CN110245469A - Watermark generation method, watermark analytic method, device and the storage medium of webpage - Google Patents

Watermark generation method, watermark analytic method, device and the storage medium of webpage Download PDF

Info

Publication number
CN110245469A
CN110245469A CN201910547456.2A CN201910547456A CN110245469A CN 110245469 A CN110245469 A CN 110245469A CN 201910547456 A CN201910547456 A CN 201910547456A CN 110245469 A CN110245469 A CN 110245469A
Authority
CN
China
Prior art keywords
watermark
user identity
webpage
identity information
string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910547456.2A
Other languages
Chinese (zh)
Other versions
CN110245469B (en
Inventor
胡平
贡文伟
陈励平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruishi (Suzhou) video technology Co., Ltd
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Ruiweibo Technology Co Ltd
Suzhou Keda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Ruiweibo Technology Co Ltd, Suzhou Keda Technology Co Ltd filed Critical Suzhou Ruiweibo Technology Co Ltd
Priority to CN201910547456.2A priority Critical patent/CN110245469B/en
Publication of CN110245469A publication Critical patent/CN110245469A/en
Application granted granted Critical
Publication of CN110245469B publication Critical patent/CN110245469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

This application involves a kind of watermark generation method of webpage, watermark analytic method, device and storage mediums, belong to field of computer technology, this method comprises: obtaining user identity information;User identity information is converted according to encrypted watermark format, obtains encrypted watermark;The watermark recovery of target webpage is generated using user identity information and encrypted watermark;When can solve the watermark recovery that encrypted watermark generation target webpage is used only, encrypted watermark can not prompt there are problems that watermark in potential blabber's webpage;It can achieve and not only prompt in potential blabber's webpage that there are watermarks, but also the effect for avoiding user identity information from being pretended, can reduce the leakage range of web page contents.

Description

Watermark generation method, watermark analytic method, device and the storage medium of webpage
Technical field
This application involves the watermark generation method of webpage, watermark analytic method, device and storage mediums, belong to computer skill Art field.
Background technique
With the development of information technology, web service has become essential a part in people's daily life.Very Multiple web pages service, particularly in-company web service may show when carrying out data displaying and be related to intra-company's number According to information such as the, business secrets that is related to company, increased with Internet technology application, these information are also easier to be let out Dew.Currently, the leakage of internal information in order to prevent, can be embedded in watermark in webpage.
The patent of invention of 109726348 A of Publication No. CN discloses a kind of method of webpage watermark protection, this method packet It includes: obtaining user information;Generate the watermark picture to match with user information;When users log on, it is shown in Intranet webpage Watermark picture;Watermark picture is detected in outer net webpage, if detecting watermark picture, watermark picture is identified, According to watermark picture match user information.
Wherein, watermark picture is generated by encrypted user information.Appoint since this watermark picture usually passes through not having Pattern, character of what meaning etc. indicate, therefore, it is impossible to prompt potential blabber's current web page there are watermark, are easy to allow potential Blabber take for there is no watermark in webpage, may cause web page contents and largely propagated.
Summary of the invention
This application provides a kind of watermark generation method of webpage, watermark analytic method, device and storage mediums, can solve When the watermark recovery of encrypted watermark generation target webpage is certainly used only, encrypted watermark can not prompt to deposit in potential blabber's webpage The watermark the problem of.The application provides the following technical solutions:
In a first aspect, providing a kind of watermark generation method of webpage, which comprises
User identity information is obtained, the user identity information is used to identify the user for logging in target webpage;
The user identity information is converted according to encrypted watermark format, obtains encrypted watermark;
The watermark recovery of the target webpage is generated using the user identity information and the encrypted watermark.
Optionally, described to convert the user identity information according to encrypted watermark format, encrypted watermark is obtained, is wrapped It includes:
Generate the corresponding information index value of the user identity information, the corresponding information index value of different user identification information It is different;
Convert the information index value to the binary data string of presetting digit capacity;
The binary data string is indicated with default representation, obtains the encrypted watermark.
Optionally, the watermark figure that the target webpage is generated using the user identity information and the encrypted watermark Case, comprising:
The binary data string is divided into n sub- serial datas, the n is the integer greater than 1;
Obtain the n arrangement modes of the sub- serial data in the target webpage;
Each subdata string is arranged in corresponding pattern position according to the arrangement mode with the user identity information, Obtain the watermark recovery.
Optionally, the arrangement mode is the serial data matrix that the n sub- serial datas are arranged in n × n;
Wherein, every row of the serial data matrix includes the different subdata strings in the binary data string;The number Each column according to string matrix includes the different subdata strings in the binary data string.
It is optionally, described to generate the corresponding information index value of the user identity information, comprising:
Calculate the difference between current time and preset time;
The difference and the presetting digit capacity are inputted into preset index value and generate formula, obtains the information index value;
Wherein, the product of the difference and concurrency maximum value is less than or equal to 2i, the i is the presetting digit capacity.
Optionally, described that the binary data string is indicated with default representation, obtain the encrypted watermark, comprising:
0 in the binary data string is indicated with the line segment of the first length, indicates described two with the line segment of the second length 1 in binary data string, obtain the encrypted watermark.
Second aspect provides a kind of watermark analytic method of webpage, which comprises
The image information of target webpage is obtained, the target webpage includes generating using user identity information and encrypted watermark Watermark recovery, the encrypted watermark is will to log in the user identity information of the target webpage to carry out according to encrypted watermark format What conversion obtained;
Described image information is parsed, the watermark recovery is obtained;
The encrypted watermark in the watermark recovery is restored, the user identity information for logging in the target webpage is obtained.
Optionally, the encrypted watermark is the binary data string to preset the presetting digit capacity that representation indicates;
Encrypted watermark in the reduction watermark recovery, comprising:
The binary data string is reduced to information index value;
Search that the information index value is corresponding to step in corresponding relationship between user identity information and information index value Record the user identity information of the target webpage.
Optionally, the watermark recovery is that the binary data string is divided into n sub- serial datas;Obtain the n Arrangement mode of the subdata string in the target webpage;By each subdata string and the user identity information according to the row Column mode, which is arranged in, to be obtained after corresponding pattern position;The arrangement mode is that the n sub- serial datas are arranged in n × n Serial data matrix;Wherein, every row of the serial data matrix includes the different subdata strings in the binary data string;Institute The each column for stating serial data matrix includes different subdata strings in the binary data string;
It is described that the binary data string is reduced to information index value, comprising:
It include the subdata string for being located at multiple pattern positions in described image information for each subdata string Multiple subdivisions when, the multiple pattern position is determined according to the arrangement mode;
The subdata string is determined using the subdivision in each pattern position;
Each subdata string is spliced to obtain the binary data string;
The binary data string is reduced to the information index value.
Optionally, the subdivision using in each pattern position determines the subdata string, comprising:
Each subdivision is spliced, the subdata string is obtained;
And/or
Each subdivision is spliced, part subdata string is obtained;Go out multiple suppositions based on the part subdata string exhaustion Complete subdata string;The complete subdata string that corresponding user identity information will be present is determined as the subdata string.
The third aspect, provides a kind of watermark generating means of webpage, and described device includes:
Data obtaining module, for obtaining user identity information, the user identity information logs in target network for identifying The user of page;
Information conversion module is encrypted for converting the user identity information according to encrypted watermark format Watermark;
Watermark generation module, for generating the target webpage using the user identity information and the encrypted watermark Watermark recovery.
Fourth aspect, provides a kind of watermark resolver of webpage, and described device includes:
Image collection module, for obtaining the image information of target webpage, the target webpage includes using user identifier The watermark recovery that information and encrypted watermark generate, the encrypted watermark be will log in the user identity information of the target webpage by It is converted according to encrypted watermark format;
Image analysis module obtains the watermark recovery for parsing to described image information;
Watermark recovery module obtains logging in the target webpage for restoring the encrypted watermark in the watermark recovery User identity information.
5th aspect, provides a kind of watermark generating means of webpage, described device includes processor and memory;It is described to deposit Program, the watermark that described program is loaded by the processor and executed to realize the webpage of first aspect offer are stored in reservoir Generation method.
6th aspect, provides a kind of watermark resolver of webpage, described device includes processor and memory;It is described to deposit Program, the watermark that described program is loaded by the processor and executed to realize the webpage of second aspect offer are stored in reservoir Analytic method.
7th aspect, provides a kind of computer readable storage medium, program, described program is stored in the storage medium It is loaded as the processor and executes the watermark generation method to realize webpage described in first aspect;Alternatively, realizing second party The watermark analytic method for the webpage that face provides.
The beneficial effects of the present application are as follows: by obtaining user identity information, user identity information logs in mesh for identifying Mark the user of webpage;User identity information is converted according to encrypted watermark format, obtains encrypted watermark;Use user identifier Information and encrypted watermark generate the watermark recovery of target webpage;It can solve and the watermark that encrypted watermark generates target webpage is used only When pattern, encrypted watermark can not prompt there are problems that watermark in potential blabber's webpage;Due to using user identity information The watermark recovery of target webpage is generated with encrypted watermark, user identity information can prompt in potential blabber's webpage that there are water Print, encrypted watermark can be modified the problem of causing user identity information to be pretended to avoid watermark, therefore, can achieve and both prompted There are watermarks in potential blabber's webpage, and the effect for avoiding user identity information from being pretended, and can reduce web page contents Reveal range.
Above description is only the general introduction of technical scheme, in order to better understand the technological means of the application, And can be implemented in accordance with the contents of the specification, with the preferred embodiment of the application and cooperate attached drawing below detailed description is as follows.
Detailed description of the invention
Fig. 1 is the flow chart of the watermark generation method for the webpage that the application one embodiment provides;
Fig. 2 is the schematic diagram for the encrypted watermark that the application one embodiment provides;
Fig. 3 is the schematic diagram for the watermark recovery that the application one embodiment provides;
Fig. 4 is the schematic diagram for the watermark recovery that another embodiment of the application provides;
Fig. 5 is the flow chart of the watermark analytic method for the webpage that the application one embodiment provides;
Fig. 6 is the block diagram of the watermark generating means for the webpage that the application one embodiment provides;
Fig. 7 is the block diagram of the watermark resolver for the webpage that the application one embodiment provides;
Fig. 8 is the block diagram for the choke detection device that the application one embodiment provides.
Specific embodiment
With reference to the accompanying drawings and examples, the specific embodiment of the application is described in further detail.Implement below Example is not limited to scope of the present application for illustrating the application.
Optionally, the application is illustrated so that the executing subject of each embodiment is electronic equipment as an example, the electronic equipment There can be the equipment of computing capability for server or terminal etc., the present embodiment does not limit the type of electronic equipment.Its In, terminal can be computer, tablet computer, mobile phone, wearable device etc., and the present embodiment does not limit the type of terminal It is fixed.
Fig. 1 is the flow chart of the watermark generation method for the webpage that the application one embodiment provides.This method includes at least Following steps:
Step 101, user identity information is obtained.
Wherein, user identity information is used to identify the user for logging in target webpage.Optionally, user identity information include but Be not limited to: user's name logs in account number, identity card and Internet protocol address (Internet Protocol Address, IP Address), at least one of login time.
Step 102, user identity information is converted according to encrypted watermark format, obtains encrypted watermark.
Optionally, user identity information is converted according to encrypted watermark format, obtains encrypted watermark, comprising: generated The corresponding information index value of user identity information;Convert information index value to the binary data string of presetting digit capacity;With default Representation indicates binary data string, obtains encrypted watermark.
Wherein, the corresponding information index value of different user identification information is different.Schematically, user shown in reference table one marks Know the corresponding relationship between information and information index value, the corresponding information index of the user identity information of each user in table one Value, and the corresponding information index value of user identity information of different user is different.
Table one:
In the application, the information index value that electronic equipment generates has impact resistance and randomness.Wherein, impact resistance is used In preventing duplicate information index value.Randomness is for avoiding camouflage and exhaustion verification, i.e. raising information index value is by mould Difficulty that is imitative and decoding.
Optionally, generate the corresponding information index value of user identity information, comprising: calculate current time and preset time it Between difference;Difference and presetting digit capacity are inputted into preset index value and generate formula, obtains information index value.Wherein, difference with The product of concurrency maximum value is less than or equal to 2i, i is presetting digit capacity.
Wherein, it is as follows to generate formula for preset index value:
Information index value=((current time-preset time)/10k-k’) %2i
K is the decimal digits of current time timing accuracy, such as: current time timing accuracy is Millisecond, then small Numerical digit number is 3, k 3.The maximum value of concurrency is default in the electronic device, and the maximum value of the concurrency refers to synchronization The maximum value of the maximum value of the number of users of log-on webpage, concurrency is less than or equal to 10k。10k’For the maximum greater than concurrency Value and the smallest numerical value of difference between the maximum value of concurrency, such as: the maximum value of concurrency is 999, then 10k’For 103, k ' is 3;For another example: the maximum value of concurrency is 99, then 10k’It is 102, k ' is 2.
Wherein, the maximum value j of presetting digit capacity i and concurrency needs to meet following formula:
I=ceil (log2 (366*24*3600*a*j))
Wherein, ceil expression rounds up, and a indicates the maximum lifespan of preset time.The value of a is preset in electronic equipment In.
Assuming that the value that the value of j is 1000, a is 2, then determine that i is 36 according to the formula between i and j, at this point, 366*24* 3600*1000*2=63,244,800,000 < 68,719,476,736 (236), meet concurrency in the case where 1000, information The maximum value of index value is less than or equal to 2i
Optionally, binary data string is indicated with default representation, obtains encrypted watermark, comprising: with the first length Line segment indicates 0 in binary data string, indicates 1 in binary data string with the line segment of the second length, obtains encrypted watermark.
Wherein, the first length is different from the second length, and the first length can be greater than the second length;Alternatively, might be less that Second length, the present embodiment do not limit the opposite length between the first length and the second length.
With reference to shown in Fig. 2 to preset the encryption water that representation indicates that binary data string 00001011010011 obtains Print.In Fig. 2, shorter line segment indicates 0, and longer line segment indicates 1.
Step 103, the watermark recovery of target webpage is generated using user identity information and encrypted watermark.
Watermark recovery had not only included the user identity information of plaintext, but also including encrypted watermark.In one example, water will be encrypted Print is integrally provided in the first pattern position, and user identity information is arranged in the second pattern position, watermark recovery is obtained.First figure Case position is different from the second pattern position.
31 table of the first pattern position with reference to the schematic diagram of the watermark recovery of target webpage shown in Fig. 3, in watermark recovery Show encrypted watermark, the second pattern position 32 indicates user identity information " Zhang San ".
In watermark generating mode shown in Fig. 3, if the length of encrypted watermark is longer, correspondingly, the first pattern position 31 Required region becomes larger, and target webpage possibly can not show whole encrypted watermarks.In addition, the screenshot requirement to watermark recovery It will increase, it is just available to effective only when being truncated to the image-region 33 including entire encrypted watermark with reference to Fig. 3 Encrypted watermark, to be parsed to the encrypted watermark.And for not including the image-region 34 and 35 of entire encrypted watermark, nothing Method gets effective encrypted watermark, therefore, it is impossible to parse to the encrypted watermark.
In another example, binary data string is divided into n sub- serial datas by electronic equipment;Obtain n subdata Arrangement mode of the string in target webpage;Each subdata string is arranged according to the arrangement mode with user identity information corresponding Pattern position, obtain watermark recovery.N is the integer greater than 1.
Optionally, the digit of n sub- serial datas is identical;Alternatively, there are the digits of at least one subdata string and other sons The digit of serial data is different.It is illustrated so that the digit of n sub- serial datas is identical as an example in the present embodiment.
Optionally, in order to guarantee the position that can determine each subdata string when subdata string is spliced, often A sub- serial data front end point of addition mark.Station location marker is for identifying position of the subdata string in binary data string.Show Meaning property, station location marker can by binary coding representation, such as: 00 indicate first segment subdata string, 01 indicate second segment Subdata string, 10 indicate third cross-talk serial data.Certainly, station location marker can also indicate otherwise, such as: pass through word Matrix shows that the present embodiment does not limit the representation of station location marker.
With reference to the schematic diagram of the watermark recovery of target webpage shown in Fig. 4.Binary data string is divided into 3 subdatas It goes here and there (m1, m2 and m3), each subdata string is distributed in the different pattern position of watermark recovery.At this point, encrypted watermark length compared with When long, shown due to that can be segmented the encrypted watermark, target webpage can show whole encrypted watermarks.
In one example, arrangement mode is the serial data matrix that n sub- serial datas are arranged in n × n;Wherein, data Every row of string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data string In different subdata strings.
In order to guarantee that every row of serial data matrix includes the different subdata strings in binary data string;Serial data matrix Each column includes the different subdata strings in binary data string, and the pth behavior of serial data matrix follows the element of -1 row of pth Ring moves to left 1 and obtains;Alternatively, element progress ring shift right 1 of p-1 row is obtained.P is greater than 1 and to be less than or equal to n Integer.
With reference to Fig. 4, serial data matrix is 3 × 3 matrixes, every row of the serial data matrix include in binary data string not With the different subdata strings that subdata string, each column include in binary data string.At this point, truncated picture information do not need include The whole of each subdata string, it is only necessary to be truncated to the multiple portions of each subdata string, multiple part is combined i.e. Each subdata string (specific reduction process embodiment described in reference diagram 5) can be restored, can be reduced to watermark recovery Screenshot requirement.
Optionally, when user logs in target webpage, watermark recovery is shown in the target webpage.
Optionally, the parameters such as the size, transparency, color, font of watermark recovery, position and/or pixel can basis It needs to adjust.
In conclusion the watermark generation method of webpage provided in this embodiment, by obtaining user identity information, Yong Hubiao Know information to be used to identify the user for logging in target webpage;User identity information is converted according to encrypted watermark format, is obtained Encrypted watermark;The watermark recovery of target webpage is generated using user identity information and encrypted watermark;It can solve and encryption is used only When watermark generates the watermark recovery of target webpage, encrypted watermark can not prompt asking there are watermark in potential blabber's webpage Topic;Due to using user identity information and encrypted watermark to generate the watermark recovery of target webpage, user identity information can be prompted In potential blabber's webpage there are watermark, encrypted watermark can be modified to avoid watermark causes user identity information to be pretended Therefore problem can achieve and not only prompt in potential blabber's webpage that there are watermarks, but also user identity information is avoided to be pretended Effect can reduce the leakage range of web page contents.
In addition, by converting information index value for user identity information;Presetting digit capacity is converted by information index value Binary data string;Binary data string is indicated with default representation, obtains encrypted watermark;The broken of encrypted watermark can be improved Difficulty is translated, to increase the difficulty that encrypted watermark is pretended.
In addition, by the way that binary data string is divided into n sub- serial datas, by each subdata string and user identity information It is arranged in corresponding pattern position according to preset arrangement mode, obtains watermark recovery;It, can when the length of encrypted watermark is longer It is shown so that the encrypted watermark to be segmented, guarantees that target webpage can show whole encrypted watermarks.
In addition, by setting arrangement mode to n sub- serial datas are arranged in the serial data matrix of n × n;Wherein, number Every row according to string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data Different subdata strings in string;In screenshot truncated picture information do not need include each subdata string whole, it is only necessary to The multiple portions of each subdata string are truncated to, multiple part, which is combined, can restore each subdata string, can be with The screenshot requirement to watermark recovery is reduced, screenshot efficiency is improved.
In addition, by using the difference and 2 between current time and preset timeiComplementation is carried out, information rope is obtained Draw value;Wherein, the difference between current time and preset time is less than or equal to 2i;It can guarantee the impact resistance of information index value Property and randomness, can prevent electronic equipment from generating duplicate information index value;Improve what information index value was imitated and decoded Difficulty.
Based on above-mentioned each embodiment, the present embodiment is also provided with the watermark analytic method to target webpage.It should
Fig. 5 is the flow chart of the watermark analytic method for the webpage that the application one embodiment provides.This method includes at least Following steps:
Step 501, the image information of target webpage is obtained.
Wherein, target webpage includes the watermark recovery generated using user identity information and encrypted watermark, and encrypted watermark is The user identity information for logging in target webpage is converted according to encrypted watermark format.
Optionally, electronic equipment detects each webpage, if detecting the watermark recovery generated including step 103 The webpage is then determined as target webpage by webpage.Optionally, electronic equipment can be directed to the webpage of some hot topics to watermark recovery It is detected, both directly watermark recovery can be identified when detecting has watermark recovery in webpage, it can also be by watermark Pattern again identifies watermark recovery after saving to database.In the present embodiment, by way of watermark crawler to webpage into Row search, in actual implementation can also be by another way.
The image information of target webpage refers to the information of the image including target webpage, which can be for target Webpage carries out the information that screenshot obtains;Or, or to the information etc. that target webpage is taken pictures, the present embodiment is not The acquisition modes of the image information are limited.
Step 502, image information is parsed, obtains watermark recovery.
Optionally, the mode parsed to image information includes ORC algorithm identifies, neural network model identifies etc., this Embodiment does not limit the analysis mode of image information.
Step 503, the encrypted watermark in watermark recovery is restored, the user identity information for logging in target webpage is obtained.
Optionally, encrypted watermark is the binary data string to preset the presetting digit capacity that representation indicates.At this point, reduction Encrypted watermark in watermark recovery, comprising: binary data string is reduced to information index value;From user identity information and information The corresponding user identity information for logging in target webpage of information index value is searched in corresponding relationship between index value.
In one example, watermark recovery is that binary data string is divided into n sub- serial datas;Obtain n subdata Arrangement mode of the string in target webpage;Each subdata string is arranged according to arrangement mode with user identity information corresponding It is obtained after pattern position.Wherein, arrangement mode is the serial data matrix that n sub- serial datas are arranged in n × n;Wherein, data Every row of string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data string In different subdata strings.
In the first scene, image information includes the n complete subdatas of same a line in serial data matrix String;Alternatively, image information includes n complete subdata strings of the same row in serial data matrix.At this point, electronic equipment N sub- serial datas are spliced, binary data string is obtained.
Optionally, each subdata string front end is added with station location marker, and electronic equipment is according to the station location marker, by n son Part in serial data in addition to station location marker is spliced, and binary data string is obtained.
Assuming that image information is the image information in the region 41 in Fig. 4, region 41 includes 3 sub- serial data (m1 00 10 110110101110) 001011010011, m2 is 01 000111110110, m3 is that, the front two of each subdata string is Station location marker, wherein 00 indicates that first segment subdata string, 01 indicate that second segment subdata string, 10 indicate third cross-talk serial data; 12 are complete subdata string afterwards.Electronic equipment obtains after splicing according to station location marker to latter 12 of 3 sub- serial datas Binary data string:
001011010011 000111110110 110110101110.Then, electronic equipment is by the binary data string The decimal system is converted to, information index value 12131986862 is obtained.According to corresponding relationship shown in table one, the information index is obtained Being worth corresponding user identity information includes zhangsan.
In second of scene, for each subdata string, image information includes the son for being located at multiple pattern positions Multiple subdivisions of serial data.At this point, electronic equipment determines multiple pattern positions according to arrangement mode;Use each pattern position In subdivision determine subdata string;Spliced each subdata string to obtain binary data string;By binary data string It is reduced to information index value.
Optionally, subdata string is determined using the subdivision in each pattern position, comprising: each subdivision is spliced, Obtain subdata string.
Optionally, subdata string is determined using the subdivision in each pattern position, comprising: each subdivision is spliced, Obtain part subdata string;Go out the complete subdata string of multiple suppositions based on part subdata string exhaustion;Corresponding use will be present The complete subdata string of family identification information is determined as the subdata string to be determined.
Assuming that image information is the image information in the region 42 in Fig. 4, region 42 include 6 sub- serial datas (m1, m2, m3, M4, m5 and m6), the complete digit of each subdata string is 14, and front two is station location marker, wherein 00 indicates the first cross-talk Serial data, 01 indicate that second segment subdata string, 10 indicate third cross-talk serial data.As can be seen from FIG. 4, the position of 6 sub- serial datas Number is respectively less than 14, is incomplete subdata string.Wherein, the upper right corner m1 lack two, the upper right corner m2 lack two, the right side of m3 Upper angle lacks three;The lower left corner m4 and m5 missing;The upper left corner m6 and the lower right corner lack, unavailable.Matrix according to Fig.4, Rule, electronic equipment can make up two of the upper right corner m2 missing by latter two of m4, and obtaining m2 is 01 000111110110, three of the upper right corner missing of m3 are made up by m5, obtaining m3 is 10 110110101110.M1 can not be mended Entirely, but can exhaustion go out m1 missing two possibility are as follows: 00,01,10,11, it is hereby achieved that the complete son of the supposition of m1 Serial data includes:
[A]001011010000
[B]001011010001
[C]001011010010
[D]001011010011
By each complete subdata string according to the sequential concatenation of m1, m2, m3 after, obtain following four binary data String:
[A’]001011010000 000111110110110110101110
[B’]001011010001 000111110110110110101110
[C’]001011010010 000111110110110110101110
[D’]001011010011 000111110110110110101110
Decimal data string is converted by obtained binary data string to be respectively as follows:
[A”]12081655214
[B”]12098432430
[C”]12115209646
[D”]12131986862
[A "], [B "], [C "] and [D "] is compared with each information index value in table one, in table one exist with [D "] identical information index value, hence, it can be determined that two of the upper right corner m1 missing are 11 out, user identity information is zhangsan。
In conclusion the watermark analytic method of webpage provided in this embodiment, by obtaining the image information of target webpage, The target webpage includes the watermark recovery generated using user identity information and encrypted watermark, which is that will log in target The user identity information of webpage is converted according to encrypted watermark format;Image information is parsed, watermark is obtained Pattern;The encrypted watermark in watermark recovery is restored, the user identity information for logging in target webpage is obtained;It can solve to be used only and add When close watermark generates the watermark recovery of target webpage, encrypted watermark can not prompt in potential blabber's webpage that there are watermarks, lead The problem of causing the leakage range of web page contents to increase;Due to using user identity information and encrypted watermark to generate the water of target webpage It is patterned, user identity information can be prompted there are watermark in potential blabber's webpage, and encrypted watermark can be to avoid watermark quilt Therefore modification the problem of causing user identity information to be pretended, can achieve and both prompt in potential blabber's webpage that there are water Print, and the effect for avoiding user identity information from being pretended, can reduce the leakage range of web page contents.
In addition, tracking user identity information by using encrypted watermark, can prevent from directly parsing the use in target webpage Family identification information, the problem for the user identity information inaccuracy determined when the user identity information is tampered, it is ensured that The accuracy of the user identity information tracked.
In addition, by setting arrangement mode to n sub- serial datas are arranged in the serial data matrix of n × n;Wherein, number Every row according to string matrix includes the different subdata strings in binary data string;The each column of serial data matrix includes binary data Different subdata strings in string;In screenshot truncated picture information do not need include each subdata string whole, it is only necessary to The multiple portions of each subdata string are truncated to, multiple part, which is combined, can restore each subdata string, can be with The screenshot requirement to watermark recovery is reduced, screenshot efficiency is improved.
Fig. 6 is the block diagram of the watermark generating means for the webpage that the application one embodiment provides.The device include at least with Under several modules: data obtaining module 610, information conversion module 620 and watermark generation module 630.
Data obtaining module 610, for obtaining user identity information, the user identity information logs in target for identifying The user of webpage;
Information conversion module 620 is added for converting the user identity information according to encrypted watermark format Close watermark;
Watermark generation module 630, for generating the target network using the user identity information and the encrypted watermark The watermark recovery of page.
Correlative detail refers to above method embodiment.
It should be understood that the watermark generating means of the webpage provided in above-described embodiment generate webpage watermark when, Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution It is completed by different functional modules, i.e., the internal structure of the watermark generating means of webpage is divided into different functional modules, with Complete all or part of function described above.In addition, the watermark generating means and webpage of webpage provided by the above embodiment Watermark generation method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 7 is the block diagram of the watermark resolver for the webpage that the application one embodiment provides.The device include at least with Under several modules: image collection module 710, image analysis module 720 and watermark recovery module 730.
Image collection module 710, for obtaining the image information of target webpage, the target webpage includes being marked using user Know the watermark recovery of information and encrypted watermark generation, the encrypted watermark is the user identity information that will log in the target webpage It is converted according to encrypted watermark format;
Image analysis module 720 obtains the watermark recovery for parsing to described image information;
Watermark recovery module 730 obtains logging in the target webpage for restoring the encrypted watermark in the watermark recovery User identity information.
Correlative detail refers to above method embodiment.
It should be understood that the watermark resolver of the webpage provided in above-described embodiment is in the watermark of analyzing web page, Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution It is completed by different functional modules, i.e., the internal structure of the watermark resolver of webpage is divided into different functional modules, with Complete all or part of function described above.In addition, the watermark resolver and webpage of webpage provided by the above embodiment Watermark analytic method embodiment belong to same design, specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 8 is the block diagram of the watermark processing unit for the webpage that the application one embodiment provides, and the apparatus may include Fig. 6 Shown in webpage watermark generating means and/or watermark resolver including webpage shown in Fig. 7.The device can be intelligence Mobile phone, tablet computer, laptop, desktop computer or server.The watermark processing unit of webpage is also possible to referred to as user Equipment, portable terminal, laptop terminal, terminal console, controlling terminal, server etc., the present embodiment is not construed as limiting this.It should Device includes at least processor 801 and memory 802.
Processor 801 may include one or more processing cores, such as: 4 core processors, 8 core processors etc..Place Reason device 801 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field- Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed Logic array) at least one of example, in hardware realize.Processor 801 also may include primary processor and coprocessor, master Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.? In some embodiments, processor 801 can be integrated with GPU (Graphics Processing Unit, image processor), GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 801 can also be wrapped AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning Calculating operation.
Memory 802 may include one or more computer readable storage mediums, which can To be non-transient.Memory 802 may also include high-speed random access memory and nonvolatile memory, such as one Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 802 can Storage medium is read for storing at least one instruction, at least one instruction performed by processor 801 for realizing this Shen Please in embodiment of the method provide webpage watermark generation method;Alternatively, realizing the webpage that embodiment of the method provides in the application Watermark analytic method.
In some embodiments, the watermark processing unit of webpage is also optional includes: peripheral device interface and at least one Peripheral equipment.It can be connected by bus or signal wire between processor 801, memory 802 and peripheral device interface.It is each outer Peripheral equipment can be connected by bus, signal wire or circuit board with peripheral device interface.Schematically, peripheral equipment includes but not It is limited to: radio circuit, touch display screen, voicefrequency circuit and power supply etc..
Certainly, the watermark processing unit of webpage can also include less or more component, and the present embodiment does not limit this It is fixed.
Optionally, the application is also provided with a kind of computer readable storage medium, in the computer readable storage medium It is stored with program, the watermark generation side that described program is loaded by processor and executed to realize the webpage of above method embodiment Method;Alternatively, the watermark analytic method of the webpage to realize above method embodiment.
Optionally, the application is also provided with a kind of computer product, which includes computer-readable storage medium Matter is stored with program in the computer readable storage medium, and described program is loaded by processor and executed to realize above-mentioned side The watermark generation method of the webpage of method embodiment;Alternatively, the watermark analytic method of the webpage to realize above method embodiment.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (15)

1. a kind of watermark generation method of webpage, which is characterized in that the described method includes:
User identity information is obtained, the user identity information is used to identify the user for logging in target webpage;
The user identity information is converted according to encrypted watermark format, obtains encrypted watermark;
The watermark recovery of the target webpage is generated using the user identity information and the encrypted watermark.
2. the method according to claim 1, wherein it is described by the user identity information according to encrypted watermark lattice Formula is converted, and encrypted watermark is obtained, comprising:
The corresponding information index value of the user identity information is generated, the corresponding information index value of different user identification information is not Together;
Convert the information index value to the binary data string of presetting digit capacity;
The binary data string is indicated with default representation, obtains the encrypted watermark.
3. according to the method described in claim 2, it is characterized in that, described use the user identity information and the encryption water Print generates the watermark recovery of the target webpage, comprising:
The binary data string is divided into n sub- serial datas, the n is the integer greater than 1;
Obtain the n arrangement modes of the sub- serial data in the target webpage;
Each subdata string is arranged in corresponding pattern position according to the arrangement mode with the user identity information, is obtained The watermark recovery.
4. according to the method described in claim 3, it is characterized in that, the arrangement mode is to arrange the n sub- serial datas At the serial data matrix of n × n;
Wherein, every row of the serial data matrix includes the different subdata strings in the binary data string;The serial data The each column of matrix includes the different subdata strings in the binary data string.
5. according to the method described in claim 2, it is characterized in that, described generate the corresponding information rope of the user identity information Draw value, comprising:
Calculate the difference between current time and preset time;
The difference and the presetting digit capacity are inputted into preset index value and generate formula, obtains the information index value;
Wherein, the product of the difference and concurrency maximum value is less than or equal to 2i, the i is the presetting digit capacity.
6. according to the method described in claim 2, it is characterized in that, described indicate the binary data with default representation String, obtains the encrypted watermark, comprising:
0 in the binary data string is indicated with the line segment of the first length, and the binary system is indicated with the line segment of the second length 1 in serial data, obtain the encrypted watermark.
7. a kind of watermark analytic method of webpage, which is characterized in that the described method includes:
The image information of target webpage is obtained, the target webpage includes the water generated using user identity information and encrypted watermark It is patterned, the encrypted watermark is to convert the user identity information for logging in the target webpage according to encrypted watermark format It obtains;
Described image information is parsed, the watermark recovery is obtained;
The encrypted watermark in the watermark recovery is restored, the user identity information for logging in the target webpage is obtained.
8. the method according to the description of claim 7 is characterized in that the encrypted watermark is to indicate pre- with default representation If the binary data string of digit;
Encrypted watermark in the reduction watermark recovery, comprising:
The binary data string is reduced to information index value;
The corresponding login institute of the information index value is searched in corresponding relationship between user identity information and information index value State the user identity information of target webpage.
9. according to the method described in claim 8, it is characterized in that, the watermark recovery is to divide the binary data string At n sub- serial datas;Obtain the n arrangement modes of the sub- serial data in the target webpage;By each subdata string with The user identity information is arranged according to the arrangement mode to be obtained after corresponding pattern position;The arrangement mode is will The n sub- serial datas are arranged in the serial data matrix of n × n;Wherein, every row of the serial data matrix includes the binary system Different subdata strings in serial data;The each column of the serial data matrix includes the different subdatas in the binary data string String;
It is described that the binary data string is reduced to information index value, comprising:
For each subdata string, described image information include be located at multiple pattern positions the subdata string it is more When a subdivision, the multiple pattern position is determined according to the arrangement mode;
The subdata string is determined using the subdivision in each pattern position;
Each subdata string is spliced to obtain the binary data string;
The binary data string is reduced to the information index value.
10. according to the method described in claim 9, it is characterized in that, the subdivision using in each pattern position determines The subdata string, comprising:
Each subdivision is spliced, the subdata string is obtained;
And/or
Each subdivision is spliced, part subdata string is obtained;Go out the complete of multiple suppositions based on the part subdata string exhaustion Whole subdata string;The complete subdata string that corresponding user identity information will be present is determined as the subdata string.
11. a kind of watermark generating means of webpage, which is characterized in that described device includes:
Data obtaining module, for obtaining user identity information, the user identity information, which is used to identify, logs in target webpage User;
Information conversion module obtains encrypted watermark for converting the user identity information according to encrypted watermark format;
Watermark generation module, for generating the watermark of the target webpage using the user identity information and the encrypted watermark Pattern.
12. a kind of watermark resolver of webpage, which is characterized in that described device includes:
Image collection module, for obtaining the image information of target webpage, the target webpage includes using user identity information The watermark recovery generated with encrypted watermark, the encrypted watermark are will to log in the user identity information of the target webpage according to adding What close watermark format was converted;
Image analysis module obtains the watermark recovery for parsing to described image information;
Watermark recovery module obtains the user for logging in the target webpage for restoring the encrypted watermark in the watermark recovery Identification information.
13. a kind of watermark generating means of webpage, which is characterized in that described device includes processor and memory;The storage Program is stored in device, described program is loaded by the processor and executed to realize as claimed in any one of claims 1 to 6 The watermark generation method of webpage.
14. a kind of watermark resolver of webpage, which is characterized in that described device includes processor and memory;The storage Program is stored in device, described program is loaded as the processor and executed to realize as described in any one of claim 7 to 10 Webpage watermark analytic method.
15. a kind of computer readable storage medium, which is characterized in that be stored with program, described program quilt in the storage medium For realizing the watermark generation method of webpage such as claimed in any one of claims 1 to 6 when processor executes;Alternatively, realizing such as The watermark analytic method of the described in any item webpages of claim 7 to 10.
CN201910547456.2A 2019-06-24 2019-06-24 Webpage watermark generation method, watermark analysis method, device and storage medium Active CN110245469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910547456.2A CN110245469B (en) 2019-06-24 2019-06-24 Webpage watermark generation method, watermark analysis method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910547456.2A CN110245469B (en) 2019-06-24 2019-06-24 Webpage watermark generation method, watermark analysis method, device and storage medium

Publications (2)

Publication Number Publication Date
CN110245469A true CN110245469A (en) 2019-09-17
CN110245469B CN110245469B (en) 2021-06-18

Family

ID=67888882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910547456.2A Active CN110245469B (en) 2019-06-24 2019-06-24 Webpage watermark generation method, watermark analysis method, device and storage medium

Country Status (1)

Country Link
CN (1) CN110245469B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110909320A (en) * 2019-10-18 2020-03-24 北京字节跳动网络技术有限公司 Webpage watermark tamper-proofing method, device, medium and electronic equipment
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN111680273A (en) * 2020-05-21 2020-09-18 北京北信源软件股份有限公司 Watermark embedding method, device, electronic equipment and readable storage medium
CN112100583A (en) * 2020-09-23 2020-12-18 上海英方软件股份有限公司 Method and device for generating Web visual watermark
CN112650987A (en) * 2019-10-10 2021-04-13 百度(美国)有限责任公司 Method and system for artificial intelligence watermarking using kernel signatures
CN112800396A (en) * 2021-02-08 2021-05-14 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
CN113672880A (en) * 2021-08-24 2021-11-19 联仁健康医疗大数据科技股份有限公司 File anti-leakage method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631355A (en) * 2015-12-18 2016-06-01 北京奇虎科技有限公司 Data processing method and device
CN108055493A (en) * 2017-12-13 2018-05-18 苏州科达科技股份有限公司 The method and device of embedded watermark in video image
CN108391078A (en) * 2018-02-26 2018-08-10 苏州科达科技股份有限公司 Determination method, system, equipment and the storage medium of watermark embedded location in video
CN108985081A (en) * 2018-07-06 2018-12-11 泰康保险集团股份有限公司 A kind of watermark encrypting method, apparatus, medium and electronic equipment
CN109190339A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN109190340A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking generates, identification, Method of printing and device
CN109427029A (en) * 2017-08-21 2019-03-05 苏宁云商集团股份有限公司 A kind of method and device generating watermark
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 The method and system of image watermark insertion and retrospect
CN109919823A (en) * 2019-02-13 2019-06-21 阿里巴巴集团控股有限公司 A kind of watermark generation method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631355A (en) * 2015-12-18 2016-06-01 北京奇虎科技有限公司 Data processing method and device
CN109427029A (en) * 2017-08-21 2019-03-05 苏宁云商集团股份有限公司 A kind of method and device generating watermark
CN108055493A (en) * 2017-12-13 2018-05-18 苏州科达科技股份有限公司 The method and device of embedded watermark in video image
CN108391078A (en) * 2018-02-26 2018-08-10 苏州科达科技股份有限公司 Determination method, system, equipment and the storage medium of watermark embedded location in video
CN108985081A (en) * 2018-07-06 2018-12-11 泰康保险集团股份有限公司 A kind of watermark encrypting method, apparatus, medium and electronic equipment
CN109190339A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking image generates, identification, Method of printing and device
CN109190340A (en) * 2018-09-13 2019-01-11 中国农业银行股份有限公司 A kind of webpage digital watermarking generates, identification, Method of printing and device
CN109767375A (en) * 2018-12-06 2019-05-17 北京北信源信息安全技术有限公司 The method and system of image watermark insertion and retrospect
CN109919823A (en) * 2019-02-13 2019-06-21 阿里巴巴集团控股有限公司 A kind of watermark generation method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112650987A (en) * 2019-10-10 2021-04-13 百度(美国)有限责任公司 Method and system for artificial intelligence watermarking using kernel signatures
CN110909320A (en) * 2019-10-18 2020-03-24 北京字节跳动网络技术有限公司 Webpage watermark tamper-proofing method, device, medium and electronic equipment
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN111488559B (en) * 2020-04-10 2023-03-10 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN111680273A (en) * 2020-05-21 2020-09-18 北京北信源软件股份有限公司 Watermark embedding method, device, electronic equipment and readable storage medium
CN112100583A (en) * 2020-09-23 2020-12-18 上海英方软件股份有限公司 Method and device for generating Web visual watermark
CN112800396A (en) * 2021-02-08 2021-05-14 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
CN112800396B (en) * 2021-02-08 2023-10-27 北京百度网讯科技有限公司 Page watermark generation method, device, equipment, storage medium and program product
CN113672880A (en) * 2021-08-24 2021-11-19 联仁健康医疗大数据科技股份有限公司 File anti-leakage method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110245469B (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN110245469A (en) Watermark generation method, watermark analytic method, device and the storage medium of webpage
CN108985066B (en) Intelligent contract security vulnerability detection method, device, terminal and storage medium
CN108446314B (en) Student information storage method, computer readable storage medium and terminal equipment
US11361397B2 (en) Method and apparatus for watermark embedding and extracting
CN109409030A (en) A kind of digital publishing rights generation method and device
CN111191414A (en) Page watermark generation method, identification method, device, equipment and storage medium
Cao et al. Coverless information hiding based on the generation of anime characters
CN107025480A (en) Image generating method and its equipment
CN109255826B (en) Chinese training image generation method, device, computer equipment and storage medium
CN107451106A (en) Text method and device for correcting, electronic equipment
CN110968847A (en) File watermark hiding and analyzing method, device, equipment and storage medium
CN111143551A (en) Text preprocessing method, classification method, device and equipment
CN110322386A (en) A kind of insertion of digital text watermarking and detection method and device
CN114818000A (en) Privacy protection set confusion intersection method, system and related equipment
CN111209600A (en) Block chain-based data processing method and related product
US20150169508A1 (en) Obfuscating page-description language output to thwart conversion to an editable format
CN110012338A (en) A kind of method, apparatus, computer equipment and storage medium showing barrage data
CN103377325B (en) A kind of protect the method for eBook content, system and equipment
CN105354506B (en) The method and apparatus of hidden file
BR102012033731A2 (en) SYSTEM AND METHOD FOR DIGITAL ANALYSIS OF DOCUMENT AUTHENTICITY AND INTEGRITY USING PORTABLE DEVICES
CN111355709A (en) Data verification method and device, electronic equipment and computer readable storage medium
CN113554549B (en) Text image generation method, device, computer equipment and storage medium
CN104424619A (en) Information processing apparatus and information processing method
CN111966973A (en) Copyright protection method and system based on picture pixel value steganography
CN107256220A (en) Data logging generation method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201117

Address after: Room 708, Ruiqi building, building 11, no.668, Fengting Avenue, Suzhou Industrial Park, Suzhou, Jiangsu Province, 215000

Applicant after: Ruishi (Suzhou) video technology Co., Ltd

Applicant after: SUZHOU KEDA TECHNOLOGY Co.,Ltd.

Address before: 215000 Unit 04, 13th Floor, Building 388 A, Xinping Street, Suzhou Industrial Park, Jiangsu Province

Applicant before: Suzhou Ruiweibo Technology Co.,Ltd.

Applicant before: SUZHOU KEDA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant