CN116339652A - Method and system for adding printing watermark based on credit operation system - Google Patents

Method and system for adding printing watermark based on credit operation system Download PDF

Info

Publication number
CN116339652A
CN116339652A CN202310249526.2A CN202310249526A CN116339652A CN 116339652 A CN116339652 A CN 116339652A CN 202310249526 A CN202310249526 A CN 202310249526A CN 116339652 A CN116339652 A CN 116339652A
Authority
CN
China
Prior art keywords
file
watermark
directory
printing
print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310249526.2A
Other languages
Chinese (zh)
Inventor
林皓
陈家富
秦磊
任鹏龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN202310249526.2A priority Critical patent/CN116339652A/en
Publication of CN116339652A publication Critical patent/CN116339652A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1211Improving printing performance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1202Dedicated interfaces to print systems specifically adapted to achieve a particular effect
    • G06F3/1222Increasing security of the print job
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1238Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The application discloses a method and a system for adding a printing watermark based on a credit operation system. Wherein the method comprises the following steps: storing the first file to a first directory based on the print instruction; moving the first file to a second directory; renaming the first file to obtain a second file; intercepting the second file and suspending the printing process; adding a preset watermark to the second file to obtain a third file; covering the second file with the third file, and triggering a printing process to print the third file; the method can realize the noninductive operation of the user, can add the watermark to the file, does not influence the printing efficiency of the user, can effectively improve the confidentiality level of the file and timely trace and trace the source, effectively improves the transparency of the application, and ensures that the output file can be added with the preset watermark so as to realize confidentiality of the sensitive file and trace the source of the file.

Description

Method and system for adding printing watermark based on credit operation system
Technical Field
The disclosure relates to the technical field of computers, in particular to a method and a system for adding a printing watermark based on a credit-creating operating system.
Background
With the popularization of information systems, network construction and expansion of user scale, the way of using data by countries, enterprises and common people is becoming more complex, and after a key information is leaked out through a certain channel, a series of chain reactions are brought in a short time, thus causing serious loss to related units.
There are numerous leakage channels in enterprises, including USB mobile storage, shared storage, printing, burning, faxing, infrared, R232, mail, chat tools, web discs, BBS, etc.; the diversified secret leakage channels bring great challenges to security management, each channel may need to be prevented by different methods, wherein sensitive files are sent out through a file printing mode, which is a common secret leakage mode, but the scheme disclosed in the prior art for improving the confidentiality level of the files through watermark addition is complex and cumbersome, the printing time of each time is long, the printing efficiency and experience of users are influenced, and inconvenience is brought to the users.
Disclosure of Invention
In view of the above, the embodiments of the present disclosure provide a method and a system for adding a watermark to a file based on a trusted operating system, which can implement a user's noninductive operation, not only can watermark the file, but also does not affect the printing efficiency of the user, and further can effectively improve the security level of the file and timely track and trace the trace to the source.
In a first aspect, an embodiment of the present disclosure provides a method for adding a print watermark based on a trusted operating system, including:
storing the first file to a first directory based on the print instruction;
moving the first file to a second directory;
renaming the first file to obtain a second file;
intercepting the second file and suspending the printing process;
adding a preset watermark to the second file to obtain a third file;
and covering the third file with the second file, and triggering the printing process to print the third file.
Optionally, the first file is a PDF file;
the first directory is a temporary directory, and the second directory is different from the first directory in the path.
Optionally, the renaming the first file to obtain a second file includes:
renaming the first file by calling a rename function through CUPS service to obtain the second file;
and the renaming path of the second file belongs to the directory of the CUPS service.
Optionally, the intercepting the second file and suspending the printing process includes:
and monitoring the second catalog in real time through the HOOK dynamic library, intercepting the second file when the second file is detected to be generated, and controlling the printer to pause the printing process.
Optionally, the adding a preset watermark to the second file to obtain a third file includes:
analyzing the second file to obtain the type of the second file;
and adding a matched watermark to the second file based on a preset watermark printing strategy to obtain the third file.
Optionally, the preset watermark includes one or more of a vector watermark, a text watermark, a two-dimensional code watermark or a picture watermark.
Optionally, the preset watermark strategy includes: if the second file is of the first type, the added matching watermark is a vector watermark;
if the second file is of the second type, the added matching watermark is a text watermark;
if the second file is of a third type, the added matching watermark is a two-dimensional code watermark;
and if the second file is of the fourth type, the added matching watermark is a picture watermark.
In a second aspect, embodiments of the present disclosure provide a system for adding a print watermark based on a trusted operating system, comprising:
a storage module configured to store the first file to the first directory based on the print instruction;
a moving module configured to move the first file to a second directory;
the renaming module is configured to rename the first file to obtain a second file;
the interception module is configured to intercept the second file and pause the printing process;
the watermark adding module is configured to add a preset watermark to the second file to obtain a third file;
and the coverage module is configured to cover the third file with the second file and trigger a printing process.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, which adopts the following technical scheme:
the electronic device includes:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods of adding a print watermark based on a credit-based operating system described above.
In a fourth aspect, the disclosed embodiments also provide a computer-readable storage medium storing computer instructions for causing a computer to perform any of the above methods of adding a print watermark based on a credit operating system.
According to the method for adding the printing watermark based on the credit operation system, which is provided by the embodiment of the disclosure, the corresponding file can be continuously intercepted, the original printing process is paused while the watermark is added, and the printer is prevented from automatically printing the original file without the watermark; according to the method and the device, the security of the sensitive file and the tracking and tracing of the file can be realized by adding the preset watermark to the file, the noninductive addition of a user can be realized, the printing use efficiency is not influenced, and the transparency of the application is effectively improved; the method disclosed by the application can be applied to various domestic credit and wound operating systems such as Galaxy kylin, union UOS, zhongkefand and the like.
The method disclosed by the application adopts a HOOK mechanism, and utilizes the HOOK function to directly capture the printing behavior of the system, so that the method is safe and reliable, the policy execution efficiency is high, and the policy is effective in real time; the method for adding the watermark conveniently and rapidly is provided for file printing scenes in the environment of the domestic credit operation system, and the watermark of the appointed type and the appointed content can be added for the appointed terminal in batches according to the setting of the manager, so that the problem of core data leakage caused by printing sensitive files is effectively prevented.
The foregoing description is only an overview of the disclosed technology, and may be implemented in accordance with the disclosure of the present disclosure, so that the above-mentioned and other objects, features and advantages of the present disclosure can be more clearly understood, and the following detailed description of the preferred embodiments is given with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is a flowchart of a method for adding a print watermark based on a credit-creating operating system according to an embodiment of the disclosure.
Fig. 2 is a detailed schematic diagram of a method provided by an embodiment of the present disclosure.
Fig. 3 is a schematic block diagram of a system for adding a print watermark based on a credit-creating operating system provided in an embodiment of the present disclosure.
Fig. 4 is a schematic block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
It should be appreciated that the following specific embodiments of the disclosure are described in order to provide a better understanding of the present disclosure, and that other advantages and effects will be apparent to those skilled in the art from the present disclosure. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should also be noted that the illustrations provided in the following embodiments merely illustrate the basic concepts of the disclosure by way of illustration, and only the components related to the disclosure are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided in order to provide a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
Referring to fig. 1, the present application discloses a method for adding a print watermark based on a credit operating system, the method comprising the steps of:
s100, storing a first file to a first directory based on a printing instruction; the first file is a PDF file.
S200, moving the first file to a second directory;
renaming the first file to obtain a second file.
The second file obtaining method body comprises the following steps: renaming the first file by calling a rename function through the CUPS service to obtain a second file; the renaming path of the second file is subordinate to the directory of the CUPS service.
S300, intercepting the second file and suspending the printing process.
Specifically, the second directory is monitored in real time through the HOOK dynamic library, and when the second file generation is detected, the second file is intercepted and the printer is controlled to pause the printing process.
S400, adding a preset watermark to the second file to obtain a third file.
Specifically, analyzing the second file to obtain the type of the second file;
and adding a matched watermark to the second file based on a preset watermark printing strategy to obtain the third file.
Further, if the second file is of the first type, the added matching watermark is a vector watermark;
if the second file is of the second type, the added matching watermark is a text watermark;
if the second file is of the third type, the added matching watermark is a two-dimensional code watermark;
and if the second file is of the fourth type, the added matching watermark is a picture watermark.
Vector watermarking, in order to avoid watermark distortion problem, a dot matrix form is adopted, a pattern formed by some slight dots or dots is displayed on a printed file, a string of numbers can be obtained through the dots or symbols, text information corresponding to the string of numbers is stored on a server, and after the printed file is transmitted outwards, the terminal can be tracked according to the string of numbers corresponding to the dot matrix information.
The two-dimensional code watermarking refers to the steps that watermark content is generated by utilizing a specific algorithm, a piece of two-dimensional code is used as a watermark, after a printed file is transmitted outwards, a scanning function of WeChat or other small programs can be directly used, the two-dimensional code on the transmitted file is scanned, and according to the two-dimensional code information, a terminal through which the printed file is printed is inquired and tracked.
The picture watermark refers to a picture which has identification and is easy to track the source, and is used as a watermark of a printed file.
S500, the third file is covered on the second file, and the printing process is triggered to print the third file.
In this embodiment, the first directory is a temporary directory, and the second directory is different from the first directory in the path.
The method for adding the watermark printing based on the created operation system disclosed by the application can be suitable for various domestic created operation systems such as Galaxy kylin, general letter UOS, zhongkefande and the like, effectively prevents the data leakage behavior in the form of file printing, and can track and trace the source in time after the data leakage.
Further, referring to fig. 2, the method disclosed in the present application specifically includes:
an administrator configures a preset watermark printing strategy on a management platform and issues the strategy; specifically, to the target device, i.e., the client linked to the printer.
The preset watermark printing strategy is one or more of vector watermark, text watermark, two-dimensional code watermark or picture watermark, in this embodiment, the corresponding client can preset the corresponding watermark requirement, and the user's noninductive operation is realized without setting each time, so that the watermark adding requirement can be met, and the printing efficiency can be improved.
The client Agent receives and analyzes the strategy and stores the watermark format; specifically, the client Agent receives a preset watermark printing strategy, then analyzes the watermark printing strategy to obtain watermark information which can be added by the corresponding client and stores a watermark format.
The watermark format may include one or more of a type, a display position, a display size, a color or transparency of the two-dimensional code.
Alternatively, the watermark format mainly includes valid information such as a client host name, an IP address, a MAC address, holder information, a current date, and the like.
And monitoring CUPS service by using the client Agent HOOK system function.
In this embodiment, the client Agent uses the HOOK technique to load the HOOK dynamic library into the system's so pre-load configuration (default: per etc/ld.so.pre-load file);
then the CUPS service (universal UNIX printing system) can be restarted, so that the CUPS service loads the HOOK dynamic library;
the HOOK dynamic library monitors a system rename function, and when the CUPS service is found to call the function to process the file and the renamed path of the processed file belongs to the CUPS directory (the default is var/spool/caps /), the corresponding file is judged to belong to the file to be printed.
In other words, judging whether the CUPS service calls the rename function to process the file, if not, judging that the file is not the file to be printed; if yes, judging whether the renamed path of the processed file belongs to the CUPS directory, if not, judging that the file is not the file to be printed, and if yes, judging that the file is the file to be printed.
The HOOK dynamic library is a so file, and the HOOK dynamic library is loaded into a so preloading configuration of the system, namely, the absolute path of the so file is added into the preloading configuration/etc/ld.so.preload; after loading is completed, system-level services like CUPS service are used for loading the HOOK dynamic library by default.
The HOOK dynamic library intercepts the print file and adds a watermark to the file.
Specifically, a HOOK dynamic library is adopted to intercept PDF files temporarily generated in the printing process of CUPS service, namely, before the printer starts printing, the printing process is suspended, and the printer is prevented from printing files without watermarks.
Wherein, adding watermark for file specifically includes: the client Agent calls a watermark printing function module, and adds a watermark to the temporary PDF file by utilizing the parsed and stored printing format.
The HOOK dynamic library exits from the rename function, releases the interception behavior, hands over the printing behavior to the CUPS service, and then the CUPS service continues the printing behavior to generate the print file with the watermark.
And judging whether the client Agent receives the closing strategy, if so, unloading the HOOK dynamic library, otherwise, reserving the original setting, and automatically monitoring, intercepting and adding the watermark when printing next time.
In the process of printing the file by the credit operating system, the PDF file is in a final converted format, that is, no matter what file is printed by the credit operating system, including word, excel, PDF, when the printing stage is performed, the system defaults to converting the printed file format into PDF format for printing.
In this embodiment, a control method for adding a watermark in a domestic created operation system environment is formed by a management platform, a client Agent and a HOOK dynamic library. The management platform is accessed in a Web form, and an administrator can directly create, modify and close the watermark printing strategy by accessing the webpage of the management platform. After the strategy is established, actively issuing the strategy to a designated client Agent; the client Agent receives the policy from the management platform, parses the policy and stores the format and content of the print watermark. After the function is started, the client Agent actively adds the absolute path of the HOOK dynamic library into the so preloading configuration file/etc/ld.so.preload of the system, and after the addition is completed, the system printing service CUPS is restarted to ensure that the CUPS service loads the HOOK dynamic library. During the function starting period, the HOOK dynamic library continuously monitors the system rename function and captures the calling operation of CUPS service; intercepting a print message of the CUPS service in real time, and adding watermark content in a specified format to a print file; after the watermark adding is finished, the CUPS service continues the printing operation, and finally generates a print file with the watermark; once the manager closes the watermark printing strategy on the management platform, the client Agent actively unloads the HOOK dynamic library after receiving the closing switch, thereby thoroughly closing the watermark printing function.
The method also comprises a management platform, a client Agent and a CUPS server, wherein the management platform is used for providing a web service access entrance and performing full life cycle management and control from formulation and maintenance to closing of a watermark printing strategy; in this embodiment, the management platform is configured to store a preset watermark printing policy.
The client Agent is used for receiving a preset watermark printing strategy issued by the management platform, analyzing and executing the strategy.
The CUPS server comprises a storage module, a mobile module, a renaming module and an interception module, wherein the storage module is used for storing a first file to a first directory, namely a temporary directory, based on a printing instruction; the mobile module is used for moving the first file to the second directory (namely, copying the first file into the second directory after cutting); the renaming module is used for calling the rename function to rename the first file to obtain a second file (namely the renamed first file); the interception module is used for intercepting the second file and suspending the printing process of the printer.
And then, adding a preset watermark to the second file by the client Agent through a watermark adding module to obtain a third file.
And finally, covering the second file by the third file through the covering module by the client Agent, triggering the printing process, namely triggering the CUPS server to continue to execute the printing process, and controlling the printer to start so as to print the third file.
In the embodiment, the application adopts a B/S architecture, and establishes a complete set of perfect watermark creation and maintenance mechanism for ensuring the normal execution of watermark printing functions.
Among other things, CUPS (Common UNIX Printing System) services are used to manage printers and printing.
The method adopts the HOOK mechanism, utilizes the HOOK function to directly capture the printing behavior of the system, is safe and reliable, has high policy execution efficiency and takes effect in real time; the method for adding the watermark conveniently and rapidly is provided for file printing scenes in the environment of the domestic credit operation system, and the watermark of the appointed type and the appointed content can be added for the appointed terminal in batches according to the setting of the manager, so that the problem of core data leakage caused by printing sensitive files is effectively prevented.
Referring to fig. 3, a second aspect of the present application provides a system for adding a print watermark based on a trusted operating system, comprising:
a storage module configured to store the first file to the first directory based on the print instruction;
a moving module configured to move the first file to a second directory;
the renaming module is configured to rename the first file to obtain a second file;
the interception module is configured to intercept the second file and pause the printing process;
the watermark adding module is configured to add a preset watermark to the second file to obtain a third file;
and the coverage module is configured to cover the third file with the second file and trigger a printing process.
An electronic device according to an embodiment of the present disclosure includes a memory and a processor. The memory is for storing non-transitory computer readable instructions. In particular, the memory may include one or more computer program products, which may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, random Access Memory (RAM) and/or cache memory (cache), and the like. The non-volatile memory may include, for example, read Only Memory (ROM), hard disk, flash memory, and the like.
The processor may be a Central Processing Unit (CPU) or other form of processing unit having data processing and/or instruction execution capabilities, and may control other components in the electronic device to perform the desired functions. In one embodiment of the present disclosure, the processor is configured to execute the computer readable instructions stored in the memory, to cause the electronic device to perform all or part of the steps of the method for watermarking print based on a credit-based operating system of the embodiments of the present disclosure described above.
It should be understood by those skilled in the art that, in order to solve the technical problem of how to obtain a good user experience effect, the present embodiment may also include well-known structures such as a communication bus, an interface, and the like, and these well-known structures are also included in the protection scope of the present disclosure.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure. A schematic diagram of an electronic device suitable for use in implementing embodiments of the present disclosure is shown. The electronic device shown in fig. 4 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 4, the electronic device may include a processing means (e.g., a central processing unit, a graphic processor, etc.), which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) or a program loaded from the storage means into a Random Access Memory (RAM). In the RAM, various programs and data required for the operation of the electronic device are also stored. The processing device, ROM and RAM are connected to each other via a bus. An input/output (I/O) interface is also connected to the bus.
In general, the following devices may be connected to the I/O interface: input means including, for example, sensors or visual information gathering devices; output devices including, for example, display screens and the like; storage devices including, for example, magnetic tape, hard disk, etc.; a communication device. The communication means may allow the electronic device to communicate wirelessly or by wire with other devices, such as edge computing devices, to exchange data. While fig. 4 shows an electronic device having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via a communication device, or installed from a storage device, or installed from ROM. All or part of the steps of the method of adding a print watermark based on a credit operating system of an embodiment of the disclosure are performed when the computer program is executed by a processing device.
The detailed description of the present embodiment may refer to the corresponding description in the foregoing embodiments, and will not be repeated herein.
A computer-readable storage medium according to an embodiment of the present disclosure has stored thereon non-transitory computer-readable instructions. When executed by a processor, perform all or part of the steps of the method of watermarking print watermarks based on the credit-based operating system of the various embodiments of the disclosure described above.
The computer-readable storage medium described above includes, but is not limited to: optical storage media (e.g., CD-ROM and DVD), magneto-optical storage media (e.g., MO), magnetic storage media (e.g., magnetic tape or removable hard disk), media with built-in rewritable non-volatile memory (e.g., memory card), and media with built-in ROM (e.g., ROM cartridge).
The detailed description of the present embodiment may refer to the corresponding description in the foregoing embodiments, and will not be repeated herein.
The basic principles of the present disclosure have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present disclosure are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present disclosure. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, since the disclosure is not necessarily limited to practice with the specific details described.
In this disclosure, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions, and the block diagrams of devices, apparatuses, devices, systems involved in this disclosure are merely illustrative examples and are not intended to require or implicate that connections, arrangements, configurations must be made in the manner shown in the block diagrams. As will be appreciated by one of skill in the art, the devices, apparatuses, devices, systems may be connected, arranged, configured in any manner. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
In addition, as used herein, the use of "or" in the recitation of items beginning with "at least one" indicates a separate recitation, such that recitation of "at least one of A, B or C" for example means a or B or C, or AB or AC or BC, or ABC (i.e., a and B and C). Furthermore, the term "exemplary" does not mean that the described example is preferred or better than other examples.
It is also noted that in the systems and methods of the present disclosure, components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered equivalent to the present disclosure.
Various changes, substitutions, and alterations are possible to the techniques described herein without departing from the teachings of the techniques defined by the appended claims. Furthermore, the scope of the claims of the present disclosure is not limited to the particular aspects of the process, machine, manufacture, composition of matter, means, methods and acts described above. The processes, machines, manufacture, compositions of matter, means, methods, or acts, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding aspects described herein may be utilized. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or acts.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the disclosure to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (10)

1. A method for adding a print watermark based on a trusted operating system, comprising:
storing the first file to a first directory based on the print instruction;
moving the first file to a second directory;
renaming the first file to obtain a second file;
intercepting the second file, and suspending the printing process;
adding a preset watermark to the second file to obtain a third file;
and covering the third file with the second file, and triggering the printing process to print the third file.
2. The method of claim 1, wherein the first file is a PDF file;
the first directory is a temporary directory, and the second directory is different from the first directory in the path.
3. The method of claim 1, wherein renaming the first file to obtain a second file comprises:
renaming the first file by calling a rename function through CUPS service to obtain the second file;
and the renaming path of the second file belongs to the directory of the CUPS service.
4. The method of claim 1, wherein intercepting the second file and suspending the printing process comprises:
and monitoring the second catalog in real time through the HOOK dynamic library, intercepting the second file when the second file is detected to be generated, and controlling the printer to pause the printing process.
5. The method of claim 1, wherein adding a preset watermark to the second file to obtain a third file comprises:
analyzing the second file to obtain the type of the second file;
and adding a matched watermark to the second file based on a preset watermark printing strategy to obtain the third file.
6. The method of claim 5, wherein the pre-set watermark comprises one or more of a vector watermark, a text watermark, a two-dimensional code watermark, or a picture watermark.
7. The method of claim 5, wherein the pre-set watermark printing strategy comprises: if the second file is of the first type, the added matching watermark is a vector watermark;
if the second file is of the second type, the added matching watermark is a text watermark;
if the second file is of a third type, the added matching watermark is a two-dimensional code watermark;
and if the second file is of the fourth type, the added matching watermark is a picture watermark.
8. A system for adding a print watermark based on a trusted operating system, comprising:
a storage module configured to store the first file to the first directory based on the print instruction;
a moving module configured to move the first file to a second directory;
the renaming module is configured to rename the first file to obtain a second file;
the interception module is configured to intercept the second file and pause the printing process;
a watermark adding module configured to add a preset watermark to the second file to obtain a third yy+231498P
A file;
and the coverage module is configured to cover the third file with the second file and trigger a printing process.
9. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of adding a print watermark based on a credit-based operating system of any one of claims 1-7.
10. A computer readable storage medium storing computer instructions for causing a computer to perform the method of adding a print watermark based on a credit-based operating system of any one of claims 1-7.
CN202310249526.2A 2023-03-15 2023-03-15 Method and system for adding printing watermark based on credit operation system Pending CN116339652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310249526.2A CN116339652A (en) 2023-03-15 2023-03-15 Method and system for adding printing watermark based on credit operation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310249526.2A CN116339652A (en) 2023-03-15 2023-03-15 Method and system for adding printing watermark based on credit operation system

Publications (1)

Publication Number Publication Date
CN116339652A true CN116339652A (en) 2023-06-27

Family

ID=86890924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310249526.2A Pending CN116339652A (en) 2023-03-15 2023-03-15 Method and system for adding printing watermark based on credit operation system

Country Status (1)

Country Link
CN (1) CN116339652A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117556395A (en) * 2024-01-10 2024-02-13 北京天空卫士网络安全技术有限公司 System application watermark generation method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117556395A (en) * 2024-01-10 2024-02-13 北京天空卫士网络安全技术有限公司 System application watermark generation method and device
CN117556395B (en) * 2024-01-10 2024-04-19 北京天空卫士网络安全技术有限公司 System application watermark generation method and device

Similar Documents

Publication Publication Date Title
US20210312010A1 (en) Secure Document Sharing
US10694074B2 (en) Information processing method, first terminal, second terminal, and server
CN102236537B (en) Print system
US20070051798A1 (en) Content management server, storage medium having content management program stored therein, and content management method
US20140247961A1 (en) Apparatus and method for displaying watermark on a screen
US20120226823A1 (en) Document distribution system and method
JP2013093017A (en) Wireless printing from out-of-network device
US20140233055A1 (en) Method, device and computer readable medium for managing print jobs
CN106790172B (en) File sharing method, server and client
CN110348182A (en) A kind of method and apparatus of web document watermark insertion
CN116339652A (en) Method and system for adding printing watermark based on credit operation system
CN108664774A (en) A kind of timely method, apparatus, storage medium and system for generating watermark
CN112311851B (en) Network policy configuration method and device
CN105786521B (en) File outgoing protection method and device
CN104035733A (en) Distributed print management
CN113064562A (en) Man-machine interaction printing method and system based on block chain
CN104036162B (en) A kind of scanning means
CN110930325B (en) Image processing method and device based on artificial intelligence and storage medium
WO2021088571A1 (en) Data encryption method and apparatus, and device and readable storage medium
CN109067809A (en) Authority configuring method, device, equipment and the storage medium of security component
CN111181905B (en) File encryption method and device
CN112257037A (en) Process watermarking method and system and electronic equipment
CN111639313B (en) File transmission method, device, terminal and computer readable storage medium
CN113254976B (en) Printer security enhancement system, method and electronic equipment
CN115904589A (en) Application program window watermark processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination