CN116186748B - Anti-disclosure management system and method for digital printer - Google Patents

Anti-disclosure management system and method for digital printer Download PDF

Info

Publication number
CN116186748B
CN116186748B CN202310473333.5A CN202310473333A CN116186748B CN 116186748 B CN116186748 B CN 116186748B CN 202310473333 A CN202310473333 A CN 202310473333A CN 116186748 B CN116186748 B CN 116186748B
Authority
CN
China
Prior art keywords
module
authority
file
encrypted
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310473333.5A
Other languages
Chinese (zh)
Other versions
CN116186748A (en
Inventor
陈泽亮
熊祝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Peisongli Technology Co ltd
Original Assignee
Yunnan Peisongli Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Peisongli Technology Co ltd filed Critical Yunnan Peisongli Technology Co ltd
Priority to CN202310473333.5A priority Critical patent/CN116186748B/en
Publication of CN116186748A publication Critical patent/CN116186748A/en
Application granted granted Critical
Publication of CN116186748B publication Critical patent/CN116186748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Abstract

The application provides a digital printer secret leakage prevention management system and a method thereof, which are applied to the field of printing secret leakage prevention management systems; the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database; the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function, an identity recognition function and a data transmission module are arranged in the mobile terminal APP. The method and the device realize that the sensitive part in the printed file is automatically encrypted by using different levels of encryption modes according to different users, and decryption and check can be carried out according to the authority level of the personnel at different levels when the personnel at different levels check the encrypted printed file.

Description

Anti-disclosure management system and method for digital printer
Technical Field
The application relates to the field of printing anti-disclosure management systems, in particular to an anti-disclosure management system and method for a digital printing machine.
Background
The anti-disclosure management system of the digital printer is a system developed to protect confidential documents from disclosure. It monitors and controls document output and printing behavior of the digital printer by software installed inside the digital printer to prevent confidential information from being leaked.
In the existing anti-disclosure management system of the digital printer, because the monitoring and control of the system depend on some fixed rules and algorithms, misjudgment can occur. For example, some normal files are mistaken for confidential files and are thus limited, which may negatively impact the user's work.
And is not applicable to all types of files: anti-compromise systems are only applicable to files that are considered confidential. However, some files may not be formally considered confidential, but may still contain sensitive information. In this case, the anti-disclosure system may not be able to completely protect the information from disclosure.
Disclosure of Invention
Compared with the prior art, the application provides the anti-disclosure management system for the digital printer, which comprises a printing end and a system end, wherein the system end is provided with an anti-disclosure management service terminal, the printing end is connected with digital printing equipment, and the digital printing equipment is provided with an identity collector and a self-verification module;
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database;
the image processing module includes: an image recognition function and an image editing function;
an encryption algorithm matched with different authority levels is arranged in the encryption module; a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module;
the rights management module is used for the rights grade division and rights identification of the personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP.
According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different kinds of encryption algorithms, so that the sensitive information in the file is not easy to leak, and the encryption process is carried out at a service terminal, so that the security is ensured;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
Further, an identity recognition module is arranged in the identity collector; the identity collector comprises face recognition equipment, fingerprint recognition equipment and password recognition equipment;
the digital printing equipment is internally provided with a self-verification module, the self-verification module comprises a cover plate arranged at the output end of the digital printing equipment, a scanning device and an ink-jet printing head with a guide rail are fixedly connected to the cover plate, and the scanning device and the ink-jet printing head are both in signal connection with the digital printing equipment;
the printing end prints the encrypted document through the digital printing equipment, the document text is scanned through the self-verification module when the encrypted document is output, and if the unencrypted information is found, the sensitive information field is subjected to ink-jet smearing by using the ink-jet printing head, so that the sensitive information is not easy to leak.
A digital printer anti-disclosure management method comprises the following specific steps:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, encrypting sensitive information in the file according to the authority level, backing up the encrypted file to a file database, generating a two-dimensional code corresponding to the electronic backup, covering a blank position of the encrypted file, and then sending the blank position to a printing end;
s3, printing an encrypted document through a printing end;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
invoking a decryption algorithm tool of a corresponding level, wherein a user can acquire images of positions of the text file to be decrypted at the moment, and the anti-disclosure management service terminal decrypts the encrypted bytes according to the encrypted bytes identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
Furthermore, the two-dimension code is used for the mobile terminal APP to access the mark, the mobile terminal APP can only call the decryption module after scanning the two-dimension code, and each two-dimension code corresponds to an electronic backup of an encrypted document.
Further, the authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables; s4, in the step of: after a person with authority scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that personnel tracking for reading the encrypted document is facilitated, and related personnel can be conveniently tracked when sensitive information leakage is found.
Optionally, when the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, an image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent, each watermark image is matched with an encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, and the characteristic point position distribution of each watermark image in the same authority level is different;
the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
Further, when the document is encrypted: and the multiple pieces of sensitive information with the same authority level are respectively encrypted by different encryption algorithms.
Compared with the prior art, the application has the advantages that:
(1) According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different kinds of encryption algorithms, so that the sensitive information in the file is not easy to leak, and the encryption process is carried out at a service terminal, so that the security is ensured;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
(2) The digital printing equipment is internally provided with a self-verification module, the self-verification module comprises a cover plate arranged at the output end of the digital printing equipment, a scanning device and an inkjet printing head with a guide rail are fixedly connected to the cover plate, and the scanning device and the inkjet printing head are both in signal connection with a processor at the printing end; the printing end prints the encrypted document through the digital printing equipment, the document text is scanned through the self-verification module when the encrypted document is output, and if the unencrypted information is found, the sensitive information field is subjected to ink-jet smearing by using the ink-jet printing head, so that the sensitive information is not easy to leak.
(3) When the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, an image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent, each watermark image is matched with an encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, and the characteristic point position distribution of each watermark image in the same authority level is different; the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
(4) The authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables; s4, in the step of: after a person with authority scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that personnel tracking for reading the encrypted document is facilitated, and related personnel can be conveniently tracked when sensitive information leakage is found.
Drawings
FIG. 1 is a system architecture diagram of the present application;
FIG. 2 is a perspective view of a digital printing apparatus according to the present application;
FIG. 3 is a perspective view of a cover plate of the present application;
FIG. 4 is a flow chart of the operation of the printing end of the present application in use;
FIG. 5 is a flowchart of the operation of the APP end of the present application;
FIG. 6 is a diagram showing the state change of the encryption of a watermark of sensitive information according to the present application;
FIG. 7 is a schematic representation of the application after encryption of a watermark of sensitive information;
fig. 8 is a topology of the present application in use.
The reference numerals in the figures illustrate:
1 digital printing equipment, 2 identity collector, 3 apron, 4 scanning device, 5 inkjet print head.
Detailed Description
The embodiments of the present application will be described in detail and fully with reference to the accompanying drawings, and it is intended that all other embodiments of the application, which are apparent to one skilled in the art without the inventive faculty, are included in the scope of the present application.
Example 1:
the application provides a secret leakage prevention management system of a digital printer, please refer to fig. 1-5, which comprises a printing end and a system end, wherein the printing end is connected with the system end through a wired network or a wireless network, the system end is provided with a secret leakage prevention management service terminal, the printing end is connected with digital printing equipment, and an identity collector 2 and a self-verification module are arranged on the digital printing equipment 1;
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database, and is provided with a security firewall;
the image processing module includes: an image recognition function and an image editing function; the image processing module is used for carrying out encryption field identification on the acquired image;
an encryption algorithm matched with different authority levels is arranged in the encryption module; sensitive information with different authority levels can be encrypted through different encryption algorithms, so that the sensitive information with different levels in the same document can be encrypted through the encryption algorithms with different levels, and further, people with different authority levels can obtain different information amounts through decryption when viewing the same document;
a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module, a plurality of decryption algorithms in the decryption module are consistent with the corresponding encryption algorithm authority levels, authority personnel with the same authority level or more can invoke the decryption algorithm tool with the corresponding authority level to decrypt through the mobile terminal APP, and a user can access the anti-disclosure management service terminal through the mobile terminal APP;
the rights management module is used for the rights grade division and rights identification of the personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database; the authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP; the mobile terminal APP can upload the document image acquired by the mobile terminal, download the encrypted field information after decryption, and verify the authority information of the user.
Referring to fig. 2-3, a digital printing device 1 and a two-dimensional code printing module are connected to the anti-disclosure printing module, and an identity recognition module is arranged in the identity collector 2; the identity collector 2 comprises face recognition equipment, fingerprint recognition equipment and password recognition equipment;
the digital printing equipment 1 is internally provided with a self-verification module, the self-verification module comprises a cover plate 3 arranged at the output end of the digital printing equipment 1, a scanning device 4 and an inkjet printing head 5 with a guide rail are fixedly connected to the cover plate 3, and the scanning device 4 and the inkjet printing head 5 are in signal connection with the digital printing equipment 1;
the printing end prints the encrypted file through the digital printing equipment 1, the self-verification module scans the file text when the encrypted file is output, and if the unencrypted sensitive information is found, the ink-jet printing head 5 is used for carrying out ink-jet coating on the sensitive information field, so that the sensitive information is not easy to leak.
The encrypted text in this embodiment is used for all rights class personnel to view;
encrypting all the sensitive information; for sensitive information with different authority levels, the encryption modules respectively use encryption algorithms with the corresponding levels to carry out encryption processing;
referring to fig. 4-5, a method for managing leakage prevention of a digital printer includes:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
during encryption processing, the data processing module classifies sensitive information in the document according to authority levels of the sensitive information, and sensitive information fields of the same authority level can be respectively encrypted by using different encryption algorithms under the same authority level;
the sensitive information with different authority levels is encrypted by using encryption algorithms with different authority levels;
the encrypted document is backed up to a document database, a two-dimensional code corresponding to the electronic backup is generated, and the encrypted document is covered at a blank position and then sent to a printing end; the two-dimension code can be used for access record marks of authority personnel, the mobile terminal APP can only call the decryption module after scanning the two-dimension code, and each two-dimension code corresponds to an electronic backup of an encrypted document;
s3, printing the encrypted document by the digital printing equipment 1, and scanning the document text by a self-verification module during printing output;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
after a person with authority scans the two-dimension code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that the document reading record corresponding to the two-dimension code accessed by the person with authority is updated in the document reading record table of the person with authority, the personnel tracking of reading the encrypted document is facilitated, and the related personnel can be conveniently tracked when sensitive information disclosure is found. The multiple pieces of sensitive information with the same authority level can be respectively encrypted by different encryption algorithms;
after judging the authority level of the user, the system terminal calls a decryption algorithm tool of the corresponding level, at the moment, the user can acquire an image of a position of the text file to be decrypted (the image acquisition can acquire a screenshot of an encrypted document electronic backup obtained by scanning a two-dimensional code of the document or directly acquire a photographed image of the printed encrypted document by using the mobile terminal), and the anti-disclosure management service terminal decrypts the byte according to the encrypted byte identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different types of encryption algorithms, so that the sensitive information in the file is not easy to leak, the encryption process is performed at the service terminal, the security is ensured, the encrypted file is transmitted to the printing end, and the security of the printing end is not ensured, so that the sensitive information in the file is still ensured not to leak;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
Example 2:
referring to fig. 6 to 7, only the differences from embodiment 1 will be described below for the sake of brevity. This embodiment 2 is different from embodiment 1 in that:
when the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, the image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent from the image layers of the document images, each watermark image is matched with one encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, the characteristic point position distribution of each watermark image of the same authority level is different, and the characteristic point shapes of the watermark images of different authority levels are different;
the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
Example 3:
the present application provides a secret leakage prevention management system for a digital printer, and only the differences from embodiment 1 are described below for the sake of simplicity. This embodiment 3 is different from embodiment 1 in that:
the encrypted text of the embodiment is only used for the user to check by the personnel with the same authority level;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
when in encryption processing, an encryption algorithm corresponding to the same authority level of a user is used for carrying out encryption processing on sensitive information fields with the same authority level and below, so that sensitive information with a low authority level is also encrypted by a high-level encryption algorithm; the image processing module erases or maps the sensitive information with the authority level higher than the current authority level of the user;
sensitive information in the encrypted document above the user permission level is completely enclosed, and personnel below the user permission level cannot perform partial decryption and viewing on the document.
Example 4:
the present application provides a secret leakage prevention management system for a digital printer, and only the differences from embodiment 1 are described below for the sake of simplicity. This embodiment 4 is different from embodiment 1 in that:
the encrypted text of the embodiment is only used for checking the current authority of the user and the following personnel;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
when in encryption processing, the sensitive information with different grades is encrypted by using an encryption algorithm with the corresponding grade, and the information with the grade higher than the current authority of the user is erased or covered;
personnel with different authority levels can check sensitive information with corresponding levels in the encrypted document, and sensitive information with authority levels higher than that of a user is completely sealed.
The foregoing is merely illustrative of the best modes of carrying out the application in connection with the actual requirements, and the scope of the application is not limited thereto.

Claims (9)

1. The anti-disclosure management system of the digital printer is characterized by comprising a printing end and a system end, wherein the system end is provided with an anti-disclosure management service terminal, digital printing equipment is connected to the printing end, and an identity collector (2) and a self-verification module are arranged on the digital printing equipment (1);
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a permission management module, an identity verification module, a two-dimension code generation module and a data database;
the image processing module includes: an image recognition function and an image editing function;
an encryption algorithm matched with different authority levels is arranged in the encryption module; a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module;
the rights management module is used for rights grade division and rights identification of personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP;
the self-verification module comprises a cover plate (3) arranged at the output end of the digital printing equipment (1), a scanning device (4) and an inkjet printing head (5) with a guide rail are fixedly connected to the cover plate (3), and the scanning device (4) and the inkjet printing head (5) are both in signal connection with the digital printing equipment (1).
2. The anti-disclosure management system of a digital printer according to claim 1, wherein an identity recognition module is disposed in the identity collector (2), and the identity collector (2) includes a face recognition device, a fingerprint recognition device and a password recognition device.
3. The anti-disclosure management system of claim 1, wherein the rights personnel database includes rights personnel account information, rights personnel rights level information and rights personnel document reading record table.
4. A method of managing a security breach prevention management system according to any one of claims 1 to 3, characterized by the specific steps of:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, encrypting sensitive information in the file according to the authority level, backing up the encrypted file to a file database, generating a two-dimensional code corresponding to the electronic backup, covering a blank position of the encrypted file, and then sending the blank position to a printing end;
s3, printing an encrypted document through a printing end;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
invoking a decryption algorithm tool of a corresponding level, wherein a user can acquire images of positions of the text file to be decrypted at the moment, and the anti-disclosure management service terminal decrypts the encrypted bytes according to the encrypted bytes identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
5. The method for managing leakage prevention of a digital printer according to claim 4, wherein the two-dimensional codes are used for access marks of a mobile terminal APP, the mobile terminal APP can only retrieve decryption tools after scanning the two-dimensional codes, and each two-dimensional code corresponds to an electronic backup of an encrypted document.
6. The method for security leakage prevention management of a digital printer according to claim 4, wherein in the step S4: after the authorized person scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the authorized person in the document reading record table of the authorized person.
7. The method for security leakage prevention management of a digital printer according to claim 4, wherein when the document is encrypted: after the sensitive information in the document is identified and positioned through the data processing module, the image processing module adds a watermark image at the sensitive information position, and the image layer of the watermark image is mutually independent with the image layer of the document image.
8. The method for preventing leakage of digital printer according to claim 7, wherein each watermark image is matched with an encryption algorithm in the encryption module, the shapes of the watermark images are similar, characteristic points for image identification are arranged on the watermark images, the position distribution of the characteristic points of each watermark image in the same authority level is different, and the characteristic point shapes of the watermark images in different authority levels are different.
9. The method for security leakage prevention management of a digital printer according to claim 4, wherein when the document is encrypted: and selecting different encryption algorithms for encryption processing of the sensitive information of the same authority level.
CN202310473333.5A 2023-04-28 2023-04-28 Anti-disclosure management system and method for digital printer Active CN116186748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310473333.5A CN116186748B (en) 2023-04-28 2023-04-28 Anti-disclosure management system and method for digital printer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310473333.5A CN116186748B (en) 2023-04-28 2023-04-28 Anti-disclosure management system and method for digital printer

Publications (2)

Publication Number Publication Date
CN116186748A CN116186748A (en) 2023-05-30
CN116186748B true CN116186748B (en) 2023-09-22

Family

ID=86433061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310473333.5A Active CN116186748B (en) 2023-04-28 2023-04-28 Anti-disclosure management system and method for digital printer

Country Status (1)

Country Link
CN (1) CN116186748B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6450605B1 (en) * 1998-11-09 2002-09-17 Silverbrook Res Pty Ltd Modular printhead and methods of loading and printing using it
EP1881400A1 (en) * 1998-11-02 2008-01-23 E-Ink Corporation Display devices made of electronic ink
CN101352972A (en) * 2008-09-26 2009-01-28 北京美科艺数码科技发展有限公司 Assistant print cartridges for ink jet printer
JP2009098779A (en) * 2007-10-15 2009-05-07 Fuji Xerox Co Ltd Document management system, document management device and document management program
CN101588360A (en) * 2009-07-03 2009-11-25 深圳市安络大成科技有限公司 Associated equipment and method for internal network security management
CN104608509A (en) * 2013-11-04 2015-05-13 深圳光启创新技术有限公司 Printer, printing system and method and server
CN104616135A (en) * 2015-02-12 2015-05-13 西安印艺苑实业有限公司 Stamp protection method and system
CN106528007A (en) * 2015-09-11 2017-03-22 南京叱咤信息科技有限公司 Printing control system and printing method thereof
CN107562392A (en) * 2017-08-31 2018-01-09 珠海赛纳打印科技股份有限公司 Safe printing method and system
CN108038373A (en) * 2017-12-20 2018-05-15 北京明朝万达科技股份有限公司 A kind of data scanning method and system for cloud terminal
CN108520183A (en) * 2018-04-13 2018-09-11 杭州橙鹰数据技术有限公司 A kind of date storage method and device
CN109379345A (en) * 2018-09-28 2019-02-22 阿里巴巴集团控股有限公司 Sensitive information transmission method and system
CN110362281A (en) * 2019-05-29 2019-10-22 益萃网络科技(中国)有限公司 Print control program, device, computer equipment and storage medium
CN110806842A (en) * 2019-10-11 2020-02-18 杭州珐珞斯科技有限公司 Uniformly managed printing method, device and system
KR20210014705A (en) * 2021-01-20 2021-02-09 황보의 www.18338891.com
CN112989377A (en) * 2021-03-12 2021-06-18 深圳供电局有限公司 Method and system for performing authority processing on encrypted document
CN113157223A (en) * 2021-04-27 2021-07-23 天津光电久远科技有限公司 Cross-platform official document anti-counterfeiting printing management system used in local area network
CN115329177A (en) * 2022-08-19 2022-11-11 阿里巴巴(中国)有限公司 Data processing method, device, storage medium and program product

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050134896A1 (en) * 2003-12-04 2005-06-23 Canon Kabushiki Kaisha Data processing system, data processing method and apparatus, document printing system, client device, printing device, document printing method, and computer program

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1881400A1 (en) * 1998-11-02 2008-01-23 E-Ink Corporation Display devices made of electronic ink
US6450605B1 (en) * 1998-11-09 2002-09-17 Silverbrook Res Pty Ltd Modular printhead and methods of loading and printing using it
JP2009098779A (en) * 2007-10-15 2009-05-07 Fuji Xerox Co Ltd Document management system, document management device and document management program
CN101352972A (en) * 2008-09-26 2009-01-28 北京美科艺数码科技发展有限公司 Assistant print cartridges for ink jet printer
CN101588360A (en) * 2009-07-03 2009-11-25 深圳市安络大成科技有限公司 Associated equipment and method for internal network security management
CN104608509A (en) * 2013-11-04 2015-05-13 深圳光启创新技术有限公司 Printer, printing system and method and server
CN104616135A (en) * 2015-02-12 2015-05-13 西安印艺苑实业有限公司 Stamp protection method and system
CN106528007A (en) * 2015-09-11 2017-03-22 南京叱咤信息科技有限公司 Printing control system and printing method thereof
CN107562392A (en) * 2017-08-31 2018-01-09 珠海赛纳打印科技股份有限公司 Safe printing method and system
CN108038373A (en) * 2017-12-20 2018-05-15 北京明朝万达科技股份有限公司 A kind of data scanning method and system for cloud terminal
CN108520183A (en) * 2018-04-13 2018-09-11 杭州橙鹰数据技术有限公司 A kind of date storage method and device
CN109379345A (en) * 2018-09-28 2019-02-22 阿里巴巴集团控股有限公司 Sensitive information transmission method and system
CN110362281A (en) * 2019-05-29 2019-10-22 益萃网络科技(中国)有限公司 Print control program, device, computer equipment and storage medium
CN110806842A (en) * 2019-10-11 2020-02-18 杭州珐珞斯科技有限公司 Uniformly managed printing method, device and system
KR20210014705A (en) * 2021-01-20 2021-02-09 황보의 www.18338891.com
CN112989377A (en) * 2021-03-12 2021-06-18 深圳供电局有限公司 Method and system for performing authority processing on encrypted document
CN113157223A (en) * 2021-04-27 2021-07-23 天津光电久远科技有限公司 Cross-platform official document anti-counterfeiting printing management system used in local area network
CN115329177A (en) * 2022-08-19 2022-11-11 阿里巴巴(中国)有限公司 Data processing method, device, storage medium and program product

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Inkjet-Printed Quantum Dot Fluorescent Security Labels with TripleLevel Optical Encryption;Xin Zheng 等;ACS Appl. Mater. Interfaces 2021(第13期);第 15701−15708页 *
Intelligent Paper;Marc Dymetman 等;Artistic Imaging,and Digitial Typography:7th International Conference on Electric Publishing;第392-406页 *
基于二维码技术的涉密文件保密管理系统;张培晶;中国人民公安大学学报(自然科学版)(第第3期期);第48-53页 *
数据安全与隐私保护技术研究;刘明辉 等;邮电设计技术(第04期);第31-35页 *
终端计算模式集中管控系统建设实践;许柔;冯蓓;;无线互联科技(第06期);第157-159页 *
许柔 ; 冯蓓 ; .终端计算模式集中管控系统建设实践.无线互联科技.2019,(06),第157-159页. *
面向遥感影像内容的多级安全授权方法;刘进;孙婧;徐正全;姚晔;;武汉大学学报(信息科学版)(第09期);第1096-1099页 *

Also Published As

Publication number Publication date
CN116186748A (en) 2023-05-30

Similar Documents

Publication Publication Date Title
US6968058B1 (en) Digital evidential camera system for generating alteration detection data using built-in encryption key
US8005213B2 (en) Method, apparatus, and computer program for generating session keys for encryption of image data
US8122483B2 (en) Document file, document file generating apparatus, and document file usage method
US7606769B2 (en) System and method for embedding user authentication information in encrypted data
US7627118B2 (en) Scanner device, scanner system and image protection method
CN1167017C (en) System, method, and program for providing will-call certificates for guaranteeing authorization for printer to retrieve file directly from file server upon request from client in network computer syst
US6480958B1 (en) Single-use passwords for smart paper interfaces
US20080013727A1 (en) Image processing apparatus and image processing method
CN101001305B (en) Information processing apparatus and control method for the same
EP1998306A1 (en) Image encryption/decryption system
US20080297853A1 (en) Methods and Apparatus for Embedding and Detecting Digital Watermarks in a Text Document
US6839838B2 (en) Data management system, information processing apparatus, authentification management apparatus, method and storage medium
JP2001016655A (en) Portable terminal with security
JP2007011422A (en) Document processing method and apparatus, and program
JP4629581B2 (en) Output information management system
CN108390857A (en) A kind of method and apparatus of high sensitive network to low sensitive network export
JP4836499B2 (en) Network printing system
CN116186748B (en) Anti-disclosure management system and method for digital printer
KR20060132547A (en) Digital literary work protection system and digital literary work protection method
WO1994000936A9 (en) Method and apparatus for protecting material on a storage media and transfering material of the media
US8132014B2 (en) Image archiver
JP2004152262A (en) Document print program, document protection program, and document protection system
JP2008040912A (en) Facsimile transmission and reception system with authentication function, device, transmitting and receiving method and program for transmission and reception
JP3984951B2 (en) Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium
CN108322311B (en) Method and device for generating digital certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant