WO2015018052A1 - Information presentation method and device - Google Patents

Information presentation method and device Download PDF

Info

Publication number
WO2015018052A1
WO2015018052A1 PCT/CN2013/081144 CN2013081144W WO2015018052A1 WO 2015018052 A1 WO2015018052 A1 WO 2015018052A1 CN 2013081144 W CN2013081144 W CN 2013081144W WO 2015018052 A1 WO2015018052 A1 WO 2015018052A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
information
watermark
user
secure
Prior art date
Application number
PCT/CN2013/081144
Other languages
French (fr)
Chinese (zh)
Inventor
叶思海
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2013/081144 priority Critical patent/WO2015018052A1/en
Priority to CN201380001146.1A priority patent/CN103650459A/en
Publication of WO2015018052A1 publication Critical patent/WO2015018052A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Disclosed are an information presentation method and device, which relate to the field of electronic information, and can determine whether to present a watermark or not according to a practical situation, so as to avoid visual interference caused by the watermark. The present invention is applied to the process for a user accessing a cloud computing system to access target information stored in the cloud computing system. The method mainly comprises: acquiring access information about a user; determining an access manner of the user according to the access information; if the access manner is a secure access manner, presenting the target information in a manner which does not contain a watermark; and if the access manner is an unsecure access manner, presenting the target information in a manner which contains the watermark.

Description

一种信息呈现方法及设备 技术领域  Information presentation method and device
本发明涉及电子信息领域, 尤其涉及一种信息呈现方法及设备。 背景技术  The present invention relates to the field of electronic information, and in particular, to an information presentation method and device. Background technique
随着电子信息技术的发展,在日常生活或工作中的一些涉及隐私或机 密的信息, 可以通过各种电子设备进行传播和呈现。 然而, 在信息的传播 和呈现的同时, 隐私信息或机密信息的安全性也受到了较大威胁。  With the development of electronic information technology, some privacy or confidential information in daily life or work can be spread and presented through various electronic devices. However, while the information is being disseminated and presented, the security of private or confidential information is also greatly threatened.
尤其是在云计算系统出现之后,由于用户可以在任意时间和任意地点 接入到云计算系统, 获取和呈现云计算系统中存储的信息, 而信息呈现出 来之后很容易被拍照或截图, 从而导致信息泄露。  Especially after the emergence of the cloud computing system, since the user can access the cloud computing system at any time and any place, the information stored in the cloud computing system is acquired and presented, and the information is easily photographed or screenshotd after being presented, thereby causing Information disclosure.
为了防止信息呈现后被非法窃取,现有技术中提出一种插入数字水印 的信息呈现方法,具体为: 将水印嵌入到目标信息中, 当打开目标信息时, 便会呈现包含有水印的目标信息。 这样, 即使窃取者对呈现出来的信息进 行拍照或截图, 水印也会包含在其窃取的结果中, 构成直接的信息窃取证 据, 从而降低信息泄露的风险。  In order to prevent the information from being illegally stolen after being presented, the prior art proposes an information presentation method for inserting a digital watermark, specifically: embedding the watermark into the target information, and when opening the target information, presenting the target information including the watermark . In this way, even if the stealer takes a picture or screenshot of the presented information, the watermark will be included in the result of the theft, which constitutes direct evidence of theft, thereby reducing the risk of information leakage.
但是, 在实现上述信息呈现的过程中, 发明人发现现有技术中至少存 在如下问题: 由于在目标信息中嵌入水印后, 水印会一直存在信息中, 在 任何时间或地点打开目标信息, 都会呈现包含水印的目标信息, 而水印的 存在对视觉效果有一定影响,因此会对观看和使用目标信息本身造成较大 干扰。 发明内容  However, in the process of implementing the above information presentation, the inventors have found that at least the following problems exist in the prior art: Since the watermark is always present in the information after the watermark is embedded in the target information, the target information is displayed at any time or place. The target information of the watermark is included, and the existence of the watermark has a certain influence on the visual effect, and thus causes great interference to the viewing and use of the target information itself. Summary of the invention
本发明的实施例提供一种信息呈现方法及设备,可以根据实际情况确 定是否呈现水印, 以避免水印造成的视觉干扰。  Embodiments of the present invention provide an information presentation method and device, which can determine whether to present a watermark according to actual conditions to avoid visual interference caused by a watermark.
本发明的第一方面, 提供一种信息呈现方法, 包括:  A first aspect of the present invention provides an information presentation method, including:
获取所述用户的接入信息;  Obtaining access information of the user;
根据所述接入信息确定所述用户的接入方式; 若所述接入方式为安全接入方式, 则以不含水印的方式呈现目标信 息; Determining, according to the access information, an access mode of the user; If the access mode is a secure access mode, the target information is presented in a manner that does not include a watermark;
若所述接入方式为非安全接入方式,则以包含水印的方式呈现目标信 息。  If the access mode is a non-secure access mode, the target information is presented in a manner including a watermark.
结合第一方面, 在第一方面的第一种可能的实现方式中, 当所述接入 信息包括以下至少之一:接入位置信息、用户标识信息和设备标识信息时 , 所述根据所述接入信息确定所述用户的接入方式包括:  With reference to the first aspect, in a first possible implementation manner of the first aspect, when the access information includes at least one of: access location information, user identifier information, and device identifier information, The access information determines that the access mode of the user includes:
根据所述接入信息查询预先配置的安全接入白名单;  Querying a pre-configured secure access white list according to the access information;
若所述接入信息属于所述安全接入白名单,则确定所述用户的接入方 式为安全接入方式;  If the access information belongs to the secure access whitelist, determine that the access mode of the user is a secure access mode;
若所述接入信息不属于所述安全接入白名单,则确定所述用户的接入 方式为非安全接入方式。  If the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
结合第一方面, 在第一方面的第二种可能的实现方式中, 当所述接入 信息包括以下至少之一:接入位置信息、用户标识信息和设备标识信息时 , 所述根据所述接入信息确定所述用户的接入方式包括:  With reference to the first aspect, in a second possible implementation manner of the first aspect, when the access information includes at least one of: access location information, user identifier information, and device identifier information, The access information determines that the access mode of the user includes:
根据所述接入信息查询预先配置的安全接入黑名单;  Querying a pre-configured secure access blacklist according to the access information;
若所述接入信息不属于所述安全接入黑名单,则确定所述用户的接入 方式为安全接入方式;  If the access information does not belong to the security access blacklist, determine that the access mode of the user is a secure access mode;
若所述接入信息属于所述安全接入黑名单,则确定所述用户的接入方 式为非安全接入方式。  If the access information belongs to the secure access blacklist, it is determined that the access mode of the user is a non-secure access mode.
结合第一方面, 在第一方面的第三种可能的实现方式中, 当所述接入 信息包括接入认证信息时,所述根据所述接入信息确定所述用户的接入方 式包括:  With reference to the first aspect, in a third possible implementation manner of the first aspect, when the access information includes the access authentication information, the determining, by the access information, the access manner of the user includes:
若所述接入认证信息表明所述用户的接入方式通过接入认证系统的 认证, 则确定所述用户的接入方式为安全接入方式;  If the access authentication information indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode;
若所述接入认证信息表明所述用户的接入方式未通过接入认证系统 的认证, 则确定所述用户的接入方式为非安全接入方式。  If the access authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, the access mode of the user is determined to be a non-secure access mode.
结合第一方面或第一方面的第一种至第三种可能的实现方式中的任 意一种实现方式, 在第一方面的第四种可能的实现方式中, 所述以包含水 印的方式呈现目标信息包括: In combination with the first aspect or any one of the first to third possible implementations of the first aspect, in a fourth possible implementation of the first aspect, the The way to present the target information includes:
同时呈现目标信息和独立的水印;  Presenting target information and independent watermarks simultaneously;
或, 将水印插入到目标信息的显示图形帧中, 呈现已插入水印的目标 信息。  Or, insert the watermark into the display graphic frame of the target information, and present the target information of the inserted watermark.
结合第一方面或第一方面的第一种至第四种可能的实现方式中的任 意一种实现方式, 在第一方面的第五种可能的实现方式中, 在以包含水印 的方式呈现目标信息之前, 还包括:  In combination with the first aspect or any one of the first to fourth possible implementations of the first aspect, in a fifth possible implementation of the first aspect, the target is presented in a manner including a watermark Before the information, it also includes:
获取所述目标信息的安全级别, 根据所述安全级别确定水印类型; 所述以包含水印的方式呈现目标信息为:以包含所述水印类型对应的 水印的方式呈现目标信息。  Obtaining a security level of the target information, determining a watermark type according to the security level; and presenting the target information in a manner including a watermark: presenting the target information in a manner of including a watermark corresponding to the watermark type.
结合第一方面的第五种可能的实现方式,在第一方面的第六种可能的 实现方式中, 影响所述水印类型的因素包括以下至少之一: 水印位置、 水 印大小、 水印颜色和水印内容。  With reference to the fifth possible implementation manner of the first aspect, in a sixth possible implementation manner of the first aspect, the factor affecting the watermark type includes at least one of the following: a watermark location, a watermark size, a watermark color, and a watermark content.
结合第一方面或第一方面的第一种至第六种可能的实现方式中的任 意一种实现方式, 在第一方面的第七中可能的实现方式中, 还包括:  With reference to the first aspect, or any one of the first to the sixth possible implementation manners of the first aspect, in a possible implementation manner of the seventh aspect of the first aspect, the method further includes:
在非安全接入方式下, 若无法以包含水印的方式呈现目标信息, 则进 行告警或停止向所述用户提供服务。  In the non-secure access mode, if the target information cannot be presented in a manner including a watermark, an alarm is issued or the service is stopped to be provided to the user.
本发明的第二方面, 提供一种信息呈现设备, 应用于用户接入到云计 算系统,并对所述云计算系统中存储的目标信息进行访问的过程中,包括: 获取单元, 用于获取用户的接入信息;  A second aspect of the present invention provides an information presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, and includes: an acquiring unit, configured to acquire User access information;
确定单元,用于根据所述获取单元获取的接入信息确定所述用户的接 入方式;  a determining unit, configured to determine, according to the access information acquired by the acquiring unit, an access mode of the user;
第一呈现单元,用于当所述确定单元确定所述接入方式为安全接入方 式时, 以不含水印的方式呈现目标信息;  a first presentation unit, configured to: when the determining unit determines that the access mode is a secure access mode, present the target information in a manner that does not include a watermark;
第二呈现单元,用于当所述确定单元确定所述接入方式为非安全接入 方式时, 以包含水印的方式呈现目标信息。  And a second rendering unit, configured to: when the determining unit determines that the access mode is a non-secure access mode, present the target information in a manner including a watermark.
结合第二方面, 在第二方面的第一种可能的实现方式中, 所述获取单 元获取的接入信息包括以下至少之一: 接入位置信息、 用户标识信息和设 备标识信息, 所述确定单元包括: 查询子单元,用于根据所述获取单元获取的接入信息查询预先配置的 安全接入白名单; With reference to the second aspect, in a first possible implementation manner of the second aspect, the access information acquired by the acquiring unit includes at least one of: access location information, user identifier information, and device identifier information, where the determining The unit includes: Querying a sub-unit, configured to query a pre-configured secure access white list according to the access information obtained by the obtaining unit;
确定子单元,用于在所述查询子单元得到的查询结果表明所述接入信 息属于所述安全接入白名单时, 确定所述用户的接入方式为安全接入方 式;在所述查询子单元得到的查询结果表明所述接入信息不属于所述安全 接入白名单时, 确定所述用户的接入方式为非安全接入方式。  Determining a sub-unit, wherein when the query result obtained by the query sub-unit indicates that the access information belongs to the secure access white list, determining that the access mode of the user is a secure access mode; The query result obtained by the subunit indicates that the access information does not belong to the secure access whitelist, and determines that the access mode of the user is a non-secure access mode.
结合第二方面, 在第二方面的第二种可能的实现方式中, 所述获取单 元获取的接入信息包括以下至少之一: 接入位置信息、 用户标识信息和设 备标识信息时, 所述确定单元包括:  With reference to the second aspect, in a second possible implementation manner of the second aspect, the access information acquired by the acquiring unit includes at least one of the following: when accessing location information, user identifier information, and device identifier information, The determining unit includes:
查询子单元,用于根据所述获取单元获取的接入信息查询预先配置的 安全接入黑名单;  Querying a sub-unit, configured to query a pre-configured blacklist of security access according to the access information obtained by the acquiring unit;
确定子单元,用于在所述查询子单元得到的查询结果表明所述接入信 息不属于所述安全接入黑名单时,确定所述用户的接入方式为安全接入方 式;在所述查询子单元得到的查询结果表明所述接入信息属于所述安全接 入黑名单时, 确定所述用户的接入方式为非安全接入方式。  Determining a subunit, where the query result obtained by the query subunit indicates that the access information does not belong to the security access blacklist, determining that the access mode of the user is a secure access mode; The query result obtained by the query subunit indicates that the access information belongs to the secure access blacklist, and determines that the access mode of the user is a non-secure access mode.
结合第二方面, 在第二方面的第三种可能的实现方式中, 所述获取单 元获取的接入信息包括接入认证信息, 所述确定单元还用于:  With reference to the second aspect, in a third possible implementation manner of the second aspect, the access information acquired by the acquiring unit includes access authentication information, and the determining unit is further configured to:
若所述获取单元获取的接入认证信息表明所述用户的接入方式通过 接入认证系统的认证, 则确定所述用户的接入方式为安全接入方式; 若所 述获取单元获取的接入认证信息表明所述用户的接入方式未通过接入认 证系统的认证, 则确定所述用户的接入方式为非安全接入方式。  If the access authentication information obtained by the acquiring unit indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode; The authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, and the access mode of the user is determined to be a non-secure access mode.
结合第二方面或第二方面的第一种至第三种可能的实现方式中的任 意一种实现方式, 在第二方面的第四种可能的实现方式中, 所述第二呈现 单元用于:  With reference to the second aspect, or any one of the first to the third possible implementation manners of the second aspect, in a fourth possible implementation manner of the second aspect, the second presentation unit is used :
同时呈现目标信息和独立的水印;  Presenting target information and independent watermarks simultaneously;
或, 将水印插入到目标信息的显示图形帧中, 呈现已插入水印的目标 信息。  Or, insert the watermark into the display graphic frame of the target information, and present the target information of the inserted watermark.
结合第二方面或第二方面的第一种至第四种可能的实现方式中的任 意一种实现方式, 在第二方面的第五种可能的实现方式中, 还包括: 水印确定单元,用于在所述第二呈现单元以包含水印的方式呈现目标 信息之前, 获取所述目标信息的安全级别, 根据所述安全级别确定水印类 型; With reference to the second aspect, or any one of the first to the fourth possible implementation manners of the second aspect, in a fifth possible implementation manner of the second aspect, the method further includes: a watermark determining unit, configured to acquire a security level of the target information, and determine a watermark type according to the security level, before the second rendering unit presents the target information in a manner including a watermark;
所述第二呈现单元还用于:以包含所述水印确定单元所确定的水印类 型对应的水印的方式呈现目标信息。  The second rendering unit is further configured to: present the target information in a manner that includes a watermark corresponding to the watermark type determined by the watermark determining unit.
结合第二方面的第五种可能的实现方式,在第二方面的第六种可能的 实现方式中,影响所述水印确定单元确定的水印类型的因素包括以下至少 之一: 水印位置、 水印大小、 水印颜色和水印内容。  With reference to the fifth possible implementation manner of the second aspect, in a sixth possible implementation manner of the second aspect, the factor affecting the watermark type determined by the watermark determining unit includes at least one of the following: a watermark location, a watermark size , watermark color and watermark content.
结合第二方面或第二方面的第一种至第六种可能的实现方式中的任 意一种实现方式, 在第二方面的第七中可能的实现方式中, 还包括:  With reference to the second aspect, or any one of the first to the sixth possible implementation manners of the second aspect, in a possible implementation manner of the seventh aspect, the method further includes:
监控单元, 用于在非安全接入方式下, 当检测到所述第二呈现单元无 法以包含水印的方式呈现目标信息时,进行告警或停止向所述用户提供服 务。  And a monitoring unit, configured to: in the non-secure access mode, when detecting that the second rendering unit cannot present the target information in a manner including a watermark, performing an alarm or stopping providing the service to the user.
本发明的第三方面, 提供一种新型呈现设备, 应用于用户接入到云计 算系统,并对所述云计算系统中存储的目标信息进行访问的过程中,包括: 接收器, 用于获取用户的接入信息;  A third aspect of the present invention provides a novel presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, and includes: a receiver, configured to acquire User access information;
处理器,用于根据所述接收器获取的接入信息确定所述用户的接入方 式; 若所述接入方式为安全接入方式, 则控制显示器以不含水印的方式呈 现目标信息; 若所述接入方式为非安全接入方式, 则控制显示器以包含水 印的方式呈现目标信息;  a processor, configured to determine, according to the access information acquired by the receiver, an access mode of the user; if the access mode is a secure access mode, control the display to present the target information in a manner that does not include a watermark; The access mode is a non-secure access mode, and the control display device presents the target information in a manner including a watermark;
显示器,用于在所述处理器的控制下以包含或者不含水印的方式呈现 目标信息。  A display for presenting target information in a manner with or without a watermark under the control of the processor.
结合第三方面, 在第三方面的第一种可能的实现方式中, 所述接入信 息包括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息, 该 设备还包括:  With reference to the third aspect, in a first possible implementation manner of the third aspect, the access information includes at least one of the following: access location information, user identifier information, and device identifier information, where the device further includes:
存储器, 用于存储预先配置的安全接入白名单;  a memory for storing a pre-configured secure access whitelist;
所述处理器还用于:根据所述接收器获取的接入信息查询所述存储器 中存储的安全接入白名单;  The processor is further configured to: query, according to the access information acquired by the receiver, a secure access white list stored in the memory;
若查询结果表明所述接入信息属于所述安全接入白名单,则确定所述 用户的接入方式为安全接入方式; If the query result indicates that the access information belongs to the secure access white list, determine the The user access mode is a secure access mode.
若查询结果表明所述接入信息不属于所述安全接入白名单,则确定所 述用户的接入方式为非安全接入方式。  If the query result indicates that the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
结合第三方面, 在第三方面的第二种可能的实现方式中, 所述接入信 息包括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息, 该 设备还包括:  With reference to the third aspect, in a second possible implementation manner of the third aspect, the access information includes at least one of the following: access location information, user identification information, and device identification information, where the device further includes:
存储器, 用于存储预先配置的安全接入黑名单;  a memory for storing a pre-configured secure access blacklist;
所述处理器还用于:根据所述接收器获取的接入信息查询所述存储器 中存储的安全接入黑名单;  The processor is further configured to: query the secure access blacklist stored in the memory according to the access information acquired by the receiver;
若查询结果表明所述接入信息不属于所述安全接入黑名单,则确定所 述用户的接入方式为安全接入方式;  If the query result indicates that the access information does not belong to the security access blacklist, determine that the access mode of the user is a secure access mode;
若查询结果表明所述接入信息不属于所述安全接入黑名单,则确定所 述用户的接入方式为非安全接入方式。  If the query result indicates that the access information does not belong to the secure access blacklist, it is determined that the access mode of the user is a non-secure access mode.
结合第三方面, 在第三方面的第三种可能的实现方式中, 所述接入信 息包括接入认证信息, 所述处理器还用于:  With reference to the third aspect, in a third possible implementation manner of the third aspect, the access information includes access authentication information, and the processor is further configured to:
若所述接入认证信息表明所述用户的接入方式通过接入认证系统的 认证, 则确定所述用户的接入方式为安全接入方式;  If the access authentication information indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode;
若所述接入认证信息表明所述用户的接入方式未通过接入认证系统 的认证, 则确定所述用户的接入方式为非安全接入方式。  If the access authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, the access mode of the user is determined to be a non-secure access mode.
结合第三方面或第三方面的第一种至第三种可能的实现方式中的任 意一种实现方式, 在第三方面的第四种可能的实现方式中, 所述处理器还 用于:  With reference to the third aspect, or any one of the first to the third possible implementation manners of the third aspect, in a fourth possible implementation manner of the third aspect, the processor is further configured to:
控制所述显示器同时呈现目标信息和独立的水印;  Controlling the display to simultaneously present target information and an independent watermark;
或, 将水印插入到目标信息的显示图形帧中, 控制所述显示器呈现已 插入水印的目标信息。  Or, inserting a watermark into the display graphic frame of the target information, and controlling the display to present the target information of the inserted watermark.
结合第三方面或第三方面的第一种至第四种可能的实现方式中的任 意一种实现方式, 在第三方面的第五种可能的实现方式中, 所述接收器还 用于: 在所述处理器控制所述显示器以包含水印的方式呈现目标信息之 前, 获取所述目标信息的安全级别; 所述处理器还用于, 根据所述接收器获取的安全级别确定水印类型; 以包含所述水印类型对应的水印的方式呈现目标信息。 With reference to the third aspect, or any one of the first to the fourth possible implementation manners of the third aspect, in a fifth possible implementation manner of the third aspect, the receiver is further configured to: Obtaining a security level of the target information before the processor controls the display to present target information in a manner including a watermark; The processor is further configured to: determine a watermark type according to a security level acquired by the receiver; and present target information in a manner of including a watermark corresponding to the watermark type.
结合第三方面的第五种可能的实现方式,在第三方面的第六种可能的 实现方式中, 影响所述处理器确定的水印类型的因素包括以下至少之一: 水印位置、 水印大小、 水印颜色和水印内容。  With reference to the fifth possible implementation manner of the third aspect, in a sixth possible implementation manner of the third aspect, a factor that affects a watermark type determined by the processor includes at least one of: a watermark location, a watermark size, Watermark color and watermark content.
结合第三方面或第三方面的第一种至第六种可能的实现方式中的任 意一种实现方式, 在第三方面的第七中可能的实现方式中, 所述处理器还 用于: 在非安全接入方式下, 若无法以包含水印的方式呈现目标信息, 则 进行告警或停止向所述用户提供服务。  With reference to the third aspect, or any one of the first to the sixth possible implementation manners of the third aspect, in a possible implementation manner of the seventh aspect, the processor is further configured to: In the non-secure access mode, if the target information cannot be presented in a manner including a watermark, an alarm is issued or the service is stopped to be provided to the user.
本发明实施例提供的信息呈现方法及设备,与现有技术中水印一直存 在于目标信息中的技术相比,通过获取接入到云计算系统的用户的接入信 息, 确定用户是否为安全接入, 从而可以在用户为安全接入时以不含水印 的方式呈现目标信息, 以避免在安全接入方式下水印造成的视觉干扰, 有 利于目标信息的观看和使用。 附图说明 实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。  The information presentation method and device provided by the embodiment of the present invention, compared with the technology in the prior art that the watermark is always present in the target information, determine whether the user is securely connected by obtaining access information of the user accessing the cloud computing system. Into, the target information can be presented in a watermark-free manner when the user accesses the security, so as to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are to be regarded as Other drawings may also be obtained from these drawings without the use of creative labor.
图 1为本发明一实施例中的一种信息呈现方法流程图;  FIG. 1 is a flowchart of an information presentation method according to an embodiment of the present invention;
图 2为本发明另一实施例中的一种信息呈现方法流程图;  2 is a flowchart of a method for presenting information according to another embodiment of the present invention;
图 3为本发明另一实施例中的一种系统架构示例图;  3 is a diagram showing an example of a system architecture in another embodiment of the present invention;
图 4为本发明另一实施例中的另一种系统架构示例图;  4 is a diagram showing another example of a system architecture in another embodiment of the present invention;
图 5为本发明另一实施例中的一种信息呈现设备组成示意图; 图 6为本发明另一实施例中的确定单元组成示意图;  5 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention; FIG. 6 is a schematic diagram of a composition of a determining unit according to another embodiment of the present invention;
图 7为本发明另一实施例中的一种信息呈现设备组成示意图; 图 8为本发明另一实施例中的一种信息呈现设备组成示意图; 图 9为本发明另一实施例中的一种信息呈现设备组成示意图。 FIG. 7 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention; FIG. 8 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention; FIG. 9 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention.
具体实施方式 detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进 行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。基于本发明中的实施例, 本领域普通技术人员在没 有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的 范围。  The technical solutions in the embodiments of the present invention are clearly and completely described in conjunction with the drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
另外, 本文中术语"和 /或", 仅仅是一种描述关联对象的关联关系, 表示可以存在三种关系, 例如, A和 /或 B , 可以表示: 单独存在 A , 同时 存在 A和 B , 单独存在 B这三种情况。 另外, 本文中字符" /", 一般表示 前后关联对象是一种 "或"的关系。  In addition, the term "and/or" in this context is merely an association describing the associated object, indicating that there may be three relationships, for example, A and / or B, which may indicate that A exists separately, and A and B exist simultaneously. There are three cases of B alone. In addition, the character " /" in this article generally means that the contextual object is an "or" relationship.
本发明的一实施例提供一种信息呈现方法, 如图 1所示, 包括: An embodiment of the present invention provides an information presentation method, as shown in FIG. 1 , including:
1 01、 获取用户的接入信息。 1 01. Obtain the access information of the user.
需要说明的是,本发明提供的方法可以应用于用户访问目标信, I.的过 程中, 其中所述目标信息存储于云计算系统中。  It should be noted that the method provided by the present invention can be applied to a process in which a user accesses a target letter, I., wherein the target information is stored in a cloud computing system.
1 02、 根据所述接入信息确定所述用户的接入方式, 所述接入方式包 括安全接入方式和非安全接入方式。  The access mode of the user is determined according to the access information, where the access mode includes a secure access mode and a non-secure access mode.
其中, 所述接入信息包括以下至少之一: 接入位置信息、 接入认证信 息、 用户标识信息和设备标识信息。  The access information includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
1 03、 若所述接入方式为安全接入方式, 则以不含水印的方式呈现目 标信息。  1 03. If the access mode is a secure access mode, the target information is presented in a manner that does not include a watermark.
1 04、 若所述接入方式为非安全接入方式, 则以包含水印的方式呈现 目标信息。  1 04. If the access mode is a non-secure access mode, the target information is presented in a manner including a watermark.
其中, 以包含水印的方式呈现目标信息的方法包括: 同时呈现目标信 息和独立的水印; 或, 将水印插入到目标信息的显示图形帧中, 呈现已插 入水印的目标信息。  The method for presenting the target information in a manner including a watermark includes: simultaneously presenting the target information and the independent watermark; or, inserting the watermark into the display graphic frame of the target information, and presenting the target information of the inserted watermark.
本实施例提供的信息呈现方法,与现有技术中水印一直存在于目标信 息中的方法相比, 通过获取接入到云计算系统的用户的接入信息, 确定用 户是否为安全接入,从而可以在用户为安全接入时以不含水印的方式呈现 目标信息, 以避免在安全接入方式下水印造成的视觉干扰, 有利于目标信 息的观看和使用。 本发明的另一实施例提供一种信息呈现方法, 如图 2所示, 包括:The information presentation method provided in this embodiment is compared with the method in the prior art in which the watermark is always present in the target information, and the access information of the user accessing the cloud computing system is obtained. Whether the user is a secure access, the target information can be presented in a watermark-free manner when the user accesses the security, to avoid visual interference caused by the watermark in the secure access mode, and is beneficial to the viewing and use of the target information. Another embodiment of the present invention provides an information presentation method, as shown in FIG. 2, including:
201、 获取用户的接入信息。 201. Acquire access information of the user.
在本实施例的一种实现方式中, 所述接入信息可以包括以下至少之 一:接入位置信息、用户标识信息和设备标识信息;在另一种实现方式中, 所述接入信息可以包括接入认证信息。  In an implementation manner of this embodiment, the access information may include at least one of the following: the access location information, the user identifier information, and the device identifier information. In another implementation manner, the access information may be Includes access authentication information.
当所述接入信息包括接入位置信息、用户标识信息和设备标识信息中 至少之一时, 以下步骤 202 以预先配置有安全接入白名单的场景为例, 确 定用户的接入方式:  When the access information includes at least one of the access location information, the user identification information, and the device identification information, the following step 202 is performed by using a scenario in which the secure access whitelist is pre-configured as an example to determine the access mode of the user:
202、 根据所述接入信息查询预先配置的安全接入白名单; 若查询结 果表明所述接入信息属于所述安全接入白名单,则确定所述用户的接入方 式为安全接入方式, 执行步骤 203 ; 若查询结果表明所述接入信息不属于 所述安全接入白名单, 则确定所述用户的接入方式为非安全接入方式, 执 行步骤 204。  202. Query, according to the access information, a pre-configured secure access whitelist. If the query result indicates that the access information belongs to the secure access whitelist, determine that the access mode of the user is a secure access mode. Step 203: If the query result indicates that the access information does not belong to the secure access whitelist, determine that the access mode of the user is a non-secure access mode, and perform step 204.
具体的, 如图 3所示的架构中, 可以根据用户的接入位置信息、 用户 标识信息或设备标识信息查询安全接入白名单, 在白名单中则为安全接 入; 或者, 根据用户的接入位置信息、 用户标识信息或设备标识信息查询 黑名单, 在黑名单中则为非安全接入。 例如, 以图 3为例, 在办公区的接 入 I P地址在白名单中, 是安全接入方式, 在酒店的接入 IP地址不在白名 单中, 视为非安全接入方式。 其中, 接入位置识别模块用于识别用户的接 入方式。进一步的,信息安全级别识别模块可以识别目标信息的安全级别。 安全策略控制模块根据用户接入方式和安全级别决策是否呈现水印、水印 的样式、 类型或大小等要素, 并将策略信息发送给数字水印处理模块, 由 数字水印处理模块进行水印的生成和呈现。  Specifically, in the architecture shown in FIG. 3, the secure access whitelist may be queried according to the user's access location information, the user identification information, or the device identification information, or the secure access in the whitelist; or, according to the user's The blacklist is queried for access location information, user identification information, or device identification information, and is not securely accessed in the blacklist. For example, in Figure 3, the access IP address in the office area is in the whitelist, which is a secure access mode. The access IP address of the hotel is not in the whitelist, and is regarded as a non-secure access mode. The access location identification module is used to identify the access mode of the user. Further, the information security level identification module can identify the security level of the target information. The security policy control module determines whether to present the watermark, the style, type or size of the watermark according to the user access mode and the security level, and sends the policy information to the digital watermark processing module, and the digital watermark processing module generates and presents the watermark.
当所述接入信息包括接入位置信息、用户标识信息和设备标识信息中 至少之一时, 以下步骤 202 ' 以预先配置有安全接入黑名单的场景为例, 确定用户的接入方式: When the access information includes at least one of the access location information, the user identification information, and the device identification information, the following step 202' is performed by using a scenario in which the security access blacklist is pre-configured. Determine the user's access method:
202 ' 、 根据所述接入信息查询预先配置的安全接入黑名单; 若查询 结果表明所述接入信息不属于所述安全接入黑名单,则确定所述用户的接 入方式为安全接入方式, 执行步骤 203 ; 若查询结果表明所述接入信息属 于所述安全接入黑名单, 则确定所述用户的接入方式为非安全接入方式, 执行步骤 204。  And determining, according to the access information, a pre-configured secure access blacklist; if the query result indicates that the access information does not belong to the secure access blacklist, determining that the user access mode is securely connected If the query result indicates that the access information belongs to the security access blacklist, the access mode of the user is determined to be a non-secure access mode, and step 204 is performed.
当所述接入信息包括接入认证信息时, 可以通过以下步骤 202〃 确定 用户的接入方式:  When the access information includes the access authentication information, the user access method may be determined by the following step 202:
202 " 、根据接入认证系统的接入认证信息判断所述用户的接入方式; 若所述接入认证信息表明所述用户的接入方式通过接入认证系统的认证, 则确定所述用户的接入方式为安全接入方式, 执行步骤 203 ; 若所述接入 认证信息表明所述用户的接入方式未通过接入认证系统的认证,则确定所 述用户的接入方式为非安全接入方式, 执行步骤 204。 例如图 4所示的架 构中, 用户的接入还可以通过接入认证系统的认证。 接入认证系统可以对 用户的接入位置信息、 用户标识信息或设备标识信息进行认证, 也可以釆 用账号密码等方式进行认证, 本发明实施例对此不做限定。  202: determining, according to the access authentication information of the access authentication system, the access mode of the user; if the access authentication information indicates that the access mode of the user passes the authentication of the access authentication system, determining the user The access mode is a secure access mode, and step 203 is performed. If the access authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, it is determined that the access mode of the user is not secure. In the access mode, step 204 is performed. For example, in the architecture shown in Figure 4, the user's access may also be authenticated by the access authentication system. The access authentication system may access the user's access location information, user identification information, or device identifier. The information is authenticated, and the authentication may be performed by using an account password or the like. This embodiment of the present invention does not limit this.
值得说明的是, 在本实施例中, 步骤 202、 202 ' 和 202〃 是三种可选 的确定用户的接入方式的具体实现方式,在实际应用中可以选择以上三种 具体实现方式中的一种。图 3和图 4中用户虚拟机内部各个单元的功能及 连接方式, 在图 5-7对应的信息呈现设备的实施例中进行描述, 本实施例 这里不做佯细介绍。  It should be noted that, in this embodiment, the steps 202, 202 ′ and 202 〃 are three specific implementation manners for determining the access mode of the user, and may be selected in the above three specific implementation manners in practical applications. One. The functions and the connection modes of the internal units of the user virtual machine in FIG. 3 and FIG. 4 are described in the embodiment of the information presentation device corresponding to FIG. 5-7, which is not described in detail in this embodiment.
203、 以不含水印的方式呈现目标信息。  203. Present the target information in a manner that does not include a watermark.
其中, 以不含水印的方式呈现目标信息即为呈现目标信息, 在目标信 息中没有水印的干扰,便于用户查看,从而不会影响信息本身的视觉效果。  Wherein, the target information is presented in a manner that does not contain a watermark, that is, the target information is presented, and there is no watermark interference in the target information, which is convenient for the user to view, thereby not affecting the visual effect of the information itself.
204、 将水印插入到目标信息的显示图形帧中, 呈现已插入水印的目 标信息。  204. Insert a watermark into the display graphic frame of the target information, and present the target information of the inserted watermark.
其中,在确定用户是以非安全接入方式接入到云计算系统以打开云计 算系统中的目标信息时, 才对本次呈现进行插入水印的操作, 而非在云计 算系统中生成文件时即在每个文件中插入固有的水印,从而保证目标信息 可以有灵活的呈现方式。 这种水印与目标信息混合呈现方式, 在目标信息 呈现时, 在其显示的图形帧中插入数字水印信息。 这种呈现方式, 处理复 杂 ,但视觉效果好。可以根据要插入位置的周边图形信息进行适应性调整 , 如周边是红色的, 可以插入与红色接近的图形, 以平滑过渡。 Wherein, when it is determined that the user accesses the cloud computing system in a non-secure access manner to open the target information in the cloud computing system, the watermark insertion operation is performed on the present presentation, instead of generating the file in the cloud computing system. That is, insert an intrinsic watermark in each file to ensure target information. Can have a flexible presentation. The watermark and the target information are mixed and presented, and the digital watermark information is inserted into the graphic frame displayed when the target information is presented. This way of presentation, the processing is complex, but the visual effect is good. The adjustment can be made according to the surrounding graphic information of the position to be inserted. If the periphery is red, a graphic close to red can be inserted to smooth the transition.
本实施例中,步骤 2 04可以以包含水印的方式呈现目标信息,可选的, 步骤 204也可以替换为: 同时呈现目标信息和独立的水印。 这种显示方式 可以称为屏幕水印, 即该水印与目标信息的内容无关, 只是在显示屏幕上 显示,从而不用对文件内容进行改动,又同时起到防拍照和防泄密的作用。 独立的数字水印呈现进程, 在用户屏幕上呈现对应类型的数字水印。 这种 方式, 水印与目标信息是独立呈现的, 处理简单, 但两者显示的效果可能 不是很平滑。 当然, 本实施例还可以釆用其他方式实现以包含水印的方式 呈现目标信息, 本实施例不——赘述。  In this embodiment, step 205 may present the target information in a manner including a watermark. Alternatively, step 204 may be replaced by: simultaneously presenting the target information and the independent watermark. This display mode can be called a screen watermark, that is, the watermark has nothing to do with the content of the target information, but is displayed on the display screen, so that the file content is not changed, and at the same time, the image is prevented from being taken out and leakproof. A separate digital watermark rendering process presents a corresponding type of digital watermark on the user's screen. In this way, the watermark and the target information are presented independently, and the processing is simple, but the effect of the two displays may not be very smooth. Of course, in this embodiment, the target information may be presented in a manner that includes a watermark in other manners, which is not described in this embodiment.
进一步可选的, 本发明实施例的方法还可以包括在步骤 204之前, 识 别用户使用的目标信息的安全级别, 并根据该安全级别信息生成水印。 其 中, 目标信息的安全级别的识别方法, 是业界现有技术, 本文不展开。 如 此, 步骤 2 04的具体实现方法可以为: 根据用户的接入位置和用户使用的 文档信息安全的级别, 形成安全策略, 按照该安全策略进行水印处理。  Further optionally, the method of the embodiment of the present invention may further include: prior to step 204, identifying a security level of the target information used by the user, and generating a watermark according to the security level information. Among them, the identification method of the security level of the target information is the existing technology in the industry, and this article does not expand. Therefore, the specific implementation method of step 224 may be: forming a security policy according to the access location of the user and the security level of the document information used by the user, and performing watermark processing according to the security policy.
例如, 具体的一种安全策略控制方法可以为: 当用户从非安全区域接 入, 使用绝密级文档, 则呈现的数字水印类型为 1 ; 当用户从非安全区域 接入, 使用机密级文档, 则呈现的数字水印类型为 2 ; 当用户从非安全区 域接入, 使用秘密级文档, 则呈现的数字水印类型为 3。 进一步的, 水印类型可预先编辑, 影响水印类型的因素包括以下至少 之一: 呈现在屏幕的不同位置、 占据屏幕大小、 水印颜色和水印内容等。 水印内容可以包括: 使用者相关的信息, 例如姓名、 工号、 I P地址、 时间 等。 进一步可选的, 为了进一步保证目标信息呈现过程中的安全性, 避免 用户篡改或停止水印生成和显示的进程, 本实施例还可以包括: For example, a specific security policy control method may be: when a user accesses from a non-secure area, using a top secret document, the digital watermark type is 1; when the user accesses from a non-secure area, using a confidential document, The digital watermark type presented is 2; when the user accesses from the non-secure area and uses the secret level document, the digital watermark type presented is 3. Further, the watermark type may be pre-edited, and the factors affecting the watermark type include at least one of the following: presentation at different positions of the screen, occupying the screen size, watermark color, and watermark content, and the like. The watermark content may include: user-related information such as name, job number, IP address, time, and the like. Further, in order to further ensure the security of the target information presentation process, and to prevent the user from tampering or stopping the process of watermark generation and display, the embodiment may further include:
205、 在非安全接入方式下, 若无法以包含水印的方式呈现目标信息, 则进行告警或停止向所述用户提供服务。  205. In the non-secure access mode, if the target information cannot be presented in a manner including a watermark, perform an alarm or stop providing the service to the user.
本实施例提供的信息呈现方法,与现有技术中水印一直存在于目标信 息中的方法相比, 通过获取接入到云计算系统的用户的接入信息, 确定用 户是否为安全接入,从而可以在用户为安全接入时以不含水印的方式呈现 目标信息, 以避免在安全接入方式下水印造成的视觉干扰, 有利于目标信 息的观看和使用。 本发明另一实施例提供一种信息呈现设备,应用于用户接入到云计算 系统, 并对所述云计算系统中存储的目标信息进行访问的过程中,如图 5 所示, 包括:  The information presentation method provided in this embodiment is compared with the method in which the watermark is always present in the target information in the prior art, and the access information of the user accessing the cloud computing system is obtained, thereby determining whether the user is securely accessing. The target information can be presented in a watermark-free manner when the user accesses the security to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information. Another embodiment of the present invention provides an information presentation device, which is applied to a user accessing a cloud computing system and accessing target information stored in the cloud computing system, as shown in FIG. 5, including:
获取单元 5 1 , 用于获取用户的接入信息;  The obtaining unit 5 1 is configured to acquire access information of the user;
确定单元 52 , 用于根据所述获取单元 5 1获取的接入信息确定所述用 户的接入方式;  a determining unit 52, configured to determine, according to the access information acquired by the acquiring unit 51, an access mode of the user;
第一呈现单元 5 3 , 用于当所述确定单元 52确定所述接入方式为安全 接入方式时, 以不含水印的方式呈现目标信息;  The first presentation unit 5 3 is configured to: when the determining unit 52 determines that the access mode is a secure access mode, present the target information in a manner that does not include a watermark;
第二呈现单元 54 , 用于当所述确定单元 52确定所述接入方式为非安 全接入方式时, 以包含水印的方式呈现目标信息。  The second rendering unit 54 is configured to: when the determining unit 52 determines that the access mode is a non-secure access mode, present the target information in a manner including a watermark.
其中, 获取单元 5 1获取的接入信息包括以下至少之一: 接入位置信 息、 接入认证信息、 用户标识信息和设备标识信息。  The access information acquired by the obtaining unit 51 includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
在一种可能的实现方式中, 获取单元 5 1获取的接入信息包括以下至 少之一: 接入位置信息、 用户标识信息和设备标识信息, 如图 6所示, 所 述确定单元 52包括:  In a possible implementation manner, the access information acquired by the acquiring unit 51 includes at least one of the following: the access location information, the user identifier information, and the device identifier information. As shown in FIG. 6, the determining unit 52 includes:
查询子单元 521 , 用于根据所述获取单元 5 1 获取的接入信息查询预 先配置的安全接入白名单;  The query sub-unit 521 is configured to query the pre-configured secure access white list according to the access information obtained by the obtaining unit 51;
确定子单元 522 , 用于在所述查询子单元 52 1得到的查询结果表明所 述接入信息属于所述安全接入白名单时,确定所述用户的接入方式为安全 接入方式;在所述查询子单元 52 1得到的查询结果表明所述接入信息不属 于所述安全接入白名单时, 确定所述用户的接入方式为非安全接入方式。 a determining sub-unit 522, configured to determine, when the query result obtained by the query sub-unit 52 1 indicates that the access information belongs to the secure access white list, determine that the access mode of the user is secure The access mode is determined when the query result obtained by the query sub-unit 52 1 indicates that the access information does not belong to the secure access whitelist, and the access mode of the user is determined to be a non-secure access mode.
或者, 当获取单元 51获取的接入信息包括以下至少之一: 接入位置 信息、 用户标识信息和设备标识信息时, 如图 6 所示, 所述确定单元 52 包括:  Alternatively, when the access information acquired by the obtaining unit 51 includes at least one of the following: access location information, user identification information, and device identification information, as shown in FIG. 6, the determining unit 52 includes:
查询子单元 521 , 用于根据所述获取单元 5 1 获取的接入信息查询预 先配置的安全接入黑名单;  The query sub-unit 521 is configured to query the pre-configured secure access blacklist according to the access information obtained by the obtaining unit 51;
确定子单元 522 , 用于在所述查询子单元 52 1得到的查询结果表明所 述接入信息不属于所述安全接入黑名单时,确定所述用户的接入方式为安 全接入方式;在所述查询子单元 521得到的查询结果表明所述接入信息属 于所述安全接入黑名单时, 确定所述用户的接入方式为非安全接入方式。  a determining sub-unit 522, configured to determine, when the query result obtained by the query sub-unit 52 1 indicates that the access information does not belong to the security access blacklist, determine that the access mode of the user is a secure access mode; When the query result obtained by the query sub-unit 521 indicates that the access information belongs to the secure access blacklist, the access mode of the user is determined to be a non-secure access mode.
在另一种可能的实现方式中, 所述获取单元 5 1获取的接入信息包括 接入认证信息, 所述确定单元 52还用于:  In another possible implementation manner, the access information acquired by the acquiring unit 51 includes the access authentication information, and the determining unit 52 is further configured to:
根据所述获取单元 5 1 获取的接入认证信息判断所述用户的接入方 式; 若所述获取单元 5 1获取的接入认证信息表明所述用户的接入方式通 过接入认证系统的认证, 则确定所述用户的接入方式为安全接入方式; 若 所述获取单元 5 1获取的接入认证信息表明所述用户的接入方式未通过接 入认证系统的认证, 则确定所述用户的接入方式为非安全接入方式。  Determining the access mode of the user according to the access authentication information acquired by the acquiring unit 51; if the access authentication information acquired by the acquiring unit 51 indicates that the access mode of the user is authenticated by the access authentication system Determining that the access mode of the user is a secure access mode; if the access authentication information acquired by the acquiring unit 51 indicates that the access mode of the user does not pass the authentication of the access authentication system, determining the The user access mode is non-secure access mode.
进一步的, 所述第二呈现单元 54用于: 同时呈现目标信息和独立的 水印; 或, 将水印插入到目标信息的显示图形帧中, 呈现已插入水印的目 标信息。  Further, the second presentation unit 54 is configured to: simultaneously present the target information and the independent watermark; or insert the watermark into the display graphic frame of the target information to present the target information of the inserted watermark.
进一步的, 如图 7 所示, 还包括水印确定单元 55 , 用于在所述第二 呈现单元 54以包含水印的方式呈现目标信息之前, 获取所述目标信息的 安全级别, 根据所述安全级别确定水印类型;  Further, as shown in FIG. 7, a watermark determining unit 55 is further configured to acquire a security level of the target information before the second rendering unit 54 presents the target information in a manner including a watermark, according to the security level. Determine the type of watermark;
所述第二呈现单元 54还用于:以包含所述水印确定单元 55所确定的 水印类型对应的水印的方式呈现目标信息。  The second rendering unit 54 is further configured to present the target information in a manner including a watermark corresponding to the watermark type determined by the watermark determining unit 55.
影响所述水印类型的因素包括以下至少之一: 水印位置、 水印大小、 水印颜色和水印内容。  Factors affecting the type of watermark include at least one of: watermark location, watermark size, watermark color, and watermark content.
所述信息呈现设备还包括: 监控单元 56 , 用于在非安全接入方式下, 当检测到所述第二呈现单 元 54无法以包含水印的方式呈现目标信息时, 进行告警或停止向所述用 户提供服务。 The information presentation device further includes: The monitoring unit 56 is configured to: in the non-secure access mode, when detecting that the second rendering unit 54 cannot present the target information in a manner including a watermark, perform an alarm or stop providing the service to the user.
另一方面, 本发明实施例还提供了一种信息呈现设备, 应用于用户接 入到云计算系统,并对所述云计算系统中存储的目标信息进行访问的过程 中,如图 8所示, 包括:  On the other hand, an embodiment of the present invention further provides an information presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, as shown in FIG. , including:
接收器 81 , 用于获取用户的接入信息。  The receiver 81 is configured to acquire access information of the user.
处理器 82 , 用于根据所述接收器 81获取的接入信息确定所述用户的 接入方式, 所述接入方式包括安全接入方式和非安全接入方式; 若所述接 入方式为安全接入方式, 则控制显示器以不含水印的方式呈现目标信息; 若所述接入方式为非安全接入方式,则控制显示器以包含水印的方式呈现 目标信息;  The processor 82 is configured to determine, according to the access information acquired by the receiver 81, the access mode of the user, where the access mode includes a secure access mode and a non-secure access mode; The secure access mode is used to control the display to present the target information in a manner that does not include a watermark; if the access mode is a non-secure access mode, the control display presents the target information in a manner including a watermark;
显示器 83 , 用于在所述处理器 82的控制下以包含或不含水印的方式 呈现目标信息。  A display 83 is configured to present the target information in a manner with or without a watermark under the control of the processor 82.
接收器 81接收的接入信息包括以下至少之一: 接入位置信息、 接入 认证信息、 用户标识信息和设备标识信息。  The access information received by the receiver 81 includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
进一步的, 当所述接入信息包括以下至少之一: 接入位置信息、 用户 标识信息和设备标识信息时, 此时该设备如图 9所示还包括:  Further, when the access information includes at least one of the following: access location information, user identification information, and device identification information, the device further includes:
存储器 84 , 用于存储预先配置的安全接入白名单。  The memory 84 is configured to store a pre-configured secure access white list.
所述处理器 82还用于:根据所述接收器 81获取的接入信息查询所述 存储器中存储的安全接入白名单;  The processor 82 is further configured to: query, according to the access information acquired by the receiver 81, the secure access white list stored in the memory;
若查询结果表明所述接入信息属于所述安全接入白名单,则确定所述 用户的接入方式为安全接入方式。  If the query result indicates that the access information belongs to the secure access whitelist, the access mode of the user is determined to be a secure access mode.
若查询结果表明所述接入信息不属于所述安全接入白名单,则确定所 述用户的接入方式为非安全接入方式。  If the query result indicates that the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
或者, 当所述接入信息包括以下至少之一: 接入位置信息、 用户标识 信息和设备标识信息时, 此时该设备如图 9所示还包括:  Or, when the access information includes at least one of the following: access location information, user identification information, and device identification information, the device further includes:
存储器 84 , 用于存储预先配置的安全接入黑名单。  The memory 84 is configured to store a pre-configured secure access blacklist.
所述处理器 82还用于:根据所述接收器 81获取的接入信息查询所述 存储器中存储的安全接入黑名单; The processor 82 is further configured to: query, according to the access information acquired by the receiver 81, a secure access blacklist stored in the memory;
若查询结果表明所述接入信息不属于所述安全接入黑名单,则确定所 述用户的接入方式为安全接入方式。  If the query result indicates that the access information does not belong to the security access blacklist, it is determined that the access mode of the user is a secure access mode.
若查询结果表明所述接入信息属于所述安全接入黑名单,则确定所述 用户的接入方式为非安全接入方式。  If the query result indicates that the access information belongs to the security access blacklist, the access mode of the user is determined to be a non-secure access mode.
进一步的, 当接入信息包括接入认证信息时, 处理器 82还用于: 根 据所述接收器 81接收的接入认证信息判断所述用户的接入方式; 若所述 接入认证信息表明所述用户的接入方式通过接入认证系统的认证,则确定 所述用户的接入方式为安全接入方式;若所述接入认证信息表明所述用户 的接入方式未通过接入认证系统的认证,则确定所述用户的接入方式为非 安全接入方式。  Further, when the access information includes the access authentication information, the processor 82 is further configured to: determine, according to the access authentication information received by the receiver 81, the access mode of the user; if the access authentication information indicates If the access mode of the user is authenticated by the access authentication system, the access mode of the user is determined to be a secure access mode; and the access authentication information indicates that the access mode of the user does not pass the access authentication. The authentication of the system determines that the access mode of the user is a non-secure access mode.
此外, 处理器 82还用于控制所述显示器同时呈现目标信息和独立的 水印;  In addition, the processor 82 is further configured to control the display to simultaneously present target information and a separate watermark;
或, 将水印插入到目标信息的显示图形帧中, 控制所述显示器呈现已 插入水印的目标信息。  Or, inserting a watermark into the display graphic frame of the target information, and controlling the display to present the target information of the inserted watermark.
所述接收器 81还用于: 在所述处理器 82控制所述显示器 83以包含 水印的方式呈现目标信息之前, 获取所述目标信息的安全级别;  The receiver 81 is further configured to: acquire a security level of the target information before the processor 82 controls the display 83 to present target information in a manner including a watermark;
所述处理器 82还用于,根据所述接收器 81接收的安全级别确定水印 类型; 以包含所述水印类型对应的水印的方式呈现目标信息。  The processor 82 is further configured to determine a watermark type according to a security level received by the receiver 81; and present the target information in a manner of including a watermark corresponding to the watermark type.
影响所述处理器 82确定的水印类型的因素包括以下至少之一: 水印 位置、 水印大小、 水印颜色和水印内容。  Factors affecting the type of watermark determined by the processor 82 include at least one of: watermark location, watermark size, watermark color, and watermark content.
所述处理器还 82用于: 在非安全接入方式下, 若无法以包含水印的 方式呈现目标信息, 则进行告警或停止向所述用户提供服务。  The processor is further configured to: in the non-secure access mode, if the target information cannot be presented in a manner including a watermark, perform an alarm or stop providing the service to the user.
本实施例提供的信息呈现设备,与现有技术中水印一直存在于目标信 息中的方法相比, 通过获取接入到云计算系统的用户的接入信息, 确定用 户是否为安全接入,从而可以在用户为安全接入时以不含水印的方式呈现 目标信息, 以避免在安全接入方式下水印造成的视觉干扰, 有利于目标信 息的观看和使用。  The information presentation device provided in this embodiment determines whether the user is securely accessing by obtaining the access information of the user accessing the cloud computing system, compared with the method in the prior art that the watermark is always present in the target information. The target information can be presented in a watermark-free manner when the user accesses the security to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到 本发明可借助软件加必需的通用硬件的方式来实现, 当然也可以通过硬 件, 但很多情况下前者是更佳的实施方式。 基于这样的理解, 本发明的技 术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式 体现出来, 该计算机软件产品存储在可读取的存储介质中, 如计算机的软 盘, 硬盘或光盘等, 包括若干指令用以使得一台计算机设备(可以是个人 计算机, 服务器, 或者网络设备等) 执行本发明各个实施例所述的方法。 以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不局 限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可 轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明 的保护范围应以所述权利要求的保护范围为准。 Through the description of the above embodiments, those skilled in the art can clearly understand The invention can be implemented by means of software plus the necessary general hardware, and of course also by hardware, but in many cases the former is a better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer. A hard disk or optical disk or the like includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention. The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the appended claims.

Claims

权 利 要 求 书 claims
1、 一种信息呈现方法, 应用于用户接入到云计算系统对云计算系统中 存储的目标信息进行访问的过程中, 其特征在于, 该方法包括: 1. An information presentation method, applied to the process of users accessing the cloud computing system to access target information stored in the cloud computing system, characterized in that the method includes:
获取所述用户的接入信息; Obtain the access information of the user;
根据所述接入信息确定所述用户的接入方式; Determine the access mode of the user according to the access information;
若所述接入方式为安全接入方式, 则以不含水印的方式呈现所述目标 信息; If the access method is a secure access method, the target information is presented without a watermark;
若所述接入方式为非安全接入方式, 则以包含水印的方式呈现所述目 标信息。 If the access method is a non-secure access method, the target information is presented in a manner including a watermark.
2、 根据权利要求 1所述的方法, 其特征在于, 2. The method according to claim 1, characterized in that,
所述接入信息包括以下至少之一: 接入位置信息、 接入认证信息、 用 户标识信息、 和设备标识信息。 The access information includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
3、 根据权利要求 1或 2所述的方法, 其特征在于, 当所述接入信息包 括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息时, 所述 根据所述接入信息确定所述用户的接入方式包括: 3. The method according to claim 1 or 2, characterized in that when the access information includes at least one of the following: access location information, user identification information and device identification information, The information determining the user's access method includes:
根据所述接入信息查询预先配置的安全接入白名单; Query the pre-configured secure access whitelist according to the access information;
若所述接入信息属于所述安全接入白名单, 则确定所述用户的接入方 式为安全接入方式; If the access information belongs to the secure access whitelist, it is determined that the user's access method is a secure access method;
若所述接入信息不属于所述安全接入白名单, 则确定所述用户的接入 方式为非安全接入方式。 If the access information does not belong to the secure access whitelist, it is determined that the user's access mode is a non-secure access mode.
4、 根据权利要求 1或 2所述的方法, 其特征在于, 当所述接入信息包 括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息时, 所述 根据所述接入信息确定所述用户的接入方式包括: 4. The method according to claim 1 or 2, characterized in that when the access information includes at least one of the following: access location information, user identification information and device identification information, The information determining the user's access method includes:
根据所述接入信息查询预先配置的安全接入黑名单; Query a preconfigured secure access blacklist according to the access information;
若所述接入信息不属于所述安全接入黑名单, 则确定所述用户的接入 方式为安全接入方式; If the access information does not belong to the secure access blacklist, determine that the user's access method is a secure access method;
若所述接入信息属于所述安全接入黑名单, 则确定所述用户的接入方 式为非安全接入方式。 If the access information belongs to the secure access blacklist, it is determined that the user's access mode is a non-secure access mode.
5、 根据权利要求 1或 2所述的方法, 其特征在于, 当所述接入信息包 括接入认证信息时,所述根据所述接入信息确定所述用户的接入方式包括: 若所述接入认证信息表明所述用户的接入方式通过接入认证系统的认 证, 则确定所述用户的接入方式为安全接入方式; 5. The method according to claim 1 or 2, characterized in that, when the access information includes access authentication information, determining the access mode of the user according to the access information includes: if If the access authentication information indicates that the user's access method has passed the authentication of the access authentication system, it is determined that the user's access method is a secure access method;
若所述接入认证信息表明所述用户的接入方式未通过接入认证系统的 认证, 则确定所述用户的接入方式为非安全接入方式。 If the access authentication information indicates that the user's access mode has not passed the authentication of the access authentication system, it is determined that the user's access mode is a non-secure access mode.
6、 根据权利要求 1 -5中任一项所述的方法, 其特征在于, 所述以包含 水印的方式呈现所述目标信息包括: 6. The method according to any one of claims 1 to 5, characterized in that: presenting the target information in a manner including a watermark includes:
同时呈现所述目标信息和独立的水印; 或, Present the target information and an independent watermark simultaneously; or,
将所述水印插入到所述目标信息的显示图形帧中, 呈现已插入水印的 目标信息。 The watermark is inserted into the display graphic frame of the target information, and the target information into which the watermark has been inserted is presented.
7、 根据权利要求 1 -6中任一项所述的方法, 其特征在于, 在以包含水 印的方式呈现所述目标信息之前, 还包括: 7. The method according to any one of claims 1 to 6, characterized in that, before presenting the target information in a manner including a watermark, it further includes:
获取所述目标信息的安全级别, 根据所述安全级别确定水印类型; 所述以包含水印的方式呈现所述目标信息为: 以包含所述水印类型对 应的水印的方式呈现所述目标信息。 Obtain the security level of the target information, and determine the watermark type according to the security level; Presenting the target information in a manner that includes a watermark is: Presenting the target information in a manner that includes a watermark corresponding to the watermark type.
8、 根据权利要求 7所述的方法, 其特征在于, 影响所述水印类型的因 素包括以下至少之一: 水印位置、 水印大小、 水印颜色、 和水印内容。 8. The method according to claim 7, wherein factors affecting the watermark type include at least one of the following: watermark position, watermark size, watermark color, and watermark content.
9、 根据权利要求 1 -8中任一项所述的方法, 其特征在于, 还包括: 在非安全接入方式下, 若无法以包含水印的方式呈现所述目标信息, 则进行告警或停止向所述用户提供服务。 9. The method according to any one of claims 1 to 8, further comprising: in a non-secure access mode, if the target information cannot be presented in a manner containing a watermark, alarm or stop Provide services to said users.
1 0、 一种信息呈现设备, 应用于用户接入到云计算系统, 并对所述云 计算系统中存储的目标信息进行访问的过程中, 其特征在于, 包括: 10. An information presentation device, used in the process of users accessing a cloud computing system and accessing target information stored in the cloud computing system, characterized in that it includes:
获取单元, 用于获取所述用户的接入信息; An acquisition unit, configured to acquire access information of the user;
确定单元, 用于根据所述获取单元获取的接入信息确定所述用户的接 入方式; Determining unit, configured to determine the access mode of the user according to the access information obtained by the obtaining unit;
第一呈现单元, 用于当所述确定单元确定所述接入方式为安全接入方 式时, 以不含水印的方式呈现所述目标信息; The first presentation unit is configured to present the target information in a watermark-free manner when the determining unit determines that the access method is a secure access method;
第二呈现单元, 用于当所述确定单元确定所述接入方式为非安全接入 方式时, 以包含水印的方式呈现所述目标信息。 The second presentation unit is used when the determining unit determines that the access method is non-secure access. mode, the target information is presented in a manner including a watermark.
1 1、 根据权利要求 1 0所述的设备, 其特征在于, 所述获取单元获取的 接入信息包括以下至少之一: 接入位置信息、 接入认证信息、 用户标识信 息和设备标识信息。 11. The device according to claim 10, wherein the access information obtained by the acquisition unit includes at least one of the following: access location information, access authentication information, user identification information and device identification information.
12、 根据权利要求 10或 1 1所述的设备, 其特征在于, 所述获取单元 获取的接入信息包括以下至少之一: 接入位置信息、 用户标识信息和设备 标识信息时, 所述确定单元包括: 12. The device according to claim 10 or 11, characterized in that, the access information obtained by the obtaining unit includes at least one of the following: when accessing location information, user identification information and device identification information, the determination Units include:
查询子单元, 用于根据所述获取单元获取的接入信息查询预先配置的 安全接入白名单; Query subunit, used to query the preconfigured secure access whitelist based on the access information obtained by the acquisition unit;
确定子单元, 用于在所述查询子单元得到的查询结果表明所述接入信 息属于所述安全接入白名单时,确定所述用户的接入方式为安全接入方式; 在所述查询子单元得到的查询结果表明所述接入信息不属于所述安全接入 白名单时, 确定所述用户的接入方式为非安全接入方式。 Determining subunit, configured to determine that the user's access mode is a safe access mode when the query result obtained by the query subunit indicates that the access information belongs to the secure access whitelist; When the query result obtained by the subunit indicates that the access information does not belong to the secure access whitelist, it is determined that the user's access mode is a non-secure access mode.
1 3、 根据权利要求 10或 1 1所述的设备, 其特征在于, 所述获取单元 获取的接入信息包括以下至少之一: 接入位置信息、 用户标识信息和设备 标识信息, 所述确定单元包括: 1 3. The device according to claim 10 or 1 1, characterized in that the access information obtained by the obtaining unit includes at least one of the following: access location information, user identification information and device identification information, the determination Units include:
查询子单元, 用于根据所述获取单元获取的接入信息查询预先配置的 安全接入黑名单; Query subunit, used to query the preconfigured secure access blacklist based on the access information obtained by the acquisition unit;
确定子单元, 用于在所述查询子单元得到的查询结果表明所述接入信 息不属于所述安全接入黑名单时, 确定所述用户的接入方式为安全接入方 式; 在所述查询子单元得到的查询结果表明所述接入信息属于所述安全接 入黑名单时, 确定所述用户的接入方式为非安全接入方式。 Determining subunit, configured to determine that the user's access mode is a safe access mode when the query result obtained by the query subunit indicates that the access information does not belong to the secure access blacklist; When the query result obtained by the query subunit indicates that the access information belongs to the secure access blacklist, it is determined that the user's access mode is a non-secure access mode.
14、 根据权利要求 10或 1 1所述的设备, 其特征在于, 所述获取单元 获取的接入信息包括接入认证信息, 所述确定单元还用于: 14. The device according to claim 10 or 11, characterized in that the access information obtained by the obtaining unit includes access authentication information, and the determining unit is also used to:
若所述获取单元获取的接入认证信息表明所述用户的接入方式通过接 入认证系统的认证, 则确定所述用户的接入方式为安全接入方式; 若所述 获取单元获取的接入认证信息表明所述用户的接入方式未通过接入认证系 统的认证, 则确定所述用户的接入方式为非安全接入方式。 If the access authentication information obtained by the acquisition unit indicates that the user's access method has passed the authentication of the access authentication system, it is determined that the user's access method is a secure access method; if the access method obtained by the acquisition unit If the access authentication information indicates that the user's access mode has not passed the authentication of the access authentication system, it is determined that the user's access mode is a non-secure access mode.
15、 根据权利要求 10-14 中任一项所述的设备, 其特征在于, 所述第 二呈现单元用于: 15. The device according to any one of claims 10-14, characterized in that, the first Two presentation units are used for:
同时呈现所述目标信息和独立的水印; Present the target information and an independent watermark simultaneously;
或, 将所述水印插入到所述目标信息的显示图形帧中, 呈现已插入水 印的目标信息。 Or, insert the watermark into the display graphics frame of the target information, and present the target information with the watermark inserted.
1 6、 根据权利要求 1 0-1 5中任一项所述的设备, 其特征在于, 还包括: 水印确定单元, 用于在所述第二呈现单元以包含水印的方式呈现目标 信息之前, 获取所述目标信息的安全级别, 根据所述安全级别确定水印类 型; 16. The device according to any one of claims 10-15, further comprising: a watermark determination unit, configured to present the target information in a manner including a watermark before the second presentation unit, Obtain the security level of the target information, and determine the watermark type according to the security level;
所述第二呈现单元还用于: 以包含所述水印确定单元所确定的水印类 型对应的水印的方式呈现所述目标信息。 The second presentation unit is further configured to: present the target information in a manner that includes a watermark corresponding to the watermark type determined by the watermark determination unit.
1 7、 根据权利要求 1 6所述的设备, 其特征在于, 影响所述水印类型的 因素包括以下至少之一: 水印位置、 水印大小、 水印颜色和水印内容。 17. The device according to claim 16, characterized in that factors affecting the watermark type include at least one of the following: watermark position, watermark size, watermark color and watermark content.
1 8、 根据权利要求 1 0-1 7中任一项所述的设备, 其特征在于, 还包括: 监控单元, 用于在非安全接入方式下, 当检测到所述第二呈现单元无 法以包含水印的方式呈现所述目标信息时, 进行告警或停止向所述用户提 供服务。 18. The device according to any one of claims 10-17, further comprising: a monitoring unit, configured to detect that the second presentation unit cannot When the target information is presented in a manner including a watermark, an alarm is issued or services are stopped for the user.
1 9、 一种信息呈现设备, 应用于用户接入到云计算系统, 并对所述云 计算系统中存储的目标信息进行访问的过程中, 其特征在于, 包括: 19. An information presentation device, used in the process of users accessing a cloud computing system and accessing target information stored in the cloud computing system, which is characterized by including:
接收器, 用于获取所述用户的接入信息; A receiver, used to obtain access information of the user;
处理器, 用于根据所述接收器获取的接入信息确定所述用户的接入方 式; 若所述接入方式为安全接入方式, 则控制显示器以不含水印的方式呈 现目标信息; 若所述接入方式为非安全接入方式, 则控制显示器以包含水 印的方式呈现目标信息; A processor, configured to determine the access mode of the user based on the access information obtained by the receiver; if the access mode is a secure access mode, control the display to present the target information in a manner that does not contain a watermark; if If the access method is a non-secure access method, the display is controlled to present the target information in a manner including a watermark;
显示器, 用于在所述处理器的控制下以包含或者不含水印的方式呈现 目标信息。 A display configured to present target information with or without a watermark under the control of the processor.
2 0、 根据权利要求 1 9所述的设备, 其特征在于, 所述接收器获取的接 入信息包括以下至少之一: 接入位置信息、 接入认证信息、 用户标识信息 和设备标识信息。 20. The device according to claim 19, wherein the access information obtained by the receiver includes at least one of the following: access location information, access authentication information, user identification information and device identification information.
2 1、 根据权利要求 1 9或 2 0所述的设备, 其特征在于, 所述接入信息 包括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息, 该设 备还包括: 21. The device according to claim 19 or 20, characterized in that, the access information Including at least one of the following: access location information, user identification information and device identification information. The device also includes:
存储器, 用于存储预先配置的安全接入白名单; Memory, used to store a pre-configured security access whitelist;
所述处理器还用于: 根据所述接收器获取的接入信息查询所述存储器 中存储的安全接入白名单; The processor is also configured to: query the secure access whitelist stored in the memory according to the access information obtained by the receiver;
若查询结果表明所述接入信息属于所述安全接入白名单, 则确定所述 用户的接入方式为安全接入方式; If the query result indicates that the access information belongs to the secure access whitelist, it is determined that the user's access method is a secure access method;
若查询结果表明所述接入信息不属于所述安全接入白名单, 则确定所 述用户的接入方式为非安全接入方式。 If the query result indicates that the access information does not belong to the secure access whitelist, it is determined that the user's access method is a non-secure access method.
22、 根据权利要求 19或 20所述的设备, 其特征在于, 所述接入信息 包括以下至少之一: 接入位置信息、 用户标识信息和设备标识信息, 该设 备还包括: 22. The device according to claim 19 or 20, characterized in that the access information includes at least one of the following: access location information, user identification information and device identification information, and the device further includes:
存储器, 用于存储预先配置的安全接入黑名单; Memory, used to store a pre-configured security access blacklist;
所述处理器还用于: 根据所述接收器获取的接入信息查询所述存储器 中存储的安全接入黑名单; The processor is also configured to: query the secure access blacklist stored in the memory according to the access information obtained by the receiver;
若查询结果表明所述接入信息不属于所述安全接入黑名单, 则确定所 述用户的接入方式为安全接入方式; If the query result indicates that the access information does not belong to the secure access blacklist, it is determined that the user's access method is a secure access method;
若查询结果表明所述接入信息属于所述安全接入黑名单, 则确定所述 用户的接入方式为非安全接入方式。 If the query result indicates that the access information belongs to the secure access blacklist, it is determined that the user's access mode is a non-secure access mode.
23、 根据权利要求 19或 20所述的设备, 其特征在于, 所述接入信息 包括接入认证信息, 所述处理器还用于: 23. The device according to claim 19 or 20, wherein the access information includes access authentication information, and the processor is further configured to:
若所述接入认证信息表明所述用户的接入方式通过接入认证系统的认 证, 则确定所述用户的接入方式为安全接入方式; If the access authentication information indicates that the user's access method has passed the authentication of the access authentication system, then it is determined that the user's access method is a secure access method;
若所述接入认证信息表明所述用户的接入方式未通过接入认证系统的 认证, 则确定所述用户的接入方式为非安全接入方式。 If the access authentication information indicates that the user's access mode has not passed the authentication of the access authentication system, it is determined that the user's access mode is a non-secure access mode.
24、 根据权利要求 19-23 中任一项所述的设备, 其特征在于, 所述处 理器还用于: 24. The device according to any one of claims 19-23, characterized in that the processor is also used for:
控制所述显示器同时呈现所述目标信息和独立的水印; Controlling the display to simultaneously present the target information and the independent watermark;
或, 将所述水印插入到所述目标信息的显示图形帧中, 控制所述显示 器呈现已插入水印的目标信息。 Or, insert the watermark into the display graphic frame of the target information to control the display The processor renders the target information with inserted watermark.
25、 根据权利要求 19-24中任一项所述的设备, 其特征在于, 所述接收器还用于: 在所述处理器控制所述显示器以包含水印的方式 呈现目标信息之前, 获取所述目标信息的安全级别; 25. The device according to any one of claims 19 to 24, wherein the receiver is further configured to: before the processor controls the display to present the target information in a manner including a watermark, obtain the Describe the security level of the target information;
所述处理器还用于, 根据所述接收器获取的安全级别确定水印类型; 以包含所述水印类型对应的水印的方式呈现目标信息。 The processor is further configured to determine a watermark type according to the security level obtained by the receiver; and present the target information in a manner that includes a watermark corresponding to the watermark type.
26、 根据权利要求 19-25 中任一项所述的设备, 其特征在于, 影响所 述水印类型的因素包括以下至少之一: 水印位置、 水印大小、 水印颜色和 水印内容。 26. The device according to any one of claims 19-25, characterized in that factors affecting the watermark type include at least one of the following: watermark position, watermark size, watermark color and watermark content.
27、 根据权利要求 19-26 中任一项所述的设备, 其特征在于, 所述处 理器还用于: 在非安全接入方式下, 若无法以包含水印的方式呈现所述目 标信息, 则进行告警或停止向所述用户提供服务。 27. The device according to any one of claims 19 to 26, characterized in that the processor is further configured to: in a non-secure access mode, if the target information cannot be presented in a manner containing a watermark, Then issue an alarm or stop providing services to the user.
PCT/CN2013/081144 2013-08-09 2013-08-09 Information presentation method and device WO2015018052A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2013/081144 WO2015018052A1 (en) 2013-08-09 2013-08-09 Information presentation method and device
CN201380001146.1A CN103650459A (en) 2013-08-09 2013-08-09 Information presentation method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/081144 WO2015018052A1 (en) 2013-08-09 2013-08-09 Information presentation method and device

Publications (1)

Publication Number Publication Date
WO2015018052A1 true WO2015018052A1 (en) 2015-02-12

Family

ID=50253432

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/081144 WO2015018052A1 (en) 2013-08-09 2013-08-09 Information presentation method and device

Country Status (2)

Country Link
CN (1) CN103650459A (en)
WO (1) WO2015018052A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292180B (en) * 2017-05-27 2019-07-05 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN111263025A (en) * 2018-11-30 2020-06-09 北京京东尚科信息技术有限公司 Picture processing method and device, equipment and storage medium thereof
CN111488559B (en) * 2020-04-10 2023-03-10 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN114708138B (en) * 2022-06-06 2022-10-04 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177201A (en) * 2011-10-08 2013-06-26 美国博通公司 Content security in a social network
CN103189872A (en) * 2010-09-16 2013-07-03 凡瑞斯公司 Secure and efficient content screening in a networked environment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
US8300877B2 (en) * 2007-02-20 2012-10-30 Sony Mobile Communications Ab Copy protected information distribution

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103189872A (en) * 2010-09-16 2013-07-03 凡瑞斯公司 Secure and efficient content screening in a networked environment
CN103177201A (en) * 2011-10-08 2013-06-26 美国博通公司 Content security in a social network

Also Published As

Publication number Publication date
CN103650459A (en) 2014-03-19

Similar Documents

Publication Publication Date Title
US9712565B2 (en) System and method to provide server control for access to mobile client data
WO2015074517A1 (en) Information viewing method, device, system and storage medium
WO2013159725A1 (en) Method and apparatus for accessing application
JP2011527472A (en) Web page alteration prevention equipment, web page alteration prevention method and system
WO2014201830A1 (en) Method and device for detecting software-tampering
WO2016115888A1 (en) Photograph capturing method, image viewing method, system, and terminal
US10264000B2 (en) Malicious website access method and apparatus
US10348783B2 (en) Controlling visibility and distribution of shared conferencing data
CN105530261B (en) The guard method of privacy information and device
WO2015018052A1 (en) Information presentation method and device
US9479678B1 (en) Method and device for image processing, and storage medium
WO2016169267A1 (en) Image sharing method and device
WO2017092291A1 (en) Method and apparatus for acquiring certification material
CN105306479A (en) Computer data embedding method, computer data displaying method and computer data embedding and displaying device
JP2011141806A (en) Device for preventing leakage of information to network
GB2512140A (en) Messaging system and method
WO2023202214A1 (en) Communication method, apparatus and system, terminal, and server
JP5535056B2 (en) Security management device, security management method, and program
JP2008217675A (en) Information browsing system, terminal, control method, control program and storage medium
WO2023046104A1 (en) Object moving method and device
US20130014214A1 (en) System Security Process Method and Properties of Human Authorization Mechanism
CN108696355B (en) Method and system for preventing head portrait of user from being embezzled
CN110532792B (en) Method and system for checking privacy information
JP2020140735A (en) Apparatus and method for camera-based user authentication for content access
JP6103797B2 (en) Security management device, security management method, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13891127

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13891127

Country of ref document: EP

Kind code of ref document: A1