryption method, system and device
US11295027B2 (en) System and method for protecting electronic documents containing confidential information from unauthorized access
CN114021184A (en) Data management method and device, electronic equipment and storage medium
Singh et al. Sql injection detection and correction using machine learning techniques
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
Oka Building secure cars: assuring the automotive software development lifecycle
CN110955897A (en) Software research and development safety control visualization method and system based on big data
US10089463B1 (en) Managing security of source code
JP2008210043A (en) Server device and conversion rule creation program
CN116595573B (en) Data security reinforcement method and device for traffic management information system
CN112328975A (en) Product software authorization management method, terminal device and medium
CN116881979A (en) Method, device and equipment for detecting data safety compliance
CN115640591B (en) Contract management system and method for supply chain
CN114896609A (en) Electronic document system and operation monitoring method thereof
CN114925337B (en) Data labeling method and device and electronic equipment
CN113032744B (en) Digital watermarking integrated machine system
CN111274579B (en) Enterprise document encryption protection system based on computer
Mason Authentic digital records: Laying the foundation for evidence
WO2002103461A2 (en) A method and a system for embedding textual forensic information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220812

RJ01 Rejection of invention patent application after publication