CN108647509A - A kind of method and device for preventing sensitive document from revealing - Google Patents
A kind of method and device for preventing sensitive document from revealing Download PDFInfo
- Publication number
- CN108647509A CN108647509A CN201810446848.5A CN201810446848A CN108647509A CN 108647509 A CN108647509 A CN 108647509A CN 201810446848 A CN201810446848 A CN 201810446848A CN 108647509 A CN108647509 A CN 108647509A
- Authority
- CN
- China
- Prior art keywords
- audio
- information
- video information
- specially
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Studio Devices (AREA)
Abstract
This application discloses a kind of method and devices for preventing sensitive document from revealing, the program is acquiring the audio and video information specified in operating area when sensitive document is in broadcasting or display state, the wherein described audio and video information is specially one or more of sound, picture, video type, judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value, and sends a warning message when the determination result is yes.This method improves the safety that file is protected during sensitive document is opened and traditional privacy mechanism fails, by many-sided identification fraudulent copying operation such as image, action, sound to protect document secret.
Description
Technical field
This application involves file security field, more particularly to a kind of method for preventing sensitive document from revealing.The application is simultaneously
Further relate to a kind of device for preventing sensitive document from revealing.
Background technology
With information-based high speed development, demand of the people to information security comes one after another, talent competition, market competition,
Financial crisis, enemy spy mechanism etc. all bring great risk to the development of enterprises and institutions, and inside steals secret information, hacker attack, unconscious
The means of stealing secret information such as divulge a secret become between interpersonal, enterprise and enterprise, inter-State security risk.So to document
The protection of safety is most important.
As shown in Figure 1, for the various schematic diagrams divulged a secret in the prior art.In order to avoid the leakage of information, market
Demand, the awareness of safety of people, environment factors promote information security high speed development, information security to experienced from traditional
Single protection is such as fire wall to information security total solution, from traditional old three samples fire wall, intrusion detection, antivirus software
To the protecting information safety of diversification, from traditional external network protection to intranet security, Host Security etc..
Sensitive document is provided with privacy requirements due to the sensibility of its content, and content only has specified individual or designated group
Body has browsing or modification authority.The prior art is in order to realize the security management to sensitive document, to the opening of sensitive document, multiple
The operations such as system, transfer have all carried out permission control, to realize effective protection of usage right to its content.
Currently, file encryption is the main force of protecting information safety now, using transparent encryption and decryption technology, data are carried out
Encryption is forced, does not change the original use habit of user;This technology is either detached from operating system to data self-encryption, also
Be it is illegal be detached from security context, user data itself be all it is safe, it is smaller to the dependence of environment.Document on the market adds
Close main technology is divided into several technologies such as disk encryption, application layer encryption, driving stage encryption.
Inventor has found during realizing the application, after opening sensitive document by lawful authority, in file
Hold in by browse state, the content viewables such as image, picture or word are presented in display screen, and acoustic information etc. passes through speaker or ear
The external speakers such as machine are played, and after this, any people that may browse through display screen or can hear broadcasting content can be led to
It crosses the modes such as take pictures, image, copying, recording and content duplication is carried out to sensitive document, and the prior art lacks this duplication
Restriction scheme causes a hidden trouble to the content safety of sensitive document.
Invention content
This application provides a kind of method for preventing sensitive document from revealing, to solve in the prior art can not be in sensitive text
The problem of carrying out secrecy monitoring in part opening procedure to it, the program includes:
When sensitive document is in broadcasting or display state, the audio and video information specified in operating area, the institute are acquired
It is specially one or more of sound, picture, video type to state audio and video information;
Judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value;
If so, sending a warning message.
Preferably, when the audio and video information is specially picture, the acoustic image comparative information is specially the figure of specified article
Picture, judges whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
It is determined in the picture and be whether there is and the specified matched content of article, the content packet according to described image
Include the specified article and the specified article under particular state;
If in the presence of confirming that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold value.
Preferably, when the audio and video information is specially picture, the acoustic image comparative information is specially facial image, is judged
Whether whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
The picture is subjected to facial image matching in preset face database, is deposited in advance in the face database
Store up the facial image authorized;
If in the face database there is no with the matched facial image of the picture, confirm the audio and video information with
The matching rate of the acoustic image comparative information is higher than the threshold value.
Preferably, when the audio and video information is specially video or picture, the acoustic image comparative information is specially specified appearance
Gesture or action, judge whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value,
Specially:
Action recognition is carried out to personnel's operation behavior in the video image or the picture;
If action recognition result and the specified posture are kept strokes, the audio and video information and the acoustic image pair are confirmed
It is higher than the threshold value than the matching rate of information.
Preferably, when the audio and video information is specially audio, the acoustic image comparative information is specially specified sound, is judged
Whether whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
Judge whether the audio and the similarity of the specified sound are higher than the threshold value.
Preferably, if the type of the sensitive document is document or picture, the type of the audio and video information is specially to correspond to
The image of picture or writing record, action or sound;
If the type of the sensitive document is audio, the concrete type of the audio and video information is the shadow of corresponding audio recording
Picture, action or sound.
Preferably, further include:
After the sensitive document is closed, stop the audio and video information in the specified operating area of acquisition.
Preferably, after sending the warning information, further include:
Preserve the audio and video information.
Correspondingly, the application also proposed it is a kind of prevent sensitive document reveal device, described device include memory and
Processor;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in above-mentioned any one
The method of leakage.
The application also proposed a kind of computer storage media, and described device includes memory and processor;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in above-mentioned any one
The method of leakage.
It can be seen that by the technical solution of application the application, the program is played or is shown when sensitive document is in
The audio and video information specified in operating area is acquired when state, wherein the audio and video information is specially one in sound, picture, video
A or multiple types, judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value,
And it sends a warning message when the determination result is yes.This method is in the process that sensitive document is opened and traditional privacy mechanism fails
In, file protection is improved to protect document secret by many-sided identification fraudulent copying operation such as image, action, sound
Safety.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application without having to pay creative labor, may be used also for those of ordinary skill in the art
With obtain other attached drawings according to these attached drawings.
Fig. 1 is the schematic diagram of sensitive document leakage in the prior art;
Fig. 2 is a kind of flow diagram for method for preventing sensitive document from revealing that the embodiment of the present application proposes;
Fig. 3 is a kind of structural schematic diagram for device for preventing sensitive document from revealing that the embodiment of the present application proposes.
Specific implementation mode
As stated in the background art, although the prior art by lawful authority open sensitive document, and on a display screen into
Row display is played with convenient for users to browsing and content obtaining.But after sensitive document opening, traditional document security
Secrecy technology just no longer plays protective effect in this navigation process, and any people that may browse through display screen can lead to
It crosses and takes pictures, image, copy, the modes such as recording carry out content duplication to sensitive document.
In view of the above problem, present applicant proposes a kind of method for preventing sensitive document from revealing, this method is in sensitive text
After part is opened, the information such as action, the sound of image, personnel in operating area can be identified, to doubtful malice
The behavior that content replicates is screened and is alerted, to avoid the leakage of sensitive documents content.
As shown in Fig. 2, for the idiographic flow schematic diagram of the program, include the following steps:
S201 acquires the audio and video information specified in operating area, institute when sensitive document is in broadcasting or display state
It is specially one or more of sound, picture, video type to state audio and video information.
The technical issues of in order to solve this programme, the application carry out sensitive document from sound, picture, video etc. are many-sided
Protection, specifically, technical staff in advance be directed to sensitive document audio and video playing region be configured, the region with it can be seen that
Or it hears subject to the content of sensitive document.Specifically, acquisition can show the camera shooting in equipment by the broadcasting of sensitive document
Head and recording wheat are completed, and can also show that the audio-video acquisition equipment around equipment is complete by being arranged to play in sensitive document
At these settings do not influence the protection domain of the application.
Ensure that the safety of sensitive document, the application of the application preferred embodiment are opened quick while in order to save equipment energy consumption
The operation for feeling file is the trigger timing that protection mechanism starts, the triggering that the operation to close sensitive document is closed as protection mechanism
Opportunity.To ensure to open in sensitive document or, or the application is proposed in sensitive document playing process protection mechanism can
It brings into operation in time, is not in the vacuum period of file content protection.It, can meanwhile in closing of a file or after playing stopping
Protection mechanism is closed in time, avoids additional system processing load and energy consumption, after also avoiding closing of a file or playing stopping,
Regular event before display is misidentified.I.e. after the sensitive document is closed, stops acquisition and specify in operating area
Audio and video information.
It may be noted that if perform file open operation, but due to Authority Verification or security system authentication failed, and lead
In the case of causing file content and being not presented at display, this protection mechanism can't start.
S202, judges whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value.
If so, S203 is executed, if it is not, executing S204.
Based on audio and video information different in S201, the application preferred embodiment is based on various audio and video informations and is provided with inhomogeneity
The acoustic image comparative information of type, the acoustic image comparative information for being screened to audio and video information, the application acoustic image comparative information in
Determine that sensitive document is compromised in the case of audio and video information height is similar.Specifically, the corresponding acoustic image pair of difference audio and video information
It is as follows than information and its respective handling mode:
(1) doubtful copying equipment identification (static image identification)
In this case, audio and video information is specially picture, and acoustic image comparative information is specially the image of specified article, is judged
Journey is actually to be determined in the picture to whether there is and the specified matched content of article, the content according to described image
Specified article including the specified article and under particular state;If in the presence of, confirm the audio and video information with it is described
The matching rate of acoustic image comparative information is higher than the threshold value.
In specific application scenarios, the present embodiment is by camera to (in the embodiment of the present application may be used in operating area
Before being specially display screen) object carry out static identification (i.e. to the image display tableaux in operating area, and to picture
In object be identified), such as find to be similar to camera, video camera, mobile phone, recorder, the equipment such as recording pen are accused
It is alert.
Certainly, it is contemplated that the equipment such as mobile phone are commonly used equipments, and call function itself having etc. replicates not with content
Correlation, so, in order to improve the accuracy of alarm, restrictive condition can be further set, for example, the camera lens direction display of equipment
Screen, equipment is in shooting standby mode (lens cap open, dolly camera be in stretching state etc.) etc., ensures to be identified with this
The equipment arrived currently has the expection of shooting really.
(2) pre-authorization recognition of face
In this case, audio and video information is specially picture, and the acoustic image comparative information is specially facial image, deterministic process
The picture is actually carried out to facial image matching in preset face database, is deposited in advance in the face database
Store up the facial image authorized;If in the face database there is no with the matched facial image of the picture, confirm institute
It states audio and video information and the matching rate of the acoustic image comparative information is higher than the threshold value.
In specific application scenarios, the content of the static image identification of this preferred embodiment can further carry out individual character
Change setting, for example, pre-establish and safeguard donor's image information bank, then, after sensitive document is opened, known by face
Not, if in the image that camera captures not being pre-stored donor's image, then it is assumed that be illegal operation, directly carry out
Alarming processing.Wherein, whether when the image captured includes multiple human face datas, it includes to deposit in advance to need identification wherein
Donor's image of storage, if do not included, then it is assumed that be illegal operation, directly carry out alarming processing.
Certainly, it is contemplated that the information versatility of other identification objects in technical scheme, it is above-mentioned to be based on recognition of face
Protection scheme need carry out donor's image information bank independent maintenance, therefore, can safety coefficient require it is higher quick
In the Preservation tactics for feeling file, to improve the safety of response sensitive document.
(3) doubtful replication actions identification (dynamic image identification)
In this case, audio and video information is specially video or picture, and the acoustic image comparative information is specially specified posture, is sentenced
Disconnected process is actually to carry out action recognition to personnel's operation behavior in the video image or the picture, if action recognition
As a result consistent with the specified posture, then confirm that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold
Value.
In specific application scenarios, Dynamic Recognition is carried out (i.e. to operation to the image in operating area by camera
Image in region is obtained, and the human behavior in coherent action recognition operating area is passed through), it such as finds to be similar to take pictures
Prepare, shooting prepares, recording prepares, the actions such as copy, that is, alerted.
It is further noted that action recognition herein can also be combined with the static identification in (1), to certain
Given pose is identified, and when there is given pose, that is, is alerted.
(4) doubtful duplication voice recognition (voice recognition)
In this case, audio and video information is specially audio, and the acoustic image comparative information is specially specified sound.Deterministic process
Actually judge whether the audio and the similarity of the specified sound are higher than the threshold value.Specifically, pass through microphone
Sound collection is carried out, when collecting doubtful shutter sound, camera lens adjustment sound is alerted when recording such as starts at the acoustic informations.This
Kind situation has better identity, such as google glasses, the objects such as recording pen for the identification of the audio-visual collecting device of concealment
Body is no different with conventional object, can not Direct Recognition therefore to be audio-visual collecting device can be used as identification by information such as sound
The supplement of information.
It should be noted that consider for the flexibility that equipment uses, in the technical solution that the application is proposed, according to
The file type difference of current protected object, specific Preservation tactics can also have corresponding adjustment.
If the type of the sensitive document is document or picture, the type of the audio and video information is specially corresponding picture or text
Image, action or the sound of word record;If the type of the sensitive document is audio, the concrete type of the audio and video information is pair
Answer image, action or the sound of audio recording.
In the preferred embodiment of the application, if the type of the sensitive document is document or picture, the audio and video information
Type be specially picture and video;If the type of the sensitive document is audio, the concrete type of the audio and video information is
Audio.
For example, for word and picture file, the identification function of single sound pick-up outfit (recorder, recording pen etc.) will just close
Close, and for audio file, the identification function of camera will also close, to, avoid excessive invalid identification mechanism there are institutes
Caused misrecognition operation.
S203 sends a warning message.
S204 continues to acquire the audio and video information in the specified operating area.
Include 2 points of preferable contents in the early warning processing strategy of the application, one is information records, at above-mentioned place
During reason, in order to which evidence is retained, picture or sound to being acquired is needed to record.The second is alarming processing, that is, having
The audio and video information is preserved in the application scenarios of body, recognition result above-mentioned can directly be determined as fraudulent copying, corresponding to accuse
Alert processing can be submitted directly as final judgement result to security department, to handle alarm object.
It should be noted that in view of the serious forgiveness of recognition result itself and other possibility of identified object itself
(for example, it may be to take notes to copy action itself, the reference object of shooting action may be nor classified document etc.), because
This, if being directly determined as fraudulent copying, it is possible that erroneous judgement, therefore, corresponding alarm operation is intended only as early warning, so as to
It reminds all sides of classified document, or the personnel with higher security permission to carry out security check, waits for that related personnel shows up
Afterwards, malicious act verification can be carried out in conjunction with field condition, if it is judged that being according to the picture or sound of aforementioned record
It is then to handle alarm object, if it is judged that being no, then releases alarm.
By the technical solution of application the application, the program is acquired when sensitive document is in broadcasting or display state
Audio and video information in specified operating area, wherein the audio and video information is specially one or more of sound, picture, video class
Type, judges whether the matching rate of the audio and video information and preset acoustic image comparative information is higher than preset threshold value, and is judging to tie
Fruit is to send a warning message when being.This method is opened in sensitive document and during the failure of traditional privacy mechanism, by image,
Many-sided identification fraudulent copying operation such as action, sound improves the safety of file protection to protect document secret.
In order to which the technological thought of the application is expanded on further, in conjunction with specific application scenarios, to the technical side of the application
Case illustrates.
Specific embodiment one
Step a) staff opens a piece of video file for including sensitive content by Authority Verification, and video file is opened
Beginning plays out on a display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) is recognized by the picture capturing in operating area and is placed with a video camera on desk and (passes through institute
Interception image is compared to determine with the information material that inside prestores).
There is currently the danger of potential fraudulent copying, alarms for step d) judgements.
There are step e) personnel of higher security permission to record progress security inspection with picture according to field condition.
If it is determined that step f) safety, releases alarm, if it is decided that dangerous, the then operation for the personnel that are stopped, and deliver
Corresponding department's processing.
Specific embodiment two
Step a) staff opens a picture file for including sensitive information, image content exhibition by Authority Verification
Show in display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff leaves for some reason, and forgets to close display screen.
Step d) other staff pass through display screen, and take out camera preparation and take pictures.
Step e) protection mechanisms recognize action of taking pictures by the action recognition in operating area.
There is currently the danger of potential fraudulent copying, alarms for step f) judgements.
There are step g) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step h) judgements are dangerous, and other staff, which are delivered corresponding department, to be handled.
Specific embodiment three
Step a) staff opens an audio file for including sensitive information by Authority Verification, and acoustic information is logical
Sound external speaker is crossed to play out.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff records in taking out mobile phone.
Step d) protection mechanisms recognize sound pick-up outfit and recording operation by image and action recognition.
There is currently the danger of potential fraudulent copying, alarms for step e) judgements.
There are step f) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step g) judgements are dangerous, and other staff, which are delivered corresponding department, to be handled.
Specific embodiment four
Step a) staff opens a text document for including sensitive information, document content exhibition by Authority Verification
Show in display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff is contacted in other people by mobile phone, and carries out screenshotss operation, sends out shutter sound.
Step d) protection mechanisms recognize shutter sound by voice recognition.
There is currently the danger of potential fraudulent copying, alarms for step e) judgements.
There are step f) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step g) judgement safety, releases alarm.
Above-mentioned specific embodiment is opened in sensitive document, after the failure of traditional privacy mechanism, open camera and microphone into
The audio-visual acquisition of row identifies copying equipment by image, is replicated and taken action by action recognition, the sound of operation is replicated by voice recognition
It rings, thus, it is possible to continue to protect sensitive documents content, prevents fraudulent copying from operating, document content is protected safely
Card.Wherein, image, action, sound can come into force together, can also individually come into force.
To reach the above technical purpose, the application also proposed a kind of device for preventing sensitive document from revealing, such as Fig. 3 institutes
Show, described device includes memory 310 and processor 320;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in any one as above
The method of leakage.
Through the above description of the embodiments, those skilled in the art can be understood that the application can lead to
Hardware realization is crossed, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding, this Shen
Technical solution please can be expressed in the form of software products, which can be stored in a non-volatile memories
In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are used so that a computer equipment (can be
Personal computer, server or network equipment etc.) execute each implement scene of the application described in method.
It will be appreciated by those skilled in the art that the accompanying drawings are only schematic diagrams of a preferred implementation scenario, module in attached drawing or
Flow is not necessarily implemented necessary to the application.
It will be appreciated by those skilled in the art that the module in device in implement scene can be described according to implement scene into
Row is distributed in the device of implement scene, can also be carried out respective change and is located at the one or more dresses for being different from this implement scene
In setting.The module of above-mentioned implement scene can be merged into a module, can also be further split into multiple submodule.
Above-mentioned the application serial number is for illustration only, does not represent the quality of implement scene.
Disclosed above is only several specific implementation scenes of the application, and still, the application is not limited to this, Ren Heben
What the technical staff in field can think variation should all fall into the protection domain of the application.
Claims (10)
1. a kind of method for preventing sensitive document from revealing, which is characterized in that including:
When sensitive document is in broadcasting or display state, the audio and video information specified in operating area, the acoustic image letter are acquired
Breath is specially one or more of sound, picture, video type;
Judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value;
If so, sending a warning message.
2. the method as described in claim 1, which is characterized in that when the audio and video information is specially picture, the acoustic image pair
Than the image that information is specially specified article, judge the audio and video information whether with the matching rate of preset acoustic image comparative information be
It is no to be higher than preset threshold value, specially:
According to described image determine in the picture with the presence or absence of with the specified matched content of article, the content includes institute
State specified article and the specified article under particular state;
If in the presence of confirming that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold value.
3. the method as described in claim 1, which is characterized in that when the audio and video information is specially picture, the acoustic image pair
It is specially facial image than information, judges whether the audio and video information be higher than with the matching rate of preset acoustic image comparative information
Preset threshold value, specially:
The picture is subjected to facial image matching in preset face database, is prestored in the face database
The facial image of mandate;
If in the face database there is no with the matched facial image of the picture, confirm the audio and video information with it is described
The matching rate of acoustic image comparative information is higher than the threshold value.
4. the method as described in claim 1, which is characterized in that described when the audio and video information is specially video or picture
Acoustic image comparative information is specially specified posture or action, judge the audio and video information whether with preset acoustic image comparative information
Whether it is higher than preset threshold value with rate, specially:
Action recognition is carried out to personnel's operation behavior in the video image or the picture;
If action recognition result and the specified posture are kept strokes, confirm that the audio and video information is believed with acoustic image comparison
The matching rate of breath is higher than the threshold value.
5. the method as described in claim 1, which is characterized in that when the audio and video information is specially audio, the acoustic image pair
It is specially specified sound than information, judges whether the audio and video information be higher than with the matching rate of preset acoustic image comparative information
Preset threshold value, specially:
Judge whether the audio and the similarity of the specified sound are higher than the threshold value.
6. method as described in any one in claim 1-5, which is characterized in that
If the type of the sensitive document is document or picture, the type of the audio and video information is specially corresponding picture or word note
Image, action or the sound of record;
If the type of the sensitive document is audio, the concrete type of the audio and video information is the image of corresponding audio recording, moves
Work or sound.
7. method as claimed in claim 6, which is characterized in that further include:
After the sensitive document is closed, stop the audio and video information in the specified operating area of acquisition.
8. the method as described in claim 1, which is characterized in that after sending the warning information, further include:
Preserve the audio and video information.
9. a kind of device for preventing sensitive document from revealing, which is characterized in that described device includes memory and processor;
The memory is for storing computer program;
The processor is for executing the computer program to realize claim 1 to described in any one of claim 8
Prevent sensitive document reveal method.
10. a kind of computer storage media, which is characterized in that described device includes memory and processor;
The memory is for storing computer program;
The processor is for executing the computer program to realize claim 1 to described in any one of claim 7
Prevent sensitive document reveal method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810446848.5A CN108647509A (en) | 2018-05-11 | 2018-05-11 | A kind of method and device for preventing sensitive document from revealing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810446848.5A CN108647509A (en) | 2018-05-11 | 2018-05-11 | A kind of method and device for preventing sensitive document from revealing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108647509A true CN108647509A (en) | 2018-10-12 |
Family
ID=63754528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810446848.5A Pending CN108647509A (en) | 2018-05-11 | 2018-05-11 | A kind of method and device for preventing sensitive document from revealing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108647509A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110503460A (en) * | 2019-07-26 | 2019-11-26 | 秒针信息技术有限公司 | Monitoring of the advertisement method, device, system, electronic equipment and storage medium |
CN111711763A (en) * | 2020-06-30 | 2020-09-25 | 云从科技集团股份有限公司 | Camera lens module shielding control method and device and camera |
CN112104626A (en) * | 2020-09-03 | 2020-12-18 | 深圳市中科网威科技有限公司 | Block chain-based data access verification method and device, electronic equipment and medium |
CN113014574A (en) * | 2021-02-23 | 2021-06-22 | 深信服科技股份有限公司 | Intra-domain detection operation detection method and device and electronic equipment |
CN117037270A (en) * | 2023-08-03 | 2023-11-10 | 北京军安中科信息科技研究所 | Screen anti-shooting system and method based on image processing |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103369103A (en) * | 2012-03-27 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Anti-peeping method of mobile terminal and mobile terminal |
CN103902866A (en) * | 2012-12-25 | 2014-07-02 | 鸿富锦精密工业(深圳)有限公司 | File protection system and method |
CN103986946A (en) * | 2014-06-03 | 2014-08-13 | 安徽海聚信息科技有限责任公司 | Child-lock control method for network television |
CN105260642A (en) * | 2015-10-30 | 2016-01-20 | 宁波萨瑞通讯有限公司 | Privacy protecting method and mobile terminal |
CN105528578A (en) * | 2015-12-04 | 2016-04-27 | 国家电网公司 | Online training monitoring method based on sound image process tracking |
CN105959624A (en) * | 2016-05-03 | 2016-09-21 | 方筠捷 | Examination room monitoring data processing method and automatic monitoring system thereof |
CN206195933U (en) * | 2016-11-15 | 2017-05-24 | 广州市奕星研科数码有限公司 | Video action identification system |
WO2017168016A1 (en) * | 2016-04-01 | 2017-10-05 | Telefonica Digital España, S.L.U. | Method and system for protecting a computer file against possible malware encryption |
-
2018
- 2018-05-11 CN CN201810446848.5A patent/CN108647509A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103369103A (en) * | 2012-03-27 | 2013-10-23 | 宇龙计算机通信科技(深圳)有限公司 | Anti-peeping method of mobile terminal and mobile terminal |
CN103902866A (en) * | 2012-12-25 | 2014-07-02 | 鸿富锦精密工业(深圳)有限公司 | File protection system and method |
CN103986946A (en) * | 2014-06-03 | 2014-08-13 | 安徽海聚信息科技有限责任公司 | Child-lock control method for network television |
CN105260642A (en) * | 2015-10-30 | 2016-01-20 | 宁波萨瑞通讯有限公司 | Privacy protecting method and mobile terminal |
CN105528578A (en) * | 2015-12-04 | 2016-04-27 | 国家电网公司 | Online training monitoring method based on sound image process tracking |
WO2017168016A1 (en) * | 2016-04-01 | 2017-10-05 | Telefonica Digital España, S.L.U. | Method and system for protecting a computer file against possible malware encryption |
CN105959624A (en) * | 2016-05-03 | 2016-09-21 | 方筠捷 | Examination room monitoring data processing method and automatic monitoring system thereof |
CN206195933U (en) * | 2016-11-15 | 2017-05-24 | 广州市奕星研科数码有限公司 | Video action identification system |
Non-Patent Citations (2)
Title |
---|
DELPHINE CHRISTIN: "TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications", 《2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP)》 * |
吕霄云: "基于MFCC和GMM的异常声音识别算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110503460A (en) * | 2019-07-26 | 2019-11-26 | 秒针信息技术有限公司 | Monitoring of the advertisement method, device, system, electronic equipment and storage medium |
CN111711763A (en) * | 2020-06-30 | 2020-09-25 | 云从科技集团股份有限公司 | Camera lens module shielding control method and device and camera |
CN112104626A (en) * | 2020-09-03 | 2020-12-18 | 深圳市中科网威科技有限公司 | Block chain-based data access verification method and device, electronic equipment and medium |
CN113014574A (en) * | 2021-02-23 | 2021-06-22 | 深信服科技股份有限公司 | Intra-domain detection operation detection method and device and electronic equipment |
CN117037270A (en) * | 2023-08-03 | 2023-11-10 | 北京军安中科信息科技研究所 | Screen anti-shooting system and method based on image processing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108647509A (en) | A kind of method and device for preventing sensitive document from revealing | |
CN104376011B (en) | Realize method for secret protection and device | |
JP4036051B2 (en) | Face matching device and face matching method | |
US8634808B1 (en) | Mobile device loss prevention | |
CN105787324A (en) | Computer information security system | |
Zeng et al. | Responsible facial recognition and beyond | |
CN106372522A (en) | Photo shooting method, corresponding device, photo viewing method and corresponding device | |
JPWO2009013822A1 (en) | Video surveillance device and video surveillance program | |
CN111866600B (en) | Method, device and system for protecting privacy | |
US9998884B2 (en) | Method for preventing misdirection of pictures and electronic device using the same | |
CN109274582A (en) | Methods of exhibiting, device, equipment and the storage medium of instant communication information | |
CN111901567A (en) | Privacy protection method, device, equipment and computer readable storage medium | |
CN108733690B (en) | Image data storage method and device and electronic equipment | |
TW201426394A (en) | System and method of protecting electronic documents | |
CN108985075A (en) | A kind of image file disk encryption system and method for lightweight | |
CN106355120B (en) | A kind of method and apparatus for preventing card information to be replicated | |
CN106162083B (en) | A kind of HD video superposition processing system and its method for carrying out safety certification | |
JP6665590B2 (en) | Information processing apparatus, information processing method, program, and information processing system | |
McQuillan | Is lip-reading the secret to security? | |
WO2016095680A1 (en) | Intrusion detection method and device for private data | |
US10529210B2 (en) | Personal safety device | |
KR101830774B1 (en) | Personal image information protection system based on Layered framework | |
JP2010073112A (en) | Face collating system | |
CN110263521A (en) | Login guard method and device, system, electronic equipment and storage medium | |
CN115220665B (en) | Access method and system of distributed storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181012 |
|
RJ01 | Rejection of invention patent application after publication |