CN103650459A - Information presentation method and equipment - Google Patents
Information presentation method and equipment Download PDFInfo
- Publication number
- CN103650459A CN103650459A CN201380001146.1A CN201380001146A CN103650459A CN 103650459 A CN103650459 A CN 103650459A CN 201380001146 A CN201380001146 A CN 201380001146A CN 103650459 A CN103650459 A CN 103650459A
- Authority
- CN
- China
- Prior art keywords
- access
- information
- watermark
- user
- access way
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 51
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000000007 visual effect Effects 0.000 abstract description 4
- 238000013329 compounding Methods 0.000 abstract 2
- 238000010586 diagram Methods 0.000 description 5
- 230000004438 eyesight Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 3
- 230000004308 accommodation Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses an information presentation method and equipment, relates to the field of electronic information, and can determine whether to present the watermark or not so as to avoid the visual interference. The information presentation method is applied to the process when a user accesses a cloud compounding system and assesses the target information stored in the cloud compounding system. The method mainly comprises the following steps: obtaining the user access information; determining the access mode according to the user access information; if the access mode is a safe access mode, representing the target information without watermark; if the access mode is an unsafe access mode, representing the target information with watermark.
Description
Technical field
The present invention relates to electronic information field, relate in particular to a kind of information demonstrating method and equipment.
Background technology
Along with the development of electronic information technology, some in daily life or work relate to the information of privacy or secret, can be propagated and be presented by various electronic equipments.Yet when the propagation of information and presenting, the fail safe of privacy information or confidential information has also been subject to larger threat.
Especially after cloud computing system occurs, because user can be linked into cloud computing system with anywhere at any time, obtain and present canned data in cloud computing system, and information is easy to be taken pictures or sectional drawing after presenting, thereby cause information leakage.
In order to prevent that information from presenting rear quilt and illegally stealing, a kind of information demonstrating method that inserts digital watermarking is proposed in prior art, be specially: watermark is embedded in target information, when opening target information, just can presents the target information that includes watermark.Like this, even if stealer takes pictures or sectional drawing to the information presenting, watermark also can be included in its result of stealing, and form direct information and steal evidence, thus the risk of reduction information leakage.
But, in the process that the information of stating in realization presents, inventor finds that in prior art, at least there are the following problems: after watermarked in target information, watermark meeting exists in information always, at any time or place open target information, capital presents the target information that comprises watermark, and the existence of watermark has certain influence to visual effect, therefore can be to watching and use target information itself to cause larger interference.
Summary of the invention
Embodiments of the invention provide a kind of information demonstrating method and equipment, can determine whether to present watermark according to actual conditions, to avoid the vision that watermark causes to disturb.
A first aspect of the present invention, provides a kind of information demonstrating method, comprising:
Obtain described user's access information;
According to described access information, determine described user's access way;
If described access way is safe access way, not contain the mode of watermark, present target information;
If described access way is non-security access way, in the mode that comprises watermark, present target information.
In conjunction with first aspect, in the possible implementation of the first of first aspect, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access white list of described access information inquiry;
If described access information belongs to described safety access white list, determine that described user's access way is safe access way;
If described access information does not belong to described safety access white list, determine that described user's access way is non-security access way.
In conjunction with first aspect, in the possible implementation of the second of first aspect, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access blacklist of described access information inquiry;
If described access information does not belong to described safety access blacklist, determine that described user's access way is safe access way;
If described access information belongs to described safety access blacklist, determine that described user's access way is non-security access way.
In conjunction with first aspect, in the third possible implementation of first aspect, when described access information comprises access authentication information, describedly according to described access information, determine that described user's access way comprises:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of first aspect or first aspect, to any one implementation in the third possible implementation, in the 4th kind of possible implementation of first aspect, describedly in the mode that comprises watermark, present target information and comprise:
Present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of first aspect or first aspect, in the 5th kind of possible implementation of first aspect, before the mode to comprise watermark presents target information, also comprise:
Obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described take the mode that comprises watermark present target information as: in the mode that comprises watermark corresponding to described type of watermark, present target information.
In conjunction with the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of first aspect or first aspect, first aspect the 7th in possible implementation, also comprise:
Under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
A second aspect of the present invention, provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, comprising:
Acquiring unit, for obtaining user's access information;
Determining unit, determines described user's access way for the access information obtaining according to described acquiring unit;
The first display unit, for when described determining unit determines that described access way is safe access way, presents target information not contain the mode of watermark;
The second display unit, for when described determining unit determines that described access way is non-security access way, presents target information in the mode that comprises watermark.
In conjunction with second aspect, in the possible implementation of the first of second aspect, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access white list of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
In conjunction with second aspect, in the possible implementation of the second of second aspect, the access information that described acquiring unit obtains comprise following one of at least: when accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access blacklist of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
In conjunction with second aspect, in the third possible implementation of second aspect, the access information that described acquiring unit obtains comprises access authentication information, described determining unit also for:
If the access authentication information that described acquiring unit obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of second aspect or second aspect, to any one implementation in the third possible implementation, in the 4th kind of possible implementation of second aspect, described the second display unit is used for:
Present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of second aspect or second aspect, in the 5th kind of possible implementation of second aspect, also comprise:
Watermark determining unit, before presenting target information at described the second display unit in the mode that comprises watermark, obtains the level of security of described target information, according to described level of security, determines type of watermark;
Described the second display unit also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit, present target information.
The 5th kind of possible implementation in conjunction with second aspect, in the 6th kind of possible implementation of second aspect, the factor that affects the definite type of watermark of described watermark determining unit comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of second aspect or second aspect, second aspect the 7th in possible implementation, also comprise:
Monitoring unit, under non-security access way, when described the second display unit being detected and cannot present target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
A third aspect of the present invention, provides a kind of novel display device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, comprising:
Receiver, for obtaining user's access information;
Processor, determines described user's access way for the access information obtaining according to described receiver; If described access way is safe access way, controls display and present target information not contain the mode of watermark; If described access way is non-security access way, controls display and present target information in the mode that comprises watermark;
Display, for presenting target information to comprise or not contain the mode of watermark under the control of described processor.
In conjunction with the third aspect, in the possible implementation of the first of the third aspect, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access white list;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
In conjunction with the third aspect, in the possible implementation of the second of the third aspect, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access blacklist;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is non-security access way.
In conjunction with the third aspect, in the third possible implementation of the third aspect, described access information comprises access authentication information, described processor also for:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of the third aspect or the third aspect to any one implementation in the third possible implementation, in the 4th kind of possible implementation of the third aspect, described processor also for:
Control described display and present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, control described display and present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of the third aspect or the third aspect, in the 5th kind of possible implementation of the third aspect, described receiver also for: at described processor, control before described display presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor also for, the level of security obtaining according to described receiver is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
The 5th kind of possible implementation in conjunction with the third aspect, in the 6th kind of possible implementation of the third aspect, the factor that affects the definite type of watermark of described processor comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of the third aspect or the third aspect, the third aspect the 7th in possible implementation, described processor also for: under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information demonstrating method that the embodiment of the present invention provides and equipment, compare with the technology that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is a kind of information demonstrating method flow chart in one embodiment of the invention;
Fig. 2 is a kind of information demonstrating method flow chart in another embodiment of the present invention;
Fig. 3 is a kind of system architecture exemplary plot in another embodiment of the present invention;
Fig. 4 is the another kind of system architecture exemplary plot in another embodiment of the present invention;
Fig. 5 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 6 be in another embodiment of the present invention really order unit form schematic diagram;
Fig. 7 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 8 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 9 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
In addition, term "and/or", is only a kind of incidence relation of describing affiliated partner herein, and expression can exist three kinds of relations, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/", generally represents that forward-backward correlation is to liking a kind of relation of "or" herein.
One embodiment of the invention provide a kind of information demonstrating method, as shown in Figure 1, comprising:
101, obtain user's access information.
It should be noted that, method provided by the invention can be applied in the process of user's access destination information, and wherein said target information is stored in cloud computing system.
102, according to described access information, determine described user's access way, described access way comprises safe access way and non-security access way.
Wherein, described access information comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
If 103 described access waies are safe access way, not contain the mode of watermark, present target information.
If 104 described access waies are non-security access way, in the mode that comprises watermark, present target information.
Wherein, the method that presents target information in the mode that comprises watermark comprises: present target information and independently watermark simultaneously; Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
The information demonstrating method that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Another embodiment of the present invention provides a kind of information demonstrating method, as shown in Figure 2, comprising:
201, obtain user's access information.
In a kind of implementation of the present embodiment, described access information can comprise following one of at least: accessing position information, user totem information and equipment identification information; In another kind of implementation, described access information can comprise access authentication information.
When described access information one of comprises in accessing position information, user totem information and equipment identification information at least, it is example that following steps 202 be take the scene that is provided with safety access white list in advance, determines user's access way:
202, according to the pre-configured safety access white list of described access information inquiry; If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way, execution step 203; If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way, execution step 204.
Concrete, in framework as shown in Figure 3, can, according to user's accessing position information, user totem information or equipment identification information query safe access white list, in white list, be safety access; Or, according to user's accessing position information, user totem information or equipment identification information inquiry blacklist, in blacklist, be non-security access.For example, take Fig. 3 as example, in white list, is safe access way in the access IP address of Office Area, in the access IP address in hotel, not in white list, is considered as non-security access way.Wherein, on-position identification module is for identifying user's access way.Further, information security level identification module can be identified the level of security of target information.Whether security strategy control module presents the key elements such as pattern, type or size of watermark, watermark according to user mode access and level of security decision-making, and policy information is sent to digital watermark processing module, by digital watermark processing module, carry out the generation of watermark and present.
When described access information one of comprises in accessing position information, user totem information and equipment identification information at least, the scene that following steps 202 ' take are provided with safety access blacklist in advance is example, determines user's access way:
202 ', according to the pre-configured safety access blacklist of described access information inquiry; If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way, execution step 203; If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way, execution step 204.
When described access information comprises access authentication information, can determine by following steps 202 〞 user's access way:
202 〞, according to the access authentication information of access authentication system, judge described user's access way; If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way, execution step 203; If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way, execution step 204.In example framework as shown in Figure 4, user's access can also be by the authentication of access authentication system.Access authentication system can authenticate user's accessing position information, user totem information or equipment identification information, also can adopt the modes such as account number cipher to authenticate, and the embodiment of the present invention does not limit this.
What deserves to be explained is, in the present embodiment, step 202,202 ' and 202 〞 are specific implementations of three kinds of optional users' of determining access way, can select in actual applications a kind of in above three kinds of specific implementations.Function and the connected mode of the inner unit of user virtual machine in Fig. 3 and Fig. 4 are described in the embodiment of the information presenting device of Fig. 5-7 correspondence, and the present embodiment is not described in detail here.
203, not contain the mode of watermark, present target information.
Wherein, not present target information containing the mode of watermark, be and present target information, in target information, there is no the interference of watermark, be convenient to user and check, thereby can not affect the visual effect of information itself.
204, watermark is inserted in the display graphics frame of target information, presents the target information of inserting watermark.
Wherein, definite user, be to be linked into cloud computing system when opening the target information in cloud computing system with non-security access way, just this is presented to the operation of inserting watermark, but not in cloud computing system, in each file, insert intrinsic watermark during spanned file, thereby guarantee that target information can have presentation mode flexibly.This watermark mixes presentation mode with target information, in target information, is now, in the graphic frame of its demonstration, inserts digital watermark information.This presentation mode, processes complexity, but good visual effect.Can, according to wanting the periphery graphical information of insertion position to carry out accommodation, if periphery is red, can insert the figure approaching with redness, to seamlessly transit.
In the present embodiment, step 204 can present target information in the mode that comprises watermark, and optional, step 204 also can replace with: present target information and independently watermark simultaneously.This display mode can be called screen watermark, and the content of this watermark and target information is irrelevant, just on display screen, shows, thereby need not change file content, plays again the anti-effect of taking pictures and preventing divulging a secret simultaneously.Independently digital watermarking presents process, presents the digital watermarking of corresponding types on user's screen.This mode, watermark and target information are independently to present, and process simply, but effects that both show may not be very level and smooth.Certainly, the mode that the present embodiment can also adopt other modes to realize comprising watermark presents target information, and the present embodiment does not repeat one by one.
Further alternative, before the method for the embodiment of the present invention can also be included in step 204, the level of security of the target information that identification user uses, and according to this level of security Information generation watermark.Wherein, the recognition methods of the level of security of target information, is industry prior art, does not launch herein.So, the concrete methods of realizing of step 204 can be: the rank according to the document information safety of user's on-position and user's use, form security strategy, and according to this security strategy, carry out watermark processing.
For example, concrete a kind of security strategy control method can be: when user accesses from non-security region, use top secret document, the digital watermarking type presenting is 1; When user accesses from non-security region, use confidential document, the digital watermarking type presenting is 2; When user accesses from non-security region, use confidential document, the digital watermarking type presenting is 3.
Further, type of watermark can be edited in advance, the factor that affects type of watermark comprise following one of at least: be presented on screen diverse location, occupy screen size, watermark color and watermark content etc.Watermark content can comprise: the information that user is relevant, such as name, job number, IP address, time etc.
Further alternative, in order further to guarantee that target information presents the fail safe in process, to avoid user to distort or stop the process that watermark generates and shows, the present embodiment can also comprise:
205,, under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information demonstrating method that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Another embodiment of the present invention provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, as shown in Figure 5, comprising:
Acquiring unit 51, for obtaining user's access information;
Determining unit 52, determines described user's access way for the access information obtaining according to described acquiring unit 51;
The first display unit 53, for when described determining unit 52 determines that described access way is safe access way, presents target information not contain the mode of watermark;
The second display unit 54, for when described determining unit 52 determines that described access way is non-security access way, presents target information in the mode that comprises watermark.
Wherein, the access information that acquiring unit 51 obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
In a kind of possible implementation, the access information that acquiring unit 51 obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, as shown in Figure 6, described determining unit 52 comprises:
Determine subelement 522, while showing that for the Query Result obtaining at described inquiry subelement 521 described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement 521 shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
Or, the access information obtaining when acquiring unit 51 comprise following one of at least: when accessing position information, user totem information and equipment identification information, as shown in Figure 6, described determining unit 52 comprises:
Determine subelement 522, while showing that for the Query Result obtaining at described inquiry subelement 521 described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement 521 shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
In the possible implementation of another kind, the access information that described acquiring unit 51 obtains comprises access authentication information, described determining unit 52 also for:
The access authentication information of obtaining according to described acquiring unit 51 judges described user's access way; If the access authentication information that described acquiring unit 51 obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit 51 obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
Further, described the second display unit 54 for: present target information and independently watermark simultaneously; Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
Further, as shown in Figure 7, also comprise watermark determining unit 55, before presenting target information at described the second display unit 54 in the mode that comprises watermark, obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described the second display unit 54 also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit 55, present target information.
The factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
Described information presenting device also comprises:
Monitoring unit 56, under non-security access way, when described the second display unit 54 being detected and cannot present target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
On the other hand, the embodiment of the present invention also provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, as shown in Figure 8, comprising:
The access information that receiver 81 receives comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
Further, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, now this equipment also comprises as shown in Figure 9:
Described processor 82 also inquires about for: the access information obtaining according to described receiver 81 the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way.
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
Or, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, now this equipment also comprises as shown in Figure 9:
Described processor 82 also inquires about for: the access information obtaining according to described receiver 81 the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way.
If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way.
Further, when access information comprises access authentication information, processor 82 also for: the access authentication information receiving according to described receiver 81 judges described user's access way; If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In addition, processor 82 also presents target information and independently watermark for controlling described display simultaneously;
Or, watermark is inserted in the display graphics frame of target information, control described display and present the target information of inserting watermark.
Described receiver 81 also for: at described processor 82, control before described display 83 presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor 82 also for, the level of security receiving according to described receiver 81 is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
The factor that affects the definite type of watermark of described processor 82 comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
Described processor also 82 for: under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information presenting device that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add essential common hardware by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Understanding based on such, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in the storage medium can read, as the floppy disk of computer, hard disk or CD etc., comprise some instructions with so that computer equipment (can be personal computer, server, or the network equipment etc.) carry out the method described in each embodiment of the present invention.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of described claim.
Claims (27)
1. an information demonstrating method, is applied to user and is linked in the process that cloud computing system conducts interviews to the target information of storing in cloud computing system, it is characterized in that, the method comprises:
Obtain described user's access information;
According to described access information, determine described user's access way;
If described access way is safe access way, not contain the mode of watermark, present described target information;
If described access way is non-security access way, in the mode that comprises watermark, present described target information.
2. method according to claim 1, is characterized in that,
Described access information comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
3. method according to claim 1 and 2, it is characterized in that, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access white list of described access information inquiry;
If described access information belongs to described safety access white list, determine that described user's access way is safe access way;
If described access information does not belong to described safety access white list, determine that described user's access way is non-security access way.
4. method according to claim 1 and 2, it is characterized in that, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access blacklist of described access information inquiry;
If described access information does not belong to described safety access blacklist, determine that described user's access way is safe access way;
If described access information belongs to described safety access blacklist, determine that described user's access way is non-security access way.
5. method according to claim 1 and 2, is characterized in that, when described access information comprises access authentication information, describedly according to described access information, determines that described user's access way comprises:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
6. according to the method described in any one in claim 1-5, it is characterized in that, describedly in the mode that comprises watermark, present described target information and comprise:
Present described target information and independently watermark simultaneously; Or,
Described watermark is inserted in the display graphics frame of described target information, presents the target information of inserting watermark.
7. according to the method described in any one in claim 1-6, it is characterized in that, before the mode to comprise watermark presents described target information, also comprise:
Obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described take the mode that comprises watermark present described target information as: in the mode that comprises watermark corresponding to described type of watermark, present described target information.
8. method according to claim 7, is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
9. according to the method described in any one in claim 1-8, it is characterized in that, also comprise:
Under non-security access way, if cannot present in the mode that comprises watermark described target information, carry out alarm or stop providing service to described user.
10. an information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, it is characterized in that, comprising:
Acquiring unit, for obtaining described user's access information;
Determining unit, determines described user's access way for the access information obtaining according to described acquiring unit;
The first display unit, for when described determining unit determines that described access way is safe access way, presents described target information not contain the mode of watermark;
The second display unit, for when described determining unit determines that described access way is non-security access way, presents described target information in the mode that comprises watermark.
11. equipment according to claim 10, is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
12. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: when accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access white list of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
13. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access blacklist of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
14. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprises access authentication information, described determining unit also for:
If the access authentication information that described acquiring unit obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
15. according to the equipment described in any one in claim 10-14, it is characterized in that, described the second display unit is used for:
Present described target information and independently watermark simultaneously;
Or, described watermark is inserted in the display graphics frame of described target information, present the target information of inserting watermark.
16. according to the equipment described in any one in claim 10-15, it is characterized in that, also comprises:
Watermark determining unit, before presenting target information at described the second display unit in the mode that comprises watermark, obtains the level of security of described target information, according to described level of security, determines type of watermark;
Described the second display unit also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit, present described target information.
17. equipment according to claim 16, is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
18. according to the equipment described in any one in claim 10-17, it is characterized in that, also comprises:
Monitoring unit, under non-security access way, when described the second display unit being detected and cannot present described target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
19. 1 kinds of information presenting devices, are applied to user and are linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, it is characterized in that, comprising:
Receiver, for obtaining described user's access information;
Processor, determines described user's access way for the access information obtaining according to described receiver; If described access way is safe access way, controls display and present target information not contain the mode of watermark; If described access way is non-security access way, controls display and present target information in the mode that comprises watermark;
Display, for presenting target information to comprise or not contain the mode of watermark under the control of described processor.
20. equipment according to claim 19, is characterized in that, the access information that described receiver obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
21. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access white list;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
22. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access blacklist;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way;
If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way.
23. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprises access authentication information, described processor also for:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
24. according to the equipment described in any one in claim 19-23, it is characterized in that, described processor also for:
Control described display and present described target information and independently watermark simultaneously;
Or, described watermark is inserted in the display graphics frame of described target information, control described display and present the target information of inserting watermark.
25. according to the equipment described in any one in claim 19-24, it is characterized in that,
Described receiver also for: at described processor, control before described display presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor also for, the level of security obtaining according to described receiver is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
26. according to the equipment described in any one in claim 19-25, it is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
27. according to the equipment described in any one in claim 19-26, it is characterized in that, described processor also for: under non-security access way, if cannot present in the mode that comprises watermark described target information, carry out alarm or stop providing service to described user.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2013/081144 WO2015018052A1 (en) | 2013-08-09 | 2013-08-09 | Information presentation method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103650459A true CN103650459A (en) | 2014-03-19 |
Family
ID=50253432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201380001146.1A Pending CN103650459A (en) | 2013-08-09 | 2013-08-09 | Information presentation method and equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103650459A (en) |
WO (1) | WO2015018052A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292180A (en) * | 2017-05-27 | 2017-10-24 | 北京北信源软件股份有限公司 | A kind of screen watermark handling method and device |
CN111263025A (en) * | 2018-11-30 | 2020-06-09 | 北京京东尚科信息技术有限公司 | Picture processing method and device, equipment and storage medium thereof |
CN111488559A (en) * | 2020-04-10 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN114708138A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Network disk image watermark adding method and device, network disk and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6400826B1 (en) * | 1998-05-21 | 2002-06-04 | Massachusetts Institute Of Technology | System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators |
CN101611620B (en) * | 2007-02-20 | 2012-07-18 | 索尼爱立信移动通讯股份有限公司 | Method and device for providing protection for image copy |
CN103177201A (en) * | 2011-10-08 | 2013-06-26 | 美国博通公司 | Content security in a social network |
CN103189872A (en) * | 2010-09-16 | 2013-07-03 | 凡瑞斯公司 | Secure and efficient content screening in a networked environment |
-
2013
- 2013-08-09 WO PCT/CN2013/081144 patent/WO2015018052A1/en active Application Filing
- 2013-08-09 CN CN201380001146.1A patent/CN103650459A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6400826B1 (en) * | 1998-05-21 | 2002-06-04 | Massachusetts Institute Of Technology | System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators |
CN101611620B (en) * | 2007-02-20 | 2012-07-18 | 索尼爱立信移动通讯股份有限公司 | Method and device for providing protection for image copy |
CN103189872A (en) * | 2010-09-16 | 2013-07-03 | 凡瑞斯公司 | Secure and efficient content screening in a networked environment |
CN103177201A (en) * | 2011-10-08 | 2013-06-26 | 美国博通公司 | Content security in a social network |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292180A (en) * | 2017-05-27 | 2017-10-24 | 北京北信源软件股份有限公司 | A kind of screen watermark handling method and device |
CN107292180B (en) * | 2017-05-27 | 2019-07-05 | 北京北信源软件股份有限公司 | A kind of screen watermark handling method and device |
CN111263025A (en) * | 2018-11-30 | 2020-06-09 | 北京京东尚科信息技术有限公司 | Picture processing method and device, equipment and storage medium thereof |
CN111488559A (en) * | 2020-04-10 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN111488559B (en) * | 2020-04-10 | 2023-03-10 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN114708138A (en) * | 2022-06-06 | 2022-07-05 | 天津联想协同科技有限公司 | Network disk image watermark adding method and device, network disk and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2015018052A1 (en) | 2015-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7913292B2 (en) | Identification and visualization of trusted user interface objects | |
RU2376631C2 (en) | Presentation of graphical user interface in system with highly protected execution medium | |
EP1586998A1 (en) | Copy prevention apparatus, copy prevention method, and program for causing computer to execute the method | |
US20190273750A1 (en) | Methods and apparatus for detecting remote control of a client device | |
US10395022B2 (en) | Access control for a resource | |
US20140053262A1 (en) | Secure Display for Secure Transactions | |
US10348783B2 (en) | Controlling visibility and distribution of shared conferencing data | |
JP2004062885A (en) | System and method for protecting video card output | |
CN109635581A (en) | A kind of data processing method, equipment, system and storage medium | |
CN103650459A (en) | Information presentation method and equipment | |
CN107729768A (en) | A kind of page display method, device, Intelligent flat and storage medium | |
KR101784711B1 (en) | Apparatus for processing picture intended for information protection, method thereof and computer recordable medium storing the method | |
CN111177770B (en) | Sensitive information protection method, mobile equipment and storage device | |
US20130014214A1 (en) | System Security Process Method and Properties of Human Authorization Mechanism | |
CN112202710A (en) | Method and device for preventing data leakage, electronic equipment and storage medium | |
CN112135166B (en) | Method, device and system for sending and playing live broadcast data | |
CN114500044A (en) | Data verification method and device, storage medium and electronic equipment | |
CN110888682A (en) | Display method and device and electronic equipment | |
CN106603384B (en) | Session control method, device and system based on instant messaging software | |
TW201523329A (en) | Method for indicating operation environment of mobile device and mobile device capable of indicating operation environment | |
CN108563955A (en) | Image processing method and device | |
US11010856B2 (en) | Method and apparatus for deterrence and detection of leakage during remote interactive sessions | |
US11012236B1 (en) | Secure communication tool for use alongside non-secure communications | |
CN104598189B (en) | A kind of information processing method and electronic equipment | |
CN105991513A (en) | Data protection method, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140319 |
|
RJ01 | Rejection of invention patent application after publication |