CN108647509A - A kind of method and device for preventing sensitive document from revealing - Google Patents

A kind of method and device for preventing sensitive document from revealing Download PDF

Info

Publication number
CN108647509A
CN108647509A CN201810446848.5A CN201810446848A CN108647509A CN 108647509 A CN108647509 A CN 108647509A CN 201810446848 A CN201810446848 A CN 201810446848A CN 108647509 A CN108647509 A CN 108647509A
Authority
CN
China
Prior art keywords
audio
information
video information
specially
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810446848.5A
Other languages
Chinese (zh)
Inventor
林皓
杨华
牟永鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing North Source Information Safe Technology Ltd
Original Assignee
Beijing North Source Information Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing North Source Information Safe Technology Ltd filed Critical Beijing North Source Information Safe Technology Ltd
Priority to CN201810446848.5A priority Critical patent/CN108647509A/en
Publication of CN108647509A publication Critical patent/CN108647509A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Studio Devices (AREA)

Abstract

This application discloses a kind of method and devices for preventing sensitive document from revealing, the program is acquiring the audio and video information specified in operating area when sensitive document is in broadcasting or display state, the wherein described audio and video information is specially one or more of sound, picture, video type, judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value, and sends a warning message when the determination result is yes.This method improves the safety that file is protected during sensitive document is opened and traditional privacy mechanism fails, by many-sided identification fraudulent copying operation such as image, action, sound to protect document secret.

Description

A kind of method and device for preventing sensitive document from revealing
Technical field
This application involves file security field, more particularly to a kind of method for preventing sensitive document from revealing.The application is simultaneously Further relate to a kind of device for preventing sensitive document from revealing.
Background technology
With information-based high speed development, demand of the people to information security comes one after another, talent competition, market competition, Financial crisis, enemy spy mechanism etc. all bring great risk to the development of enterprises and institutions, and inside steals secret information, hacker attack, unconscious The means of stealing secret information such as divulge a secret become between interpersonal, enterprise and enterprise, inter-State security risk.So to document The protection of safety is most important.
As shown in Figure 1, for the various schematic diagrams divulged a secret in the prior art.In order to avoid the leakage of information, market Demand, the awareness of safety of people, environment factors promote information security high speed development, information security to experienced from traditional Single protection is such as fire wall to information security total solution, from traditional old three samples fire wall, intrusion detection, antivirus software To the protecting information safety of diversification, from traditional external network protection to intranet security, Host Security etc..
Sensitive document is provided with privacy requirements due to the sensibility of its content, and content only has specified individual or designated group Body has browsing or modification authority.The prior art is in order to realize the security management to sensitive document, to the opening of sensitive document, multiple The operations such as system, transfer have all carried out permission control, to realize effective protection of usage right to its content.
Currently, file encryption is the main force of protecting information safety now, using transparent encryption and decryption technology, data are carried out Encryption is forced, does not change the original use habit of user;This technology is either detached from operating system to data self-encryption, also Be it is illegal be detached from security context, user data itself be all it is safe, it is smaller to the dependence of environment.Document on the market adds Close main technology is divided into several technologies such as disk encryption, application layer encryption, driving stage encryption.
Inventor has found during realizing the application, after opening sensitive document by lawful authority, in file Hold in by browse state, the content viewables such as image, picture or word are presented in display screen, and acoustic information etc. passes through speaker or ear The external speakers such as machine are played, and after this, any people that may browse through display screen or can hear broadcasting content can be led to It crosses the modes such as take pictures, image, copying, recording and content duplication is carried out to sensitive document, and the prior art lacks this duplication Restriction scheme causes a hidden trouble to the content safety of sensitive document.
Invention content
This application provides a kind of method for preventing sensitive document from revealing, to solve in the prior art can not be in sensitive text The problem of carrying out secrecy monitoring in part opening procedure to it, the program includes:
When sensitive document is in broadcasting or display state, the audio and video information specified in operating area, the institute are acquired It is specially one or more of sound, picture, video type to state audio and video information;
Judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value;
If so, sending a warning message.
Preferably, when the audio and video information is specially picture, the acoustic image comparative information is specially the figure of specified article Picture, judges whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
It is determined in the picture and be whether there is and the specified matched content of article, the content packet according to described image Include the specified article and the specified article under particular state;
If in the presence of confirming that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold value.
Preferably, when the audio and video information is specially picture, the acoustic image comparative information is specially facial image, is judged Whether whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
The picture is subjected to facial image matching in preset face database, is deposited in advance in the face database Store up the facial image authorized;
If in the face database there is no with the matched facial image of the picture, confirm the audio and video information with The matching rate of the acoustic image comparative information is higher than the threshold value.
Preferably, when the audio and video information is specially video or picture, the acoustic image comparative information is specially specified appearance Gesture or action, judge whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, Specially:
Action recognition is carried out to personnel's operation behavior in the video image or the picture;
If action recognition result and the specified posture are kept strokes, the audio and video information and the acoustic image pair are confirmed It is higher than the threshold value than the matching rate of information.
Preferably, when the audio and video information is specially audio, the acoustic image comparative information is specially specified sound, is judged Whether whether the audio and video information with the matching rate of preset acoustic image comparative information be higher than preset threshold value, specially:
Judge whether the audio and the similarity of the specified sound are higher than the threshold value.
Preferably, if the type of the sensitive document is document or picture, the type of the audio and video information is specially to correspond to The image of picture or writing record, action or sound;
If the type of the sensitive document is audio, the concrete type of the audio and video information is the shadow of corresponding audio recording Picture, action or sound.
Preferably, further include:
After the sensitive document is closed, stop the audio and video information in the specified operating area of acquisition.
Preferably, after sending the warning information, further include:
Preserve the audio and video information.
Correspondingly, the application also proposed it is a kind of prevent sensitive document reveal device, described device include memory and Processor;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in above-mentioned any one The method of leakage.
The application also proposed a kind of computer storage media, and described device includes memory and processor;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in above-mentioned any one The method of leakage.
It can be seen that by the technical solution of application the application, the program is played or is shown when sensitive document is in The audio and video information specified in operating area is acquired when state, wherein the audio and video information is specially one in sound, picture, video A or multiple types, judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value, And it sends a warning message when the determination result is yes.This method is in the process that sensitive document is opened and traditional privacy mechanism fails In, file protection is improved to protect document secret by many-sided identification fraudulent copying operation such as image, action, sound Safety.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application without having to pay creative labor, may be used also for those of ordinary skill in the art With obtain other attached drawings according to these attached drawings.
Fig. 1 is the schematic diagram of sensitive document leakage in the prior art;
Fig. 2 is a kind of flow diagram for method for preventing sensitive document from revealing that the embodiment of the present application proposes;
Fig. 3 is a kind of structural schematic diagram for device for preventing sensitive document from revealing that the embodiment of the present application proposes.
Specific implementation mode
As stated in the background art, although the prior art by lawful authority open sensitive document, and on a display screen into Row display is played with convenient for users to browsing and content obtaining.But after sensitive document opening, traditional document security Secrecy technology just no longer plays protective effect in this navigation process, and any people that may browse through display screen can lead to It crosses and takes pictures, image, copy, the modes such as recording carry out content duplication to sensitive document.
In view of the above problem, present applicant proposes a kind of method for preventing sensitive document from revealing, this method is in sensitive text After part is opened, the information such as action, the sound of image, personnel in operating area can be identified, to doubtful malice The behavior that content replicates is screened and is alerted, to avoid the leakage of sensitive documents content.
As shown in Fig. 2, for the idiographic flow schematic diagram of the program, include the following steps:
S201 acquires the audio and video information specified in operating area, institute when sensitive document is in broadcasting or display state It is specially one or more of sound, picture, video type to state audio and video information.
The technical issues of in order to solve this programme, the application carry out sensitive document from sound, picture, video etc. are many-sided Protection, specifically, technical staff in advance be directed to sensitive document audio and video playing region be configured, the region with it can be seen that Or it hears subject to the content of sensitive document.Specifically, acquisition can show the camera shooting in equipment by the broadcasting of sensitive document Head and recording wheat are completed, and can also show that the audio-video acquisition equipment around equipment is complete by being arranged to play in sensitive document At these settings do not influence the protection domain of the application.
Ensure that the safety of sensitive document, the application of the application preferred embodiment are opened quick while in order to save equipment energy consumption The operation for feeling file is the trigger timing that protection mechanism starts, the triggering that the operation to close sensitive document is closed as protection mechanism Opportunity.To ensure to open in sensitive document or, or the application is proposed in sensitive document playing process protection mechanism can It brings into operation in time, is not in the vacuum period of file content protection.It, can meanwhile in closing of a file or after playing stopping Protection mechanism is closed in time, avoids additional system processing load and energy consumption, after also avoiding closing of a file or playing stopping, Regular event before display is misidentified.I.e. after the sensitive document is closed, stops acquisition and specify in operating area Audio and video information.
It may be noted that if perform file open operation, but due to Authority Verification or security system authentication failed, and lead In the case of causing file content and being not presented at display, this protection mechanism can't start.
S202, judges whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value.
If so, S203 is executed, if it is not, executing S204.
Based on audio and video information different in S201, the application preferred embodiment is based on various audio and video informations and is provided with inhomogeneity The acoustic image comparative information of type, the acoustic image comparative information for being screened to audio and video information, the application acoustic image comparative information in Determine that sensitive document is compromised in the case of audio and video information height is similar.Specifically, the corresponding acoustic image pair of difference audio and video information It is as follows than information and its respective handling mode:
(1) doubtful copying equipment identification (static image identification)
In this case, audio and video information is specially picture, and acoustic image comparative information is specially the image of specified article, is judged Journey is actually to be determined in the picture to whether there is and the specified matched content of article, the content according to described image Specified article including the specified article and under particular state;If in the presence of, confirm the audio and video information with it is described The matching rate of acoustic image comparative information is higher than the threshold value.
In specific application scenarios, the present embodiment is by camera to (in the embodiment of the present application may be used in operating area Before being specially display screen) object carry out static identification (i.e. to the image display tableaux in operating area, and to picture In object be identified), such as find to be similar to camera, video camera, mobile phone, recorder, the equipment such as recording pen are accused It is alert.
Certainly, it is contemplated that the equipment such as mobile phone are commonly used equipments, and call function itself having etc. replicates not with content Correlation, so, in order to improve the accuracy of alarm, restrictive condition can be further set, for example, the camera lens direction display of equipment Screen, equipment is in shooting standby mode (lens cap open, dolly camera be in stretching state etc.) etc., ensures to be identified with this The equipment arrived currently has the expection of shooting really.
(2) pre-authorization recognition of face
In this case, audio and video information is specially picture, and the acoustic image comparative information is specially facial image, deterministic process The picture is actually carried out to facial image matching in preset face database, is deposited in advance in the face database Store up the facial image authorized;If in the face database there is no with the matched facial image of the picture, confirm institute It states audio and video information and the matching rate of the acoustic image comparative information is higher than the threshold value.
In specific application scenarios, the content of the static image identification of this preferred embodiment can further carry out individual character Change setting, for example, pre-establish and safeguard donor's image information bank, then, after sensitive document is opened, known by face Not, if in the image that camera captures not being pre-stored donor's image, then it is assumed that be illegal operation, directly carry out Alarming processing.Wherein, whether when the image captured includes multiple human face datas, it includes to deposit in advance to need identification wherein Donor's image of storage, if do not included, then it is assumed that be illegal operation, directly carry out alarming processing.
Certainly, it is contemplated that the information versatility of other identification objects in technical scheme, it is above-mentioned to be based on recognition of face Protection scheme need carry out donor's image information bank independent maintenance, therefore, can safety coefficient require it is higher quick In the Preservation tactics for feeling file, to improve the safety of response sensitive document.
(3) doubtful replication actions identification (dynamic image identification)
In this case, audio and video information is specially video or picture, and the acoustic image comparative information is specially specified posture, is sentenced Disconnected process is actually to carry out action recognition to personnel's operation behavior in the video image or the picture, if action recognition As a result consistent with the specified posture, then confirm that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold Value.
In specific application scenarios, Dynamic Recognition is carried out (i.e. to operation to the image in operating area by camera Image in region is obtained, and the human behavior in coherent action recognition operating area is passed through), it such as finds to be similar to take pictures Prepare, shooting prepares, recording prepares, the actions such as copy, that is, alerted.
It is further noted that action recognition herein can also be combined with the static identification in (1), to certain Given pose is identified, and when there is given pose, that is, is alerted.
(4) doubtful duplication voice recognition (voice recognition)
In this case, audio and video information is specially audio, and the acoustic image comparative information is specially specified sound.Deterministic process Actually judge whether the audio and the similarity of the specified sound are higher than the threshold value.Specifically, pass through microphone Sound collection is carried out, when collecting doubtful shutter sound, camera lens adjustment sound is alerted when recording such as starts at the acoustic informations.This Kind situation has better identity, such as google glasses, the objects such as recording pen for the identification of the audio-visual collecting device of concealment Body is no different with conventional object, can not Direct Recognition therefore to be audio-visual collecting device can be used as identification by information such as sound The supplement of information.
It should be noted that consider for the flexibility that equipment uses, in the technical solution that the application is proposed, according to The file type difference of current protected object, specific Preservation tactics can also have corresponding adjustment.
If the type of the sensitive document is document or picture, the type of the audio and video information is specially corresponding picture or text Image, action or the sound of word record;If the type of the sensitive document is audio, the concrete type of the audio and video information is pair Answer image, action or the sound of audio recording.
In the preferred embodiment of the application, if the type of the sensitive document is document or picture, the audio and video information Type be specially picture and video;If the type of the sensitive document is audio, the concrete type of the audio and video information is Audio.
For example, for word and picture file, the identification function of single sound pick-up outfit (recorder, recording pen etc.) will just close Close, and for audio file, the identification function of camera will also close, to, avoid excessive invalid identification mechanism there are institutes Caused misrecognition operation.
S203 sends a warning message.
S204 continues to acquire the audio and video information in the specified operating area.
Include 2 points of preferable contents in the early warning processing strategy of the application, one is information records, at above-mentioned place During reason, in order to which evidence is retained, picture or sound to being acquired is needed to record.The second is alarming processing, that is, having The audio and video information is preserved in the application scenarios of body, recognition result above-mentioned can directly be determined as fraudulent copying, corresponding to accuse Alert processing can be submitted directly as final judgement result to security department, to handle alarm object.
It should be noted that in view of the serious forgiveness of recognition result itself and other possibility of identified object itself (for example, it may be to take notes to copy action itself, the reference object of shooting action may be nor classified document etc.), because This, if being directly determined as fraudulent copying, it is possible that erroneous judgement, therefore, corresponding alarm operation is intended only as early warning, so as to It reminds all sides of classified document, or the personnel with higher security permission to carry out security check, waits for that related personnel shows up Afterwards, malicious act verification can be carried out in conjunction with field condition, if it is judged that being according to the picture or sound of aforementioned record It is then to handle alarm object, if it is judged that being no, then releases alarm.
By the technical solution of application the application, the program is acquired when sensitive document is in broadcasting or display state Audio and video information in specified operating area, wherein the audio and video information is specially one or more of sound, picture, video class Type, judges whether the matching rate of the audio and video information and preset acoustic image comparative information is higher than preset threshold value, and is judging to tie Fruit is to send a warning message when being.This method is opened in sensitive document and during the failure of traditional privacy mechanism, by image, Many-sided identification fraudulent copying operation such as action, sound improves the safety of file protection to protect document secret.
In order to which the technological thought of the application is expanded on further, in conjunction with specific application scenarios, to the technical side of the application Case illustrates.
Specific embodiment one
Step a) staff opens a piece of video file for including sensitive content by Authority Verification, and video file is opened Beginning plays out on a display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) is recognized by the picture capturing in operating area and is placed with a video camera on desk and (passes through institute Interception image is compared to determine with the information material that inside prestores).
There is currently the danger of potential fraudulent copying, alarms for step d) judgements.
There are step e) personnel of higher security permission to record progress security inspection with picture according to field condition.
If it is determined that step f) safety, releases alarm, if it is decided that dangerous, the then operation for the personnel that are stopped, and deliver Corresponding department's processing.
Specific embodiment two
Step a) staff opens a picture file for including sensitive information, image content exhibition by Authority Verification Show in display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff leaves for some reason, and forgets to close display screen.
Step d) other staff pass through display screen, and take out camera preparation and take pictures.
Step e) protection mechanisms recognize action of taking pictures by the action recognition in operating area.
There is currently the danger of potential fraudulent copying, alarms for step f) judgements.
There are step g) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step h) judgements are dangerous, and other staff, which are delivered corresponding department, to be handled.
Specific embodiment three
Step a) staff opens an audio file for including sensitive information by Authority Verification, and acoustic information is logical Sound external speaker is crossed to play out.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff records in taking out mobile phone.
Step d) protection mechanisms recognize sound pick-up outfit and recording operation by image and action recognition.
There is currently the danger of potential fraudulent copying, alarms for step e) judgements.
There are step f) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step g) judgements are dangerous, and other staff, which are delivered corresponding department, to be handled.
Specific embodiment four
Step a) staff opens a text document for including sensitive information, document content exhibition by Authority Verification Show in display screen.
Step b) protection mechanisms start, and camera and microphone start the picture in acquisition operations region and sound.
Step c) staff is contacted in other people by mobile phone, and carries out screenshotss operation, sends out shutter sound.
Step d) protection mechanisms recognize shutter sound by voice recognition.
There is currently the danger of potential fraudulent copying, alarms for step e) judgements.
There are step f) personnel of higher security permission to record progress security inspection with picture according to field condition.
Step g) judgement safety, releases alarm.
Above-mentioned specific embodiment is opened in sensitive document, after the failure of traditional privacy mechanism, open camera and microphone into The audio-visual acquisition of row identifies copying equipment by image, is replicated and taken action by action recognition, the sound of operation is replicated by voice recognition It rings, thus, it is possible to continue to protect sensitive documents content, prevents fraudulent copying from operating, document content is protected safely Card.Wherein, image, action, sound can come into force together, can also individually come into force.
To reach the above technical purpose, the application also proposed a kind of device for preventing sensitive document from revealing, such as Fig. 3 institutes Show, described device includes memory 310 and processor 320;
The memory is for storing computer program;
The processor prevents sensitive document to realize for executing the computer program described in any one as above The method of leakage.
Through the above description of the embodiments, those skilled in the art can be understood that the application can lead to Hardware realization is crossed, the mode of necessary general hardware platform can also be added to realize by software.Based on this understanding, this Shen Technical solution please can be expressed in the form of software products, which can be stored in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute each implement scene of the application described in method.
It will be appreciated by those skilled in the art that the accompanying drawings are only schematic diagrams of a preferred implementation scenario, module in attached drawing or Flow is not necessarily implemented necessary to the application.
It will be appreciated by those skilled in the art that the module in device in implement scene can be described according to implement scene into Row is distributed in the device of implement scene, can also be carried out respective change and is located at the one or more dresses for being different from this implement scene In setting.The module of above-mentioned implement scene can be merged into a module, can also be further split into multiple submodule.
Above-mentioned the application serial number is for illustration only, does not represent the quality of implement scene.
Disclosed above is only several specific implementation scenes of the application, and still, the application is not limited to this, Ren Heben What the technical staff in field can think variation should all fall into the protection domain of the application.

Claims (10)

1. a kind of method for preventing sensitive document from revealing, which is characterized in that including:
When sensitive document is in broadcasting or display state, the audio and video information specified in operating area, the acoustic image letter are acquired Breath is specially one or more of sound, picture, video type;
Judge whether the audio and video information and the matching rate of preset acoustic image comparative information are higher than preset threshold value;
If so, sending a warning message.
2. the method as described in claim 1, which is characterized in that when the audio and video information is specially picture, the acoustic image pair Than the image that information is specially specified article, judge the audio and video information whether with the matching rate of preset acoustic image comparative information be It is no to be higher than preset threshold value, specially:
According to described image determine in the picture with the presence or absence of with the specified matched content of article, the content includes institute State specified article and the specified article under particular state;
If in the presence of confirming that the audio and video information and the matching rate of the acoustic image comparative information are higher than the threshold value.
3. the method as described in claim 1, which is characterized in that when the audio and video information is specially picture, the acoustic image pair It is specially facial image than information, judges whether the audio and video information be higher than with the matching rate of preset acoustic image comparative information Preset threshold value, specially:
The picture is subjected to facial image matching in preset face database, is prestored in the face database The facial image of mandate;
If in the face database there is no with the matched facial image of the picture, confirm the audio and video information with it is described The matching rate of acoustic image comparative information is higher than the threshold value.
4. the method as described in claim 1, which is characterized in that described when the audio and video information is specially video or picture Acoustic image comparative information is specially specified posture or action, judge the audio and video information whether with preset acoustic image comparative information Whether it is higher than preset threshold value with rate, specially:
Action recognition is carried out to personnel's operation behavior in the video image or the picture;
If action recognition result and the specified posture are kept strokes, confirm that the audio and video information is believed with acoustic image comparison The matching rate of breath is higher than the threshold value.
5. the method as described in claim 1, which is characterized in that when the audio and video information is specially audio, the acoustic image pair It is specially specified sound than information, judges whether the audio and video information be higher than with the matching rate of preset acoustic image comparative information Preset threshold value, specially:
Judge whether the audio and the similarity of the specified sound are higher than the threshold value.
6. method as described in any one in claim 1-5, which is characterized in that
If the type of the sensitive document is document or picture, the type of the audio and video information is specially corresponding picture or word note Image, action or the sound of record;
If the type of the sensitive document is audio, the concrete type of the audio and video information is the image of corresponding audio recording, moves Work or sound.
7. method as claimed in claim 6, which is characterized in that further include:
After the sensitive document is closed, stop the audio and video information in the specified operating area of acquisition.
8. the method as described in claim 1, which is characterized in that after sending the warning information, further include:
Preserve the audio and video information.
9. a kind of device for preventing sensitive document from revealing, which is characterized in that described device includes memory and processor;
The memory is for storing computer program;
The processor is for executing the computer program to realize claim 1 to described in any one of claim 8 Prevent sensitive document reveal method.
10. a kind of computer storage media, which is characterized in that described device includes memory and processor;
The memory is for storing computer program;
The processor is for executing the computer program to realize claim 1 to described in any one of claim 7 Prevent sensitive document reveal method.
CN201810446848.5A 2018-05-11 2018-05-11 A kind of method and device for preventing sensitive document from revealing Pending CN108647509A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810446848.5A CN108647509A (en) 2018-05-11 2018-05-11 A kind of method and device for preventing sensitive document from revealing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810446848.5A CN108647509A (en) 2018-05-11 2018-05-11 A kind of method and device for preventing sensitive document from revealing

Publications (1)

Publication Number Publication Date
CN108647509A true CN108647509A (en) 2018-10-12

Family

ID=63754528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810446848.5A Pending CN108647509A (en) 2018-05-11 2018-05-11 A kind of method and device for preventing sensitive document from revealing

Country Status (1)

Country Link
CN (1) CN108647509A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503460A (en) * 2019-07-26 2019-11-26 秒针信息技术有限公司 Monitoring of the advertisement method, device, system, electronic equipment and storage medium
CN111711763A (en) * 2020-06-30 2020-09-25 云从科技集团股份有限公司 Camera lens module shielding control method and device and camera
CN112104626A (en) * 2020-09-03 2020-12-18 深圳市中科网威科技有限公司 Block chain-based data access verification method and device, electronic equipment and medium
CN113014574A (en) * 2021-02-23 2021-06-22 深信服科技股份有限公司 Intra-domain detection operation detection method and device and electronic equipment
CN117037270A (en) * 2023-08-03 2023-11-10 北京军安中科信息科技研究所 Screen anti-shooting system and method based on image processing

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103369103A (en) * 2012-03-27 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Anti-peeping method of mobile terminal and mobile terminal
CN103902866A (en) * 2012-12-25 2014-07-02 鸿富锦精密工业(深圳)有限公司 File protection system and method
CN103986946A (en) * 2014-06-03 2014-08-13 安徽海聚信息科技有限责任公司 Child-lock control method for network television
CN105260642A (en) * 2015-10-30 2016-01-20 宁波萨瑞通讯有限公司 Privacy protecting method and mobile terminal
CN105528578A (en) * 2015-12-04 2016-04-27 国家电网公司 Online training monitoring method based on sound image process tracking
CN105959624A (en) * 2016-05-03 2016-09-21 方筠捷 Examination room monitoring data processing method and automatic monitoring system thereof
CN206195933U (en) * 2016-11-15 2017-05-24 广州市奕星研科数码有限公司 Video action identification system
WO2017168016A1 (en) * 2016-04-01 2017-10-05 Telefonica Digital España, S.L.U. Method and system for protecting a computer file against possible malware encryption

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103369103A (en) * 2012-03-27 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Anti-peeping method of mobile terminal and mobile terminal
CN103902866A (en) * 2012-12-25 2014-07-02 鸿富锦精密工业(深圳)有限公司 File protection system and method
CN103986946A (en) * 2014-06-03 2014-08-13 安徽海聚信息科技有限责任公司 Child-lock control method for network television
CN105260642A (en) * 2015-10-30 2016-01-20 宁波萨瑞通讯有限公司 Privacy protecting method and mobile terminal
CN105528578A (en) * 2015-12-04 2016-04-27 国家电网公司 Online training monitoring method based on sound image process tracking
WO2017168016A1 (en) * 2016-04-01 2017-10-05 Telefonica Digital España, S.L.U. Method and system for protecting a computer file against possible malware encryption
CN105959624A (en) * 2016-05-03 2016-09-21 方筠捷 Examination room monitoring data processing method and automatic monitoring system thereof
CN206195933U (en) * 2016-11-15 2017-05-24 广州市奕星研科数码有限公司 Video action identification system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DELPHINE CHRISTIN: "TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications", 《2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP)》 *
吕霄云: "基于MFCC和GMM的异常声音识别算法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503460A (en) * 2019-07-26 2019-11-26 秒针信息技术有限公司 Monitoring of the advertisement method, device, system, electronic equipment and storage medium
CN111711763A (en) * 2020-06-30 2020-09-25 云从科技集团股份有限公司 Camera lens module shielding control method and device and camera
CN112104626A (en) * 2020-09-03 2020-12-18 深圳市中科网威科技有限公司 Block chain-based data access verification method and device, electronic equipment and medium
CN113014574A (en) * 2021-02-23 2021-06-22 深信服科技股份有限公司 Intra-domain detection operation detection method and device and electronic equipment
CN117037270A (en) * 2023-08-03 2023-11-10 北京军安中科信息科技研究所 Screen anti-shooting system and method based on image processing

Similar Documents

Publication Publication Date Title
CN108647509A (en) A kind of method and device for preventing sensitive document from revealing
CN104376011B (en) Realize method for secret protection and device
JP4036051B2 (en) Face matching device and face matching method
US8634808B1 (en) Mobile device loss prevention
CN105787324A (en) Computer information security system
Zeng et al. Responsible facial recognition and beyond
CN106372522A (en) Photo shooting method, corresponding device, photo viewing method and corresponding device
JPWO2009013822A1 (en) Video surveillance device and video surveillance program
CN111866600B (en) Method, device and system for protecting privacy
US9998884B2 (en) Method for preventing misdirection of pictures and electronic device using the same
CN109274582A (en) Methods of exhibiting, device, equipment and the storage medium of instant communication information
CN111901567A (en) Privacy protection method, device, equipment and computer readable storage medium
CN108733690B (en) Image data storage method and device and electronic equipment
TW201426394A (en) System and method of protecting electronic documents
CN108985075A (en) A kind of image file disk encryption system and method for lightweight
CN106355120B (en) A kind of method and apparatus for preventing card information to be replicated
CN106162083B (en) A kind of HD video superposition processing system and its method for carrying out safety certification
JP6665590B2 (en) Information processing apparatus, information processing method, program, and information processing system
McQuillan Is lip-reading the secret to security?
WO2016095680A1 (en) Intrusion detection method and device for private data
US10529210B2 (en) Personal safety device
KR101830774B1 (en) Personal image information protection system based on Layered framework
JP2010073112A (en) Face collating system
CN110263521A (en) Login guard method and device, system, electronic equipment and storage medium
CN115220665B (en) Access method and system of distributed storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181012

RJ01 Rejection of invention patent application after publication