products details

Created with Pixso. Home Created with Pixso. Products Created with Pixso.
DLP Solutions
Created with Pixso.

Electronic Document Data Protection Electronic Document Leak Traceability Forensic System

Electronic Document Data Protection Electronic Document Leak Traceability Forensic System

Brand Name: WSD
Model Number: EDT-004
MOQ: 1
Payment Terms: L/C
Supply Ability: 100
Detail Information
Place of Origin:
CHINA
Core Value:
To Reduce The Occurrence Of Regulatory Breaches And Leaks, Invisible Watermarks Serve As A Deterrent, Thereby Lowering The Risk Of Electronic Document Leaks.
Core Value 2:
Quickly And Accurately Identify The Source Of Leaks, Reducing The Cost Of Tracing And Shortening The Investigation Time After Electronic Document Leaks Occur.
Product Superiority 1:
The Visual Effect Is Excellent, With The Invisible Watermark Minimizing Its Impact On The Visual Presentation.
Product Superiority 2:
The System Is Minimally Invasive, Does Not Alter The Displayed Content, And Does Not Affect User Operations (such As Mouse, Keyboard, Or Stylus).
Product Superiority 3:
The Traceability Information Is Precise, Enabling Detailed Data Such As Device IP, MAC, Name, Employee ID, And Timestamp To Be Traced Through Leaked Samples.
Highlight:

electronic document protection system

,

data leak traceability system

,

forensic data protection system

Product Description

Charpter 1  Product Background

Current information systems primarily employ security measures such as physical isolation, access control, data encryption, and behavioral auditing to address electronic data security during storage and transmission. However, with the advancement of informatization, an increasing number of official documents and sensitive files are now circulated internally in electronic format. This has led to frequent internal electronic document leaks, making electronic documents a critical security control vulnerability. The threats of leaks caused by unauthorized printing, photography, or improper external distribution have become increasingly severe, turning this area into a high-risk zone for data loss and disclosure. Effective control measures are urgently needed to address these challenges.

To address these challenges, Gao Wei Data has developed an electronic document leak traceability and forensics system. By embedding invisible watermarks in electronic documents, it ensures secure control over actions like taking photos, screenshots, or external sharing. The leak traceability series not only identifies the source of leaks but also creates a strong deterrent effect, reducing unauthorized document leaks and effectively lowering the risk of unintentional data breaches. This product demonstrates exceptional practical value.

Charpter 2  Product Overview

The high-dimensional data electronic document leak traceability and forensics system consists of two components: a management platform and an electronic document watermark middleware. The management platform comprises two sub-modules: a public management module and a traceability and forensics module, which serves as the foundation for integrating electronic document watermark embedding services and forensics components. The electronic document watermark middleware handles watermark embedding and is designed for developer integration. It provides comprehensive development guides and interface documentation, ensuring easy integration and maintenance.

 

Charpter 3  product function

3.1 Font watermark

For PDF/OFD files, we provide font watermark embedding services that embed text watermarks by modifying font geometric features, while also supporting transparent watermark embedding. The font watermark preserves original font size, character spacing, and punctuation marks. It supports common official fonts including Song, Kai, Kai GB2312, FangSong, Founder FangSong, and FangSong GB2312. The watermark can be embedded in text sizes ranging from 10.5 to 22 (equivalent to 10.5-22 points) or between 2 and 5 points, without affecting normal document readability.

3.2 Tag watermark

For DOCX/PPTX/XLSX files, we provide label watermarking capability. The watermark is embedded by adding labels to the redundant space of the file. Label watermarking does not alter the file content. Editing, copying, or saving the file as a document in the same format will not cause the watermark to be lost.

3.3 traceability and forensics module

The Electronic Document Leak Traceability and Forensics System provides specialized modules for leak tracing and forensic analysis. For PDF/OFD files, it supports uploading source documents or four image formats (jpg, jpeg, png, bmp) for forensic evidence collection. For docx/pptx/xlsx files, it allows uploading source documents for forensic analysis. By parsing embedded watermarks in documents, the system extracts critical information including document titles, watermark embedding timestamps, names, employee IDs, and other details.

The system also supports displaying electronic document watermark traceability records in a list format, viewing these records, and managing them.

3.4 Public Management Module

The public management module of the electronic document leak traceability and forensics system provides the following capabilities: middleware management, permission management, log management, and system management.

Middleware management: manages the strategies of visible and invisible watermarks, traceability information, and the embedded content and intensity of watermarks.

Permission Management: The module provides user information management capabilities and offers system access authentication and management features for developers.

Log management: The system records operation logs for the management backend and captures critical operation log information.

System Management: This module provides secure login management, email and theme configurations, authorization management, along with screen factor updates and cascade settings. The cascade feature enables hierarchical unit management, ideal for organizations with multiple locations and peer or hierarchical relationships. Authorization management allows monitoring of middleware's watermark authorization quantities and usage status.

Charpter 4  performance index

On an octa-core machine with 32GB RAM, the electronic document watermarking service can embed 140 pages (900 Chinese characters per page) of PDFs in Songti font size 4 at 5 cores per second. The average CPU usage varies by file size: for example, embedding a 100MB PDF requires 300MB of memory.

4.1 environmental support

module

cpu architecture

operating system

ipv4

server

x86_64

Centos(7.6,7.9,8.3)

Ubuntu(18.04,20.04)

Redhat6.4 or later

Galaxy Kirin V10

UniXin UOS 20

Euler 22.03

support

arm

Galaxy Kirin V10

UniXin UOS 20

Euler 22.03

support

SDK

x86

WinXP SP3_X32

Win7(X32,X64)

Win10(X32,X64)

Win11 X64

Unicom UOS V20

Galaxy Kirin V10 SP1

support

arm64

Unicom UOS V20

Galaxy Kirin V10 SP1

support

4.2 Service deployment

Docker containerized deployment with sandboxing, isolates applications from each other and avoids deployment environment impacts

Supports single-machine deployment

Supports multi-node deployment to enhance system availability and scalability

4.3 service configuration

hardware

Recommended settings

Minimum configuration

internal storage

32 GB RAM

16 GB RAM

hard disc drive

Available space: 100 GB

Available space: 100 GB

processor

8 cores, above 2.1 GHz

4 cores, above 2.1 GHz

 

 

Charpter 5  product features

5.1 core value

To reduce the occurrence of regulatory breaches and leaks, invisible watermarks serve as a deterrent, thereby lowering the risk of electronic document leaks.

Quickly and accurately identify the source of leaks, reducing the cost of tracing and shortening the investigation time after electronic document leaks occur.

5.2 product superiority

The visual effect is excellent, with the invisible watermark minimizing its impact on the visual presentation.

The system is minimally invasive, does not alter the displayed content, and does not affect user operations (such as mouse, keyboard, or stylus).

The traceability information is precise, enabling detailed data such as device IP, MAC, name, employee ID, and timestamp to be traced through leaked samples.

With robust performance, industry-first advantages, and cutting-edge core algorithms, it maintains high traceability success rates even in challenging scenarios like image compression, cropping, moire pattern detection, and partial document capture.

It has strong anti-jamming ability, the watermark information is invisible, and it can effectively avoid directional smearing and erasing.