Movatterモバイル変換


[0]ホーム

URL:


CN117056877B - Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption - Google Patents

Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption
Download PDF

Info

Publication number
CN117056877B
CN117056877BCN202310884900.6ACN202310884900ACN117056877BCN 117056877 BCN117056877 BCN 117056877BCN 202310884900 ACN202310884900 ACN 202310884900ACN 117056877 BCN117056877 BCN 117056877B
Authority
CN
China
Prior art keywords
target
contract
electronic contract
information
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310884900.6A
Other languages
Chinese (zh)
Other versions
CN117056877A (en
Inventor
宁辛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youfang Information Technology Co ltd
Original Assignee
Shenzhen Youfang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youfang Information Technology Co ltdfiledCriticalShenzhen Youfang Information Technology Co ltd
Priority to CN202310884900.6ApriorityCriticalpatent/CN117056877B/en
Publication of CN117056877ApublicationCriticalpatent/CN117056877A/en
Application grantedgrantedCritical
Publication of CN117056877BpublicationCriticalpatent/CN117056877B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The application belongs to the technical field of data security, and provides a tamper-proof processing method, terminal equipment and a storage medium for electronic documents after decryption. The processing method mainly comprises the following steps: determining a payload in an original rendered layer of the electronic contract; and determining hidden image spots from the effective load based on key information of the electronic contract, generating target abstract information according to the key information of the electronic contract, and writing the target abstract information into the hidden image spots so as to convert the original rendering image layer into a target contract image, thereby generating an electronic document which is safer and not easy to tamper after decryption, and providing more powerful guarantee for electronic contract security of users.

Description

Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption
Technical Field
The application belongs to the technical field of data security, and particularly relates to a tamper-proof processing method, terminal equipment and storage medium for electronic documents after decryption.
Background
The nations develop paperlessly and vigorously, and electronic contracts are accepted by the masses gradually; in recent years, under the influence of epidemic situation, the requirements of various industries on electronic contracts are explosive growth, along with more manufacturers operating the electronic contracts in the market, the requirements on consistency and safety of the contracts are stronger, all electronic contract manufacturers currently adopt PDF/OFD formats for the storage formats of the electronic contracts, the files in the formats can adopt the accepted electronic signature technology to ensure the files not to be tampered (namely, the files are encrypted by the commercial/national secret and the PKCS7 files are generated by the time stamps and written into the files), but if the user adopts screenshot on the contracts or converts the files into picture files, the electronic contract documents have the hidden trouble of being tampered.
Disclosure of Invention
The embodiment of the application provides a tamper-proof processing method, terminal equipment and storage medium for electronic documents after decryption, and aims to solve the technical problem that the existing electronic contract documents have the hidden danger of being tampered after decryption.
In a first aspect, an embodiment of the present application provides a tamper-proof processing method after decryption of an electronic document, which is applied to a server, where the method includes:
Creating key information of the electronic contract;
acquiring an original rendering layer of the electronic contract;
Determining a payload from the original rendered layer;
Determining hidden plaques of the original rendered layer from the payload based on the key information;
generating target abstract information of the electronic contract according to the key information;
Writing the target abstract information into the hidden image spots so as to convert the original rendering image layer into a target contract image;
and encrypting the target contract picture through the secret key information to generate a target electronic contract.
In a first possible implementation manner of the first aspect, the key information includes public and private key information and key data;
the determining hidden plaques of the original rendered layer from the payload based on the key information includes:
Determining hidden patches of the original rendered layer from the payload based on the key data;
The generating the target abstract information of the electronic contract according to the secret key information comprises the following steps:
generating target abstract information of the electronic contract according to the key data;
Encrypting the target contract picture through the secret key information to generate a target electronic contract, wherein the method comprises the following steps:
And encrypting the target contract picture through the public and private key information to generate a target electronic contract.
In a first possible implementation manner of the first aspect, the determining a payload from the original rendering layer includes:
Inputting the original rendering layer into an artificial intelligent model, and determining a contract type corresponding to the original rendering layer;
Determining a payload from the original rendered layer according to the contract type;
and acquiring a payload space unit corresponding to the payload.
In a first possible implementation manner of the first aspect, the determining, based on the key data, the hidden image spot of the original rendered image layer from the payload includes:
Importing the key data into the artificial intelligent model, determining a hidden spot address space from the payload space unit according to the byte size of the key data by the artificial intelligent model, and determining hidden spots corresponding to the hidden spot address space from the payload;
the writing the target abstract information into the hidden image spots comprises the following steps:
And writing the target abstract information into the hidden spot address space.
In a first possible implementation manner of the first aspect, the determining a payload from the original rendering layer according to the contract type includes:
Determining pixel data in a low-recognition area in the original rendering layer according to the contract type;
And acquiring pixel data with gray gradation from the pixel data in the low identification area, and taking target pixel data with gray gradation error meeting a preset error threshold in the low identification area as a payload.
In a first possible implementation manner of the first aspect, before the creating the key information of the electronic contract, the method further includes:
Acquiring first identity information and second identity information, wherein the first identity information is the identity information of a first signing party of the electronic contract, and the second identity information is the identity information of a second signing party of the electronic contract;
And respectively carrying out identity authentication on the first identity information and the second identity information, and executing the step of creating the key information of the electronic contract if the first identity information and the second identity information pass verification.
In a first possible implementation manner of the first aspect, the encrypting the target contract picture through the public-private key information to generate a target electronic contract includes:
Encrypting the target contract picture through the public and private key information to obtain an encryption result;
generating a digital timestamp;
and generating a target electronic contract based on the encryption result and the digital timestamp.
The first aspect of the application has the beneficial effects that: determining a payload in an original rendered layer of the electronic contract; and determining hidden image spots from the effective load based on key information of the electronic contract, generating target abstract information according to the key information of the electronic contract, and writing the target abstract information into the hidden image spots so as to convert the original rendering image layer into a target contract image, thereby generating an electronic document which is safer and not easy to tamper after decryption, and providing more powerful guarantee for electronic contract security of users.
In a second aspect, an embodiment of the present application provides a tamper-proof processing method after decryption of an electronic document, which is applied to a user terminal, where the method includes:
acquiring a target electronic contract;
Obtaining a target contract picture of the target electronic contract according to a preset decryption mode;
Performing reverse analysis on the target contract picture to obtain an original rendering layer and summary information to be detected;
And comparing the summary information to be detected with the target summary information of the target electronic contract, and checking whether the target electronic contract is tampered or not according to a comparison result.
The second aspect of the application has the advantages that: performing reverse analysis on the target contract picture after the electronic contract is decrypted to obtain an original rendering layer and summary information to be detected of the electronic contract; and comparing the summary information to be detected with the target summary information of the target electronic contract, and checking whether the target electronic contract is tampered according to a comparison result, so that a user can successfully check the authenticity and the validity of the electronic contract after decryption.
In a third aspect, the invention also proposes a terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor;
When the terminal equipment is a server, the processor executes the computer program to realize the tamper-proof processing method after the electronic document in the first aspect is decrypted;
When the terminal equipment is a user, the processor executes the computer program to realize the tamper-proof processing method after the electronic document is decrypted.
In a fourth aspect, the present invention further proposes a storage medium, which is a computer-readable storage medium storing a computer program that, when executed by a processor, implements the tamper-proof processing method after decryption of an electronic document according to any one of the above.
It will be appreciated that the advantages of the third or fourth aspect may be found in the relevant description of the first or second aspect, and are not described here again.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of an embodiment of a tamper-proof processing method after decryption of an electronic document at a server side;
FIG. 3 is a schematic diagram of a document page number of an electronic contract provided in an embodiment of the application;
FIG. 4 is a schematic diagram of a pixel effect of a rendering layer according to an embodiment of the present application;
FIG. 5 is a schematic diagram of pixel effects of another rendering layer according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a pixel effect of another rendering layer according to an embodiment of the present application;
fig. 7 is a schematic flow chart of an embodiment of the method for tamper-proof processing after decryption of an electronic document at a user terminal side.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in the present description and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
Furthermore, the terms "first," "second," "third," and the like in the description of the present specification and in the appended claims, are used for distinguishing between descriptions and not necessarily for indicating or implying a relative importance.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
An embodiment of the present application provides a terminal device, as shown in fig. 1, and fig. 1 is a schematic structural diagram of the terminal device according to an embodiment of the present application. The terminal device 1 of this embodiment includes: at least one processor 10 (only one is shown in fig. 1), a processor 10, a memory 11 and a computer program 12 stored in the memory 11 and executable on the at least one processor 10, the processor 10 implementing the steps in an embodiment of a tamper-resistant processing method after decryption of an electronic document when the computer program 12 is executed.
The terminal device 1 may be a server of an electronic subscription cloud platform of a compliance method, or may be a user terminal corresponding to the electronic subscription cloud platform of the compliance method.
It will be appreciated by those skilled in the art that fig. 1 is merely an example of a terminal device 1 and does not constitute a limitation of the terminal device 1, and may include more or fewer components than shown, or may combine certain components, or different components.
The Processor 10 may be a central processing unit (Central Processing Unit, CPU), the Processor 10 may also be other general purpose processors, digital signal processors (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), off-the-shelf Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 11 may in some embodiments be an internal storage unit of the terminal device 1, such as a hard disk or a memory of the terminal device 1. The memory 11 may in other embodiments also be an external storage device of the terminal device 1, such as a plug-in hard disk provided on the terminal device 1, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like. Further, the memory 11 may also include both an internal storage unit and an external storage device of the terminal device 1. The memory 11 is used for storing an operating system, application programs, boot loader (BootLoader), data, other programs etc., such as program codes of the computer program etc. The memory 11 may also be used for temporarily storing data that has been output or is to be output.
It can be understood that at present, the electronic contract cannot be verified in real effectiveness on the premise of decryption, namely, after the user captures a picture of the electronic contract or converts the electronic contract file into a picture file, the electronic contract cannot be verified in real effectiveness, so that verification of the electronic contract after decryption is a difficult problem.
In order to solve the above technical problems, in a first aspect, the present application proposes an embodiment of a tamper-proof processing method applied to a server side after an electronic document is decrypted, and fig. 2 is a schematic flow chart illustrating a first embodiment of the tamper-proof processing method provided by the present application, which is used as an example, but not a limitation, in the present embodiment, that is, an execution body of the tamper-proof processing method is a server after the electronic document is decrypted; the server can be a server of an electronic subscription cloud platform of a compliance method, and the tamper-proof processing method after the electronic document is decrypted mainly comprises the following steps:
Step S01, creating key information of the electronic contract;
It can be understood that when the identification card is confirmed in the process of creating the electronic contract, random data is generated to generate corresponding public and private key information; namely, the secret key information comprises public and private key information and key data;
The public and private key information is used for encrypting and decrypting the electronic contract file, for example, a sender (of the electronic contract) encrypts the electronic contract by using a public key, a receiver (of the electronic contract) decrypts the electronic contract by using a private key, or the sender (of the electronic contract) encrypts the electronic contract by using a private key, and the receiver (of the electronic contract) decrypts the electronic contract by using a public key;
The embodiment introduces an artificial intelligent model to process the electronic contract; accordingly, the key data characterizes tags of entries of the artificial intelligence classifier corresponding algorithm, which may include convolutional neural network models, with image classification functions (image feature representations and relationships that may be used to classify electronic contract document images by learning electronic contract document images), image recognition functions (semantic representations that may be used to identify literal pixel data in electronic contract document images by learning electronic contract document images), and image generation functions (that may be used to generate images, such as generating countermeasure networks, etc.).
In a specific implementation, the embodiment may acquire first identity information and second identity information, where the first identity information is identity information of a first signing party of the electronic contract (may be a sender of the electronic contract), and the second identity information is identity information of a second signing party of the electronic contract (may be a receiver of the electronic contract); and respectively carrying out identity authentication on the first identity information and the second identity information, if the first identity information and the second identity information pass verification, the real-name verification of both sides of the electronic contract is successful, and then the step of creating the key information of the electronic contract is executed.
Step S02, an original rendering layer of the electronic contract is obtained;
it will be appreciated that the original rendering layer, the image presentation layer in the electronic contract document, remains substantially the same although the format of the electronic contract document has a number of different categories.
Step S03, determining a payload from the original rendering layer;
It will be appreciated that three sub-pixels (red, green and blue) for each pixel in a 24-bit bitmap are each represented using 8 bits:
For example, only blue is considered, i.e. there are 2 different values to represent blue with different shades. And blue colors represented by the two values 11111111 and 11111110 are almost indistinguishable to the human eye. Thus, this least significant bit can be used to store information other than color, and is somewhat undetectable. If the same is done for red and green, one byte of information can be stored in more or less three pixels. Further, the above-described operations may characterize steganographic information as being difficult to detect, i.e. to ensure that the modulation of the "carrier" (i.e. the original signal) by the "payload" (the signal that needs to be concealed) has almost negligible visual error in the effect on the carrier.
In a specific embodiment, the server performs "input the original rendering layer to the artificial intelligence model, and determines a contract type corresponding to the original rendering layer; determining a payload from the original rendered layer according to the contract type; a step of acquiring a payload space unit corresponding to the payload:
It can be appreciated that there are differences in document typesetting for different types of electronic contracts: for example, different contract types, fonts, arrangement formats, colors, line spaces, signature areas and stamping areas can be distinguished, so that the difficulty of the effective load is influenced, and whether the camouflage space size is enough or not is influenced; the server determines the payload from the original rendered layer according to the contract type of the currently processed electronic contract:
In a specific embodiment, the server may pre-deploy an artificial intelligence model, where the artificial intelligence model learns and trains documents of various electronic contracts, so that the artificial intelligence model has a function of identifying and classifying an original rendering layer of the electronic contract to be processed currently. Specifically, an artificial intelligence model determines pixel data in a low-recognition region in the original rendered layer according to the contract type; and acquiring pixel data with gray gradation from the pixel data in the low identification area, and taking target pixel data with gray gradation error meeting a preset error threshold in the low identification area as a payload. It can be understood that the above-mentioned low recognition area may be a pixel data area except for a signature and/or a official seal in the electronic contract image, and because the signature area and the official seal area belong to a pixel data area with higher recognition in the electronic contract, when the artificial intelligence model learns and trains documents of various electronic contracts in advance, the pixel data areas with higher recognition are hidden, so that the artificial intelligence model can pay attention to some low recognition areas in the electronic contract, as shown in fig. 3, the contract header area in the drawing can be regarded as a low recognition area, and as can be seen from the contract header in fig. 3, the edge area of the pixel data corresponding to the amplified "contract" two words has a gray gradient condition, the pixel data of gray gradient is obtained from the pixel data in the low recognition area, the pixel data of gray gradient is compared with a preset error threshold, and if the obtained gray gradient error meets the preset error threshold, the target pixel data corresponding to the preset error threshold is regarded as a payload.
It will be appreciated that referring to fig. 4, the rendering layer is effectively probed to find the "payload position" and the size of the "payload space", fig. 4 is an RGB sub-pixel arrangement display (upper diagram of fig. 4) including a standard rendering layer, and each three RGB sub-pixels form a pixel unit, and the visual display effect of the actual rendering layer is shown in the lower diagram of fig. 4. The sub-pixel R in fig. 4 is adjusted to a value 254 by a value 255 for the sub-pixel R and B, so as to obtain a rendering diagram display effect as shown in fig. 5, no change is perceived from the naked eye with the visual display effect of the rendering diagram layer in fig. 4, the sub-pixel R in fig. 5 is continuously adjusted to a value 248, and the sub-pixel R in fig. 5 and B are adjusted to a value 245 by a value 254 for the sub-pixel R in fig. 5, so as to obtain a rendering diagram display effect as shown in fig. 6, the rendering diagram display effect in fig. 5 and 6 can be seen to be obviously graded by the naked eye when the limiting value is 245, if the preset error threshold is set to 245, the reserved bits are 255-245=10 bits, and for the convenience of calculation, the embodiment uses 8 bits of the reduced bits as one byte, and then the two spaces are two byte sizes.
Step S04, determining hidden image spots of the original rendering image layer from the effective load based on the secret key information;
in a specific implementation, the server determines hidden plaques of the original rendered layer from the payload based on the key data;
Specifically, the key data is imported into the artificial intelligent model, a hidden spot address space is determined from the payload space unit according to the byte size of the key data by the artificial intelligent model, and hidden spots corresponding to the hidden spot address space are determined from the payload;
In a specific implementation, the hash algorithm of the electronic contract of the present embodiment may use SHA256 algorithm or SM3 algorithm, where the digest length generated by each SHA256 algorithm or SM3 algorithm is 256 bits, and if the digest length is not compressed and stored, 256 bytes are needed, and if the hash algorithm is converted into "payload space units", 128 hash algorithms are needed, and a single-page contract shown in fig. 3 is used as an example: assuming that the single page of fig. 3 has 269 pixel units in the width direction and 484 pixel units in the height direction, wherein the "payload space" is 269 x 484 = 130196, the effective bits 72%, i.e. 93741 "payload space units", are stored as a set of hashes according to 128 units, and it is expected that 93741/128 = 732 hashes can be stored, for these 732 units we will refer to as a rendering layer structure class, based on which the hidden patches of the original rendering layer are determined.
Step S05, generating target abstract information of the electronic contract according to the key information;
In a specific implementation, the target digest information of the electronic contract is generated from the key data, in particular, the target digest information is generated from the electronic contract (file) based on the key data and by a hash function (agreed upon by the first signer and the second signer).
Step S06, writing the target abstract information into the hidden image spots to convert the original rendering image layer into a target contract image;
Specifically, writing the target abstract information into the hidden spot address space;
It will be appreciated that, for the original rendering layer of the electronic contract, setting the pixel value corresponding to the target digest information, determining the binary message of the target digest information (to be hidden), the artificial intelligence model will pay most attention to finding the pixel address (i.e. the hidden patch address space) where the digest data can be inserted from (the payload space unit), and this pixel where the target digest information can be inserted is called a hidden patch, for use in steganographically writing the target digest information into the original rendering layer.
Step S07, encrypting the target contract picture through the key information to generate a target electronic contract.
Specifically, encrypting the target contract picture through the public and private key information to generate a target electronic contract; to further ensure security, a digital timestamp may also be generated for the target contract picture, and a target electronic contract may be generated based on the encryption result and the digital timestamp.
The present embodiment determines the payload in the original rendered layer of the electronic contract; and determining hidden image spots from the effective load based on key information, and writing target abstract information of the electronic contract into the hidden image spots so as to convert the original rendering image layer into a target contract image, thereby generating an electronic document which is safer and not easy to tamper after decryption, and providing more powerful guarantee for the electronic contract safety of a user.
In the second aspect, if a user adopts a screenshot on an electronic contract document or converts a document into a picture document, the authenticity of the electronic contract document (i.e. decryption verification of an electronic contract) cannot be verified, so that the decryption contract verification is a difficult problem, and in order to solve the above technical problems, an embodiment of the present application provides a tamper-proof processing method applied to a user terminal side after decryption of an electronic document, where the method mainly includes the following steps:
Step S10, acquiring a target electronic contract;
it should be noted that, the execution body of the embodiment is a user terminal, where the user terminal may be a user terminal used by the first signing party or the second signing party of the target electronic contract, and a user of the first signing party or the second signing party may log in an account number of the electronic signing cloud platform to download the target electronic contract and store the target electronic contract to the user terminal;
Step S20, obtaining a target contract picture of the target electronic contract according to a preset decryption mode;
The preset decryption mode may be that a user performs screenshot on the target electronic contract, or converts the target electronic contract into a picture file to implement decryption, so as to obtain a target contract picture of the target electronic contract.
S30, carrying out reverse analysis on the target contract picture to obtain an original rendering layer and summary information to be detected;
in the embodiment, an artificial intelligent model with the same function as the artificial intelligent model deployed on the server side in the embodiment is introduced to perform reverse analysis on the target contract picture, so as to obtain an original rendering layer; stripping the abstract information to be detected in the obtained original rendering layer;
And S40, comparing the summary information to be detected with the target summary information of the target electronic contract, and checking whether the target electronic contract is tampered or not according to a comparison result.
The embodiment of the second aspect of the application has the beneficial effects that: a user signing the electronic contract can reversely analyze the target contract picture after the target electronic contract is decrypted to obtain an original rendering layer and summary information to be detected of the electronic contract; and comparing the summary information to be detected with the target summary information of the target electronic contract, and checking whether the target electronic contract is tampered according to a comparison result, so that a user can successfully check the authenticity and the validity of the electronic document contract after decryption. The technical problem that the authenticity and the validity of the electronic document contract cannot be checked on the premise of decryption of the existing electronic contract is solved, and effective guarantee is further provided for the electronic contract safety of users.
Furthermore, embodiments of the present application provide a computer readable storage medium storing a computer program which, when executed by a processor, implements steps for implementing the various method embodiments described above.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiments, and may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing device/terminal apparatus, recording medium, computer Memory, read-Only Memory (ROM), random access Memory (RAM, random Access Memory), electrical carrier signals, telecommunications signals, and software distribution media. Such as a U-disk, removable hard disk, magnetic or optical disk, etc. In some jurisdictions, computer readable media may not be electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other manners. For example, the apparatus/network device embodiments described above are merely illustrative, e.g., the division of the modules or units is merely a logical functional division, and there may be additional divisions in actual implementation, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

CN202310884900.6A2023-07-182023-07-18Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryptionActiveCN117056877B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202310884900.6ACN117056877B (en)2023-07-182023-07-18Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202310884900.6ACN117056877B (en)2023-07-182023-07-18Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption

Publications (2)

Publication NumberPublication Date
CN117056877A CN117056877A (en)2023-11-14
CN117056877Btrue CN117056877B (en)2024-06-25

Family

ID=88668214

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202310884900.6AActiveCN117056877B (en)2023-07-182023-07-18Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption

Country Status (1)

CountryLink
CN (1)CN117056877B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103873255A (en)*2014-03-032014-06-18杭州电子科技大学Electronic contract off-line signing method based on trusted third party
CN112307125A (en)*2020-11-102021-02-02湖南众享账本网络技术有限公司Signing method and device for realizing encrypted electronic contract based on block chain intelligent contract

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108665403B (en)*2017-03-292022-06-24腾讯科技(深圳)有限公司Digital watermark embedding method, digital watermark extracting method, digital watermark embedding device, digital watermark extracting device and digital watermark system
CN112070636B (en)*2020-09-092023-03-21西南交通大学Image electronic contract signing and verifying method with multistage evidence chain
CN113901817A (en)*2021-08-302022-01-07上海浦东发展银行股份有限公司Document classification method and device, computer equipment and storage medium
CN114119332A (en)*2021-11-122022-03-01中国银行股份有限公司Block chain-based digital watermark writing and reading method and device
CN114338245B (en)*2022-03-112022-05-24湖南三湘银行股份有限公司Data anti-leakage method and system based on artificial intelligence

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103873255A (en)*2014-03-032014-06-18杭州电子科技大学Electronic contract off-line signing method based on trusted third party
CN112307125A (en)*2020-11-102021-02-02湖南众享账本网络技术有限公司Signing method and device for realizing encrypted electronic contract based on block chain intelligent contract

Also Published As

Publication numberPublication date
CN117056877A (en)2023-11-14

Similar Documents

PublicationPublication DateTitle
US11349666B2 (en)Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
US6005936A (en)System for embedding authentication information into an image and an image alteration detecting system
CN106709963B (en)The method and apparatus of the authentication image true and false
US7474761B2 (en)System and method for generating and verifying a self-authenticating document
KR100878579B1 (en) Watermarking method, watermark checking method, watermarking device and watermark checking device
US8175322B2 (en)Method of digital watermark and the corresponding device, and digital camera which can append watermark
US8230216B2 (en)Information processing apparatus, control method therefor, information processing system, and program
CN108596820B (en)Image processing system based on information security
CN113988242A (en)Multi-region-based anti-counterfeiting code generation and verification method, system, equipment and medium
CN117668787B (en)Electronic document identification encryption and anti-counterfeiting detection method based on convolutional neural network
JP2006503374A (en) Cryptographically secure personal identification
TWI861551B (en) Image encryption, image processing method, device, equipment and medium
CN113452526A (en)Electronic document storage and verification method and corresponding device
US8270036B2 (en)Variable data addition method and system
US20030202680A1 (en)Information processing method and apparatus, and computer program and computer -readable storage medium
CN116684201A (en)Digital collection encryption method, system and readable storage medium
KR101809086B1 (en)System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic
WO2021005405A1 (en)A method and system for generating and validating documents and document holder using machine readable barcode
CN117056877B (en)Tamper-proof processing method, terminal equipment and storage medium for electronic document after decryption
WO2019041769A1 (en)Image processing method and application server
KR102280505B1 (en)System and method for providing authenticity and integrity of electronic document
CN113379583B (en)Image signature method, device, computing equipment and storage medium
WO2020199393A1 (en)Anti-counterfeiting system and anti-counterfeiting method
CN113079027B (en)Block data generation and verification method based on hash value
KR101837831B1 (en)Electronic signature display and verification methods with enhanced security

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp