CN116186748B - Anti-disclosure management system and method for digital printer - Google Patents
Anti-disclosure management system and method for digital printer Download PDFInfo
- Publication number
- CN116186748B CN116186748B CN202310473333.5A CN202310473333A CN116186748B CN 116186748 B CN116186748 B CN 116186748B CN 202310473333 A CN202310473333 A CN 202310473333A CN 116186748 B CN116186748 B CN 116186748B
- Authority
- CN
- China
- Prior art keywords
- module
- authority
- file
- encrypted
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/30—Computing systems specially adapted for manufacturing
Abstract
The application provides a digital printer secret leakage prevention management system and a method thereof, which are applied to the field of printing secret leakage prevention management systems; the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database; the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function, an identity recognition function and a data transmission module are arranged in the mobile terminal APP. The method and the device realize that the sensitive part in the printed file is automatically encrypted by using different levels of encryption modes according to different users, and decryption and check can be carried out according to the authority level of the personnel at different levels when the personnel at different levels check the encrypted printed file.
Description
Technical Field
The application relates to the field of printing anti-disclosure management systems, in particular to an anti-disclosure management system and method for a digital printing machine.
Background
The anti-disclosure management system of the digital printer is a system developed to protect confidential documents from disclosure. It monitors and controls document output and printing behavior of the digital printer by software installed inside the digital printer to prevent confidential information from being leaked.
In the existing anti-disclosure management system of the digital printer, because the monitoring and control of the system depend on some fixed rules and algorithms, misjudgment can occur. For example, some normal files are mistaken for confidential files and are thus limited, which may negatively impact the user's work.
And is not applicable to all types of files: anti-compromise systems are only applicable to files that are considered confidential. However, some files may not be formally considered confidential, but may still contain sensitive information. In this case, the anti-disclosure system may not be able to completely protect the information from disclosure.
Disclosure of Invention
Compared with the prior art, the application provides the anti-disclosure management system for the digital printer, which comprises a printing end and a system end, wherein the system end is provided with an anti-disclosure management service terminal, the printing end is connected with digital printing equipment, and the digital printing equipment is provided with an identity collector and a self-verification module;
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database;
the image processing module includes: an image recognition function and an image editing function;
an encryption algorithm matched with different authority levels is arranged in the encryption module; a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module;
the rights management module is used for the rights grade division and rights identification of the personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP.
According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different kinds of encryption algorithms, so that the sensitive information in the file is not easy to leak, and the encryption process is carried out at a service terminal, so that the security is ensured;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
Further, an identity recognition module is arranged in the identity collector; the identity collector comprises face recognition equipment, fingerprint recognition equipment and password recognition equipment;
the digital printing equipment is internally provided with a self-verification module, the self-verification module comprises a cover plate arranged at the output end of the digital printing equipment, a scanning device and an ink-jet printing head with a guide rail are fixedly connected to the cover plate, and the scanning device and the ink-jet printing head are both in signal connection with the digital printing equipment;
the printing end prints the encrypted document through the digital printing equipment, the document text is scanned through the self-verification module when the encrypted document is output, and if the unencrypted information is found, the sensitive information field is subjected to ink-jet smearing by using the ink-jet printing head, so that the sensitive information is not easy to leak.
A digital printer anti-disclosure management method comprises the following specific steps:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, encrypting sensitive information in the file according to the authority level, backing up the encrypted file to a file database, generating a two-dimensional code corresponding to the electronic backup, covering a blank position of the encrypted file, and then sending the blank position to a printing end;
s3, printing an encrypted document through a printing end;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
invoking a decryption algorithm tool of a corresponding level, wherein a user can acquire images of positions of the text file to be decrypted at the moment, and the anti-disclosure management service terminal decrypts the encrypted bytes according to the encrypted bytes identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
Furthermore, the two-dimension code is used for the mobile terminal APP to access the mark, the mobile terminal APP can only call the decryption module after scanning the two-dimension code, and each two-dimension code corresponds to an electronic backup of an encrypted document.
Further, the authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables; s4, in the step of: after a person with authority scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that personnel tracking for reading the encrypted document is facilitated, and related personnel can be conveniently tracked when sensitive information leakage is found.
Optionally, when the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, an image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent, each watermark image is matched with an encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, and the characteristic point position distribution of each watermark image in the same authority level is different;
the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
Further, when the document is encrypted: and the multiple pieces of sensitive information with the same authority level are respectively encrypted by different encryption algorithms.
Compared with the prior art, the application has the advantages that:
(1) According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different kinds of encryption algorithms, so that the sensitive information in the file is not easy to leak, and the encryption process is carried out at a service terminal, so that the security is ensured;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
(2) The digital printing equipment is internally provided with a self-verification module, the self-verification module comprises a cover plate arranged at the output end of the digital printing equipment, a scanning device and an inkjet printing head with a guide rail are fixedly connected to the cover plate, and the scanning device and the inkjet printing head are both in signal connection with a processor at the printing end; the printing end prints the encrypted document through the digital printing equipment, the document text is scanned through the self-verification module when the encrypted document is output, and if the unencrypted information is found, the sensitive information field is subjected to ink-jet smearing by using the ink-jet printing head, so that the sensitive information is not easy to leak.
(3) When the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, an image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent, each watermark image is matched with an encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, and the characteristic point position distribution of each watermark image in the same authority level is different; the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
(4) The authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables; s4, in the step of: after a person with authority scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that personnel tracking for reading the encrypted document is facilitated, and related personnel can be conveniently tracked when sensitive information leakage is found.
Drawings
FIG. 1 is a system architecture diagram of the present application;
FIG. 2 is a perspective view of a digital printing apparatus according to the present application;
FIG. 3 is a perspective view of a cover plate of the present application;
FIG. 4 is a flow chart of the operation of the printing end of the present application in use;
FIG. 5 is a flowchart of the operation of the APP end of the present application;
FIG. 6 is a diagram showing the state change of the encryption of a watermark of sensitive information according to the present application;
FIG. 7 is a schematic representation of the application after encryption of a watermark of sensitive information;
fig. 8 is a topology of the present application in use.
The reference numerals in the figures illustrate:
1 digital printing equipment, 2 identity collector, 3 apron, 4 scanning device, 5 inkjet print head.
Detailed Description
The embodiments of the present application will be described in detail and fully with reference to the accompanying drawings, and it is intended that all other embodiments of the application, which are apparent to one skilled in the art without the inventive faculty, are included in the scope of the present application.
Example 1:
the application provides a secret leakage prevention management system of a digital printer, please refer to fig. 1-5, which comprises a printing end and a system end, wherein the printing end is connected with the system end through a wired network or a wireless network, the system end is provided with a secret leakage prevention management service terminal, the printing end is connected with digital printing equipment, and an identity collector 2 and a self-verification module are arranged on the digital printing equipment 1;
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a right management module, an identity verification module, a two-dimension code generation module and a data database, and is provided with a security firewall;
the image processing module includes: an image recognition function and an image editing function; the image processing module is used for carrying out encryption field identification on the acquired image;
an encryption algorithm matched with different authority levels is arranged in the encryption module; sensitive information with different authority levels can be encrypted through different encryption algorithms, so that the sensitive information with different levels in the same document can be encrypted through the encryption algorithms with different levels, and further, people with different authority levels can obtain different information amounts through decryption when viewing the same document;
a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module, a plurality of decryption algorithms in the decryption module are consistent with the corresponding encryption algorithm authority levels, authority personnel with the same authority level or more can invoke the decryption algorithm tool with the corresponding authority level to decrypt through the mobile terminal APP, and a user can access the anti-disclosure management service terminal through the mobile terminal APP;
the rights management module is used for the rights grade division and rights identification of the personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database; the authority personnel database comprises authority personnel account information, authority personnel authority level information and authority personnel document reading record tables;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP; the mobile terminal APP can upload the document image acquired by the mobile terminal, download the encrypted field information after decryption, and verify the authority information of the user.
Referring to fig. 2-3, a digital printing device 1 and a two-dimensional code printing module are connected to the anti-disclosure printing module, and an identity recognition module is arranged in the identity collector 2; the identity collector 2 comprises face recognition equipment, fingerprint recognition equipment and password recognition equipment;
the digital printing equipment 1 is internally provided with a self-verification module, the self-verification module comprises a cover plate 3 arranged at the output end of the digital printing equipment 1, a scanning device 4 and an inkjet printing head 5 with a guide rail are fixedly connected to the cover plate 3, and the scanning device 4 and the inkjet printing head 5 are in signal connection with the digital printing equipment 1;
the printing end prints the encrypted file through the digital printing equipment 1, the self-verification module scans the file text when the encrypted file is output, and if the unencrypted sensitive information is found, the ink-jet printing head 5 is used for carrying out ink-jet coating on the sensitive information field, so that the sensitive information is not easy to leak.
The encrypted text in this embodiment is used for all rights class personnel to view;
encrypting all the sensitive information; for sensitive information with different authority levels, the encryption modules respectively use encryption algorithms with the corresponding levels to carry out encryption processing;
referring to fig. 4-5, a method for managing leakage prevention of a digital printer includes:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
during encryption processing, the data processing module classifies sensitive information in the document according to authority levels of the sensitive information, and sensitive information fields of the same authority level can be respectively encrypted by using different encryption algorithms under the same authority level;
the sensitive information with different authority levels is encrypted by using encryption algorithms with different authority levels;
the encrypted document is backed up to a document database, a two-dimensional code corresponding to the electronic backup is generated, and the encrypted document is covered at a blank position and then sent to a printing end; the two-dimension code can be used for access record marks of authority personnel, the mobile terminal APP can only call the decryption module after scanning the two-dimension code, and each two-dimension code corresponds to an electronic backup of an encrypted document;
s3, printing the encrypted document by the digital printing equipment 1, and scanning the document text by a self-verification module during printing output;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
after a person with authority scans the two-dimension code on the file, the anti-disclosure management service terminal updates the document reading record information of the person with authority in the document reading record table of the person with authority, so that the document reading record corresponding to the two-dimension code accessed by the person with authority is updated in the document reading record table of the person with authority, the personnel tracking of reading the encrypted document is facilitated, and the related personnel can be conveniently tracked when sensitive information disclosure is found. The multiple pieces of sensitive information with the same authority level can be respectively encrypted by different encryption algorithms;
after judging the authority level of the user, the system terminal calls a decryption algorithm tool of the corresponding level, at the moment, the user can acquire an image of a position of the text file to be decrypted (the image acquisition can acquire a screenshot of an encrypted document electronic backup obtained by scanning a two-dimensional code of the document or directly acquire a photographed image of the printed encrypted document by using the mobile terminal), and the anti-disclosure management service terminal decrypts the byte according to the encrypted byte identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
According to the scheme, the sensitive part in the printed file can be automatically encrypted by using different levels of encryption modes according to different users, the sensitive information with different authority levels in the same file is encrypted by different types of encryption algorithms, so that the sensitive information in the file is not easy to leak, the encryption process is performed at the service terminal, the security is ensured, the encrypted file is transmitted to the printing end, and the security of the printing end is not ensured, so that the sensitive information in the file is still ensured not to leak;
the file viewers of different grades can scan the two-dimensional codes on the file through the APP of the mobile equipment terminal, at the moment, the user information is recorded in the database, and the user obtains the decryption tool of the corresponding authority grade to decrypt and view the encrypted codes on the viewed file; when people of different grades check the encrypted printed file, decryption check can be carried out according to the authority level of the person, and when the person checks the encrypted printed file, the terminal database records the check personnel, so that the tracking and recording of the encrypted file check personnel are realized.
Example 2:
referring to fig. 6 to 7, only the differences from embodiment 1 will be described below for the sake of brevity. This embodiment 2 is different from embodiment 1 in that:
when the document is encrypted: after sensitive information in a document is identified and positioned through a data processing module, the image processing module adds watermark images at the sensitive information positions, the image layers of the watermark images are mutually independent from the image layers of the document images, each watermark image is matched with one encryption algorithm in an encryption module, the shapes of various watermark images are similar, characteristic points for image identification are arranged on the watermark images, the characteristic point position distribution of each watermark image of the same authority level is different, and the characteristic point shapes of the watermark images of different authority levels are different;
the sensitive word fields are rapidly positioned through the watermark images, and the sensitive words with different authority levels are classified by using different watermark images, so that the field positioning during encryption processing of the sensitive fields in the document is facilitated, and meanwhile, the positioning and classification of the encrypted sensitive word fields in the acquired images in the decryption process are facilitated, so that the authority levels of the encrypted fields can be rapidly confirmed by the decryption module according to the watermark types, and the decryption is performed by using a corresponding decryption algorithm.
Example 3:
the present application provides a secret leakage prevention management system for a digital printer, and only the differences from embodiment 1 are described below for the sake of simplicity. This embodiment 3 is different from embodiment 1 in that:
the encrypted text of the embodiment is only used for the user to check by the personnel with the same authority level;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
when in encryption processing, an encryption algorithm corresponding to the same authority level of a user is used for carrying out encryption processing on sensitive information fields with the same authority level and below, so that sensitive information with a low authority level is also encrypted by a high-level encryption algorithm; the image processing module erases or maps the sensitive information with the authority level higher than the current authority level of the user;
sensitive information in the encrypted document above the user permission level is completely enclosed, and personnel below the user permission level cannot perform partial decryption and viewing on the document.
Example 4:
the present application provides a secret leakage prevention management system for a digital printer, and only the differences from embodiment 1 are described below for the sake of simplicity. This embodiment 4 is different from embodiment 1 in that:
the encrypted text of the embodiment is only used for checking the current authority of the user and the following personnel;
s2, when a user selects a file which accords with the authority in the database to print, the user encrypts sensitive information in the file according to the authority level;
when in encryption processing, the sensitive information with different grades is encrypted by using an encryption algorithm with the corresponding grade, and the information with the grade higher than the current authority of the user is erased or covered;
personnel with different authority levels can check sensitive information with corresponding levels in the encrypted document, and sensitive information with authority levels higher than that of a user is completely sealed.
The foregoing is merely illustrative of the best modes of carrying out the application in connection with the actual requirements, and the scope of the application is not limited thereto.
Claims (9)
1. The anti-disclosure management system of the digital printer is characterized by comprising a printing end and a system end, wherein the system end is provided with an anti-disclosure management service terminal, digital printing equipment is connected to the printing end, and an identity collector (2) and a self-verification module are arranged on the digital printing equipment (1);
the anti-disclosure management service terminal is connected with a data processing module, an image processing module, an encryption module, a decryption module, a permission management module, an identity verification module, a two-dimension code generation module and a data database;
the image processing module includes: an image recognition function and an image editing function;
an encryption algorithm matched with different authority levels is arranged in the encryption module; a decryption algorithm tool for decrypting the encryption algorithm is arranged in the decryption module;
the rights management module is used for rights grade division and rights identification of personnel in the rights personnel database, and a plurality of algorithms in the encryption module and the decryption module are respectively matched with different rights grades;
the data database comprises: sensitive information database, authority personnel database and document database;
the anti-disclosure management service terminal is connected with a mobile terminal APP, and an image acquisition function, a data transmission function and an identity recognition function are arranged in the mobile terminal APP;
the self-verification module comprises a cover plate (3) arranged at the output end of the digital printing equipment (1), a scanning device (4) and an inkjet printing head (5) with a guide rail are fixedly connected to the cover plate (3), and the scanning device (4) and the inkjet printing head (5) are both in signal connection with the digital printing equipment (1).
2. The anti-disclosure management system of a digital printer according to claim 1, wherein an identity recognition module is disposed in the identity collector (2), and the identity collector (2) includes a face recognition device, a fingerprint recognition device and a password recognition device.
3. The anti-disclosure management system of claim 1, wherein the rights personnel database includes rights personnel account information, rights personnel rights level information and rights personnel document reading record table.
4. A method of managing a security breach prevention management system according to any one of claims 1 to 3, characterized by the specific steps of:
s1, when in use, confirming authority levels of printing file applicant personnel through an authority management module;
s2, when a user selects a file which accords with the authority in the database to print, encrypting sensitive information in the file according to the authority level, backing up the encrypted file to a file database, generating a two-dimensional code corresponding to the electronic backup, covering a blank position of the encrypted file, and then sending the blank position to a printing end;
s3, printing an encrypted document through a printing end;
s4, when the file is checked, the non-authority person directly looks at the file body, the authority person uses the mobile terminal APP to scan the two-dimensional code on the file, obtain the file information and log in the personal account to confirm the identity, and the system terminal judges the authority level of the user;
invoking a decryption algorithm tool of a corresponding level, wherein a user can acquire images of positions of the text file to be decrypted at the moment, and the anti-disclosure management service terminal decrypts the encrypted bytes according to the encrypted bytes identified in the image information acquired by the mobile terminal, and the decrypted text is sent to the mobile terminal APP;
if the encryption algorithm level corresponding to the byte information in the image is not matched with the user permission, decryption cannot be performed.
5. The method for managing leakage prevention of a digital printer according to claim 4, wherein the two-dimensional codes are used for access marks of a mobile terminal APP, the mobile terminal APP can only retrieve decryption tools after scanning the two-dimensional codes, and each two-dimensional code corresponds to an electronic backup of an encrypted document.
6. The method for security leakage prevention management of a digital printer according to claim 4, wherein in the step S4: after the authorized person scans the two-dimensional code on the file, the anti-disclosure management service terminal updates the document reading record information of the authorized person in the document reading record table of the authorized person.
7. The method for security leakage prevention management of a digital printer according to claim 4, wherein when the document is encrypted: after the sensitive information in the document is identified and positioned through the data processing module, the image processing module adds a watermark image at the sensitive information position, and the image layer of the watermark image is mutually independent with the image layer of the document image.
8. The method for preventing leakage of digital printer according to claim 7, wherein each watermark image is matched with an encryption algorithm in the encryption module, the shapes of the watermark images are similar, characteristic points for image identification are arranged on the watermark images, the position distribution of the characteristic points of each watermark image in the same authority level is different, and the characteristic point shapes of the watermark images in different authority levels are different.
9. The method for security leakage prevention management of a digital printer according to claim 4, wherein when the document is encrypted: and selecting different encryption algorithms for encryption processing of the sensitive information of the same authority level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310473333.5A CN116186748B (en) | 2023-04-28 | 2023-04-28 | Anti-disclosure management system and method for digital printer |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310473333.5A CN116186748B (en) | 2023-04-28 | 2023-04-28 | Anti-disclosure management system and method for digital printer |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116186748A CN116186748A (en) | 2023-05-30 |
CN116186748B true CN116186748B (en) | 2023-09-22 |
Family
ID=86433061
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310473333.5A Active CN116186748B (en) | 2023-04-28 | 2023-04-28 | Anti-disclosure management system and method for digital printer |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116186748B (en) |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6450605B1 (en) * | 1998-11-09 | 2002-09-17 | Silverbrook Res Pty Ltd | Modular printhead and methods of loading and printing using it |
EP1881400A1 (en) * | 1998-11-02 | 2008-01-23 | E-Ink Corporation | Display devices made of electronic ink |
CN101352972A (en) * | 2008-09-26 | 2009-01-28 | 北京美科艺数码科技发展有限公司 | Assistant print cartridges for ink jet printer |
JP2009098779A (en) * | 2007-10-15 | 2009-05-07 | Fuji Xerox Co Ltd | Document management system, document management device and document management program |
CN101588360A (en) * | 2009-07-03 | 2009-11-25 | 深圳市安络大成科技有限公司 | Associated equipment and method for internal network security management |
CN104608509A (en) * | 2013-11-04 | 2015-05-13 | 深圳光启创新技术有限公司 | Printer, printing system and method and server |
CN104616135A (en) * | 2015-02-12 | 2015-05-13 | 西安印艺苑实业有限公司 | Stamp protection method and system |
CN106528007A (en) * | 2015-09-11 | 2017-03-22 | 南京叱咤信息科技有限公司 | Printing control system and printing method thereof |
CN107562392A (en) * | 2017-08-31 | 2018-01-09 | 珠海赛纳打印科技股份有限公司 | Safe printing method and system |
CN108038373A (en) * | 2017-12-20 | 2018-05-15 | 北京明朝万达科技股份有限公司 | A kind of data scanning method and system for cloud terminal |
CN108520183A (en) * | 2018-04-13 | 2018-09-11 | 杭州橙鹰数据技术有限公司 | A kind of date storage method and device |
CN109379345A (en) * | 2018-09-28 | 2019-02-22 | 阿里巴巴集团控股有限公司 | Sensitive information transmission method and system |
CN110362281A (en) * | 2019-05-29 | 2019-10-22 | 益萃网络科技(中国)有限公司 | Print control program, device, computer equipment and storage medium |
CN110806842A (en) * | 2019-10-11 | 2020-02-18 | 杭州珐珞斯科技有限公司 | Uniformly managed printing method, device and system |
KR20210014705A (en) * | 2021-01-20 | 2021-02-09 | 황보의 | www.18338891.com |
CN112989377A (en) * | 2021-03-12 | 2021-06-18 | 深圳供电局有限公司 | Method and system for performing authority processing on encrypted document |
CN113157223A (en) * | 2021-04-27 | 2021-07-23 | 天津光电久远科技有限公司 | Cross-platform official document anti-counterfeiting printing management system used in local area network |
CN115329177A (en) * | 2022-08-19 | 2022-11-11 | 阿里巴巴(中国)有限公司 | Data processing method, device, storage medium and program product |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050134896A1 (en) * | 2003-12-04 | 2005-06-23 | Canon Kabushiki Kaisha | Data processing system, data processing method and apparatus, document printing system, client device, printing device, document printing method, and computer program |
-
2023
- 2023-04-28 CN CN202310473333.5A patent/CN116186748B/en active Active
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1881400A1 (en) * | 1998-11-02 | 2008-01-23 | E-Ink Corporation | Display devices made of electronic ink |
US6450605B1 (en) * | 1998-11-09 | 2002-09-17 | Silverbrook Res Pty Ltd | Modular printhead and methods of loading and printing using it |
JP2009098779A (en) * | 2007-10-15 | 2009-05-07 | Fuji Xerox Co Ltd | Document management system, document management device and document management program |
CN101352972A (en) * | 2008-09-26 | 2009-01-28 | 北京美科艺数码科技发展有限公司 | Assistant print cartridges for ink jet printer |
CN101588360A (en) * | 2009-07-03 | 2009-11-25 | 深圳市安络大成科技有限公司 | Associated equipment and method for internal network security management |
CN104608509A (en) * | 2013-11-04 | 2015-05-13 | 深圳光启创新技术有限公司 | Printer, printing system and method and server |
CN104616135A (en) * | 2015-02-12 | 2015-05-13 | 西安印艺苑实业有限公司 | Stamp protection method and system |
CN106528007A (en) * | 2015-09-11 | 2017-03-22 | 南京叱咤信息科技有限公司 | Printing control system and printing method thereof |
CN107562392A (en) * | 2017-08-31 | 2018-01-09 | 珠海赛纳打印科技股份有限公司 | Safe printing method and system |
CN108038373A (en) * | 2017-12-20 | 2018-05-15 | 北京明朝万达科技股份有限公司 | A kind of data scanning method and system for cloud terminal |
CN108520183A (en) * | 2018-04-13 | 2018-09-11 | 杭州橙鹰数据技术有限公司 | A kind of date storage method and device |
CN109379345A (en) * | 2018-09-28 | 2019-02-22 | 阿里巴巴集团控股有限公司 | Sensitive information transmission method and system |
CN110362281A (en) * | 2019-05-29 | 2019-10-22 | 益萃网络科技(中国)有限公司 | Print control program, device, computer equipment and storage medium |
CN110806842A (en) * | 2019-10-11 | 2020-02-18 | 杭州珐珞斯科技有限公司 | Uniformly managed printing method, device and system |
KR20210014705A (en) * | 2021-01-20 | 2021-02-09 | 황보의 | www.18338891.com |
CN112989377A (en) * | 2021-03-12 | 2021-06-18 | 深圳供电局有限公司 | Method and system for performing authority processing on encrypted document |
CN113157223A (en) * | 2021-04-27 | 2021-07-23 | 天津光电久远科技有限公司 | Cross-platform official document anti-counterfeiting printing management system used in local area network |
CN115329177A (en) * | 2022-08-19 | 2022-11-11 | 阿里巴巴(中国)有限公司 | Data processing method, device, storage medium and program product |
Non-Patent Citations (7)
Title |
---|
Inkjet-Printed Quantum Dot Fluorescent Security Labels with TripleLevel Optical Encryption;Xin Zheng 等;ACS Appl. Mater. Interfaces 2021(第13期);第 15701−15708页 * |
Intelligent Paper;Marc Dymetman 等;Artistic Imaging,and Digitial Typography:7th International Conference on Electric Publishing;第392-406页 * |
基于二维码技术的涉密文件保密管理系统;张培晶;中国人民公安大学学报(自然科学版)(第第3期期);第48-53页 * |
数据安全与隐私保护技术研究;刘明辉 等;邮电设计技术(第04期);第31-35页 * |
终端计算模式集中管控系统建设实践;许柔;冯蓓;;无线互联科技(第06期);第157-159页 * |
许柔 ; 冯蓓 ; .终端计算模式集中管控系统建设实践.无线互联科技.2019,(06),第157-159页. * |
面向遥感影像内容的多级安全授权方法;刘进;孙婧;徐正全;姚晔;;武汉大学学报(信息科学版)(第09期);第1096-1099页 * |
Also Published As
Publication number | Publication date |
---|---|
CN116186748A (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6968058B1 (en) | Digital evidential camera system for generating alteration detection data using built-in encryption key | |
US8005213B2 (en) | Method, apparatus, and computer program for generating session keys for encryption of image data | |
US8122483B2 (en) | Document file, document file generating apparatus, and document file usage method | |
US7606769B2 (en) | System and method for embedding user authentication information in encrypted data | |
US7627118B2 (en) | Scanner device, scanner system and image protection method | |
CN1167017C (en) | System, method, and program for providing will-call certificates for guaranteeing authorization for printer to retrieve file directly from file server upon request from client in network computer syst | |
US6480958B1 (en) | Single-use passwords for smart paper interfaces | |
US20080013727A1 (en) | Image processing apparatus and image processing method | |
CN101001305B (en) | Information processing apparatus and control method for the same | |
EP1998306A1 (en) | Image encryption/decryption system | |
US20080297853A1 (en) | Methods and Apparatus for Embedding and Detecting Digital Watermarks in a Text Document | |
US6839838B2 (en) | Data management system, information processing apparatus, authentification management apparatus, method and storage medium | |
JP2001016655A (en) | Portable terminal with security | |
JP2007011422A (en) | Document processing method and apparatus, and program | |
JP4629581B2 (en) | Output information management system | |
CN108390857A (en) | A kind of method and apparatus of high sensitive network to low sensitive network export | |
JP4836499B2 (en) | Network printing system | |
CN116186748B (en) | Anti-disclosure management system and method for digital printer | |
KR20060132547A (en) | Digital literary work protection system and digital literary work protection method | |
WO1994000936A9 (en) | Method and apparatus for protecting material on a storage media and transfering material of the media | |
US8132014B2 (en) | Image archiver | |
JP2004152262A (en) | Document print program, document protection program, and document protection system | |
JP2008040912A (en) | Facsimile transmission and reception system with authentication function, device, transmitting and receiving method and program for transmission and reception | |
JP3984951B2 (en) | Content usage frequency limiting method, content usage terminal device, content usage system, computer program, and computer-readable recording medium | |
CN108322311B (en) | Method and device for generating digital certificate |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |