Invention content
The main purpose of the present invention is to provide the storages of a kind of information security processing method, device, equipment and computer to be situated between
Matter, it is intended to discrete Fourier transform be carried out to electronic information, and add stealthy watermark, user is avoided and carry out watermark information manually
Removal, improve the safety of information, be effectively prevented information leakage.
To achieve the above object, the present invention provides a kind of information security processing method, described information security processing packet
Include following steps:
Judge whether to be in information protection mode, if being in information protection mode, when detecting transmission instruction, obtain
The transmission instructs associated initial information;
The initial information is subjected to discrete Fourier transform, generates information to be edited;
Preset user identifier is obtained, user identifier, which is carried out coding, generates mark watermark;
The information to be edited and the mark watermark are overlapped processing, and carry out inverse Fourier transform, generates hair
Send instruction corresponding transmission information;
The transmission information is sent to transmission and instructs associated reception account, so as to the corresponding user of the reception account
Check the transmission information.
Optionally, the described the step of information to be edited and the mark watermark are overlapped processing, including:
The size for obtaining the size and the mark watermark of the initial information, obtains the initial information and the mark
The size relative scale of watermark, judges whether the size relative scale matches with preset ratio;
If the size relative scale is matched with preset ratio, default queueing discipline is pressed into mark watermark and is placed, and will
Information to be edited and the mark watermark are overlapped processing;
If the size relative scale is mismatched with preset ratio, display reminding information, so that user is to identifying watermark
Carry out size adjusting;
After the completion of the size adjusting for detecting mark watermark, default queueing discipline is pressed into mark watermark and is placed, and will be waited for
Editor's information and the mark watermark are overlapped processing.
Optionally, after described the step of judging whether in information protection mode, further include:
If being in information protection mode, the current display interface of display screen is obtained;
The current display interface is parsed, the display information that the current display interface includes is obtained, to be believed according to display
Breath determines whether to open anti-exposal model;
If opening anti-exposal model, obtain preset user identifier and encoded, generates coded graphics;
The coded graphics is converted into preset format polar plot, and the preset format polar plot broken up be distributed to it is aobvious
In display screen, with the caused information leakage that prevents from taking pictures.
Optionally, the parsing current display interface, obtains the display information that the current display interface includes, with
According to display information determine whether to open anti-exposal model the step of include:
The current display interface is parsed, the display information that the current display interface includes is obtained, obtains the display
Character set in information;
Character in the character set is subjected to traversal matching with the sensitive character in default sensitive information library, to judge
Whether include the sensitive character in the character set;
If being determined according to the character quantity of the sensitive character current comprising the sensitive character in the character set
The sensitive grade of display interface;
If the sensitive grade of the current display interface is more than predetermined threshold value, anti-exposal model is opened.
Optionally, described that the transmission information is sent to the associated reception account of transmission instruction, so as to the reception account
The corresponding user in family checks after the step of transmission information, including:
When detecting based on the analysis request for sending information triggering, the transmission information is subjected to Fourier transformation;
When detecting that the transmission information Fourier transformation is completed, the mark watermark for sending information and including is obtained,
And be decoded mark watermark, obtain the corresponding user identifier of mark watermark.
Optionally, described to obtain preset user identifier, user identifier is subjected to the step of coding generates mark watermark, is also wrapped
It includes:
Preset user identifier is obtained, the preset user identifier is encrypted by preset rules;
After the completion of detecting preset user identifier encryption, the preset user identifier is subjected to random coded and generates mark
Watermark, so that mark watermark is overlapped processing with information to be edited.
Optionally, described when detecting that sending information Fourier transformation completes, obtain the mark for sending information and including
Know watermark, and the step of mark watermark is decoded, obtains mark watermark corresponding user identifier, including:
When detecting that sending information Fourier transformation completes, the mark watermark for sending information and including is obtained, and sentence
Whether the mark watermark of breaking passes through encryption;
If encryption is passed through in the mark watermark, the corresponding decryption rule of mark watermark and decoding rule are obtained;
The mark watermark is decoded and is decrypted, the corresponding user identifier of mark watermark is obtained.
In addition, to achieve the above object, the present invention also provides a kind of information security processing unit, described information safe handlings
Device includes:
Mode deciding module is in information protection mode for judging whether, if being in information protection mode, is detecting
Associated initial information is instructed to when sending instruction, obtaining to send;
Message processing module generates information to be edited for initial information to be carried out discrete Fourier transform;
Processing module is identified, for obtaining preset user identifier, user identifier is subjected to coding and generates mark watermark;
Watermark processing module for the information to be edited and the mark watermark to be overlapped processing, and carries out Fu
In leaf inverse transformation, generate to send and instruct corresponding transmission information;
Information sending module instructs associated reception account, to receive for the transmission information to be sent to transmission
Account corresponds to user and checks the transmission information.
In addition, to achieve the above object, the present invention also provides a kind of information security processing equipment, described information safe handlings
Equipment includes:It memory, processor and is stored on the memory and at the information security that can be run on the processor
Program is managed, wherein:
It is realized such as above-mentioned information security processing method when described information render safe procedures are executed by the processor
Step.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
Information security processing routine is stored on the computer storage media, described information render safe procedures are handled
It is realized such as the step of above-mentioned information security processing method when device executes.
A kind of information security processing method, device, equipment and the computer storage media that the embodiment of the present invention proposes, are being looked forward to
User identifier, and setting information protected mode on computers are preserved in industry or public institution's personal computer, are made in user
When carrying out information processing with computer, computer judges whether to be in information protection mode first, if being in information protection mode,
Then detecting that when sending instruction, acquisition, which is sent, instructs associated initial information;Initial information is subjected to discrete Fourier transform,
Generate information to be edited;At the same time, terminal acquisition user identifier preset in being locally stored, coding life is carried out by user identifier
At mark watermark;Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, are generated and are sent
Corresponding transmission information is instructed, sends the stealthy watermark for carrying user identifier in information at this time;Terminal is sent to information is sent
It sends and instructs associated reception account, corresponding to user to receive account checks the transmission information.When there is leakage of information,
Dissection process can be carried out to information and obtain corresponding user identifier, to determine leakage of information source, ensured information security.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:Preserve user identity information in the terminal that user uses, with
When family is sent into row information, the identification information of user is generated into corresponding mark watermark, and the mark watermark by generation and user
The information of transmission merges, and carries out inverse Fourier transform and generate stealthy watermark so that adds and uses in the information that user sends
Family identification information, while the information of user's transmission does not influence the reading of recipient;When there is information leakage, terminal by information into
Row Fourier transformation so that user identity information is shown, to determine the source of information leakage.
Since the prior art will add watermark on electronic document, user can be with by means such as PS when information is sent
Personal information is deleted, such method can to a certain extent protect confidential data, reduce concerning security matters number
According to stolen risk;However, such protected mode can only be embedded in watermark in certain specific positions of confidential data first, it can not
All concerning security matters contents are comprehensively covered, the person of stealing secret information deliberately can avoid watermark and steal the other parts of confidential data,
Occur not determining that the source of information leakage, information security can not be effectively protected when information leakage.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can also be mobile terminal, wherein fixed terminal such as " Internet of Things with fixed terminal
Equipment ", the intelligent air condition with network savvy, intelligent electric lamp, intelligent power etc.;Mobile terminal, such as AR/VR with network savvy
Equipment, intelligent sound box, autonomous driving vehicle, smart mobile phone, tablet computer, E-book reader, pocket computer etc. have aobvious
Show the terminal device of function.
As shown in Figure 1, the terminal may include:Processor 1001, (such as central processing unit Central Processing
Unit, CPU), network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002
For realizing the connection communication between these components.User interface 1003 may include display screen (Display), input unit ratio
Such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface
1004 may include optionally that (such as Wireless Fidelity WIreless-FIdelity, WIFI connect standard wireline interface and wireless interface
Mouthful).Memory 1005 can be high-speed random access memory (random access memory, RAM), can also be stabilization
Memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of preceding
State the storage device of processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, either combines certain components or different components arrangement.
As shown in Figure 1, the computer software product is stored in a storage medium (storage medium:It is called computer storage
Medium, computer media, readable medium, readable storage medium storing program for executing, computer readable storage medium are directly medium etc., such as
RAM, magnetic disc, CD) in, including some instructions are used so that a station terminal equipment (can be mobile phone, computer, server, sky
Adjust device or the network equipment etc.) method described in each embodiment of the present invention is executed, as a kind of depositing for computer storage media
May include operating system, network communication module, Subscriber Interface Module SIM and information security processing application program in reservoir 1005.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server
Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor
1001 can be used for calling the information security processing application program stored in memory 1005, and execute following embodiment of the present invention
Step in the information security processing method of offer.
With reference to Fig. 2, in the first embodiment of information security processing method of the present invention, described information security processing packet
It includes:
Step S10 judges whether to be in information protection mode, if being in information protection mode, is detecting that transmission refers to
When enabling, obtains and send the associated initial information of instruction.
When user starts terminal or when user carries out terminal operation, terminal judges whether the pattern residing for itself is letter
Cease protected mode, it should be noted that end message protected mode can be carried out certainly by server or other monitoring devices
Dynamic setting, can also be independently to be arranged with terminal user, however, it is determined that terminal is in information protection mode, is detected in terminal
When user is operated based on terminal, terminal automatic trigger operation detection request, terminal handler receives operation detection request, and
The operation executed in detection terminal, when terminal handler detects that the operation corresponding instruction of user's triggering is to send instruction, eventually
End, which obtains to send, instructs associated initial information, wherein initial information can be image information, electronic document or instant message
Equal different types of information, for example, scientific & technical corporation sets the work computer of all employees to information protection mode, in work computer
Processor detects, when triggering the transmission instruction of screenshotss image in the instant message applications of terminal, terminal is obtained to send to instruct and be closed
Screenshotss image is carried out information security processing by the screenshotss image of connection, terminal.
Initial information is carried out discrete Fourier transform, generates information to be edited by step S20.
Initial information is carried out discrete Fourier transform (Fourier Transform) by terminal.For example, initial information is to cut
Screen image, terminal are handled by default discrete Fourier transform formula, wherein are schemed in default discrete Fourier transform formula
Frequency of picture etc. can be configured according to actual conditions, the low-frequency information in image be distinguished with high-frequency information, terminal
Discrete Fourier transform will be passed through later to be filtered frequency domain, the information to be edited for meeting information superposition is obtained, require supplementation with
Illustrate, the parameter in discrete Fourier transform in the present invention does not do specific restriction, can be according to the initial letter of processing
The effect of breath is determined.
Step S30 obtains preset user identifier, and user identifier, which is carried out coding, generates mark watermark.
Terminal acquisition be locally stored in preset user identifier, wherein user identifier be address name, user's work number or its
His user post information, user identifier can be pre-entered by user, can also be that terminal obtains automatically according to user's operation
It takes, user identity information is being believed with the mark of unique identification user identity of having already passed through that discrete Fourier transform obtains
Breath, the preset user identifier of terminal-pair carry out coded treatment, wherein coded treatment is to indicate image with less symbol (bit number)
A kind of technology;Image encoding method mainly has symbolic coding, predictive coding, transition coding, sub-band coding, wavelet transformation to compile
Code, point dimension coding etc., generate the corresponding mark watermark of user identifier.
The information to be edited and the mark watermark are overlapped processing, and carry out Fourier's inversion by step S40
It changes, generates and send the corresponding transmission information of instruction.
Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, that is, terminal will be into
The information to be edited and mark watermark that row overlap-add procedure is completed are overlapped processing inverse Fourier transform, realize tangible mark water
Print is converted into stealthy mark watermark, and terminal will be sent using the information obtained by inverse Fourier transform as information is sent
Information is sent to corresponding user.
Terminal information to be edited and mark watermark are overlapped processing and different modes may be used in step S40;
For example, mode one, the size of processing is overlapped according to information to be edited and mark watermark:That is, terminal acquisition waits for
The area of the area and mark watermark of information to be edited is calculated in the size for editing the size and mark watermark of information, according to
The area ratio of the area and mark watermark of information to be edited is arranged information to be edited and mark watermark position and closes automatically
System is overlapped processing to carry out information to be edited and mark watermark;For example, the size of information to be edited is 20cmx10cm, mark
Know the size 5cmx5cm of watermark, it is 8 that terminal, which obtains information to be edited with the area ratio for identifying watermark,:1, terminal will be to be edited
The face of information is divided into 8 parts, and corresponds to and mark watermark is placed into information to be edited;Mode two, terminal, which is pre-set, to be waited compiling
It collects information and mark watermark is overlapped processing mode, that is, terminal will identify watermark and be set as smaller size, and terminal will mark
The random setting of watermark completes information to be edited and mark watermark is overlapped processing in information to be edited.
Information to be edited and mark watermark are overlapped processing by terminal in the present embodiment, and carry out Fourier's inversion
Change so that mark watermark is hidden, by user identifier under the premise of not influencing user and reading, addition and information to be edited into
At the same time fusion of having gone is identified the setting of watermark location so as to be edited according to mark watermark size in the present embodiment
Mark watermark at random, is comprehensively provided in information so that user can not reject mark watermark, to improve information security
Property.
The transmission information is sent to transmission and instructs associated reception account by step S50, to receive account to application
The transmission information is checked at family.
Terminal, which will send information and be sent to transmission, instructs associated reception account, and corresponding to user to receive account checks institute
State transmission information, that is, terminal extraction sends the transmission account information of the user in instruction, will send information and is sent to transmission instruction
Associated reception account.
In the present embodiment by preserving user identifier in enterprise or public institution's personal computer, and calculating is set
Machine safe mode judges whether to be in information protection mode when user carries out information processing, if being in information protection mode,
Then detecting that when sending instruction, acquisition, which is sent, instructs associated initial information;Initial information is subjected to discrete Fourier transform,
Generate information to be edited;At the same time, terminal acquisition user identifier preset in being locally stored, coding life is carried out by user identifier
At mark watermark;Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, are generated and are sent
Corresponding transmission information is instructed, sends the stealthy watermark for carrying user identifier in information at this time;Terminal is sent to information is sent
It sends and instructs associated reception account, corresponding to user to receive account checks the transmission information.When there is leakage of information,
Dissection process can be carried out to information and obtain corresponding user identifier, to determine leakage of information source, ensured information security.
Further, the present embodiment of the present invention is proposed on the basis of first embodiment of the invention, the present embodiment is
The refinement of step S30 in one embodiment specifically illustrates the processing step of mark watermark.
Specifically, with reference to Fig. 3, step S30 in information security processing method, described information security processing includes:
Step S31 obtains preset user identifier, and the preset user identifier is encrypted by preset rules.
Terminal acquisition user identifier preset in being locally stored, terminal are (pre- by preset rules encryption by preset user identifier
Refer to pre-set encryption rule if regular, that is, terminal or user be according to information type condition input by user etc. because
The pre-set encryption rule of element), wherein it is illustrated asymmetric encryption as preset rules in the present invention, it is non-in terminal
Symmetric encipherment algorithm needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography with
Private cipher key is a pair of, if data are encrypted with public-key cryptography, could be decrypted with corresponding private cipher key;If with
Private cipher key pair data are encrypted, then could be decrypted with corresponding public-key cryptography.
In this embodiment because encryption and decryption use two different keys, when there is information leakage,
Only the information divulged a secret can be decrypted in characteristic decryption rule, realized while ensureing user identity information safety
The watermark addition of information to be edited.
The preset user identifier is carried out random coded by step S32 after the completion of detecting preset user identifier encryption
Mark watermark is generated, so that mark watermark is overlapped processing with information to be edited.
After the completion of terminal detects preset user identifier encryption, for example, being generated after the completion of identifying watermark encrypting corresponding
Prompt message, terminal receive prompt message and then detect that the encryption of preset user identifier is completed, terminal by preset user identifier into
Row random coded generates mark watermark, so that mark watermark is overlapped processing with information to be edited.
In the present embodiment terminal by user identifier by preset rules encrypt, on the one hand can prevent user malice it is counterfeit its
The identification information of his user, prevents user identifier from revealing, and on the other hand can just believe user identifier only for decoding key
Breath parsing ensures that mark watermark corresponds to the safety of user identity information.
On the basis of first embodiment of the invention, the present embodiment of the present invention is further provided, the present embodiment is first
The refinement of step S40 in embodiment specifically illustrates the set-up mode of the position of mark watermark.
Specifically, with reference to Fig. 4, step S40 in information security processing method, including:
Step S41 obtains the size of the size and the mark watermark of information to be edited, obtains information and mark to be edited
The size relative scale of watermark, judges whether size relative scale meets preset ratio.
Terminal obtains the size of the size and mark watermark of information to be edited, obtains information to be edited and identifies the ruler of watermark
Very little relative scale, wherein the size of information to be edited and the size of mark watermark can refer to corresponding length of side information, can be with
The area for being information to be edited and identifying watermark, size and the size that identifies watermark of the terminal according to information to be edited, really
Fixed information to be edited and the size relative scale for identifying watermark identify water for example, the size of information to be edited is 20cmx10cm
The size 5cmx5cm of print, it is 8 that terminal, which obtains information to be edited with the area relative scale for identifying watermark,:1, terminal judges size
Whether relative scale meets preset ratio.
Wherein, preset ratio is pre-set ratio, and preset ratio may be configured as 10:1 or other, setting is default
The purpose of ratio is to ensure the complete of mark watermark information to ensure that the size of information to be edited is more than the size of mark watermark
With it is clear.
Mark watermark is pressed default queueing discipline and placed by step S42 if size relative scale is matched with preset ratio,
And information to be edited and the mark watermark are overlapped processing.
If terminal determines size, relative scale is matched with preset ratio, and terminal will identify watermark and press default queueing discipline
(default queueing discipline refers to the mark watermark location queueing discipline according to ratio setting, for example, area relative scale is 9:1, then
Corresponding queueing discipline is 9 palace lattice in default queueing discipline) setting corresponding position, to complete information to be edited and the mark water
Print is overlapped processing.
Further, include the step of being overlapped processing with identify watermark by information to be edited:
After being placed by default queueing discipline, the file with profiling watermarking images is formd, the mark water that arrangement is completed
Print is overlapped processing with information to be edited, that is, determines the frequency spectrum of the frequency spectrum and information to be edited of mark watermark, wherein frequency spectrum
It is figure of the amplitude according to frequency permutation, x-axis is frequency, and y-axis is amplitude, will identify the frequency of the frequency spectrum and information to be edited of watermark
Spectrum is overlapped so that mark watermark is stealthy in information to be edited, obtains corresponding transmission information.It should be noted that with
Spectrogram can be arranged according to actual conditions in family, select the frequency and amplitude that need.
Step S43, if size relative scale is mismatched with preset ratio, display reminding information, so that user is to mark
Mark watermark after adjustment is pressed default queueing discipline and placed by the carry out size adjusting of watermark, and by information to be edited and described
Mark watermark is overlapped processing.
If size relative scale and preset ratio mismatch, display reminding information, for user to mark watermark into
Row size adjusting, for example, terminal shows " mark watermark cannot be fully displayed in information to be edited, please reduce mark watermark " then
User is identified the diminution of watermark according to prompt message.In when meeting the requirements of watermark of mark, then display reminding information, prompts
User stops adjustment mark watermark, and after the completion of terminal detects the size adjusting of mark watermark, terminal will identify watermark by pre-
If queueing discipline is placed, and information to be edited and the mark watermark are overlapped processing.
It specifically illustrates in the present embodiment and mark watermark location is determined according to the size of mark watermark and information to be edited
Method so that mark watermark completely clearly indicate, in addition, may be implemented to identify according to the technical solution in the present embodiment
Watermark is arranged in any position of information to be edited, and user can not be removed the mark watermark in information to be edited, from
And it is more effectively prevented from information leakage.
Further, with reference to Fig. 5, on the basis of first embodiment of the invention, it is proposed that information security processing of the present invention
The second embodiment of method generates coded image on the display screen of terminal in the present embodiment, to prevent screen shot from causing
Information leakage;
Specifically, described information security processing includes:
Step S60 obtains the current display interface of display screen if being in information protection mode.
Terminal, which determines, is in information protection mode, then terminal obtains the current display interface of display screen, with aobvious according to terminal
The display information for showing interface judges whether the coded image that user identifier is shown on terminal display screen, to prevent screen shot
Caused information leakage.Specifically:
Step S70 parses the current display interface, obtains the display information that current display interface includes, with according to aobvious
Show that information determines whether to open anti-exposal model;If opening anti-exposal model, obtain preset user identifier and encoded, generates
Coded graphics.
Terminal parses current display interface, obtains the display information that current display interface includes, wherein current display interface
On may include different information, for example, document, application software, program etc., carried out so that current display interface shows document as an example
Illustrate, using the text information in document as display information, terminal determines whether to open anti-terminal according to the content of display information
Exposal model is encoded obtaining preset user identifier if opening anti-exposal model, generates coded graphics.
Further, terminal determines whether to open the step of anti-exposal model according to display information in reference Fig. 6, step S70
Suddenly further include:
Step S71 parses the current display interface, obtains the display information that current display interface includes, and obtains display
Character set in information.
Terminal parses current display interface, obtains the display information that current display interface includes, and obtains and shows in information
Character set, that is, terminal parses the corresponding display information of current display interface, obtains display information, wherein display letter
Breath can include image information and/or character information etc., and terminal obtains the character set shown in information.
Character in character set is carried out traversal matching by step S72 with the sensitive character in default sensitive information library, with
Whether judge in character set comprising sensitive character.
By the character in character set, (default sensitive information library refers to pre-set quick to terminal with default sensitive information library
Feel character, sensitive character is for example, data of financial transaction, userspersonal information) in sensitive character carry out traversal matching, to sentence
Whether comprising sensitive character in word break character set, if the character in character set and the sensitive character in default sensitive information library
Match, then includes sensitive character in character set;If the sensitive character in character and default sensitive information library in character set is not
Matching does not include sensitive character then in character set.
Step S73, if determining current display interface according to sensitive character quantity comprising sensitive character in character set
Sensitive grade.
Current display interface is determined according to sensitive character quantity comprising sensitive character, terminal in terminal determines character set
Sensitive grade, for example, sensitive character quantity is 100 or more, it is determined that sensitive grade is level-one, and sensitive character quantity is
On 100-20, it is determined that sensitive grade is two level, and sensitive character quantity is 20 or more, it is determined that sensitive grade is three-level.
Step S74 opens anti-exposal model if the sensitive grade of current display interface is more than predetermined threshold value.
If the sensitive grade of terminal current display interface is more than predetermined threshold value (predetermined threshold value:It is pre-set sensitive letter
Grade critical value is ceased, is arranged as the case may be, such as be set as two level), for example, the sensitive grade of current display interface is one
Grade, predetermined threshold value are sensitive grade two level, then the sensitive grade of current display interface is more than predetermined threshold value, and terminal opens anti-take pictures
Pattern obtains preset user identifier and is encoded if opening anti-exposal model, generates coded graphics.
Coded graphics is converted to preset format polar plot by step S80, and preset format polar plot broken up be distributed to it is aobvious
In display screen, with the caused information leakage that prevents from taking pictures.
Coded graphics is converted to preset format polar plot by terminal, and (preset format polar plot is can be big according to terminal screen
The polar plot of the factors setting such as small, for example, SVG polar plots, are called scalable vector graphics (Scalable Vector
Graphics)), and preset format polar plot is broken up and is distributed on display screen, with the caused information leakage that prevents from taking pictures, example
Such as, the establishment graph layer on current display interface so that the preset format polar plot of generation, which is shown in, to be created on graph layer,
To generate the effect that preset format polar plot is distributed to display screen.
It should be added that the technical solution in technical solution and first embodiment in the present embodiment can carry out
In conjunction with, that is, polar plot is generated on terminal display screen, and generates watermarking images in the electronic information that user sends.
Information is shown according to terminal current interface in terminal in the present embodiment, is marked in the display screen display user of terminal
Know corresponding polar plot, terminal caused by the one hand can preventing user from taking pictures shows information leakage, on the other hand, if being shown in terminal
Show that information is not related to sensitive information, does not then show that user identifier corresponds to polar plot, user-friendly end on the display screen of terminal
The convenience that user uses is taken into account, it is also contemplated that the safety of information leakage, realizes hommization in end in the present embodiment
Information protection.
Further, with reference to Fig. 7, on the basis of first embodiment of the invention, it is proposed that information security processing of the present invention
The 3rd embodiment of method is parsed in the information for addition mark watermark in the present embodiment, is determined in information and is included
User identifier is to obtain information source;
Specifically, described information security processing includes:
Step S90 will send information and carry out Fourier's change when detecting based on the analysis request for sending information triggering
It changes.
When terminal is detected based on the analysis request for sending information triggering, wherein the analysis request of triggering can adopt
With different modes, for example, user clicks and sends the button of information interface and trigger analysis request manually, alternatively, terminal receives
Control instruction, according to control instruction automatic trigger analysis request, when terminal detects analysis request, terminal will send information into
Row Fourier transformation, that is, the corresponding information of analysis request is carried out Fourier transformation by terminal so that the mark watermark that information includes
Display.
Step S100 obtains the mark for sending information and including when detecting that sending information Fourier transformation completes
Watermark, and mark watermark is decoded, obtain the corresponding user identifier of mark watermark.
When detecting that sending information Fourier transformation completes, terminal obtains the mark watermark that the transmission information includes,
And be decoded mark watermark, the corresponding user identifier of mark watermark is obtained, it should be added that, believe in the present embodiment
The step of breath parsing is the inverse process for adding watermark in first embodiment in information, and its purpose is to mark the user in information
Know information to be shown, to determine the source of information leakage.
Further, step S100, including:
Step a obtains the mark water for sending information and including when detecting that sending information Fourier transformation completes
Print, and judge whether the mark watermark passes through encryption;
Step b obtains the corresponding decryption rule of mark watermark and decoding rule if encryption is passed through in the mark watermark
Then;
The mark watermark is decoded and is decrypted by step c, obtains the corresponding user identifier of mark watermark.
Specifically, when detecting that sending information Fourier transformation completes, the mark water for sending information and including is obtained
Print, and judge whether the mark watermark passes through encryption;If encryption is passed through in the mark watermark, mark water is obtained
Print corresponding decryption rule and decoding rule;Terminal is decoded watermark is identified and decrypts, and obtains the corresponding use of mark watermark
Family identifies
Information is parsed in the present embodiment, information is by this processing mode, can when information is propagated
It tracks and propagates source.Meanwhile watermark is encrypted, user by existing image processing software carry out picture handle it is soft
Part can not also be removed it, and only corresponding analysis mode can will just carry out display and be effectively guaranteed information security
Property.
In addition, with reference to figure 8, the embodiment of the present invention also proposes information security processing unit, described information secure processing device
Including:
Mode deciding module 10 is in information protection mode for judging whether, if being in information protection mode, is examining
When measuring transmission instruction, obtains and send the associated initial information of instruction;
Message processing module 20 generates information to be edited for initial information to be carried out discrete Fourier transform;
Processing module 30 is identified, for obtaining preset user identifier, user identifier is subjected to coding and generates mark watermark;
Watermark processing module 40 for the information to be edited and the mark watermark to be overlapped processing, and carries out
Inverse Fourier transform generates and sends the corresponding transmission information of instruction;
Information sending module 50 instructs associated reception account, to connect for the transmission information to be sent to transmission
Receipt on account family corresponds to user and checks the transmission information.
Further, the watermark processing module 40, including:
Judging unit is obtained, the size of size and the mark watermark for obtaining the initial information obtains described
The size relative scale of initial information and the mark watermark, judges whether the size relative scale matches with preset ratio;
Superpositing unit is placed, if being matched with preset ratio for the size relative scale, mark watermark is pressed and is preset
Queueing discipline is placed, and information to be edited and the mark watermark are overlapped processing;
Adjustment unit is prompted, if being mismatched for the size relative scale and preset ratio, display reminding information, with
For user to the carry out size adjusting of mark watermark;
Processing unit is adjusted, for after the completion of the size adjusting for detecting mark watermark, default row to be pressed in mark watermark
Row rule is placed, and information to be edited and the mark watermark are overlapped processing.
Further, described information safe handling, including:
If interface acquisition module obtains the current display interface of display screen for being in information protection mode;
Parsing determining module obtains the display that the current display interface includes for parsing the current display interface
Information, to determine whether to open anti-exposal model according to display information;
It opens acquisition module to obtain preset user identifier if for opening anti-exposal model and encoded, generates coding
Figure;
Conversion module, for the coded graphics to be converted to preset format polar plot, and by the preset format vector
Figure, which is broken up, to be distributed on display screen, with the caused information leakage that prevents from taking pictures.
Further, the parsing determining module, including:
Parsing acquiring unit obtains the display that the current display interface includes for parsing the current display interface
Information obtains the character set in the display information;
Information matching unit, for by the sensitive character in character and the default sensitive information library in the character set into
Row traversal matching, whether to judge in the character set comprising the sensitive character;
Level determination module, if for including the sensitive character in the character set, according to the sensitive character
Character quantity determine the sensitive grade of current display interface;
Module opening module opens anti-bat if the sensitive grade for the current display interface is more than predetermined threshold value
According to pattern.
Further, described information safe handling, including:
Information analysis module, for when detect based on send information triggering analysis request when, by the transmission information
Carry out Fourier transformation;
Decoder module is identified, for when detecting that the transmission information Fourier transformation is completed, obtaining the transmission letter
The mark watermark that breath includes, and mark watermark is decoded, obtain the corresponding user identifier of mark watermark.
Further, the watermark processing module further includes:
Encryption unit is obtained, for obtaining preset user identifier, the preset user identifier is encrypted by preset rules;
Encode laminating module, for after the completion of it detect the encryption of preset user identifier, by the preset user identifier into
Row random coded generates mark watermark, so that mark watermark is overlapped processing with information to be edited.
Further, the mark decoder module, including:
Judging unit is encrypted, for when detecting that sending information Fourier transformation completes, obtaining the transmission packet
The mark watermark contained, and judge whether the mark watermark passes through encryption;
Rules unit is obtained, if passing through encryption for the mark watermark, obtains the corresponding decryption of mark watermark
Rule and decoding rule;
Determination unit is identified, for the mark watermark to be decoded and decrypt, obtains the corresponding user of mark watermark
Mark.
Wherein, the step of each Implement of Function Module of information security processing unit can refer to information security processing of the present invention
Each embodiment of method, details are not described herein again.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
Information security processing routine is stored on the computer storage media, described information render safe procedures are handled
Device realizes the operation in the information security processing method that above-described embodiment provides when executing.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/
There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only that
A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in process, method, article or the system including the element.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.