[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113190814A - Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition - Google Patents

Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition Download PDF

Info

Publication number
CN113190814A
CN113190814A CN202110459699.8A CN202110459699A CN113190814A CN 113190814 A CN113190814 A CN 113190814A CN 202110459699 A CN202110459699 A CN 202110459699A CN 113190814 A CN113190814 A CN 113190814A
Authority
CN
China
Prior art keywords
user
file
counterfeiting
authority
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110459699.8A
Other languages
Chinese (zh)
Inventor
李凯
董淑丽
张立君
禤伍梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toec Jiuyuan Technology Co ltd
Original Assignee
Toec Jiuyuan Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toec Jiuyuan Technology Co ltd filed Critical Toec Jiuyuan Technology Co ltd
Priority to CN202110459699.8A priority Critical patent/CN113190814A/en
Publication of CN113190814A publication Critical patent/CN113190814A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C23/00Auxiliary methods or auxiliary devices or accessories specially adapted for crushing or disintegrating not provided for in preceding groups or not specially adapted to apparatus covered by a single preceding group
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C23/00Auxiliary methods or auxiliary devices or accessories specially adapted for crushing or disintegrating not provided for in preceding groups or not specially adapted to apparatus covered by a single preceding group
    • B02C23/02Feeding devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C2201/00Codes relating to disintegrating devices adapted for specific materials
    • B02C2201/06Codes relating to disintegrating devices adapted for specific materials for garbage, waste or sewage

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Food Science & Technology (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Crushing And Pulverization Processes (AREA)

Abstract

The invention relates to an anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition, which comprises a computer, a specially-made paper shredder, an anti-counterfeiting printer, a camera, a face recognition module, an anti-counterfeiting printing module, an anti-counterfeiting file verification module, a file destruction module, a permission verification module, a permission management module, a file tracking module and the like. The system sets printing authority and destroying authority for the user, identifies the user identity and authority through the face recognition module, and stores records of printing and destroying behaviors. Adopting an anti-counterfeiting printer to print the anti-counterfeiting two-dimensional code; the special paper shredder is provided with a camera and an ultraviolet lamp, and scans the anti-counterfeiting two-dimensional code when the paper is fed, acquires the information of the file to be destroyed, and uploads the information to a computer for processing. The system protects the security of the file to the maximum extent, so that the file can be prevented from being copied, scanned and tampered, the file destruction has authority, the file information and the operator information are recorded in detail, the life cycle of the whole file can be monitored, and the traceability is facilitated.

Description

Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition
Technical Field
The invention relates to an anti-counterfeiting confidential destroying management system, in particular to an anti-counterfeiting confidential destroying management system based on face recognition and two-dimensional code recognition.
Background
In an institution unit with a higher security level, the most common issuing mode of the security document is a paper document, and the paper security document is convenient to use and brings great convenience to users. But with it many problems arise: 1. the printed file has no special mark, is easy to be forged and falsified by lawbreakers, and brings huge hidden danger; 2. once the secret of the secret document is divulged, the source of the secret document cannot be searched and the person responsible for the divulging secret cannot be tracked; 3. the source of the file is not easy to determine, and the person who prints the file cannot be judged; 4. the file is printed and issued, the life cycle of the file cannot be determined, and the safety management is out of control; 5. when the confidential documents are destroyed, whether the documents are actually destroyed or not cannot be determined, whether the documents are destroyed by correct people or not cannot be determined, corresponding records do not exist, and potential safety hazards exist.
Disclosure of Invention
In view of the above problems, the present invention provides an anti-counterfeit secret-related destruction management system based on face recognition and two-dimensional code recognition, which aims to prevent documents from being copied, forged, tampered and destroyed by using anti-counterfeit encryption technology and strict authority control, strictly control the life cycle of the documents and accurately position the person responsible for document operation, and the specific technical scheme is that the anti-counterfeit secret-related destruction management system based on face recognition and two-dimensional code recognition comprises a computer, a database server, a special paper shredder, an anti-counterfeit printer, a camera, a face recognition module, an anti-counterfeit printing module, an anti-counterfeit document verification module, a document destruction module, an authority verification module, an authority management module and a document tracking module, and is characterized in that: the computers are respectively connected with the camera, the anti-counterfeiting printer or the special paper shredder through USB interfaces; multiple computers access the database server in the local area network; the camera and face recognition module, the anti-counterfeiting printing module, the anti-counterfeiting file verification module, the file destruction module, the authority verification module, the authority management module and the file tracking module are respectively arranged in a plurality of computers; the system allocates printing authority and destroying authority to the user, and the user needs to set the authority before using the printer and the paper shredder; when a user prints and destroys files, corresponding authorities need to be verified, and the files can be printed or destroyed only after the verification is passed; the implementation steps comprise a printing authority setting step, a destroying authority setting step, a file anti-counterfeiting printing step and a file destroying step,
firstly, setting printing authority, (I) opening a printing authority setting interface, (II) selecting from the interface: 1. adding a new user, (1) inputting basic information of the user, (2) opening a camera after the basic information is successfully stored, reading a facial feature value of the user, and storing the facial feature value in a database; 2. viewing or maintaining the user, and modifying the basic information value or the facial feature value of the input user; 3. deleting the user; secondly, a destroying authority setting step, (I) opening a destroying authority setting interface, (II) selecting from the interface: 1. adding a new user, (1) inputting basic information of the user, (2) opening a camera after the basic information is successfully stored, reading a facial feature value of the user, and storing the facial feature value in a database; 2. viewing or maintaining the user, and modifying the basic information value or the facial feature value of the input user; 3. deleting the user; thirdly, file anti-counterfeiting printing step, (one) opens anti-counterfeiting printing interface, (two) selects file to be printed in the interface, then next step, (three) system starts the camera, obtains user's face information, then uses face characteristic value to inquire user's identity and whether user has printing authority, (four) if user has printing authority, system encrypts file information and user's information to generate anti-counterfeiting two-dimensional code information, after system generates anti-counterfeiting two-dimensional code, adds two-dimensional code on each page of file, then uses anti-counterfeiting printer to print, system records this printing information to database, (five) if user does not have printing authority, system returns result to user, and quits this printing; fourthly, opening a file destroying interface in the file destroying step, (II) selectively destroying the files in the interface, (III) starting a camera by a system to obtain the facial information of a user, then inquiring the identity of the user and whether the user has the authority of destroying the files by using the facial characteristic value, (IV) if the user has the authority of destroying, starting a special paper shredder by the system, putting the files into the paper shredder by the user, reading the information of the anti-counterfeiting two-dimensional code by a two-dimensional code reading device of the paper shredder, decrypting the two-dimensional code information by the system to obtain the information of the files, destroying the files, recording the file destroying record into a database by the system, and (V) if the user does not have the authority of destroying, returning the result to the user by the system and quitting the operation.
The special paper shredder adopts a potted landscape SMR18A type paper shredder, and is characterized in that a paper inlet is improved, the paper inlet is heightened, an ultraviolet lamp and a camera are added on the basis of an original paper shredder, and the special paper shredder is used for reading anti-counterfeiting two-dimensional codes on documents.
The anti-counterfeiting printer adopts a specially-made toner cartridge printer.
The system has the technical effects that the system sets printing authority and destruction authority for the user, before the file is printed and destroyed, the identity of the user is identified through the face recognition module, the file can be printed only if the user has the printing authority, the file can be crushed only if the user has the destruction authority, and corresponding records are recorded. The printer is an anti-counterfeiting printer, and the printed file is provided with an anti-counterfeiting two-dimensional code which can be seen under the irradiation of an ultraviolet lamp, so that the anti-counterfeiting file has the characteristics of copy prevention, scanning prevention and the like; the paper shredder uses a special paper shredder, the special paper shredder is provided with a camera and an ultraviolet lamp, the camera is matched with the ultraviolet lamp, the anti-fake two-dimensional code is scanned when paper is fed, information of a file to be destroyed is obtained, therefore, the file destruction can record file information and a person destroying the file, and the destruction track of the file can be tracked.
Drawings
FIG. 1 is a diagram of a network architecture of the present invention;
FIG. 2 is a flow chart of the print permission setting of the present invention;
fig. 3 is a flowchart of the destruction permission setting of the present invention;
FIG. 4 is a flow chart of the document anti-counterfeit printing process of the present invention;
fig. 5 is a flowchart of file destruction according to the present invention.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1 to 5, an anti-counterfeiting secret-involved destruction management system based on face recognition and two-dimensional code recognition comprises hardware including a computer, a database server, a special paper shredder, an anti-counterfeiting printer and a camera; the software comprises: the system comprises a face recognition module, an anti-counterfeiting printing module, an anti-counterfeiting file verification module, a file destruction module, a permission verification module, a permission management module, a file tracking module and the like. The implementation steps comprise printing authority setting, destruction authority setting, file anti-counterfeiting printing and file destruction. The system sets printing authority and destroying authority for the user, before the file is printed and destroyed, the identity of the user is identified through the face recognition module, the file can be printed only if the user has the printing authority, and the file can be smashed only if the user has the destroying authority. There will be corresponding records for both printing and destroying the file. The printer is an anti-counterfeiting printer, and each page of file is provided with an anti-counterfeiting two-dimensional code which can be displayed under an ultraviolet lamp; the paper shredder is a special paper shredder and is provided with a camera and an ultraviolet lamp, the camera is matched with the ultraviolet lamp, the anti-fake two-dimensional code is scanned when paper is fed, information of a file to be destroyed is obtained, then the file is destroyed, and the destruction record is stored in a database. The system protects the security of the document to the maximum extent, prevents copying, scanning and tampering, requires authority for printing and destroying the document, cannot be processed at will, completely records the life cycle of the document, and is convenient for tracing.
The print authority setting is performed on a computer, and a camera is required to be used. And (4) opening a printing authority setting interface by a user, entering a new user adding interface, firstly inputting and storing the basic information of the user, then opening a camera, reading the facial characteristic value of the user, and storing the facial characteristic value of the user in a database. The input user has the authority to print the file.
The destruction permission setting is carried out on a computer, a camera is required, and the method is similar to the printing permission setting. And (4) opening a destruction authority setting interface by the user, entering a new user adding interface, firstly inputting and storing the basic information of the user, then opening the camera, reading the facial characteristic value of the user, and storing the facial characteristic value of the user in the database. The recorded user has the right to destroy the file.
The anti-counterfeiting printing of the file needs an anti-counterfeiting printer, a computer and a camera. The anti-counterfeiting printer and the camera are connected with the computer through a USB interface. The user opens an anti-counterfeiting printing interface on a computer, selects a file to be printed in the interface, then selects the next step, the system starts a camera to acquire the facial information of the user, and then uses the facial characteristic value to inquire the identity of the user and whether the user has printing authority. If the user has the printing authority, the system encrypts the file information and the user information to generate the anti-counterfeiting two-dimensional code. After the system generates the anti-counterfeiting two-dimensional code, adding two-dimensional code information to each page of the file, and then printing by using an anti-counterfeiting printer. The system records the printing information to a database; if the user does not have printing authority, the system returns the result to the user and quits the printing.
Document destruction requires the use of specially made shredders, computers, and cameras. The special paper shredder and the camera are connected with the computer through a USB interface. The user opens a file destroying interface, selects a file destroying function in the interface, and the system starts a camera to acquire user face information and then queries the user identity and whether the user has the authority to destroy the files by using the face characteristic value. If the user has the destruction authority, the system starts a special paper shredder, the user puts the file into the paper shredder, a two-dimensional code reading device of the paper shredder reads the information of the anti-counterfeiting two-dimensional code, the system decrypts the two-dimensional code information to obtain the file information, then the file is destroyed, and the system records the file destruction record into a database; if the user does not have the destruction authority, the system returns the result to the user and quits the operation.
The above-described embodiments are only a part of the present invention, and those skilled in the art will recognize that the equivalent modifications and substitutions can be made without departing from the spirit and characteristics of the present invention, and the scope of the appended claims is to be considered as the protection scope of the present invention.

Claims (3)

1. The utility model provides a management system is destroyed to anti-fake secret-involved based on face identification and two-dimensional code discernment, includes computer, database server, special kneader, anti-fake printer, camera and face identification module, anti-fake print module, anti-fake document verification module, file destroy module, authority verification module, authority management module, file tracking module, its characterized in that: the computers are respectively connected with the camera, the anti-counterfeiting printer or the special paper shredder through USB interfaces; multiple computers access the database server in the local area network; the camera and face recognition module, the anti-counterfeiting printing module, the anti-counterfeiting file verification module, the file destruction module, the authority verification module, the authority management module and the file tracking module are respectively arranged in a plurality of computers; the system allocates printing authority and destroying authority to the user, and the user needs to set the authority before using the printer and the paper shredder; when a user prints and destroys files, corresponding authorities need to be verified, and the files can be printed or destroyed only after the verification is passed; the implementation steps comprise a printing authority setting step, a destroying authority setting step, a file anti-counterfeiting printing step and a file destroying step,
firstly, setting printing authority
Opening a printing authority setting interface,
(II) selecting in the interface:
1. the addition of a new user is made,
(1) the basic information of the user is input,
(2) after the basic information is successfully stored, opening a camera, reading a face characteristic value of a user, and storing the face characteristic value in a database;
2. the user is either viewed or maintained in a manner,
modifying the basic information value or the facial feature value of the input user;
3. the user is deleted and the user is deleted,
deleting the input user information and the face characteristic value;
secondly, setting destroying authority
Opening a destruction permission setting interface,
(II) selecting in the interface:
1. the addition of a new user is made,
(1) the basic information of the user is input,
(2) after the basic information is successfully stored, the camera is opened, the face characteristic value of the user is read and stored in the database,
2. the user is either viewed or maintained in a manner,
modifying the basic information value or the facial feature value of the input user;
3. the user is deleted and the user is deleted,
deleting the input user information and the face characteristic value;
third, file anti-counterfeiting printing step
Opening the anti-counterfeiting printing interface,
(II) selecting a file to be printed in the interface, and then, next,
thirdly, the system starts a camera to acquire the face information of the user, then uses the face characteristic value to inquire the identity of the user and whether the user has the printing authority or not,
(IV) if the user has the printing authority, the system encrypts the file information and the user information to generate anti-counterfeiting two-dimensional code information, after the system generates the anti-counterfeiting two-dimensional code, the two-dimensional code is added to each page of the file, then the anti-counterfeiting printer is used for printing, the system records the printing information to the database,
if the user does not have the printing authority, the system returns the result to the user and quits the printing;
fourthly, file destroying step
Opening a file destroying interface (I), and opening a file destroying interface,
(II) selecting to destroy the file in the interface,
thirdly, the system starts a camera to obtain the face information of the user, then uses the face characteristic value to inquire the identity of the user and whether the user has the authority to destroy the file,
(IV) if the user has the destruction authority, the system starts a special paper shredder, the user puts the document into the paper shredder, a two-dimensional code reading device of the paper shredder reads the information of the anti-counterfeiting two-dimensional code, the system decrypts the two-dimensional code information to obtain the document information, then the document is destroyed, the system records the document destruction record into a database,
and (V) if the user does not have the destruction authority, the system returns the result to the user and quits the operation.
2. The anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition as claimed in claim 1, characterized in that: the special paper shredder adopts a potted landscape SMR18A type paper shredder, and is characterized in that a paper inlet is improved, the paper inlet is heightened, an ultraviolet lamp and a camera are added on the basis of an original paper shredder, and the special paper shredder is used for reading anti-counterfeiting two-dimensional codes on documents.
3. The anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition as claimed in claim 1, characterized in that: the anti-counterfeiting printer adopts a specially-made toner cartridge printer.
CN202110459699.8A 2021-04-27 2021-04-27 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition Pending CN113190814A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110459699.8A CN113190814A (en) 2021-04-27 2021-04-27 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110459699.8A CN113190814A (en) 2021-04-27 2021-04-27 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition

Publications (1)

Publication Number Publication Date
CN113190814A true CN113190814A (en) 2021-07-30

Family

ID=76979489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110459699.8A Pending CN113190814A (en) 2021-04-27 2021-04-27 Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition

Country Status (1)

Country Link
CN (1) CN113190814A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114047889A (en) * 2021-11-05 2022-02-15 方正株式(武汉)科技开发有限公司 Printer control system based on face recognition
CN117150535A (en) * 2023-10-31 2023-12-01 北京隐算科技有限公司 File management system and method based on homomorphic calculation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108628553A (en) * 2017-03-15 2018-10-09 上海聚虹光电科技有限公司 A kind of remote printing system and method with iris identity authentication function
CN109375882A (en) * 2018-08-10 2019-02-22 南京华讯方舟通信设备有限公司 It is a kind of based on without mark biological identification safe printing method and system
CN109656112A (en) * 2019-01-11 2019-04-19 中国人民解放军国防科技大学 Traceable copying method and system
CN111679800A (en) * 2020-06-10 2020-09-18 天津光电久远科技有限公司 Official document anti-counterfeiting printing system based on domestic operating system
CN111984957A (en) * 2020-08-20 2020-11-24 天津光电久远科技有限公司 Confidential document identification and tracking system based on fingerprint anti-counterfeiting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108628553A (en) * 2017-03-15 2018-10-09 上海聚虹光电科技有限公司 A kind of remote printing system and method with iris identity authentication function
CN109375882A (en) * 2018-08-10 2019-02-22 南京华讯方舟通信设备有限公司 It is a kind of based on without mark biological identification safe printing method and system
CN109656112A (en) * 2019-01-11 2019-04-19 中国人民解放军国防科技大学 Traceable copying method and system
CN111679800A (en) * 2020-06-10 2020-09-18 天津光电久远科技有限公司 Official document anti-counterfeiting printing system based on domestic operating system
CN111984957A (en) * 2020-08-20 2020-11-24 天津光电久远科技有限公司 Confidential document identification and tracking system based on fingerprint anti-counterfeiting

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114047889A (en) * 2021-11-05 2022-02-15 方正株式(武汉)科技开发有限公司 Printer control system based on face recognition
CN117150535A (en) * 2023-10-31 2023-12-01 北京隐算科技有限公司 File management system and method based on homomorphic calculation
CN117150535B (en) * 2023-10-31 2024-02-02 北京隐算科技有限公司 File management system and method based on homomorphic calculation

Similar Documents

Publication Publication Date Title
JP4767750B2 (en) System and method for controlling duplication of documents containing confidential information
JP3803378B2 (en) Secure copy of confidential documents
US11995200B2 (en) Data masking system
US7770220B2 (en) System and method for securing documents using an attached electronic data storage device
US7789302B2 (en) Transfer of verification data
US8040541B2 (en) Secure document printing
US20080163364A1 (en) Security method for controlled documents
US20080320600A1 (en) Secure document management system and apparatus
WO2000051338A1 (en) Data monitoring method, data monitoring device, copying device, and storage medium
CN116842583B (en) Electronic signature system and method with PDF signature as core
CN101686294B (en) Embedded type file information security management system
JP2004201321A (en) System and method for providing and validating hardcopy secure document
US20100046748A1 (en) System and method for digital data validation
CN113190814A (en) Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition
KR101223427B1 (en) Apparatus for safely distributing an internal document and methods thereof
JP2007011422A (en) Document processing method and apparatus, and program
KR20030074568A (en) System for preventing document from forging/alternating
CN111984957A (en) Confidential document identification and tracking system based on fingerprint anti-counterfeiting
CN113157223A (en) Cross-platform official document anti-counterfeiting printing management system used in local area network
CN101170626A (en) Information processing apparatus, information processing method, program, and storage medium
KR20200063609A (en) System and method for preventing forgery and alteration of documents
CN106847314A (en) A kind of CD security management equipment and system
US20080307228A1 (en) Wedi: an encryption-based method and system for the identification and protection of printed documents or those being transmitted by electronic means
JPH05134863A (en) Method and apparatus for protecting data on recording medium
KR20220078992A (en) Confirmation system for original of proof documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210730