Summary of the invention
This application provides a kind of watermark generation method of webpage, watermark analytic method, device and storage mediums, can solve
When the watermark recovery of encrypted watermark generation target webpage is certainly used only, encrypted watermark can not prompt to deposit in potential blabber's webpage
The watermark the problem of.The application provides the following technical solutions:
In a first aspect, providing a kind of watermark generation method of webpage, which comprises
User identity information is obtained, the user identity information is used to identify the user for logging in target webpage;
The user identity information is converted according to encrypted watermark format, obtains encrypted watermark;
The watermark recovery of the target webpage is generated using the user identity information and the encrypted watermark.
Optionally, described to convert the user identity information according to encrypted watermark format, encrypted watermark is obtained, is wrapped
It includes:
Generate the corresponding information index value of the user identity information, the corresponding information index value of different user identification information
It is different;
Convert the information index value to the binary data string of presetting digit capacity;
The binary data string is indicated with default representation, obtains the encrypted watermark.
Optionally, the watermark figure that the target webpage is generated using the user identity information and the encrypted watermark
Case, comprising:
The binary data string is divided into n sub- serial datas, the n is the integer greater than 1;
Obtain the n arrangement modes of the sub- serial data in the target webpage;
Each subdata string is arranged in corresponding pattern position according to the arrangement mode with the user identity information,
Obtain the watermark recovery.
Optionally, the arrangement mode is the serial data matrix that the n sub- serial datas are arranged in n × n;
Wherein, every row of the serial data matrix includes the different subdata strings in the binary data string;The number
Each column according to string matrix includes the different subdata strings in the binary data string.
It is optionally, described to generate the corresponding information index value of the user identity information, comprising:
Calculate the difference between current time and preset time;
The difference and the presetting digit capacity are inputted into preset index value and generate formula, obtains the information index value;
Wherein, the product of the difference and concurrency maximum value is less than or equal to 2i, the i is the presetting digit capacity.
Optionally, described that the binary data string is indicated with default representation, obtain the encrypted watermark, comprising:
0 in the binary data string is indicated with the line segment of the first length, indicates described two with the line segment of the second length
1 in binary data string, obtain the encrypted watermark.
Second aspect provides a kind of watermark analytic method of webpage, which comprises
The image information of target webpage is obtained, the target webpage includes generating using user identity information and encrypted watermark
Watermark recovery, the encrypted watermark is will to log in the user identity information of the target webpage to carry out according to encrypted watermark format
What conversion obtained;
Described image information is parsed, the watermark recovery is obtained;
The encrypted watermark in the watermark recovery is restored, the user identity information for logging in the target webpage is obtained.
Optionally, the encrypted watermark is the binary data string to preset the presetting digit capacity that representation indicates;
Encrypted watermark in the reduction watermark recovery, comprising:
The binary data string is reduced to information index value;
Search that the information index value is corresponding to step in corresponding relationship between user identity information and information index value
Record the user identity information of the target webpage.
Optionally, the watermark recovery is that the binary data string is divided into n sub- serial datas;Obtain the n
Arrangement mode of the subdata string in the target webpage;By each subdata string and the user identity information according to the row
Column mode, which is arranged in, to be obtained after corresponding pattern position;The arrangement mode is that the n sub- serial datas are arranged in n × n
Serial data matrix;Wherein, every row of the serial data matrix includes the different subdata strings in the binary data string;Institute
The each column for stating serial data matrix includes different subdata strings in the binary data string;
It is described that the binary data string is reduced to information index value, comprising:
It include the subdata string for being located at multiple pattern positions in described image information for each subdata string
Multiple subdivisions when, the multiple pattern position is determined according to the arrangement mode;
The subdata string is determined using the subdivision in each pattern position;
Each subdata string is spliced to obtain the binary data string;
The binary data string is reduced to the information index value.
Optionally, the subdivision using in each pattern position determines the subdata string, comprising:
Each subdivision is spliced, the subdata string is obtained;
And/or
Each subdivision is spliced, part subdata string is obtained;Go out multiple suppositions based on the part subdata string exhaustion
Complete subdata string;The complete subdata string that corresponding user identity information will be present is determined as the subdata string.
The third aspect, provides a kind of watermark generating means of webpage, and described device includes:
Data obtaining module, for obtaining user identity information, the user identity information logs in target network for identifying
The user of page;
Information conversion module is encrypted for converting the user identity information according to encrypted watermark format
Watermark;
Watermark generation module, for generating the target webpage using the user identity information and the encrypted watermark
Watermark recovery.
Fourth aspect, provides a kind of watermark resolver of webpage, and described device includes:
Image collection module, for obtaining the image information of target webpage, the target webpage includes using user identifier
The watermark recovery that information and encrypted watermark generate, the encrypted watermark be will log in the user identity information of the target webpage by
It is converted according to encrypted watermark format;
Image analysis module obtains the watermark recovery for parsing to described image information;
Watermark recovery module obtains logging in the target webpage for restoring the encrypted watermark in the watermark recovery
User identity information.
5th aspect, provides a kind of watermark generating means of webpage, described device includes processor and memory;It is described to deposit
Program, the watermark that described program is loaded by the processor and executed to realize the webpage of first aspect offer are stored in reservoir
Generation method.
6th aspect, provides a kind of watermark resolver of webpage, described device includes processor and memory;It is described to deposit
Program, the watermark that described program is loaded by the processor and executed to realize the webpage of second aspect offer are stored in reservoir
Analytic method.
7th aspect, provides a kind of computer readable storage medium, program, described program is stored in the storage medium
It is loaded as the processor and executes the watermark generation method to realize webpage described in first aspect;Alternatively, realizing second party
The watermark analytic method for the webpage that face provides.
The beneficial effects of the present application are as follows: by obtaining user identity information, user identity information logs in mesh for identifying
Mark the user of webpage;User identity information is converted according to encrypted watermark format, obtains encrypted watermark;Use user identifier
Information and encrypted watermark generate the watermark recovery of target webpage;It can solve and the watermark that encrypted watermark generates target webpage is used only
When pattern, encrypted watermark can not prompt there are problems that watermark in potential blabber's webpage;Due to using user identity information
The watermark recovery of target webpage is generated with encrypted watermark, user identity information can prompt in potential blabber's webpage that there are water
Print, encrypted watermark can be modified the problem of causing user identity information to be pretended to avoid watermark, therefore, can achieve and both prompted
There are watermarks in potential blabber's webpage, and the effect for avoiding user identity information from being pretended, and can reduce web page contents
Reveal range.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application,
And can be implemented in accordance with the contents of the specification, with the preferred embodiment of the application and cooperate attached drawing below detailed description is as follows.
Specific embodiment
With reference to the accompanying drawings and examples, the specific embodiment of the application is described in further detail.Implement below
Example is not limited to scope of the present application for illustrating the application.
Optionally, the application is illustrated so that the executing subject of each embodiment is electronic equipment as an example, the electronic equipment
There can be the equipment of computing capability for server or terminal etc., the present embodiment does not limit the type of electronic equipment.Its
In, terminal can be computer, tablet computer, mobile phone, wearable device etc., and the present embodiment does not limit the type of terminal
It is fixed.
Fig. 1 is the flow chart of the watermark generation method for the webpage that the application one embodiment provides.This method includes at least
Following steps:
Step 101, user identity information is obtained.
Wherein, user identity information is used to identify the user for logging in target webpage.Optionally, user identity information include but
Be not limited to: user's name logs in account number, identity card and Internet protocol address (Internet Protocol Address, IP
Address), at least one of login time.
Step 102, user identity information is converted according to encrypted watermark format, obtains encrypted watermark.
Optionally, user identity information is converted according to encrypted watermark format, obtains encrypted watermark, comprising: generated
The corresponding information index value of user identity information;Convert information index value to the binary data string of presetting digit capacity;With default
Representation indicates binary data string, obtains encrypted watermark.
Wherein, the corresponding information index value of different user identification information is different.Schematically, user shown in reference table one marks
Know the corresponding relationship between information and information index value, the corresponding information index of the user identity information of each user in table one
Value, and the corresponding information index value of user identity information of different user is different.
Table one:
In the application, the information index value that electronic equipment generates has impact resistance and randomness.Wherein, impact resistance is used
In preventing duplicate information index value.Randomness is for avoiding camouflage and exhaustion verification, i.e. raising information index value is by mould
Difficulty that is imitative and decoding.
Optionally, generate the corresponding information index value of user identity information, comprising: calculate current time and preset time it
Between difference;Difference and presetting digit capacity are inputted into preset index value and generate formula, obtains information index value.Wherein, difference with
The product of concurrency maximum value is less than or equal to 2i, i is presetting digit capacity.
Wherein, it is as follows to generate formula for preset index value:
Information index value=((current time-preset time)/10k-k’) %2i
K is the decimal digits of current time timing accuracy, such as: current time timing accuracy is Millisecond, then small
Numerical digit number is 3, k 3.The maximum value of concurrency is default in the electronic device, and the maximum value of the concurrency refers to synchronization
The maximum value of the maximum value of the number of users of log-on webpage, concurrency is less than or equal to 10k。10k’For the maximum greater than concurrency
Value and the smallest numerical value of difference between the maximum value of concurrency, such as: the maximum value of concurrency is 999, then 10k’For
103, k ' is 3;For another example: the maximum value of concurrency is 99, then 10k’It is 102, k ' is 2.
Wherein, the maximum value j of presetting digit capacity i and concurrency needs to meet following formula:
I=ceil (log2 (366*24*3600*a*j))
Wherein, ceil expression rounds up, and a indicates the maximum lifespan of preset time.The value of a is preset in electronic equipment
In.
Assuming that the value that the value of j is 1000, a is 2, then determine that i is 36 according to the formula between i and j, at this point, 366*24*
3600*1000*2=63,244,800,000 < 68,719,476,736 (236), meet concurrency in the case where 1000, information
The maximum value of index value is less than or equal to 2i。
Optionally, binary data string is indicated with default representation, obtains encrypted watermark, comprising: with the first length
Line segment indicates 0 in binary data string, indicates 1 in binary data string with the line segment of the second length, obtains encrypted watermark.
Wherein, the first length is different from the second length, and the first length can be greater than the second length;Alternatively, might be less that
Second length, the present embodiment do not limit the opposite length between the first length and the second length.
With reference to shown in Fig. 2 to preset the encryption water that representation indicates that binary data string 00001011010011 obtains
Print.In Fig. 2, shorter line segment indicates 0, and longer line segment indicates 1.
Step 103, the watermark recovery of target webpage is generated using user identity information and encrypted watermark.
Watermark recovery had not only included the user identity information of plaintext, but also including encrypted watermark.In one example, water will be encrypted
Print is integrally provided in the first pattern position, and user identity information is arranged in the second pattern position, watermark recovery is obtained.First figure
Case position is different from the second pattern position.
31 table of the first pattern position with reference to the schematic diagram of the watermark recovery of target webpage shown in Fig. 3, in watermark recovery
Show encrypted watermark, the second pattern position 32 indicates user identity information " Zhang San ".
In watermark generating mode shown in Fig. 3, if the length of encrypted watermark is longer, correspondingly, the first pattern position 31
Required region becomes larger, and target webpage possibly can not show whole encrypted watermarks.In addition, the screenshot requirement to watermark recovery
It will increase, it is just available to effective only when being truncated to the image-region 33 including entire encrypted watermark with reference to Fig. 3
Encrypted watermark, to be parsed to the encrypted watermark.And for not including the image-region 34 and 35 of entire encrypted watermark, nothing
Method gets effective encrypted watermark, therefore, it is impossible to parse to the encrypted watermark.
In another example, binary data string is divided into n sub- serial datas by electronic equipment;Obtain n subdata
Arrangement mode of the string in target webpage;Each subdata string is arranged according to the arrangement mode with user identity information corresponding
Pattern position, obtain watermark recovery.N is the integer greater than 1.
Optionally, the digit of n sub- serial datas is identical;Alternatively, there are the digits of at least one subdata string and other sons
The digit of serial data is different.It is illustrated so that the digit of n sub- serial datas is identical as an example in the present embodiment.
Optionally, in order to guarantee the position that can determine each subdata string when subdata string is spliced, often
A sub- serial data front end point of addition mark.Station location marker is for identifying position of the subdata string in binary data string.Show
Meaning property, station location marker can by binary coding representation, such as: 00 indicate first segment subdata string, 01 indicate second segment
Subdata string, 10 indicate third cross-talk serial data.Certainly, station location marker can also indicate otherwise, such as: pass through word
Matrix shows that the present embodiment does not limit the representation of station location marker.
With reference to the schematic diagram of the watermark recovery of target webpage shown in Fig. 4.Binary data string is divided into 3 subdatas
It goes here and there (m1, m2 and m3), each subdata string is distributed in the different pattern position of watermark recovery.At this point, encrypted watermark length compared with
When long, shown due to that can be segmented the encrypted watermark, target webpage can show whole encrypted watermarks.
In one example, arrangement mode is the serial data matrix that n sub- serial datas are arranged in n × n;Wherein, data
Every row of string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data string
In different subdata strings.
In order to guarantee that every row of serial data matrix includes the different subdata strings in binary data string;Serial data matrix
Each column includes the different subdata strings in binary data string, and the pth behavior of serial data matrix follows the element of -1 row of pth
Ring moves to left 1 and obtains;Alternatively, element progress ring shift right 1 of p-1 row is obtained.P is greater than 1 and to be less than or equal to n
Integer.
With reference to Fig. 4, serial data matrix is 3 × 3 matrixes, every row of the serial data matrix include in binary data string not
With the different subdata strings that subdata string, each column include in binary data string.At this point, truncated picture information do not need include
The whole of each subdata string, it is only necessary to be truncated to the multiple portions of each subdata string, multiple part is combined i.e.
Each subdata string (specific reduction process embodiment described in reference diagram 5) can be restored, can be reduced to watermark recovery
Screenshot requirement.
Optionally, when user logs in target webpage, watermark recovery is shown in the target webpage.
Optionally, the parameters such as the size, transparency, color, font of watermark recovery, position and/or pixel can basis
It needs to adjust.
In conclusion the watermark generation method of webpage provided in this embodiment, by obtaining user identity information, Yong Hubiao
Know information to be used to identify the user for logging in target webpage;User identity information is converted according to encrypted watermark format, is obtained
Encrypted watermark;The watermark recovery of target webpage is generated using user identity information and encrypted watermark;It can solve and encryption is used only
When watermark generates the watermark recovery of target webpage, encrypted watermark can not prompt asking there are watermark in potential blabber's webpage
Topic;Due to using user identity information and encrypted watermark to generate the watermark recovery of target webpage, user identity information can be prompted
In potential blabber's webpage there are watermark, encrypted watermark can be modified to avoid watermark causes user identity information to be pretended
Therefore problem can achieve and not only prompt in potential blabber's webpage that there are watermarks, but also user identity information is avoided to be pretended
Effect can reduce the leakage range of web page contents.
In addition, by converting information index value for user identity information;Presetting digit capacity is converted by information index value
Binary data string;Binary data string is indicated with default representation, obtains encrypted watermark;The broken of encrypted watermark can be improved
Difficulty is translated, to increase the difficulty that encrypted watermark is pretended.
In addition, by the way that binary data string is divided into n sub- serial datas, by each subdata string and user identity information
It is arranged in corresponding pattern position according to preset arrangement mode, obtains watermark recovery;It, can when the length of encrypted watermark is longer
It is shown so that the encrypted watermark to be segmented, guarantees that target webpage can show whole encrypted watermarks.
In addition, by setting arrangement mode to n sub- serial datas are arranged in the serial data matrix of n × n;Wherein, number
Every row according to string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data
Different subdata strings in string;In screenshot truncated picture information do not need include each subdata string whole, it is only necessary to
The multiple portions of each subdata string are truncated to, multiple part, which is combined, can restore each subdata string, can be with
The screenshot requirement to watermark recovery is reduced, screenshot efficiency is improved.
In addition, by using the difference and 2 between current time and preset timeiComplementation is carried out, information rope is obtained
Draw value;Wherein, the difference between current time and preset time is less than or equal to 2i;It can guarantee the impact resistance of information index value
Property and randomness, can prevent electronic equipment from generating duplicate information index value;Improve what information index value was imitated and decoded
Difficulty.
Based on above-mentioned each embodiment, the present embodiment is also provided with the watermark analytic method to target webpage.It should
Fig. 5 is the flow chart of the watermark analytic method for the webpage that the application one embodiment provides.This method includes at least
Following steps:
Step 501, the image information of target webpage is obtained.
Wherein, target webpage includes the watermark recovery generated using user identity information and encrypted watermark, and encrypted watermark is
The user identity information for logging in target webpage is converted according to encrypted watermark format.
Optionally, electronic equipment detects each webpage, if detecting the watermark recovery generated including step 103
The webpage is then determined as target webpage by webpage.Optionally, electronic equipment can be directed to the webpage of some hot topics to watermark recovery
It is detected, both directly watermark recovery can be identified when detecting has watermark recovery in webpage, it can also be by watermark
Pattern again identifies watermark recovery after saving to database.In the present embodiment, by way of watermark crawler to webpage into
Row search, in actual implementation can also be by another way.
The image information of target webpage refers to the information of the image including target webpage, which can be for target
Webpage carries out the information that screenshot obtains;Or, or to the information etc. that target webpage is taken pictures, the present embodiment is not
The acquisition modes of the image information are limited.
Step 502, image information is parsed, obtains watermark recovery.
Optionally, the mode parsed to image information includes ORC algorithm identifies, neural network model identifies etc., this
Embodiment does not limit the analysis mode of image information.
Step 503, the encrypted watermark in watermark recovery is restored, the user identity information for logging in target webpage is obtained.
Optionally, encrypted watermark is the binary data string to preset the presetting digit capacity that representation indicates.At this point, reduction
Encrypted watermark in watermark recovery, comprising: binary data string is reduced to information index value;From user identity information and information
The corresponding user identity information for logging in target webpage of information index value is searched in corresponding relationship between index value.
In one example, watermark recovery is that binary data string is divided into n sub- serial datas;Obtain n subdata
Arrangement mode of the string in target webpage;Each subdata string is arranged according to arrangement mode with user identity information corresponding
It is obtained after pattern position.Wherein, arrangement mode is the serial data matrix that n sub- serial datas are arranged in n × n;Wherein, data
Every row of string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data string
In different subdata strings.
In the first scene, image information includes the n complete subdatas of same a line in serial data matrix
String;Alternatively, image information includes n complete subdata strings of the same row in serial data matrix.At this point, electronic equipment
N sub- serial datas are spliced, binary data string is obtained.
Optionally, each subdata string front end is added with station location marker, and electronic equipment is according to the station location marker, by n son
Part in serial data in addition to station location marker is spliced, and binary data string is obtained.
Assuming that image information is the image information in the region 41 in Fig. 4, region 41 includes 3 sub- serial data (m1 00
10 110110101110) 001011010011, m2 is 01 000111110110, m3 is that, the front two of each subdata string is
Station location marker, wherein 00 indicates that first segment subdata string, 01 indicate that second segment subdata string, 10 indicate third cross-talk serial data;
12 are complete subdata string afterwards.Electronic equipment obtains after splicing according to station location marker to latter 12 of 3 sub- serial datas
Binary data string:
001011010011 000111110110 110110101110.Then, electronic equipment is by the binary data string
The decimal system is converted to, information index value 12131986862 is obtained.According to corresponding relationship shown in table one, the information index is obtained
Being worth corresponding user identity information includes zhangsan.
In second of scene, for each subdata string, image information includes the son for being located at multiple pattern positions
Multiple subdivisions of serial data.At this point, electronic equipment determines multiple pattern positions according to arrangement mode;Use each pattern position
In subdivision determine subdata string;Spliced each subdata string to obtain binary data string;By binary data string
It is reduced to information index value.
Optionally, subdata string is determined using the subdivision in each pattern position, comprising: each subdivision is spliced,
Obtain subdata string.
Optionally, subdata string is determined using the subdivision in each pattern position, comprising: each subdivision is spliced,
Obtain part subdata string;Go out the complete subdata string of multiple suppositions based on part subdata string exhaustion;Corresponding use will be present
The complete subdata string of family identification information is determined as the subdata string to be determined.
Assuming that image information is the image information in the region 42 in Fig. 4, region 42 include 6 sub- serial datas (m1, m2, m3,
M4, m5 and m6), the complete digit of each subdata string is 14, and front two is station location marker, wherein 00 indicates the first cross-talk
Serial data, 01 indicate that second segment subdata string, 10 indicate third cross-talk serial data.As can be seen from FIG. 4, the position of 6 sub- serial datas
Number is respectively less than 14, is incomplete subdata string.Wherein, the upper right corner m1 lack two, the upper right corner m2 lack two, the right side of m3
Upper angle lacks three;The lower left corner m4 and m5 missing;The upper left corner m6 and the lower right corner lack, unavailable.Matrix according to Fig.4,
Rule, electronic equipment can make up two of the upper right corner m2 missing by latter two of m4, and obtaining m2 is 01
000111110110, three of the upper right corner missing of m3 are made up by m5, obtaining m3 is 10 110110101110.M1 can not be mended
Entirely, but can exhaustion go out m1 missing two possibility are as follows: 00,01,10,11, it is hereby achieved that the complete son of the supposition of m1
Serial data includes:
[A]001011010000
[B]001011010001
[C]001011010010
[D]001011010011
By each complete subdata string according to the sequential concatenation of m1, m2, m3 after, obtain following four binary data
String:
[A’]001011010000 000111110110110110101110
[B’]001011010001 000111110110110110101110
[C’]001011010010 000111110110110110101110
[D’]001011010011 000111110110110110101110
Decimal data string is converted by obtained binary data string to be respectively as follows:
[A”]12081655214
[B”]12098432430
[C”]12115209646
[D”]12131986862
[A "], [B "], [C "] and [D "] is compared with each information index value in table one, in table one exist with
[D "] identical information index value, hence, it can be determined that two of the upper right corner m1 missing are 11 out, user identity information is
zhangsan。
In conclusion the watermark analytic method of webpage provided in this embodiment, by obtaining the image information of target webpage,
The target webpage includes the watermark recovery generated using user identity information and encrypted watermark, which is that will log in target
The user identity information of webpage is converted according to encrypted watermark format;Image information is parsed, watermark is obtained
Pattern;The encrypted watermark in watermark recovery is restored, the user identity information for logging in target webpage is obtained;It can solve to be used only and add
When close watermark generates the watermark recovery of target webpage, encrypted watermark can not prompt in potential blabber's webpage that there are watermarks, lead
The problem of causing the leakage range of web page contents to increase;Due to using user identity information and encrypted watermark to generate the water of target webpage
It is patterned, user identity information can be prompted there are watermark in potential blabber's webpage, and encrypted watermark can be to avoid watermark quilt
Therefore modification the problem of causing user identity information to be pretended, can achieve and both prompt in potential blabber's webpage that there are water
Print, and the effect for avoiding user identity information from being pretended, can reduce the leakage range of web page contents.
In addition, tracking user identity information by using encrypted watermark, can prevent from directly parsing the use in target webpage
Family identification information, the problem for the user identity information inaccuracy determined when the user identity information is tampered, it is ensured that
The accuracy of the user identity information tracked.
In addition, by setting arrangement mode to n sub- serial datas are arranged in the serial data matrix of n × n;Wherein, number
Every row according to string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data
Different subdata strings in string;In screenshot truncated picture information do not need include each subdata string whole, it is only necessary to
The multiple portions of each subdata string are truncated to, multiple part, which is combined, can restore each subdata string, can be with
The screenshot requirement to watermark recovery is reduced, screenshot efficiency is improved.
Fig. 6 is the block diagram of the watermark generating means for the webpage that the application one embodiment provides.The device include at least with
Under several modules: data obtaining module 610, information conversion module 620 and watermark generation module 630.
Data obtaining module 610, for obtaining user identity information, the user identity information logs in target for identifying
The user of webpage;
Information conversion module 620 is added for converting the user identity information according to encrypted watermark format
Close watermark;
Watermark generation module 630, for generating the target network using the user identity information and the encrypted watermark
The watermark recovery of page.
Correlative detail refers to above method embodiment.
It should be understood that the watermark generating means of the webpage provided in above-described embodiment generate webpage watermark when,
Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution
It is completed by different functional modules, i.e., the internal structure of the watermark generating means of webpage is divided into different functional modules, with
Complete all or part of function described above.In addition, the watermark generating means and webpage of webpage provided by the above embodiment
Watermark generation method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 7 is the block diagram of the watermark resolver for the webpage that the application one embodiment provides.The device include at least with
Under several modules: image collection module 710, image analysis module 720 and watermark recovery module 730.
Image collection module 710, for obtaining the image information of target webpage, the target webpage includes being marked using user
Know the watermark recovery of information and encrypted watermark generation, the encrypted watermark is the user identity information that will log in the target webpage
It is converted according to encrypted watermark format;
Image analysis module 720 obtains the watermark recovery for parsing to described image information;
Watermark recovery module 730 obtains logging in the target webpage for restoring the encrypted watermark in the watermark recovery
User identity information.
Correlative detail refers to above method embodiment.
It should be understood that the watermark resolver of the webpage provided in above-described embodiment is in the watermark of analyzing web page,
Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution
It is completed by different functional modules, i.e., the internal structure of the watermark resolver of webpage is divided into different functional modules, with
Complete all or part of function described above.In addition, the watermark resolver and webpage of webpage provided by the above embodiment
Watermark analytic method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 8 is the block diagram of the watermark processing unit for the webpage that the application one embodiment provides, and the apparatus may include Fig. 6
Shown in webpage watermark generating means and/or watermark resolver including webpage shown in Fig. 7.The device can be intelligence
Mobile phone, tablet computer, laptop, desktop computer or server.The watermark processing unit of webpage is also possible to referred to as user
Equipment, portable terminal, laptop terminal, terminal console, controlling terminal, server etc., the present embodiment is not construed as limiting this.It should
Device includes at least processor 801 and memory 802.
Processor 801 may include one or more processing cores, such as: 4 core processors, 8 core processors etc..Place
Reason device 801 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field-
Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed
Logic array) at least one of example, in hardware realize.Processor 801 also may include primary processor and coprocessor, master
Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing
Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.?
In some embodiments, processor 801 can be integrated with GPU (Graphics Processing Unit, image processor),
GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 801 can also be wrapped
AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning
Calculating operation.
Memory 802 may include one or more computer readable storage mediums, which can
To be non-transient.Memory 802 may also include high-speed random access memory and nonvolatile memory, such as one
Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 802 can
Storage medium is read for storing at least one instruction, at least one instruction performed by processor 801 for realizing this Shen
Please in embodiment of the method provide webpage watermark generation method;Alternatively, realizing the webpage that embodiment of the method provides in the application
Watermark analytic method.
In some embodiments, the watermark processing unit of webpage is also optional includes: peripheral device interface and at least one
Peripheral equipment.It can be connected by bus or signal wire between processor 801, memory 802 and peripheral device interface.It is each outer
Peripheral equipment can be connected by bus, signal wire or circuit board with peripheral device interface.Schematically, peripheral equipment includes but not
It is limited to: radio circuit, touch display screen, voicefrequency circuit and power supply etc..
Certainly, the watermark processing unit of webpage can also include less or more component, and the present embodiment does not limit this
It is fixed.
Optionally, the application is also provided with a kind of computer readable storage medium, in the computer readable storage medium
It is stored with program, the watermark generation side that described program is loaded by processor and executed to realize the webpage of above method embodiment
Method;Alternatively, the watermark analytic method of the webpage to realize above method embodiment.
Optionally, the application is also provided with a kind of computer product, which includes computer-readable storage medium
Matter is stored with program in the computer readable storage medium, and described program is loaded by processor and executed to realize above-mentioned side
The watermark generation method of the webpage of method embodiment;Alternatively, the watermark analytic method of the webpage to realize above method embodiment.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.