CN103390141A - Secret divulging prevention method for preventing shooting screen - Google Patents

Secret divulging prevention method for preventing shooting screen Download PDF

Info

Publication number
CN103390141A
CN103390141A CN2013102682532A CN201310268253A CN103390141A CN 103390141 A CN103390141 A CN 103390141A CN 2013102682532 A CN2013102682532 A CN 2013102682532A CN 201310268253 A CN201310268253 A CN 201310268253A CN 103390141 A CN103390141 A CN 103390141A
Authority
CN
China
Prior art keywords
file
character
secret
divulging
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013102682532A
Other languages
Chinese (zh)
Inventor
耿振民
王衍江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Original Assignee
WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd filed Critical WUXI CINSEC INFORMATION TECHNOLOGY Co Ltd
Priority to CN2013102682532A priority Critical patent/CN103390141A/en
Publication of CN103390141A publication Critical patent/CN103390141A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a secret divulging prevention method for preventing shooting a screen. The method is executed by a client side which is installed on a controlled computer and comprises the steps of configuring a security strategy for the client side; establishing a security zone in a memory; caching characters in a file in the security zone; and displaying characters close to a cursor and hiding other characters in the file according to the security strategy. After the secret divulging prevention method for preventing shooting the screen provided by the invention is applied, when a user edits or checks the file, since only N characters close to the cursor in the file are displayed on a displayer, the user is effectively prevented from divulging a secret in a mode of shooting the displayer while editing.

Description

A kind of anti-method of divulging a secret that screen is taken pictures that prevents
Technical field
The present invention relates to a kind of anti-method of divulging a secret, particularly relate to a kind of anti-method of divulging a secret that screen is taken pictures that prevents.
Background technology
At present, along with office automation, informationalized development and deep, each enterprises and institutions, group start more and more to pay attention to information security.But prevent that at present the mode of divulging a secret is main or file is encrypted, perhaps rights management being carried out in the access of file, effectively the internal staff is when editing or checking confidential document, to display such mode of divulging a secret of taking pictures.And along with photographing function of mobile phone from strength to strength, can prevent the internal staff editor or while checking confidential document in the urgent need to a kind of, the method that display is taken pictures and then divulged a secret.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide a kind of anti-method of divulging a secret that screen is taken pictures that prevents, be used for to solve that prior art can't prevent effectively that the internal staff from editing or while checking confidential document, the problem that display is taken pictures and then divulged a secret.
Reach for achieving the above object other relevant purposes, the invention provides a kind of anti-method of divulging a secret that screen is taken pictures that prevents, the client executing by being arranged on managed computer comprises: be described client configuration security strategy; Set up place of safety in internal memory; Character in described place of safety in cache file; According to described security strategy, near the character display highlighting, hide other character in described file.
Preferably, according to described security strategy, near the character display highlighting, after hiding the step of other character in described file, if user's request is to the whole typesetting of described file or check: require the user to input typesetting number; Verify described typesetting number,, if typesetting is number legal, remove the hiding of character in described file, otherwise refusing user's request.
As mentioned above, the anti-method of divulging a secret that screen is taken pictures that prevents of the present invention, have following beneficial effect: the user is when editor or viewing files, due near the character of the N cursor in display on display file, so prevent that effectively the user from divulging a secret by the mode that display is taken pictures when editor.According to preferred implementation, the user can carry out whole typesetting or check file, but need to first input typesetting number, the editor who does not affect so on the one hand the user experiences, and can realize control of authority by the convenient management ground to typesetting number on the other hand, operate the safety managements such as tracking.
Description of drawings
Fig. 1 is shown as the present invention and prevents the process flow diagram of the anti-method of divulging a secret that screen is taken pictures.
Embodiment
Below by specific instantiation explanation embodiments of the present invention, those skilled in the art can understand other advantages of the present invention and effect easily by the disclosed content of this instructions.The present invention can also be implemented or be applied by other different embodiment, and the every details in this instructions also can be based on different viewpoints and application, carries out various modifications or change not deviating under spirit of the present invention.
See also accompanying drawing.Need to prove, the diagram that provides in the present embodiment only illustrates basic conception of the present invention in a schematic way, satisfy in graphic only show with the present invention in relevant assembly but not component count, shape and size drafting while according to reality, implementing, during its actual enforcement, kenel, quantity and the ratio of each assembly can be a kind of random change, and its assembly layout kenel also may be more complicated.
At first consult Fig. 1, Fig. 1 is shown as the process flow diagram that prevents the anti-method of divulging a secret that screen is taken pictures of the present invention.Implement method of the present invention, client need to be installed on managed computer, by client, complete each step in Fig. 1.Below each step in Fig. 1 is elaborated.For convenience of explanation, in following examples, only take office word as example.Thought of the present invention is equally applicable to other file editor, for example pdf editing machine, text editor etc.
Step S1 represents described client configuration security strategy.The configuration security strategy is mainly that configuration need to be taked the measure that prevents that screen from taking pictures to the file of which type.In this example, the content of security strategy is a list, only has when the file editor in list starts, and client is just carried out subsequent step S2-S4.In this example, this blacklist list is built in client, so namely completed the configuration of security strategy after the client installation, for convenience of explanation, this blacklist adopts the mode of application name, and only lists " office word " entry.In security strategy, can also comprise that preset characters counts the configuration of N, in step S3-S4, can describe preset characters in detail and count the effect of N.
Be understandable that, those skilled in the art can make multiple change to above-mentioned embodiment, such as but not limited to: the content of security strategy can be process name, application name or filename etc.Can also support asterisk wildcard; Security strategy can not be built in client yet, and configures by the keeper is unified after installation; Can also configure at server end, after the client installation, by network from server end synchronous safety strategy.
Monitoring user operation after client terminal start-up, when the user attempted to open the file in the security strategy configured list or start file editor (lower be called for short " editing machine ") in the security strategy configured list, client started to carry out following step S2-S4.
Step S2 represents that client sets up place of safety in internal memory.The Main Function of place of safety is the content of cache file, and only allow client-side program to access the interior data in this zone, client all is redirected to place of safety with the data that the user is input to pre-set programs (being office word in this example), and this pre-set programs is by the data in the client-access place of safety.
Step S3 is illustrated in the character in cache file in place of safety.In this example, by the newly-built null file of editing machine and in file during input character, the character of this input can be tackled by client as the user, and client, with this character place of safety, also is transmitted to editing machine with this character simultaneously.Like this, will cache user in place of safety the complete copy of content by the editing machine input file.When file that the user uses editing machine to open namely to have, client first all is cached to place of safety with the character in file.
Step S4 represents to count N according to preset characters, near the character in display file cursor, and other character in hidden file.Particularly, give an example with N=5, as the user by the newly-built null file of editing machine and in file during input character, if the user inputs 10 characters successively continuously in file, when the user is input to the 6th character, 2-6 character all normally shows, and the 1st character in file hidden, while being input to the 7th character, 3-7 character normally shows, and the 2nd is also hidden, by that analogy.When the user has inputted 10 characters, in the time of need to inserting character between the 6th and the 7th character, the user moves to cursor between the 6th and the 7th character, at this moment the 5th character of originally having hidden shows again, the 9th character of 6-normally shows, and the 10th character is hidden, and remains that namely N=5 character around cursor normally shows, and other character is hidden.When the user opens one while namely file being arranged with editing machine, client, can be with other character Hide All near N=5 character except cursor (normally file start character) after all characters with in file are cached to place of safety (step S3).
In this example, the concrete mode of hiding is that the character that needs are hidden is replaced to space hereof, due to the complete copy that all characters are arranged in place of safety, so when the user moves cursor, in the time of the character of having hidden need to being recovered normal the demonstration, can reach easily the purpose of normal demonstration with corresponding character replacement space in place of safety.
Those skilled in the art can also adopt other mode to reach the purpose of hiding other character, such as but not limited to: will need the character replacement of hiding to become the specific characters such as asterisk, pound sign, perhaps replace to the character hidden by needs according to the content that certain coding rule generates, can also be the character color that needs are hidden is arranged to identical with background colour etc.The routine interface of client by office word realize to text replacement, change color etc. and be operating as well known to those skilled in the artly, repeat no more here.
Those skilled in the art can make to above-mentioned embodiment other change, such as but not limited to: in step S3, client can also adopt the mode of monitoring file, after the user is input to character in file, client with the character in file one by one (also can a plurality of ground) be read into place of safety and realize that cache user is input to the character in file.
When the user completes editor and while preserving file, client can be preserved based on the content in place of safety.For further tightening security property, preferably, during preservation, client can be encrypted file.Encryption can be used symmetry or rivest, shamir, adelman.When adopting rivest, shamir, adelman, also need to have the server end and corresponding administration module or the management end that are connected with client network.Generate PKI by server end according to its machine code, and PKI is issued client, client is encrypted file with PKI.When needs are opened this encrypt file again, need to decipher encrypt file to administration module or management end application private key.
For further securing documents, prevent the purposes such as accidental damage or deletion, destruction or convenient tracking, preferably, after preserving file, client can copy this document portion and upload onto the server as backup.
More preferably, when the user need to carry out whole typesetting or while checking to file, can send request, client can require the user to input typesetting number, and note is often closed a file and is considered as typesetting once, this typesetting number can be disposable (namely can only be to the file typesetting once, this typesetting number inefficacy after close file), can be also (namely limiting the typesetting number of times is n time, and after the n time close file, typesetting number was lost efficacy) repeatedly, can also be permanent (namely not limiting the typesetting number of times).If it is legal that the user inputs the typesetting empirical tests, file namely can normally show, edit, otherwise refusing user's request.
In this example, when being installed, client can for office word, plug-in unit be installed simultaneously, thereby office word menu bar can show " whole typesetting or demonstration " button, the user asks whole typesetting or while checking, after clicking this button, can eject and require input typesetting dialog box, if the typesetting empirical tests of user's input is legal, file content is normal to be shown and can edit; Otherwise the prompting input error, require to re-enter.Number of retries can also be set, after reaching the number of retries restriction, locking a period of time refusal retry.
In practical application, this typesetting number can be obtained by the user after administrative authority's application.The technology of typesetting function realizes can adopting as modes such as short-message verification codes realizing,, for conventionally known to one of skill in the art, repeats no more.
Need to prove, for convenience of explanation, only lift office word is example to above-mentioned embodiment, but method of the present invention is applicable to the file editor of other type too.And not needing asymmetric encryption, do not need to preserve the occasion such as backup, do not need server end, only by the client of standalone version, without implementing the inventive method under network condition yet.
In sum, method of the present invention makes the user when editor or viewing files, due near the character of the N cursor in display on display file, so prevent that effectively the user from divulging a secret by the mode that display is taken pictures when editor.So the present invention has effectively overcome various shortcoming of the prior art and the tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not is used for restriction the present invention.Any person skilled in the art scholar all can, under spirit of the present invention and category, modify or change above-described embodiment.Therefore, such as have in affiliated technical field and know that usually the knowledgeable, not breaking away from all equivalence modifications of completing under disclosed spirit and technological thought or changing, must be contained by claim of the present invention.

Claims (9)

1. one kind prevents the anti-method of divulging a secret that screen is taken pictures, and the client executing by being arranged on managed computer, is characterized in that,
Comprise:
For described client configuration security strategy;
Set up place of safety in internal memory;
Character in described place of safety in cache file;
According to described security strategy, near the character display highlighting, hide other character in described file.
2. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 1, is characterized in that, describedly hides other character in described file, employing be to use specific character to replace the mode of other character in described file.
3. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 1, is characterized in that, describedly hides other character in described file, employing be the mode that described other character color is set to the background document look.
4. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 1, according to described security strategy, near the character display highlighting, after hiding the step of other character in described file described, if the user asks the whole typesetting of described file or checks:
Require the user to input typesetting number;
Verify described typesetting number,, if typesetting is number legal, remove the hiding of character in described file, otherwise refusing user's request.
5. the anti-method of divulging a secret that screen is taken pictures of enclosing according to claim 1, is characterized in that, describedly comprises for the step of described client configuration security strategy:
Configuring security strategy by on network and server that described client is connected;
By described client by described network from synchronous safety strategy on described server.
6. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 1, described according to described security strategy, near display highlighting character, after hiding the step of other character in described file, also comprise the step of preserving file, it is characterized in that, in the step of described preservation file, use cryptographic algorithm to described file encryption.
7. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 6, is characterized in that, described cryptographic algorithm is rivest, shamir, adelman, uses public-key and is encrypted, and need to decipher with private key when opening described file.
8. the anti-method of divulging a secret that screen is taken pictures that prevents according to claim 6, is characterized in that, described PKI is to generate according to the machine code of server.
9. the described anti-method of divulging a secret that screen is taken pictures that prevents of any one according to claim 7-8, is characterized in that, after described preservation file step, also comprises:
Copy described file after encrypting;
With the described File Upload that copies to server.
CN2013102682532A 2013-06-28 2013-06-28 Secret divulging prevention method for preventing shooting screen Pending CN103390141A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013102682532A CN103390141A (en) 2013-06-28 2013-06-28 Secret divulging prevention method for preventing shooting screen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013102682532A CN103390141A (en) 2013-06-28 2013-06-28 Secret divulging prevention method for preventing shooting screen

Publications (1)

Publication Number Publication Date
CN103390141A true CN103390141A (en) 2013-11-13

Family

ID=49534410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013102682532A Pending CN103390141A (en) 2013-06-28 2013-06-28 Secret divulging prevention method for preventing shooting screen

Country Status (1)

Country Link
CN (1) CN103390141A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115767025A (en) * 2022-11-10 2023-03-07 合芯科技有限公司 Method and device for preventing data leakage, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805459A (en) * 2005-01-14 2006-07-19 Lg电子株式会社 Message display unit and message display method for mobile communication terminal
CN101571850A (en) * 2009-06-10 2009-11-04 青岛海信移动通信技术股份有限公司 Display packing and device of text document in support of page turn function
US20110298817A1 (en) * 2008-05-27 2011-12-08 Kyocera Corporation Portable terminal with peeking prevention function
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
CN102685196A (en) * 2010-12-22 2012-09-19 北京华夏未来信息技术有限公司 Method and virtual application system for improving user experience in virtual application environment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805459A (en) * 2005-01-14 2006-07-19 Lg电子株式会社 Message display unit and message display method for mobile communication terminal
US20110298817A1 (en) * 2008-05-27 2011-12-08 Kyocera Corporation Portable terminal with peeking prevention function
CN101571850A (en) * 2009-06-10 2009-11-04 青岛海信移动通信技术股份有限公司 Display packing and device of text document in support of page turn function
CN102685196A (en) * 2010-12-22 2012-09-19 北京华夏未来信息技术有限公司 Method and virtual application system for improving user experience in virtual application environment
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115767025A (en) * 2022-11-10 2023-03-07 合芯科技有限公司 Method and device for preventing data leakage, electronic equipment and storage medium
CN115767025B (en) * 2022-11-10 2024-01-23 合芯科技有限公司 Method, device, electronic equipment and storage medium for preventing data leakage

Similar Documents

Publication Publication Date Title
US8542823B1 (en) Partial file encryption
US9619659B1 (en) Systems and methods for providing information security using context-based keys
US11716197B2 (en) System and method for generating a cryptographic key
EP2843569A1 (en) Method and apparatus for accessing application
CA3092611C (en) Secure password management systems, methods and apparatuses
CN103763313A (en) File protection method and system
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN103686716A (en) Android access control system for enhancing confidentiality and integrality
US11582266B2 (en) Method and system for protecting privacy of users in session recordings
US20150106614A1 (en) Systems and methods of safeguarding user information while interacting with online service providers
CN103441844A (en) Data safety and intranet monitoring system based on cloud storage
CN110140336A (en) Consecutive password technology
CN108768938B (en) A kind of web data encryption and decryption method and device
US10218505B1 (en) Server based settings for client software with asymmetric signing
Englert et al. ALIIAS: Anonymization/Pseudonymization with LimeSurvey integration and II-factor Authentication for Scientific research
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
CN103390141A (en) Secret divulging prevention method for preventing shooting screen
JP2008123070A (en) Thin client system, and display program for client terminal in thin client system
JP2006252448A (en) Document management device, sentence management program and document management method
Setiawan et al. Design of secure electronic disposition applications by applying blowfish, SHA-512, and RSA digital signature algorithms to government institution
US10491631B1 (en) Apparatus and method for augmenting a messaging application with cryptographic functions
Englert et al. ALIIAS: anonymization with limesurvey integration and II-factor authentication for scientific research
CN114091112A (en) Application authority control method and device and electronic equipment
US8880906B2 (en) Storing encrypted contents in digital archives
CN110417638B (en) Communication data processing method and device, storage medium and electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20131113