Multi-factor file watermark generation and extraction method and system

An extraction method and multi-factor technology, applied in the field of multi-factor file watermark generation and extraction, can solve the problems of lack of efficiency and security of mobile terminals, poor application of mobile terminals, and many algorithm steps, etc., to achieve rapid decryption and acquisition of content, Easy to obtain and guarantee the effect of safety

Inactive Publication Date: 2018-06-01
CRRC QINGDAO SIFANG CO LTD
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, there is a method based on file format conversion that provides a method for online preview of files, but this method requires multiple file format conversions, which is inefficient, and is based on a PC, and cannot be well applied to mobile terminals; another multi-layer architecture based on cryptographic algorithms realizes the embedding and extraction of digital watermarks, but its algorithm has many steps and is a universal algorithm that is not implemented for the characteristics of mobile terminals. Lack of efficiency and security on mobile devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor file watermark generation and extraction method and system
  • Multi-factor file watermark generation and extraction method and system
  • Multi-factor file watermark generation and extraction method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 It is a step diagram of the multi-factor file watermark generation and extraction method described in the first embodiment of the present invention. This embodiment can be applied to a file distribution management system with a file distribution device, a database, a watermark generation device, and a file receiving device. The method of the present invention It can be executed by the above-mentioned file distribution management system, such as figure 1 As shown, the multi-factor file watermark generation and extraction method described in this embodiment can be executed by the above-mentioned file distribution management system.

[0039] S11. Obtaining client information and generating sensitive information for file distribution this time;

[0040] Before distributing files, the file management system obtains the information of all the file receiving devices to be distributed, that is, the client. The client is a specific application program on a specific ter...

Embodiment 2

[0051] This embodiment is a description of a further optimized embodiment on the basis of Embodiment 1. For a more preferred implementation scheme, this embodiment uses the Android system as the operating system platform carried by the mobile terminal device, and calls the Android system. A program to complete the generation and extraction of digital watermarks.

[0052] figure 2 The step diagram of the method for generating and extracting multi-factor file watermarks in this embodiment, as shown in figure 2 The method for generating and extracting the multi-factor file watermark comprises:

[0053] S21. Obtain terminal device information, application program information, and user information, and generate sensitive information for file distribution this time;

[0054] The file distribution management system extracts the unique identifier of the user (such as the user name of a specific application), the unique identifier of the terminal device (such as IMEI number, MAC ad...

Embodiment 3

[0070] The difference between this embodiment and the second embodiment is that when the system finds a leaked file, it extracts the digital watermark, and obtains the embedded user information, terminal device information, application program information, distribution serial number and sensitive information through a reversible algorithm.

[0071] The sensitive information stored in the database is retrieved by using the distribution serial number, and the sensitive information in the digital watermark is compared with the sensitive information stored in the database. If the two are consistent, the tracking result is reliable.

[0072] Specifically, when the file distribution management system finds that the file is leaked, it extracts the inseparable digital watermark attached to the file, calls the reversible algorithm SymFunc for transformation, and obtains user information, mobile terminal device information, application program information, distribution serial number and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-factor file watermark generation and extraction method. The method comprises the following steps of: obtaining user side information which comprises mobile terminal information, application program information and user information; generating a digital watermark according to the user side information, randomly generated sensitive information and a distribution serial number; embedding the digital watermark in a distributed file; and matching information in the user side information and the digital watermark at the mobile terminal so as to access file content inan application program on mobile terminal equipment through logging in a specific user. According to the method, after the file is leaked, the sensitive information reserved in a database is comparedwith the sensitive information obtained in the digital watermark to judge whether the content of the file watermark is real or not, so that a source of the file is correctly traced.

Description

technical field [0001] The invention relates to the field of computer information security, and is used for efficiently and safely distributing files and effectively tracking files, and specifically relates to a method and system for generating and extracting multi-factor file watermarks. Background technique [0002] With the development of mobile terminal technology, mobile terminals are increasingly popular and widely used in enterprise mobile office environments. In enterprise mobile office, the distribution of enterprise files through the management system can realize efficient sharing of information and effectively improve enterprise office efficiency. [0003] At the same time, because corporate files often contain corporate sensitive information, the application of mobile terminals in corporate mobile office exacerbates the leakage of corporate sensitive information, such as mobile users actively leaking corporate files, applications leaking corporate files without t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/16
CPCG06F21/16G06F21/6209G06F21/1063
Inventor 牟琳王川张士存孙华贺婷婷何彬
Owner CRRC QINGDAO SIFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products