CN103650459A - Information presentation method and equipment - Google Patents

Information presentation method and equipment Download PDF

Info

Publication number
CN103650459A
CN103650459A CN201380001146.1A CN201380001146A CN103650459A CN 103650459 A CN103650459 A CN 103650459A CN 201380001146 A CN201380001146 A CN 201380001146A CN 103650459 A CN103650459 A CN 103650459A
Authority
CN
China
Prior art keywords
access
information
watermark
user
access way
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201380001146.1A
Other languages
Chinese (zh)
Inventor
叶思海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN103650459A publication Critical patent/CN103650459A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an information presentation method and equipment, relates to the field of electronic information, and can determine whether to present the watermark or not so as to avoid the visual interference. The information presentation method is applied to the process when a user accesses a cloud compounding system and assesses the target information stored in the cloud compounding system. The method mainly comprises the following steps: obtaining the user access information; determining the access mode according to the user access information; if the access mode is a safe access mode, representing the target information without watermark; if the access mode is an unsafe access mode, representing the target information with watermark.

Description

A kind of information demonstrating method and equipment
Technical field
The present invention relates to electronic information field, relate in particular to a kind of information demonstrating method and equipment.
Background technology
Along with the development of electronic information technology, some in daily life or work relate to the information of privacy or secret, can be propagated and be presented by various electronic equipments.Yet when the propagation of information and presenting, the fail safe of privacy information or confidential information has also been subject to larger threat.
Especially after cloud computing system occurs, because user can be linked into cloud computing system with anywhere at any time, obtain and present canned data in cloud computing system, and information is easy to be taken pictures or sectional drawing after presenting, thereby cause information leakage.
In order to prevent that information from presenting rear quilt and illegally stealing, a kind of information demonstrating method that inserts digital watermarking is proposed in prior art, be specially: watermark is embedded in target information, when opening target information, just can presents the target information that includes watermark.Like this, even if stealer takes pictures or sectional drawing to the information presenting, watermark also can be included in its result of stealing, and form direct information and steal evidence, thus the risk of reduction information leakage.
But, in the process that the information of stating in realization presents, inventor finds that in prior art, at least there are the following problems: after watermarked in target information, watermark meeting exists in information always, at any time or place open target information, capital presents the target information that comprises watermark, and the existence of watermark has certain influence to visual effect, therefore can be to watching and use target information itself to cause larger interference.
Summary of the invention
Embodiments of the invention provide a kind of information demonstrating method and equipment, can determine whether to present watermark according to actual conditions, to avoid the vision that watermark causes to disturb.
A first aspect of the present invention, provides a kind of information demonstrating method, comprising:
Obtain described user's access information;
According to described access information, determine described user's access way;
If described access way is safe access way, not contain the mode of watermark, present target information;
If described access way is non-security access way, in the mode that comprises watermark, present target information.
In conjunction with first aspect, in the possible implementation of the first of first aspect, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access white list of described access information inquiry;
If described access information belongs to described safety access white list, determine that described user's access way is safe access way;
If described access information does not belong to described safety access white list, determine that described user's access way is non-security access way.
In conjunction with first aspect, in the possible implementation of the second of first aspect, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access blacklist of described access information inquiry;
If described access information does not belong to described safety access blacklist, determine that described user's access way is safe access way;
If described access information belongs to described safety access blacklist, determine that described user's access way is non-security access way.
In conjunction with first aspect, in the third possible implementation of first aspect, when described access information comprises access authentication information, describedly according to described access information, determine that described user's access way comprises:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of first aspect or first aspect, to any one implementation in the third possible implementation, in the 4th kind of possible implementation of first aspect, describedly in the mode that comprises watermark, present target information and comprise:
Present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of first aspect or first aspect, in the 5th kind of possible implementation of first aspect, before the mode to comprise watermark presents target information, also comprise:
Obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described take the mode that comprises watermark present target information as: in the mode that comprises watermark corresponding to described type of watermark, present target information.
In conjunction with the 5th kind of possible implementation of first aspect, in the 6th kind of possible implementation of first aspect, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of first aspect or first aspect, first aspect the 7th in possible implementation, also comprise:
Under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
A second aspect of the present invention, provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, comprising:
Acquiring unit, for obtaining user's access information;
Determining unit, determines described user's access way for the access information obtaining according to described acquiring unit;
The first display unit, for when described determining unit determines that described access way is safe access way, presents target information not contain the mode of watermark;
The second display unit, for when described determining unit determines that described access way is non-security access way, presents target information in the mode that comprises watermark.
In conjunction with second aspect, in the possible implementation of the first of second aspect, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access white list of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
In conjunction with second aspect, in the possible implementation of the second of second aspect, the access information that described acquiring unit obtains comprise following one of at least: when accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access blacklist of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
In conjunction with second aspect, in the third possible implementation of second aspect, the access information that described acquiring unit obtains comprises access authentication information, described determining unit also for:
If the access authentication information that described acquiring unit obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of second aspect or second aspect, to any one implementation in the third possible implementation, in the 4th kind of possible implementation of second aspect, described the second display unit is used for:
Present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of second aspect or second aspect, in the 5th kind of possible implementation of second aspect, also comprise:
Watermark determining unit, before presenting target information at described the second display unit in the mode that comprises watermark, obtains the level of security of described target information, according to described level of security, determines type of watermark;
Described the second display unit also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit, present target information.
The 5th kind of possible implementation in conjunction with second aspect, in the 6th kind of possible implementation of second aspect, the factor that affects the definite type of watermark of described watermark determining unit comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of second aspect or second aspect, second aspect the 7th in possible implementation, also comprise:
Monitoring unit, under non-security access way, when described the second display unit being detected and cannot present target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
A third aspect of the present invention, provides a kind of novel display device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, comprising:
Receiver, for obtaining user's access information;
Processor, determines described user's access way for the access information obtaining according to described receiver; If described access way is safe access way, controls display and present target information not contain the mode of watermark; If described access way is non-security access way, controls display and present target information in the mode that comprises watermark;
Display, for presenting target information to comprise or not contain the mode of watermark under the control of described processor.
In conjunction with the third aspect, in the possible implementation of the first of the third aspect, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access white list;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
In conjunction with the third aspect, in the possible implementation of the second of the third aspect, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access blacklist;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is non-security access way.
In conjunction with the third aspect, in the third possible implementation of the third aspect, described access information comprises access authentication information, described processor also for:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In conjunction with the first of the third aspect or the third aspect to any one implementation in the third possible implementation, in the 4th kind of possible implementation of the third aspect, described processor also for:
Control described display and present target information and independently watermark simultaneously;
Or, watermark is inserted in the display graphics frame of target information, control described display and present the target information of inserting watermark.
In conjunction with any one implementation in four kinds of possible implementations of the first to the of the third aspect or the third aspect, in the 5th kind of possible implementation of the third aspect, described receiver also for: at described processor, control before described display presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor also for, the level of security obtaining according to described receiver is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
The 5th kind of possible implementation in conjunction with the third aspect, in the 6th kind of possible implementation of the third aspect, the factor that affects the definite type of watermark of described processor comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
In conjunction with any one implementation in six kinds of possible implementations of the first to the of the third aspect or the third aspect, the third aspect the 7th in possible implementation, described processor also for: under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information demonstrating method that the embodiment of the present invention provides and equipment, compare with the technology that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is a kind of information demonstrating method flow chart in one embodiment of the invention;
Fig. 2 is a kind of information demonstrating method flow chart in another embodiment of the present invention;
Fig. 3 is a kind of system architecture exemplary plot in another embodiment of the present invention;
Fig. 4 is the another kind of system architecture exemplary plot in another embodiment of the present invention;
Fig. 5 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 6 be in another embodiment of the present invention really order unit form schematic diagram;
Fig. 7 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 8 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram;
Fig. 9 is that a kind of information presenting device in another embodiment of the present invention forms schematic diagram.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
In addition, term "and/or", is only a kind of incidence relation of describing affiliated partner herein, and expression can exist three kinds of relations, and for example, A and/or B, can represent: individualism A exists A and B, these three kinds of situations of individualism B simultaneously.In addition, character "/", generally represents that forward-backward correlation is to liking a kind of relation of "or" herein.
One embodiment of the invention provide a kind of information demonstrating method, as shown in Figure 1, comprising:
101, obtain user's access information.
It should be noted that, method provided by the invention can be applied in the process of user's access destination information, and wherein said target information is stored in cloud computing system.
102, according to described access information, determine described user's access way, described access way comprises safe access way and non-security access way.
Wherein, described access information comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
If 103 described access waies are safe access way, not contain the mode of watermark, present target information.
If 104 described access waies are non-security access way, in the mode that comprises watermark, present target information.
Wherein, the method that presents target information in the mode that comprises watermark comprises: present target information and independently watermark simultaneously; Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
The information demonstrating method that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Another embodiment of the present invention provides a kind of information demonstrating method, as shown in Figure 2, comprising:
201, obtain user's access information.
In a kind of implementation of the present embodiment, described access information can comprise following one of at least: accessing position information, user totem information and equipment identification information; In another kind of implementation, described access information can comprise access authentication information.
When described access information one of comprises in accessing position information, user totem information and equipment identification information at least, it is example that following steps 202 be take the scene that is provided with safety access white list in advance, determines user's access way:
202, according to the pre-configured safety access white list of described access information inquiry; If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way, execution step 203; If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way, execution step 204.
Concrete, in framework as shown in Figure 3, can, according to user's accessing position information, user totem information or equipment identification information query safe access white list, in white list, be safety access; Or, according to user's accessing position information, user totem information or equipment identification information inquiry blacklist, in blacklist, be non-security access.For example, take Fig. 3 as example, in white list, is safe access way in the access IP address of Office Area, in the access IP address in hotel, not in white list, is considered as non-security access way.Wherein, on-position identification module is for identifying user's access way.Further, information security level identification module can be identified the level of security of target information.Whether security strategy control module presents the key elements such as pattern, type or size of watermark, watermark according to user mode access and level of security decision-making, and policy information is sent to digital watermark processing module, by digital watermark processing module, carry out the generation of watermark and present.
When described access information one of comprises in accessing position information, user totem information and equipment identification information at least, the scene that following steps 202 ' take are provided with safety access blacklist in advance is example, determines user's access way:
202 ', according to the pre-configured safety access blacklist of described access information inquiry; If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way, execution step 203; If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way, execution step 204.
When described access information comprises access authentication information, can determine by following steps 202 〞 user's access way:
202 〞, according to the access authentication information of access authentication system, judge described user's access way; If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way, execution step 203; If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way, execution step 204.In example framework as shown in Figure 4, user's access can also be by the authentication of access authentication system.Access authentication system can authenticate user's accessing position information, user totem information or equipment identification information, also can adopt the modes such as account number cipher to authenticate, and the embodiment of the present invention does not limit this.
What deserves to be explained is, in the present embodiment, step 202,202 ' and 202 〞 are specific implementations of three kinds of optional users' of determining access way, can select in actual applications a kind of in above three kinds of specific implementations.Function and the connected mode of the inner unit of user virtual machine in Fig. 3 and Fig. 4 are described in the embodiment of the information presenting device of Fig. 5-7 correspondence, and the present embodiment is not described in detail here.
203, not contain the mode of watermark, present target information.
Wherein, not present target information containing the mode of watermark, be and present target information, in target information, there is no the interference of watermark, be convenient to user and check, thereby can not affect the visual effect of information itself.
204, watermark is inserted in the display graphics frame of target information, presents the target information of inserting watermark.
Wherein, definite user, be to be linked into cloud computing system when opening the target information in cloud computing system with non-security access way, just this is presented to the operation of inserting watermark, but not in cloud computing system, in each file, insert intrinsic watermark during spanned file, thereby guarantee that target information can have presentation mode flexibly.This watermark mixes presentation mode with target information, in target information, is now, in the graphic frame of its demonstration, inserts digital watermark information.This presentation mode, processes complexity, but good visual effect.Can, according to wanting the periphery graphical information of insertion position to carry out accommodation, if periphery is red, can insert the figure approaching with redness, to seamlessly transit.
In the present embodiment, step 204 can present target information in the mode that comprises watermark, and optional, step 204 also can replace with: present target information and independently watermark simultaneously.This display mode can be called screen watermark, and the content of this watermark and target information is irrelevant, just on display screen, shows, thereby need not change file content, plays again the anti-effect of taking pictures and preventing divulging a secret simultaneously.Independently digital watermarking presents process, presents the digital watermarking of corresponding types on user's screen.This mode, watermark and target information are independently to present, and process simply, but effects that both show may not be very level and smooth.Certainly, the mode that the present embodiment can also adopt other modes to realize comprising watermark presents target information, and the present embodiment does not repeat one by one.
Further alternative, before the method for the embodiment of the present invention can also be included in step 204, the level of security of the target information that identification user uses, and according to this level of security Information generation watermark.Wherein, the recognition methods of the level of security of target information, is industry prior art, does not launch herein.So, the concrete methods of realizing of step 204 can be: the rank according to the document information safety of user's on-position and user's use, form security strategy, and according to this security strategy, carry out watermark processing.
For example, concrete a kind of security strategy control method can be: when user accesses from non-security region, use top secret document, the digital watermarking type presenting is 1; When user accesses from non-security region, use confidential document, the digital watermarking type presenting is 2; When user accesses from non-security region, use confidential document, the digital watermarking type presenting is 3.
Further, type of watermark can be edited in advance, the factor that affects type of watermark comprise following one of at least: be presented on screen diverse location, occupy screen size, watermark color and watermark content etc.Watermark content can comprise: the information that user is relevant, such as name, job number, IP address, time etc.
Further alternative, in order further to guarantee that target information presents the fail safe in process, to avoid user to distort or stop the process that watermark generates and shows, the present embodiment can also comprise:
205,, under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information demonstrating method that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Another embodiment of the present invention provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, as shown in Figure 5, comprising:
Acquiring unit 51, for obtaining user's access information;
Determining unit 52, determines described user's access way for the access information obtaining according to described acquiring unit 51;
The first display unit 53, for when described determining unit 52 determines that described access way is safe access way, presents target information not contain the mode of watermark;
The second display unit 54, for when described determining unit 52 determines that described access way is non-security access way, presents target information in the mode that comprises watermark.
Wherein, the access information that acquiring unit 51 obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
In a kind of possible implementation, the access information that acquiring unit 51 obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, as shown in Figure 6, described determining unit 52 comprises:
Inquiry subelement 521, for the pre-configured safety access white list of access information inquiry obtaining according to described acquiring unit 51;
Determine subelement 522, while showing that for the Query Result obtaining at described inquiry subelement 521 described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement 521 shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
Or, the access information obtaining when acquiring unit 51 comprise following one of at least: when accessing position information, user totem information and equipment identification information, as shown in Figure 6, described determining unit 52 comprises:
Inquiry subelement 521, for the pre-configured safety access blacklist of access information inquiry obtaining according to described acquiring unit 51;
Determine subelement 522, while showing that for the Query Result obtaining at described inquiry subelement 521 described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement 521 shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
In the possible implementation of another kind, the access information that described acquiring unit 51 obtains comprises access authentication information, described determining unit 52 also for:
The access authentication information of obtaining according to described acquiring unit 51 judges described user's access way; If the access authentication information that described acquiring unit 51 obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit 51 obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
Further, described the second display unit 54 for: present target information and independently watermark simultaneously; Or, watermark is inserted in the display graphics frame of target information, present the target information of inserting watermark.
Further, as shown in Figure 7, also comprise watermark determining unit 55, before presenting target information at described the second display unit 54 in the mode that comprises watermark, obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described the second display unit 54 also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit 55, present target information.
The factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
Described information presenting device also comprises:
Monitoring unit 56, under non-security access way, when described the second display unit 54 being detected and cannot present target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
On the other hand, the embodiment of the present invention also provides a kind of information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, as shown in Figure 8, comprising:
Receiver 81, for obtaining user's access information.
Processor 82, determines described user's access way for the access information obtaining according to described receiver 81, described access way comprises safe access way and non-security access way; If described access way is safe access way, controls display and present target information not contain the mode of watermark; If described access way is non-security access way, controls display and present target information in the mode that comprises watermark;
Display 83, for presenting target information to comprise or not contain the mode of watermark under the control at described processor 82.
The access information that receiver 81 receives comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
Further, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, now this equipment also comprises as shown in Figure 9:
Memory 84, for storing pre-configured safety access white list.
Described processor 82 also inquires about for: the access information obtaining according to described receiver 81 the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way.
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
Or, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, now this equipment also comprises as shown in Figure 9:
Memory 84, for storing pre-configured safety access blacklist.
Described processor 82 also inquires about for: the access information obtaining according to described receiver 81 the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way.
If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way.
Further, when access information comprises access authentication information, processor 82 also for: the access authentication information receiving according to described receiver 81 judges described user's access way; If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
In addition, processor 82 also presents target information and independently watermark for controlling described display simultaneously;
Or, watermark is inserted in the display graphics frame of target information, control described display and present the target information of inserting watermark.
Described receiver 81 also for: at described processor 82, control before described display 83 presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor 82 also for, the level of security receiving according to described receiver 81 is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
The factor that affects the definite type of watermark of described processor 82 comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
Described processor also 82 for: under non-security access way, if cannot present target information in the mode that comprises watermark, carry out alarm or stop providing service to described user.
The information presenting device that the present embodiment provides, compare with the method that watermark in prior art is present in target information always, by obtaining the user's who is linked into cloud computing system access information, determine whether user is safe access, thereby can when accessing for safety, user present target information not contain the mode of watermark, to avoid the vision that watermark causes under safe access way to disturb, be conducive to watching and using of target information.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add essential common hardware by software and realize, and can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Understanding based on such, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in the storage medium can read, as the floppy disk of computer, hard disk or CD etc., comprise some instructions with so that computer equipment (can be personal computer, server, or the network equipment etc.) carry out the method described in each embodiment of the present invention.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; can expect easily changing or replacing, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of described claim.

Claims (27)

1. an information demonstrating method, is applied to user and is linked in the process that cloud computing system conducts interviews to the target information of storing in cloud computing system, it is characterized in that, the method comprises:
Obtain described user's access information;
According to described access information, determine described user's access way;
If described access way is safe access way, not contain the mode of watermark, present described target information;
If described access way is non-security access way, in the mode that comprises watermark, present described target information.
2. method according to claim 1, is characterized in that,
Described access information comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
3. method according to claim 1 and 2, it is characterized in that, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access white list of described access information inquiry;
If described access information belongs to described safety access white list, determine that described user's access way is safe access way;
If described access information does not belong to described safety access white list, determine that described user's access way is non-security access way.
4. method according to claim 1 and 2, it is characterized in that, when described access information comprise following one of at least: when accessing position information, user totem information and equipment identification information, describedly according to described access information, determine that described user's access way comprises:
According to the pre-configured safety access blacklist of described access information inquiry;
If described access information does not belong to described safety access blacklist, determine that described user's access way is safe access way;
If described access information belongs to described safety access blacklist, determine that described user's access way is non-security access way.
5. method according to claim 1 and 2, is characterized in that, when described access information comprises access authentication information, describedly according to described access information, determines that described user's access way comprises:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
6. according to the method described in any one in claim 1-5, it is characterized in that, describedly in the mode that comprises watermark, present described target information and comprise:
Present described target information and independently watermark simultaneously; Or,
Described watermark is inserted in the display graphics frame of described target information, presents the target information of inserting watermark.
7. according to the method described in any one in claim 1-6, it is characterized in that, before the mode to comprise watermark presents described target information, also comprise:
Obtain the level of security of described target information, according to described level of security, determine type of watermark;
Described take the mode that comprises watermark present described target information as: in the mode that comprises watermark corresponding to described type of watermark, present described target information.
8. method according to claim 7, is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
9. according to the method described in any one in claim 1-8, it is characterized in that, also comprise:
Under non-security access way, if cannot present in the mode that comprises watermark described target information, carry out alarm or stop providing service to described user.
10. an information presenting device, is applied to user and is linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, it is characterized in that, comprising:
Acquiring unit, for obtaining described user's access information;
Determining unit, determines described user's access way for the access information obtaining according to described acquiring unit;
The first display unit, for when described determining unit determines that described access way is safe access way, presents described target information not contain the mode of watermark;
The second display unit, for when described determining unit determines that described access way is non-security access way, presents described target information in the mode that comprises watermark.
11. equipment according to claim 10, is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
12. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: when accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access white list of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information belongs to described safety access white list, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information does not belong to described safety access white list, the access way of determining described user is non-security access way.
13. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprise following one of at least: accessing position information, user totem information and equipment identification information, described determining unit comprises:
Inquiry subelement, for the pre-configured safety access blacklist of access information inquiry obtaining according to described acquiring unit;
Determine subelement, while showing that for the Query Result obtaining at described inquiry subelement described access information does not belong to described safety access blacklist, the access way of determining described user is safe access way; When the Query Result obtaining at described inquiry subelement shows that described access information belongs to described safety access blacklist, the access way of determining described user is non-security access way.
14. according to the equipment described in claim 10 or 11, it is characterized in that, the access information that described acquiring unit obtains comprises access authentication information, described determining unit also for:
If the access authentication information that described acquiring unit obtains shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way; If the access authentication information that described acquiring unit obtains shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
15. according to the equipment described in any one in claim 10-14, it is characterized in that, described the second display unit is used for:
Present described target information and independently watermark simultaneously;
Or, described watermark is inserted in the display graphics frame of described target information, present the target information of inserting watermark.
16. according to the equipment described in any one in claim 10-15, it is characterized in that, also comprises:
Watermark determining unit, before presenting target information at described the second display unit in the mode that comprises watermark, obtains the level of security of described target information, according to described level of security, determines type of watermark;
Described the second display unit also for: in the mode that comprises watermark corresponding to the determined type of watermark of described watermark determining unit, present described target information.
17. equipment according to claim 16, is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
18. according to the equipment described in any one in claim 10-17, it is characterized in that, also comprises:
Monitoring unit, under non-security access way, when described the second display unit being detected and cannot present described target information in the mode that comprises watermark, carries out alarm or stops providing service to described user.
19. 1 kinds of information presenting devices, are applied to user and are linked into cloud computing system, and in the process that the target information of storing in described cloud computing system is conducted interviews, it is characterized in that, comprising:
Receiver, for obtaining described user's access information;
Processor, determines described user's access way for the access information obtaining according to described receiver; If described access way is safe access way, controls display and present target information not contain the mode of watermark; If described access way is non-security access way, controls display and present target information in the mode that comprises watermark;
Display, for presenting target information to comprise or not contain the mode of watermark under the control of described processor.
20. equipment according to claim 19, is characterized in that, the access information that described receiver obtains comprise following one of at least: accessing position information, access authentication information, user totem information and equipment identification information.
21. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access white list;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access white list that described memory is stored;
If Query Result shows described access information and belongs to described safety access white list, determines that described user's access way is safe access way;
If Query Result shows described access information and does not belong to described safety access white list, determines that described user's access way is non-security access way.
22. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprise following one of at least: accessing position information, user totem information and equipment identification information, this equipment also comprises:
Memory, for storing pre-configured safety access blacklist;
Described processor also inquires about for: the access information obtaining according to described receiver the safety access blacklist that described memory is stored;
If Query Result shows described access information and does not belong to described safety access blacklist, determines that described user's access way is safe access way;
If Query Result shows described access information and belongs to described safety access blacklist, determines that described user's access way is non-security access way.
23. according to the equipment described in claim 19 or 20, it is characterized in that, described access information comprises access authentication information, described processor also for:
If described access authentication information shows that described user's access way is by the authentication of access authentication system, determine that described user's access way is safe access way;
If described access authentication information shows that described user's access way is not by the authentication of access authentication system, determine that described user's access way is non-security access way.
24. according to the equipment described in any one in claim 19-23, it is characterized in that, described processor also for:
Control described display and present described target information and independently watermark simultaneously;
Or, described watermark is inserted in the display graphics frame of described target information, control described display and present the target information of inserting watermark.
25. according to the equipment described in any one in claim 19-24, it is characterized in that,
Described receiver also for: at described processor, control before described display presents target information in the mode that comprises watermark, obtain the level of security of described target information;
Described processor also for, the level of security obtaining according to described receiver is determined type of watermark; In the mode that comprises watermark corresponding to described type of watermark, present target information.
26. according to the equipment described in any one in claim 19-25, it is characterized in that, the factor that affects described type of watermark comprise following one of at least: watermark location, watermark size, watermark color and watermark content.
27. according to the equipment described in any one in claim 19-26, it is characterized in that, described processor also for: under non-security access way, if cannot present in the mode that comprises watermark described target information, carry out alarm or stop providing service to described user.
CN201380001146.1A 2013-08-09 2013-08-09 Information presentation method and equipment Pending CN103650459A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/081144 WO2015018052A1 (en) 2013-08-09 2013-08-09 Information presentation method and device

Publications (1)

Publication Number Publication Date
CN103650459A true CN103650459A (en) 2014-03-19

Family

ID=50253432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201380001146.1A Pending CN103650459A (en) 2013-08-09 2013-08-09 Information presentation method and equipment

Country Status (2)

Country Link
CN (1) CN103650459A (en)
WO (1) WO2015018052A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292180A (en) * 2017-05-27 2017-10-24 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN111263025A (en) * 2018-11-30 2020-06-09 北京京东尚科信息技术有限公司 Picture processing method and device, equipment and storage medium thereof
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN114708138A (en) * 2022-06-06 2022-07-05 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
CN101611620B (en) * 2007-02-20 2012-07-18 索尼爱立信移动通讯股份有限公司 Method and device for providing protection for image copy
CN103177201A (en) * 2011-10-08 2013-06-26 美国博通公司 Content security in a social network
CN103189872A (en) * 2010-09-16 2013-07-03 凡瑞斯公司 Secure and efficient content screening in a networked environment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
CN101611620B (en) * 2007-02-20 2012-07-18 索尼爱立信移动通讯股份有限公司 Method and device for providing protection for image copy
CN103189872A (en) * 2010-09-16 2013-07-03 凡瑞斯公司 Secure and efficient content screening in a networked environment
CN103177201A (en) * 2011-10-08 2013-06-26 美国博通公司 Content security in a social network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292180A (en) * 2017-05-27 2017-10-24 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN107292180B (en) * 2017-05-27 2019-07-05 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN111263025A (en) * 2018-11-30 2020-06-09 北京京东尚科信息技术有限公司 Picture processing method and device, equipment and storage medium thereof
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN111488559B (en) * 2020-04-10 2023-03-10 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN114708138A (en) * 2022-06-06 2022-07-05 天津联想协同科技有限公司 Network disk image watermark adding method and device, network disk and storage medium

Also Published As

Publication number Publication date
WO2015018052A1 (en) 2015-02-12

Similar Documents

Publication Publication Date Title
US7913292B2 (en) Identification and visualization of trusted user interface objects
RU2376631C2 (en) Presentation of graphical user interface in system with highly protected execution medium
EP1586998A1 (en) Copy prevention apparatus, copy prevention method, and program for causing computer to execute the method
US20190273750A1 (en) Methods and apparatus for detecting remote control of a client device
US10395022B2 (en) Access control for a resource
US20140053262A1 (en) Secure Display for Secure Transactions
US10348783B2 (en) Controlling visibility and distribution of shared conferencing data
JP2004062885A (en) System and method for protecting video card output
CN109635581A (en) A kind of data processing method, equipment, system and storage medium
CN103650459A (en) Information presentation method and equipment
CN107729768A (en) A kind of page display method, device, Intelligent flat and storage medium
KR101784711B1 (en) Apparatus for processing picture intended for information protection, method thereof and computer recordable medium storing the method
CN111177770B (en) Sensitive information protection method, mobile equipment and storage device
US20130014214A1 (en) System Security Process Method and Properties of Human Authorization Mechanism
CN112202710A (en) Method and device for preventing data leakage, electronic equipment and storage medium
CN112135166B (en) Method, device and system for sending and playing live broadcast data
CN114500044A (en) Data verification method and device, storage medium and electronic equipment
CN110888682A (en) Display method and device and electronic equipment
CN106603384B (en) Session control method, device and system based on instant messaging software
TW201523329A (en) Method for indicating operation environment of mobile device and mobile device capable of indicating operation environment
CN108563955A (en) Image processing method and device
US11010856B2 (en) Method and apparatus for deterrence and detection of leakage during remote interactive sessions
US11012236B1 (en) Secure communication tool for use alongside non-secure communications
CN104598189B (en) A kind of information processing method and electronic equipment
CN105991513A (en) Data protection method, device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140319

RJ01 Rejection of invention patent application after publication