CN108510426A - Information security processing method, device, equipment and computer storage media - Google Patents

Information security processing method, device, equipment and computer storage media Download PDF

Info

Publication number
CN108510426A
CN108510426A CN201810330715.1A CN201810330715A CN108510426A CN 108510426 A CN108510426 A CN 108510426A CN 201810330715 A CN201810330715 A CN 201810330715A CN 108510426 A CN108510426 A CN 108510426A
Authority
CN
China
Prior art keywords
information
watermark
mark
mark watermark
user identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810330715.1A
Other languages
Chinese (zh)
Other versions
CN108510426B (en
Inventor
林泽全
高林龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Li'ang Electronic Technology Co ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201810330715.1A priority Critical patent/CN108510426B/en
Publication of CN108510426A publication Critical patent/CN108510426A/en
Application granted granted Critical
Publication of CN108510426B publication Critical patent/CN108510426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a kind of information security processing methods, include the following steps:Judge whether terminal is in information protection mode, if being in information protection mode, when terminal detects transmission instruction, terminal, which obtains to send, instructs associated initial information;Initial information is subjected to discrete Fourier transform, generates information to be edited;And user identifier preset in terminal is obtained, user identifier, which is carried out coding, generates mark watermark;Information to be edited and mark watermark are overlapped processing, and carry out inverse Fourier transform, generates and sends the corresponding transmission information of instruction;The transmission information is sent to transmission and instructs associated reception account, corresponding to user to receive account checks the transmission information.The invention also discloses a kind of information security processing unit, equipment and computer storage medias.The present invention adds the corresponding stealthy watermark of user identifier in the information of transmission, when there is information leakage, it may be determined that information source, to realize information security.

Description

Information security processing method, device, equipment and computer storage media
Technical field
The present invention relates to information security field more particularly to information security processing method, device, equipment and computer storages Medium.
Background technology
The form of the existing continuous development with computer technology and network technology, more and more electronic documents carries out Using, preserve and transmission.However, electronic information communication is also faced with while providing quick convenient and is illegally used or steals Threat.Therefore, the safety of data and salvo are increasingly that people pay attention to.
It is current both at home and abroad generally by the way of adding watermark for the above situation so that confidential data is protected, That is, watermark information to be directly displayed to the designated position of related data document using translucent mode, in access browser, data When privacy confidential data in library, due to the particularity of these data formats, in data embedded watermark there are inconvenience it Place, private data are just more likely to be leaked out by modes such as screen shot, video recording or sectional drawings;After the leakage of a state or party secret occurs, Can not quick positioning searching quickly be carried out to source of divulging a secret, be improved to carry out necessary processing and protection in time.
The above is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that the above is existing skill Art.
Invention content
The main purpose of the present invention is to provide the storages of a kind of information security processing method, device, equipment and computer to be situated between Matter, it is intended to discrete Fourier transform be carried out to electronic information, and add stealthy watermark, user is avoided and carry out watermark information manually Removal, improve the safety of information, be effectively prevented information leakage.
To achieve the above object, the present invention provides a kind of information security processing method, described information security processing packet Include following steps:
Judge whether to be in information protection mode, if being in information protection mode, when detecting transmission instruction, obtain The transmission instructs associated initial information;
The initial information is subjected to discrete Fourier transform, generates information to be edited;
Preset user identifier is obtained, user identifier, which is carried out coding, generates mark watermark;
The information to be edited and the mark watermark are overlapped processing, and carry out inverse Fourier transform, generates hair Send instruction corresponding transmission information;
The transmission information is sent to transmission and instructs associated reception account, so as to the corresponding user of the reception account Check the transmission information.
Optionally, the described the step of information to be edited and the mark watermark are overlapped processing, including:
The size for obtaining the size and the mark watermark of the initial information, obtains the initial information and the mark The size relative scale of watermark, judges whether the size relative scale matches with preset ratio;
If the size relative scale is matched with preset ratio, default queueing discipline is pressed into mark watermark and is placed, and will Information to be edited and the mark watermark are overlapped processing;
If the size relative scale is mismatched with preset ratio, display reminding information, so that user is to identifying watermark Carry out size adjusting;
After the completion of the size adjusting for detecting mark watermark, default queueing discipline is pressed into mark watermark and is placed, and will be waited for Editor's information and the mark watermark are overlapped processing.
Optionally, after described the step of judging whether in information protection mode, further include:
If being in information protection mode, the current display interface of display screen is obtained;
The current display interface is parsed, the display information that the current display interface includes is obtained, to be believed according to display Breath determines whether to open anti-exposal model;
If opening anti-exposal model, obtain preset user identifier and encoded, generates coded graphics;
The coded graphics is converted into preset format polar plot, and the preset format polar plot broken up be distributed to it is aobvious In display screen, with the caused information leakage that prevents from taking pictures.
Optionally, the parsing current display interface, obtains the display information that the current display interface includes, with According to display information determine whether to open anti-exposal model the step of include:
The current display interface is parsed, the display information that the current display interface includes is obtained, obtains the display Character set in information;
Character in the character set is subjected to traversal matching with the sensitive character in default sensitive information library, to judge Whether include the sensitive character in the character set;
If being determined according to the character quantity of the sensitive character current comprising the sensitive character in the character set The sensitive grade of display interface;
If the sensitive grade of the current display interface is more than predetermined threshold value, anti-exposal model is opened.
Optionally, described that the transmission information is sent to the associated reception account of transmission instruction, so as to the reception account The corresponding user in family checks after the step of transmission information, including:
When detecting based on the analysis request for sending information triggering, the transmission information is subjected to Fourier transformation;
When detecting that the transmission information Fourier transformation is completed, the mark watermark for sending information and including is obtained, And be decoded mark watermark, obtain the corresponding user identifier of mark watermark.
Optionally, described to obtain preset user identifier, user identifier is subjected to the step of coding generates mark watermark, is also wrapped It includes:
Preset user identifier is obtained, the preset user identifier is encrypted by preset rules;
After the completion of detecting preset user identifier encryption, the preset user identifier is subjected to random coded and generates mark Watermark, so that mark watermark is overlapped processing with information to be edited.
Optionally, described when detecting that sending information Fourier transformation completes, obtain the mark for sending information and including Know watermark, and the step of mark watermark is decoded, obtains mark watermark corresponding user identifier, including:
When detecting that sending information Fourier transformation completes, the mark watermark for sending information and including is obtained, and sentence Whether the mark watermark of breaking passes through encryption;
If encryption is passed through in the mark watermark, the corresponding decryption rule of mark watermark and decoding rule are obtained;
The mark watermark is decoded and is decrypted, the corresponding user identifier of mark watermark is obtained.
In addition, to achieve the above object, the present invention also provides a kind of information security processing unit, described information safe handlings Device includes:
Mode deciding module is in information protection mode for judging whether, if being in information protection mode, is detecting Associated initial information is instructed to when sending instruction, obtaining to send;
Message processing module generates information to be edited for initial information to be carried out discrete Fourier transform;
Processing module is identified, for obtaining preset user identifier, user identifier is subjected to coding and generates mark watermark;
Watermark processing module for the information to be edited and the mark watermark to be overlapped processing, and carries out Fu In leaf inverse transformation, generate to send and instruct corresponding transmission information;
Information sending module instructs associated reception account, to receive for the transmission information to be sent to transmission Account corresponds to user and checks the transmission information.
In addition, to achieve the above object, the present invention also provides a kind of information security processing equipment, described information safe handlings Equipment includes:It memory, processor and is stored on the memory and at the information security that can be run on the processor Program is managed, wherein:
It is realized such as above-mentioned information security processing method when described information render safe procedures are executed by the processor Step.
In addition, to achieve the above object, the present invention also provides a kind of computer storage medias;
Information security processing routine is stored on the computer storage media, described information render safe procedures are handled It is realized such as the step of above-mentioned information security processing method when device executes.
A kind of information security processing method, device, equipment and the computer storage media that the embodiment of the present invention proposes, are being looked forward to User identifier, and setting information protected mode on computers are preserved in industry or public institution's personal computer, are made in user When carrying out information processing with computer, computer judges whether to be in information protection mode first, if being in information protection mode, Then detecting that when sending instruction, acquisition, which is sent, instructs associated initial information;Initial information is subjected to discrete Fourier transform, Generate information to be edited;At the same time, terminal acquisition user identifier preset in being locally stored, coding life is carried out by user identifier At mark watermark;Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, are generated and are sent Corresponding transmission information is instructed, sends the stealthy watermark for carrying user identifier in information at this time;Terminal is sent to information is sent It sends and instructs associated reception account, corresponding to user to receive account checks the transmission information.When there is leakage of information, Dissection process can be carried out to information and obtain corresponding user identifier, to determine leakage of information source, ensured information security.
Description of the drawings
Fig. 1 is the apparatus structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of information security processing method first embodiment of the present invention;
Fig. 3 is the refinement flow diagram of the step S30 of information security processing method in Fig. 2;
Fig. 4 is the refinement flow diagram of the step S40 of information security processing method in Fig. 2;
Fig. 5 is the flow diagram of information security processing method second embodiment of the present invention;
Fig. 6 is the refinement flow diagram of the step S70 of information security processing method in Fig. 5;
Fig. 7 is the flow diagram of information security processing method 3rd embodiment of the present invention;
Fig. 8 is the high-level schematic functional block diagram of one embodiment of information security processing unit of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are:Preserve user identity information in the terminal that user uses, with When family is sent into row information, the identification information of user is generated into corresponding mark watermark, and the mark watermark by generation and user The information of transmission merges, and carries out inverse Fourier transform and generate stealthy watermark so that adds and uses in the information that user sends Family identification information, while the information of user's transmission does not influence the reading of recipient;When there is information leakage, terminal by information into Row Fourier transformation so that user identity information is shown, to determine the source of information leakage.
Since the prior art will add watermark on electronic document, user can be with by means such as PS when information is sent Personal information is deleted, such method can to a certain extent protect confidential data, reduce concerning security matters number According to stolen risk;However, such protected mode can only be embedded in watermark in certain specific positions of confidential data first, it can not All concerning security matters contents are comprehensively covered, the person of stealing secret information deliberately can avoid watermark and steal the other parts of confidential data, Occur not determining that the source of information leakage, information security can not be effectively protected when information leakage.
As shown in Figure 1, the terminal structure schematic diagram for the hardware running environment that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can also be mobile terminal, wherein fixed terminal such as " Internet of Things with fixed terminal Equipment ", the intelligent air condition with network savvy, intelligent electric lamp, intelligent power etc.;Mobile terminal, such as AR/VR with network savvy Equipment, intelligent sound box, autonomous driving vehicle, smart mobile phone, tablet computer, E-book reader, pocket computer etc. have aobvious Show the terminal device of function.
As shown in Figure 1, the terminal may include:Processor 1001, (such as central processing unit Central Processing Unit, CPU), network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 For realizing the connection communication between these components.User interface 1003 may include display screen (Display), input unit ratio Such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 may include optionally that (such as Wireless Fidelity WIreless-FIdelity, WIFI connect standard wireline interface and wireless interface Mouthful).Memory 1005 can be high-speed random access memory (random access memory, RAM), can also be stabilization Memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of preceding State the storage device of processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, either combines certain components or different components arrangement.
As shown in Figure 1, the computer software product is stored in a storage medium (storage medium:It is called computer storage Medium, computer media, readable medium, readable storage medium storing program for executing, computer readable storage medium are directly medium etc., such as RAM, magnetic disc, CD) in, including some instructions are used so that a station terminal equipment (can be mobile phone, computer, server, sky Adjust device or the network equipment etc.) method described in each embodiment of the present invention is executed, as a kind of depositing for computer storage media May include operating system, network communication module, Subscriber Interface Module SIM and information security processing application program in reservoir 1005.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, is carried out with background server Data communicate;User interface 1003 is mainly used for connecting client (user terminal), with client into row data communication;And processor 1001 can be used for calling the information security processing application program stored in memory 1005, and execute following embodiment of the present invention Step in the information security processing method of offer.
With reference to Fig. 2, in the first embodiment of information security processing method of the present invention, described information security processing packet It includes:
Step S10 judges whether to be in information protection mode, if being in information protection mode, is detecting that transmission refers to When enabling, obtains and send the associated initial information of instruction.
When user starts terminal or when user carries out terminal operation, terminal judges whether the pattern residing for itself is letter Cease protected mode, it should be noted that end message protected mode can be carried out certainly by server or other monitoring devices Dynamic setting, can also be independently to be arranged with terminal user, however, it is determined that terminal is in information protection mode, is detected in terminal When user is operated based on terminal, terminal automatic trigger operation detection request, terminal handler receives operation detection request, and The operation executed in detection terminal, when terminal handler detects that the operation corresponding instruction of user's triggering is to send instruction, eventually End, which obtains to send, instructs associated initial information, wherein initial information can be image information, electronic document or instant message Equal different types of information, for example, scientific & technical corporation sets the work computer of all employees to information protection mode, in work computer Processor detects, when triggering the transmission instruction of screenshotss image in the instant message applications of terminal, terminal is obtained to send to instruct and be closed Screenshotss image is carried out information security processing by the screenshotss image of connection, terminal.
Initial information is carried out discrete Fourier transform, generates information to be edited by step S20.
Initial information is carried out discrete Fourier transform (Fourier Transform) by terminal.For example, initial information is to cut Screen image, terminal are handled by default discrete Fourier transform formula, wherein are schemed in default discrete Fourier transform formula Frequency of picture etc. can be configured according to actual conditions, the low-frequency information in image be distinguished with high-frequency information, terminal Discrete Fourier transform will be passed through later to be filtered frequency domain, the information to be edited for meeting information superposition is obtained, require supplementation with Illustrate, the parameter in discrete Fourier transform in the present invention does not do specific restriction, can be according to the initial letter of processing The effect of breath is determined.
Step S30 obtains preset user identifier, and user identifier, which is carried out coding, generates mark watermark.
Terminal acquisition be locally stored in preset user identifier, wherein user identifier be address name, user's work number or its His user post information, user identifier can be pre-entered by user, can also be that terminal obtains automatically according to user's operation It takes, user identity information is being believed with the mark of unique identification user identity of having already passed through that discrete Fourier transform obtains Breath, the preset user identifier of terminal-pair carry out coded treatment, wherein coded treatment is to indicate image with less symbol (bit number) A kind of technology;Image encoding method mainly has symbolic coding, predictive coding, transition coding, sub-band coding, wavelet transformation to compile Code, point dimension coding etc., generate the corresponding mark watermark of user identifier.
The information to be edited and the mark watermark are overlapped processing, and carry out Fourier's inversion by step S40 It changes, generates and send the corresponding transmission information of instruction.
Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, that is, terminal will be into The information to be edited and mark watermark that row overlap-add procedure is completed are overlapped processing inverse Fourier transform, realize tangible mark water Print is converted into stealthy mark watermark, and terminal will be sent using the information obtained by inverse Fourier transform as information is sent Information is sent to corresponding user.
Terminal information to be edited and mark watermark are overlapped processing and different modes may be used in step S40;
For example, mode one, the size of processing is overlapped according to information to be edited and mark watermark:That is, terminal acquisition waits for The area of the area and mark watermark of information to be edited is calculated in the size for editing the size and mark watermark of information, according to The area ratio of the area and mark watermark of information to be edited is arranged information to be edited and mark watermark position and closes automatically System is overlapped processing to carry out information to be edited and mark watermark;For example, the size of information to be edited is 20cmx10cm, mark Know the size 5cmx5cm of watermark, it is 8 that terminal, which obtains information to be edited with the area ratio for identifying watermark,:1, terminal will be to be edited The face of information is divided into 8 parts, and corresponds to and mark watermark is placed into information to be edited;Mode two, terminal, which is pre-set, to be waited compiling It collects information and mark watermark is overlapped processing mode, that is, terminal will identify watermark and be set as smaller size, and terminal will mark The random setting of watermark completes information to be edited and mark watermark is overlapped processing in information to be edited.
Information to be edited and mark watermark are overlapped processing by terminal in the present embodiment, and carry out Fourier's inversion Change so that mark watermark is hidden, by user identifier under the premise of not influencing user and reading, addition and information to be edited into At the same time fusion of having gone is identified the setting of watermark location so as to be edited according to mark watermark size in the present embodiment Mark watermark at random, is comprehensively provided in information so that user can not reject mark watermark, to improve information security Property.
The transmission information is sent to transmission and instructs associated reception account by step S50, to receive account to application The transmission information is checked at family.
Terminal, which will send information and be sent to transmission, instructs associated reception account, and corresponding to user to receive account checks institute State transmission information, that is, terminal extraction sends the transmission account information of the user in instruction, will send information and is sent to transmission instruction Associated reception account.
In the present embodiment by preserving user identifier in enterprise or public institution's personal computer, and calculating is set Machine safe mode judges whether to be in information protection mode when user carries out information processing, if being in information protection mode, Then detecting that when sending instruction, acquisition, which is sent, instructs associated initial information;Initial information is subjected to discrete Fourier transform, Generate information to be edited;At the same time, terminal acquisition user identifier preset in being locally stored, coding life is carried out by user identifier At mark watermark;Information to be edited and mark watermark are overlapped processing by terminal, and carry out inverse Fourier transform, are generated and are sent Corresponding transmission information is instructed, sends the stealthy watermark for carrying user identifier in information at this time;Terminal is sent to information is sent It sends and instructs associated reception account, corresponding to user to receive account checks the transmission information.When there is leakage of information, Dissection process can be carried out to information and obtain corresponding user identifier, to determine leakage of information source, ensured information security.
Further, the present embodiment of the present invention is proposed on the basis of first embodiment of the invention, the present embodiment is The refinement of step S30 in one embodiment specifically illustrates the processing step of mark watermark.
Specifically, with reference to Fig. 3, step S30 in information security processing method, described information security processing includes:
Step S31 obtains preset user identifier, and the preset user identifier is encrypted by preset rules.
Terminal acquisition user identifier preset in being locally stored, terminal are (pre- by preset rules encryption by preset user identifier Refer to pre-set encryption rule if regular, that is, terminal or user be according to information type condition input by user etc. because The pre-set encryption rule of element), wherein it is illustrated asymmetric encryption as preset rules in the present invention, it is non-in terminal Symmetric encipherment algorithm needs two keys:Public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography with Private cipher key is a pair of, if data are encrypted with public-key cryptography, could be decrypted with corresponding private cipher key;If with Private cipher key pair data are encrypted, then could be decrypted with corresponding public-key cryptography.
In this embodiment because encryption and decryption use two different keys, when there is information leakage, Only the information divulged a secret can be decrypted in characteristic decryption rule, realized while ensureing user identity information safety The watermark addition of information to be edited.
The preset user identifier is carried out random coded by step S32 after the completion of detecting preset user identifier encryption Mark watermark is generated, so that mark watermark is overlapped processing with information to be edited.
After the completion of terminal detects preset user identifier encryption, for example, being generated after the completion of identifying watermark encrypting corresponding Prompt message, terminal receive prompt message and then detect that the encryption of preset user identifier is completed, terminal by preset user identifier into Row random coded generates mark watermark, so that mark watermark is overlapped processing with information to be edited.
In the present embodiment terminal by user identifier by preset rules encrypt, on the one hand can prevent user malice it is counterfeit its The identification information of his user, prevents user identifier from revealing, and on the other hand can just believe user identifier only for decoding key Breath parsing ensures that mark watermark corresponds to the safety of user identity information.
On the basis of first embodiment of the invention, the present embodiment of the present invention is further provided, the present embodiment is first The refinement of step S40 in embodiment specifically illustrates the set-up mode of the position of mark watermark.
Specifically, with reference to Fig. 4, step S40 in information security processing method, including:
Step S41 obtains the size of the size and the mark watermark of information to be edited, obtains information and mark to be edited The size relative scale of watermark, judges whether size relative scale meets preset ratio.
Terminal obtains the size of the size and mark watermark of information to be edited, obtains information to be edited and identifies the ruler of watermark Very little relative scale, wherein the size of information to be edited and the size of mark watermark can refer to corresponding length of side information, can be with The area for being information to be edited and identifying watermark, size and the size that identifies watermark of the terminal according to information to be edited, really Fixed information to be edited and the size relative scale for identifying watermark identify water for example, the size of information to be edited is 20cmx10cm The size 5cmx5cm of print, it is 8 that terminal, which obtains information to be edited with the area relative scale for identifying watermark,:1, terminal judges size Whether relative scale meets preset ratio.
Wherein, preset ratio is pre-set ratio, and preset ratio may be configured as 10:1 or other, setting is default The purpose of ratio is to ensure the complete of mark watermark information to ensure that the size of information to be edited is more than the size of mark watermark With it is clear.
Mark watermark is pressed default queueing discipline and placed by step S42 if size relative scale is matched with preset ratio, And information to be edited and the mark watermark are overlapped processing.
If terminal determines size, relative scale is matched with preset ratio, and terminal will identify watermark and press default queueing discipline (default queueing discipline refers to the mark watermark location queueing discipline according to ratio setting, for example, area relative scale is 9:1, then Corresponding queueing discipline is 9 palace lattice in default queueing discipline) setting corresponding position, to complete information to be edited and the mark water Print is overlapped processing.
Further, include the step of being overlapped processing with identify watermark by information to be edited:
After being placed by default queueing discipline, the file with profiling watermarking images is formd, the mark water that arrangement is completed Print is overlapped processing with information to be edited, that is, determines the frequency spectrum of the frequency spectrum and information to be edited of mark watermark, wherein frequency spectrum It is figure of the amplitude according to frequency permutation, x-axis is frequency, and y-axis is amplitude, will identify the frequency of the frequency spectrum and information to be edited of watermark Spectrum is overlapped so that mark watermark is stealthy in information to be edited, obtains corresponding transmission information.It should be noted that with Spectrogram can be arranged according to actual conditions in family, select the frequency and amplitude that need.
Step S43, if size relative scale is mismatched with preset ratio, display reminding information, so that user is to mark Mark watermark after adjustment is pressed default queueing discipline and placed by the carry out size adjusting of watermark, and by information to be edited and described Mark watermark is overlapped processing.
If size relative scale and preset ratio mismatch, display reminding information, for user to mark watermark into Row size adjusting, for example, terminal shows " mark watermark cannot be fully displayed in information to be edited, please reduce mark watermark " then User is identified the diminution of watermark according to prompt message.In when meeting the requirements of watermark of mark, then display reminding information, prompts User stops adjustment mark watermark, and after the completion of terminal detects the size adjusting of mark watermark, terminal will identify watermark by pre- If queueing discipline is placed, and information to be edited and the mark watermark are overlapped processing.
It specifically illustrates in the present embodiment and mark watermark location is determined according to the size of mark watermark and information to be edited Method so that mark watermark completely clearly indicate, in addition, may be implemented to identify according to the technical solution in the present embodiment Watermark is arranged in any position of information to be edited, and user can not be removed the mark watermark in information to be edited, from And it is more effectively prevented from information leakage.
Further, with reference to Fig. 5, on the basis of first embodiment of the invention, it is proposed that information security processing of the present invention The second embodiment of method generates coded image on the display screen of terminal in the present embodiment, to prevent screen shot from causing Information leakage;
Specifically, described information security processing includes:
Step S60 obtains the current display interface of display screen if being in information protection mode.
Terminal, which determines, is in information protection mode, then terminal obtains the current display interface of display screen, with aobvious according to terminal The display information for showing interface judges whether the coded image that user identifier is shown on terminal display screen, to prevent screen shot Caused information leakage.Specifically:
Step S70 parses the current display interface, obtains the display information that current display interface includes, with according to aobvious Show that information determines whether to open anti-exposal model;If opening anti-exposal model, obtain preset user identifier and encoded, generates Coded graphics.
Terminal parses current display interface, obtains the display information that current display interface includes, wherein current display interface On may include different information, for example, document, application software, program etc., carried out so that current display interface shows document as an example Illustrate, using the text information in document as display information, terminal determines whether to open anti-terminal according to the content of display information Exposal model is encoded obtaining preset user identifier if opening anti-exposal model, generates coded graphics.
Further, terminal determines whether to open the step of anti-exposal model according to display information in reference Fig. 6, step S70 Suddenly further include:
Step S71 parses the current display interface, obtains the display information that current display interface includes, and obtains display Character set in information.
Terminal parses current display interface, obtains the display information that current display interface includes, and obtains and shows in information Character set, that is, terminal parses the corresponding display information of current display interface, obtains display information, wherein display letter Breath can include image information and/or character information etc., and terminal obtains the character set shown in information.
Character in character set is carried out traversal matching by step S72 with the sensitive character in default sensitive information library, with Whether judge in character set comprising sensitive character.
By the character in character set, (default sensitive information library refers to pre-set quick to terminal with default sensitive information library Feel character, sensitive character is for example, data of financial transaction, userspersonal information) in sensitive character carry out traversal matching, to sentence Whether comprising sensitive character in word break character set, if the character in character set and the sensitive character in default sensitive information library Match, then includes sensitive character in character set;If the sensitive character in character and default sensitive information library in character set is not Matching does not include sensitive character then in character set.
Step S73, if determining current display interface according to sensitive character quantity comprising sensitive character in character set Sensitive grade.
Current display interface is determined according to sensitive character quantity comprising sensitive character, terminal in terminal determines character set Sensitive grade, for example, sensitive character quantity is 100 or more, it is determined that sensitive grade is level-one, and sensitive character quantity is On 100-20, it is determined that sensitive grade is two level, and sensitive character quantity is 20 or more, it is determined that sensitive grade is three-level.
Step S74 opens anti-exposal model if the sensitive grade of current display interface is more than predetermined threshold value.
If the sensitive grade of terminal current display interface is more than predetermined threshold value (predetermined threshold value:It is pre-set sensitive letter Grade critical value is ceased, is arranged as the case may be, such as be set as two level), for example, the sensitive grade of current display interface is one Grade, predetermined threshold value are sensitive grade two level, then the sensitive grade of current display interface is more than predetermined threshold value, and terminal opens anti-take pictures Pattern obtains preset user identifier and is encoded if opening anti-exposal model, generates coded graphics.
Coded graphics is converted to preset format polar plot by step S80, and preset format polar plot broken up be distributed to it is aobvious In display screen, with the caused information leakage that prevents from taking pictures.
Coded graphics is converted to preset format polar plot by terminal, and (preset format polar plot is can be big according to terminal screen The polar plot of the factors setting such as small, for example, SVG polar plots, are called scalable vector graphics (Scalable Vector Graphics)), and preset format polar plot is broken up and is distributed on display screen, with the caused information leakage that prevents from taking pictures, example Such as, the establishment graph layer on current display interface so that the preset format polar plot of generation, which is shown in, to be created on graph layer, To generate the effect that preset format polar plot is distributed to display screen.
It should be added that the technical solution in technical solution and first embodiment in the present embodiment can carry out In conjunction with, that is, polar plot is generated on terminal display screen, and generates watermarking images in the electronic information that user sends.
Information is shown according to terminal current interface in terminal in the present embodiment, is marked in the display screen display user of terminal Know corresponding polar plot, terminal caused by the one hand can preventing user from taking pictures shows information leakage, on the other hand, if being shown in terminal Show that information is not related to sensitive information, does not then show that user identifier corresponds to polar plot, user-friendly end on the display screen of terminal The convenience that user uses is taken into account, it is also contemplated that the safety of information leakage, realizes hommization in end in the present embodiment Information protection.
Further, with reference to Fig. 7, on the basis of first embodiment of the invention, it is proposed that information security processing of the present invention The 3rd embodiment of method is parsed in the information for addition mark watermark in the present embodiment, is determined in information and is included User identifier is to obtain information source;
Specifically, described information security processing includes:
Step S90 will send information and carry out Fourier's change when detecting based on the analysis request for sending information triggering It changes.
When terminal is detected based on the analysis request for sending information triggering, wherein the analysis request of triggering can adopt With different modes, for example, user clicks and sends the button of information interface and trigger analysis request manually, alternatively, terminal receives Control instruction, according to control instruction automatic trigger analysis request, when terminal detects analysis request, terminal will send information into Row Fourier transformation, that is, the corresponding information of analysis request is carried out Fourier transformation by terminal so that the mark watermark that information includes Display.
Step S100 obtains the mark for sending information and including when detecting that sending information Fourier transformation completes Watermark, and mark watermark is decoded, obtain the corresponding user identifier of mark watermark.
When detecting that sending information Fourier transformation completes, terminal obtains the mark watermark that the transmission information includes, And be decoded mark watermark, the corresponding user identifier of mark watermark is obtained, it should be added that, believe in the present embodiment The step of breath parsing is the inverse process for adding watermark in first embodiment in information, and its purpose is to mark the user in information Know information to be shown, to determine the source of information leakage.
Further, step S100, including:
Step a obtains the mark water for sending information and including when detecting that sending information Fourier transformation completes Print, and judge whether the mark watermark passes through encryption;
Step b obtains the corresponding decryption rule of mark watermark and decoding rule if encryption is passed through in the mark watermark Then;
The mark watermark is decoded and is decrypted by step c, obtains the corresponding user identifier of mark watermark.
Specifically, when detecting that sending information Fourier transformation completes, the mark water for sending information and including is obtained Print, and judge whether the mark watermark passes through encryption;If encryption is passed through in the mark watermark, mark water is obtained Print corresponding decryption rule and decoding rule;Terminal is decoded watermark is identified and decrypts, and obtains the corresponding use of mark watermark Family identifies
Information is parsed in the present embodiment, information is by this processing mode, can when information is propagated It tracks and propagates source.Meanwhile watermark is encrypted, user by existing image processing software carry out picture handle it is soft Part can not also be removed it, and only corresponding analysis mode can will just carry out display and be effectively guaranteed information security Property.
In addition, with reference to figure 8, the embodiment of the present invention also proposes information security processing unit, described information secure processing device Including:
Mode deciding module 10 is in information protection mode for judging whether, if being in information protection mode, is examining When measuring transmission instruction, obtains and send the associated initial information of instruction;
Message processing module 20 generates information to be edited for initial information to be carried out discrete Fourier transform;
Processing module 30 is identified, for obtaining preset user identifier, user identifier is subjected to coding and generates mark watermark;
Watermark processing module 40 for the information to be edited and the mark watermark to be overlapped processing, and carries out Inverse Fourier transform generates and sends the corresponding transmission information of instruction;
Information sending module 50 instructs associated reception account, to connect for the transmission information to be sent to transmission Receipt on account family corresponds to user and checks the transmission information.
Further, the watermark processing module 40, including:
Judging unit is obtained, the size of size and the mark watermark for obtaining the initial information obtains described The size relative scale of initial information and the mark watermark, judges whether the size relative scale matches with preset ratio;
Superpositing unit is placed, if being matched with preset ratio for the size relative scale, mark watermark is pressed and is preset Queueing discipline is placed, and information to be edited and the mark watermark are overlapped processing;
Adjustment unit is prompted, if being mismatched for the size relative scale and preset ratio, display reminding information, with For user to the carry out size adjusting of mark watermark;
Processing unit is adjusted, for after the completion of the size adjusting for detecting mark watermark, default row to be pressed in mark watermark Row rule is placed, and information to be edited and the mark watermark are overlapped processing.
Further, described information safe handling, including:
If interface acquisition module obtains the current display interface of display screen for being in information protection mode;
Parsing determining module obtains the display that the current display interface includes for parsing the current display interface Information, to determine whether to open anti-exposal model according to display information;
It opens acquisition module to obtain preset user identifier if for opening anti-exposal model and encoded, generates coding Figure;
Conversion module, for the coded graphics to be converted to preset format polar plot, and by the preset format vector Figure, which is broken up, to be distributed on display screen, with the caused information leakage that prevents from taking pictures.
Further, the parsing determining module, including:
Parsing acquiring unit obtains the display that the current display interface includes for parsing the current display interface Information obtains the character set in the display information;
Information matching unit, for by the sensitive character in character and the default sensitive information library in the character set into Row traversal matching, whether to judge in the character set comprising the sensitive character;
Level determination module, if for including the sensitive character in the character set, according to the sensitive character Character quantity determine the sensitive grade of current display interface;
Module opening module opens anti-bat if the sensitive grade for the current display interface is more than predetermined threshold value According to pattern.
Further, described information safe handling, including:
Information analysis module, for when detect based on send information triggering analysis request when, by the transmission information Carry out Fourier transformation;
Decoder module is identified, for when detecting that the transmission information Fourier transformation is completed, obtaining the transmission letter The mark watermark that breath includes, and mark watermark is decoded, obtain the corresponding user identifier of mark watermark.
Further, the watermark processing module further includes:
Encryption unit is obtained, for obtaining preset user identifier, the preset user identifier is encrypted by preset rules;
Encode laminating module, for after the completion of it detect the encryption of preset user identifier, by the preset user identifier into Row random coded generates mark watermark, so that mark watermark is overlapped processing with information to be edited.
Further, the mark decoder module, including:
Judging unit is encrypted, for when detecting that sending information Fourier transformation completes, obtaining the transmission packet The mark watermark contained, and judge whether the mark watermark passes through encryption;
Rules unit is obtained, if passing through encryption for the mark watermark, obtains the corresponding decryption of mark watermark Rule and decoding rule;
Determination unit is identified, for the mark watermark to be decoded and decrypt, obtains the corresponding user of mark watermark Mark.
Wherein, the step of each Implement of Function Module of information security processing unit can refer to information security processing of the present invention Each embodiment of method, details are not described herein again.
In addition, the embodiment of the present invention also proposes a kind of computer storage media.
Information security processing routine is stored on the computer storage media, described information render safe procedures are handled Device realizes the operation in the information security processing method that above-described embodiment provides when executing.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body/operation/object is distinguished with another entity/operation/object, without necessarily requiring or implying these entity/operations/ There are any actual relationship or orders between object;The terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or system including a series of elements include not only that A little elements, but also include other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of system.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in process, method, article or the system including the element.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of information security processing method, which is characterized in that described information security processing includes the following steps:
Judge whether to be in information protection mode, if being in information protection mode, when detecting transmission instruction, described in acquisition It sends and instructs associated initial information;
The initial information is subjected to discrete Fourier transform, generates information to be edited;
Preset user identifier is obtained, user identifier, which is carried out coding, generates mark watermark;
The information to be edited and the mark watermark are overlapped processing, and carry out inverse Fourier transform, transmission is generated and refers to Enable corresponding transmission information;
The transmission information is sent to transmission and instructs associated reception account, corresponding user checks so as to the reception account The transmission information.
2. information security processing method as described in claim 1, which is characterized in that described by the information to be edited and described The step of mark watermark is overlapped processing, including:
The size for obtaining the size and the mark watermark of the initial information, obtains the initial information and the mark watermark Size relative scale, judge whether the size relative scale matches with preset ratio;
If the size relative scale is matched with preset ratio, default queueing discipline is pressed into mark watermark and is placed, and will wait compiling Volume information and the mark watermark are overlapped processing;
If the size relative scale and preset ratio mismatch, display reminding information, for user to mark watermark into Row size adjusting;
After the completion of the size adjusting for detecting mark watermark, default queueing discipline is pressed into mark watermark and is placed, and will be to be edited Information and the mark watermark are overlapped processing.
3. information security processing method as described in claim 1, which is characterized in that described to judge whether to be in information protection mould After the step of formula, further include:
If being in information protection mode, the current display interface of display screen is obtained;
The current display interface is parsed, the display information that the current display interface includes is obtained, with true according to display information It is fixed whether to open anti-exposal model;
If opening anti-exposal model, obtain preset user identifier and encoded, generates coded graphics;
The coded graphics is converted into preset format polar plot, and the preset format polar plot is broken up and is distributed to display screen On, with the caused information leakage that prevents from taking pictures.
4. information security processing method as claimed in claim 3, which is characterized in that the parsing current display interface, Obtain the display information that the current display interface includes, with according to display information determine whether to open anti-exposal model the step of Including:
The current display interface is parsed, the display information that the current display interface includes is obtained, obtains the display information In character set;
Character in the character set is subjected to traversal matching with the sensitive character in default sensitive information library, described in judgement Whether include the sensitive character in character set;
If comprising the sensitive character in the character set, current display is determined according to the character quantity of the sensitive character The sensitive grade at interface;
If the sensitive grade of the current display interface is more than predetermined threshold value, anti-exposal model is opened.
5. the information security processing method as described in Claims 1-4 any one, which is characterized in that described by the transmission Information is sent to transmission and instructs associated reception account, and so as to the reception account, corresponding user checks the transmission information After step, including:
When detecting based on the analysis request for sending information triggering, the transmission information is subjected to Fourier transformation;
When detecting that the transmission information Fourier transformation is completed, the mark watermark for sending information and including is obtained, and will Mark watermark is decoded, and obtains the corresponding user identifier of mark watermark.
6. information security processing method as described in claim 1, which is characterized in that it is described to obtain preset user identifier, it will use Family mark carries out the step of coding generates mark watermark, further includes:
Preset user identifier is obtained, the preset user identifier is encrypted by preset rules;
After the completion of detecting preset user identifier encryption, the preset user identifier is subjected to random coded and generates mark water Print, so that mark watermark is overlapped processing with information to be edited.
7. information security processing method as claimed in claim 6, which is characterized in that described ought detect sends information Fourier When transformation is completed, the mark watermark for sending information and including is obtained, and mark watermark is decoded, obtain mark watermark pair The step of user identifier answered, including:
When detecting that sending information Fourier transformation completes, the mark watermark for sending information and including is obtained, and judge institute State whether mark watermark passes through encryption;
If encryption is passed through in the mark watermark, the corresponding decryption rule of mark watermark and decoding rule are obtained;
The mark watermark is decoded and is decrypted, the corresponding user identifier of mark watermark is obtained.
8. a kind of information security processing unit, which is characterized in that described information secure processing device includes:
Mode deciding module is in information protection mode for judging whether, if being in information protection mode, is detecting hair When sending instruction, obtains and send the associated initial information of instruction;
Message processing module generates information to be edited for initial information to be carried out discrete Fourier transform;
Processing module is identified, for obtaining preset user identifier, user identifier is subjected to coding and generates mark watermark;
Watermark processing module for the information to be edited and the mark watermark to be overlapped processing, and carries out Fourier Inverse transformation generates and sends the corresponding transmission information of instruction;
Information sending module instructs associated reception account, to receive account for the transmission information to be sent to transmission Corresponding user checks the transmission information.
9. a kind of information security processing equipment, which is characterized in that described information safety processing device includes:Memory, processor And it is stored in the information security processing routine that can be run on the memory and on the processor, wherein:
The letter as described in any one of claim 1 to 7 is realized when described information render safe procedures are executed by the processor The step of ceasing security processing.
10. a kind of computer storage media, which is characterized in that be stored with information security processing journey on the computer storage media Sequence realizes the information security as described in any one of claim 1 to 7 when described information render safe procedures are executed by processor The step of processing method.
CN201810330715.1A 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium Active CN108510426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810330715.1A CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810330715.1A CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN108510426A true CN108510426A (en) 2018-09-07
CN108510426B CN108510426B (en) 2023-12-29

Family

ID=63381791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810330715.1A Active CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN108510426B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741232A (en) * 2018-12-29 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of image watermark detection method, device and electronic equipment
CN109767378A (en) * 2019-01-02 2019-05-17 腾讯科技(深圳)有限公司 Image processing method and device
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
CN111506905A (en) * 2019-01-31 2020-08-07 百度在线网络技术(北京)有限公司 Data processing method, device, server and storage medium
CN111639313A (en) * 2020-05-13 2020-09-08 广州国音智能科技有限公司 File transmission method, device, terminal and computer readable storage medium
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system
CN112182605A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112532878A (en) * 2020-11-25 2021-03-19 平安信托有限责任公司 Anti-photographing method, device and equipment based on artificial intelligence and storage medium
CN112669192A (en) * 2021-01-14 2021-04-16 视联动力信息技术股份有限公司 Watermark acquisition method, watermark acquisition device, terminal equipment and storage medium
US11019407B2 (en) * 2019-08-27 2021-05-25 Synamedia Limited Systems and methods for providing watermarked content
CN113542206A (en) * 2020-11-27 2021-10-22 腾讯科技(深圳)有限公司 Image processing method and device and computer readable storage medium
CN114780187A (en) * 2022-04-11 2022-07-22 北京有竹居网络技术有限公司 Prompting method and device
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000278505A (en) * 1999-03-24 2000-10-06 Hitachi Ltd Secrecy method and device for image data by electronic watermark
US20020032863A1 (en) * 2000-04-26 2002-03-14 Contents-Korea Co., Ltd. System and method for performing digital watermarking in realtime using encrypted algorithm
JP2006270988A (en) * 2006-04-25 2006-10-05 Nec Corp Method for inserting electronic watermark data, its device and electronic watermark data detector
US20080273744A1 (en) * 2006-11-30 2008-11-06 Kabushiki Kaisha Toshiba Digital watermarking method and apparatus
US20090074230A1 (en) * 2005-04-21 2009-03-19 Noridomi Ken Ichi Electronic watermark embedding device and detection device, detection method, detection program, and intergrated circuit device thereof
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
US20130125196A1 (en) * 2005-05-18 2013-05-16 William M. Shapiro Method and apparatus for combining encryption and steganography in a file control system
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
WO2015090170A1 (en) * 2013-12-16 2015-06-25 成都宇飞信息工程有限责任公司 Digital watermarking data processing module, chip and smart digital watermarking mobile phone
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000278505A (en) * 1999-03-24 2000-10-06 Hitachi Ltd Secrecy method and device for image data by electronic watermark
US20020032863A1 (en) * 2000-04-26 2002-03-14 Contents-Korea Co., Ltd. System and method for performing digital watermarking in realtime using encrypted algorithm
US20090074230A1 (en) * 2005-04-21 2009-03-19 Noridomi Ken Ichi Electronic watermark embedding device and detection device, detection method, detection program, and intergrated circuit device thereof
US20130125196A1 (en) * 2005-05-18 2013-05-16 William M. Shapiro Method and apparatus for combining encryption and steganography in a file control system
JP2006270988A (en) * 2006-04-25 2006-10-05 Nec Corp Method for inserting electronic watermark data, its device and electronic watermark data detector
US20080273744A1 (en) * 2006-11-30 2008-11-06 Kabushiki Kaisha Toshiba Digital watermarking method and apparatus
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
WO2015090170A1 (en) * 2013-12-16 2015-06-25 成都宇飞信息工程有限责任公司 Digital watermarking data processing module, chip and smart digital watermarking mobile phone
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张玉梅等: "浏览器端定位篡改的网页脆弱水印算法" *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741232A (en) * 2018-12-29 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of image watermark detection method, device and electronic equipment
CN109767378A (en) * 2019-01-02 2019-05-17 腾讯科技(深圳)有限公司 Image processing method and device
CN109767378B (en) * 2019-01-02 2021-07-20 腾讯科技(深圳)有限公司 Image processing method and device
US11489984B2 (en) 2019-01-02 2022-11-01 Tencent Technology (Shenzhen) Company Limited Frequency and spatial domain image processing method for image marking and mark detection, apparatus, and storage medium
CN111506905A (en) * 2019-01-31 2020-08-07 百度在线网络技术(北京)有限公司 Data processing method, device, server and storage medium
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
US11019407B2 (en) * 2019-08-27 2021-05-25 Synamedia Limited Systems and methods for providing watermarked content
CN111639313A (en) * 2020-05-13 2020-09-08 广州国音智能科技有限公司 File transmission method, device, terminal and computer readable storage medium
CN111639313B (en) * 2020-05-13 2023-08-11 广州国音智能科技有限公司 File transmission method, device, terminal and computer readable storage medium
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system
CN112182605A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112532878A (en) * 2020-11-25 2021-03-19 平安信托有限责任公司 Anti-photographing method, device and equipment based on artificial intelligence and storage medium
CN113542206A (en) * 2020-11-27 2021-10-22 腾讯科技(深圳)有限公司 Image processing method and device and computer readable storage medium
CN113542206B (en) * 2020-11-27 2023-07-04 腾讯科技(深圳)有限公司 Image processing method, device and computer readable storage medium
CN112669192A (en) * 2021-01-14 2021-04-16 视联动力信息技术股份有限公司 Watermark acquisition method, watermark acquisition device, terminal equipment and storage medium
CN114780187A (en) * 2022-04-11 2022-07-22 北京有竹居网络技术有限公司 Prompting method and device
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system

Also Published As

Publication number Publication date
CN108510426B (en) 2023-12-29

Similar Documents

Publication Publication Date Title
CN108510426A (en) Information security processing method, device, equipment and computer storage media
KR100753932B1 (en) contents encryption method, system and method for providing contents through network using the encryption method
US8683223B2 (en) Selective encryption within documents
US9240883B2 (en) Multi-key cryptography for encrypting file system acceleration
US7861301B2 (en) System for monitoring personal computer documents for sensitive data
CN110798315B (en) Data processing method and device based on block chain and terminal
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN103294961A (en) Method and device for file encrypting/decrypting
JP5404030B2 (en) Electronic file transmission method
JP2007522707A (en) Backup and restoration of DRM security data
CN106709280A (en) Method, client and server for processing information
CN104067286B (en) The detection of invalid trustship key
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
CN109981266B (en) Method and device for storing and reading key and sensitive information
CN107306254B (en) Digital copyright protection method and system based on double-layer encryption
CN114175580A (en) Enhanced secure encryption and decryption system
CN106656955A (en) Communication method and system and user terminal
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN106446713A (en) Encryption method and system for database content
CN112202794A (en) Transaction data protection method and device, electronic equipment and medium
JP3984599B2 (en) Service provision system
CN110263553B (en) Database access control method and device based on public key verification and electronic equipment
Rejani et al. STEGANODB-A Secure Database using Steganography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231103

Address after: Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510000, 518.519

Applicant after: Liang Shiquan

Address before: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen LIAN intellectual property service center

Effective date of registration: 20231103

Address after: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen LIAN intellectual property service center

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231120

Address after: Room 206, No.1 Futong Street, Tianhe District, Guangzhou City, Guangdong Province, 510000

Applicant after: Zhu Na

Address before: Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510000, 518.519

Applicant before: Liang Shiquan

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231128

Address after: Room 518.519, Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510670

Applicant after: GUANGDONG LI'ANG ELECTRONIC TECHNOLOGY CO.,LTD.

Address before: Room 206, No.1 Futong Street, Tianhe District, Guangzhou City, Guangdong Province, 510000

Applicant before: Zhu Na

GR01 Patent grant
GR01 Patent grant