CN107784207B - Display method, device and equipment of financial APP interface and storage medium - Google Patents

Display method, device and equipment of financial APP interface and storage medium Download PDF

Info

Publication number
CN107784207B
CN107784207B CN201711052046.8A CN201711052046A CN107784207B CN 107784207 B CN107784207 B CN 107784207B CN 201711052046 A CN201711052046 A CN 201711052046A CN 107784207 B CN107784207 B CN 107784207B
Authority
CN
China
Prior art keywords
watermark
user
information
interface
financial app
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711052046.8A
Other languages
Chinese (zh)
Other versions
CN107784207A (en
Inventor
梁永健
杨雨芬
陈宝花
谭志杰
邓俊俊
赵媛媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201711052046.8A priority Critical patent/CN107784207B/en
Priority to PCT/CN2017/113779 priority patent/WO2019085126A1/en
Publication of CN107784207A publication Critical patent/CN107784207A/en
Application granted granted Critical
Publication of CN107784207B publication Critical patent/CN107784207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention belongs to the technical field of financial APP interface display, and provides a display method, a device, equipment and a storage medium of a financial APP interface, wherein the display method comprises the following steps: acquiring an address of a user information database, and associating the address with the user information database; when a user logs in a financial APP, obtaining login information of the user, and judging whether the login information exists in a user information database; if the login information does not exist in the user information database, refusing to log in the financial APP; if the login information exists in the user information database, watermark information is generated according to the login information, the watermark information is embedded into the interface of the financial APP to generate interface data with watermarks, the legality of a user using the financial APP is guaranteed, and once the financial APP data is subjected to illegal transmission, the purpose of tracing the source of an illegal transmitter can be achieved.

Description

Display method, device and equipment of financial APP interface and storage medium
Technical Field
The invention belongs to the technical field of financial APP interface display, and particularly relates to a financial APP interface display method, device, equipment and storage medium.
Background
the mode of present work is more and more diversified, because the portability of cell-phone makes using cell-phone APP to carry out information acquisition and exchange on the work and become the normality, and is corresponding, and finance APP is the APP that relates to in the aspect of financial finance financial affairs, and the data of finance APP interface all generally has very high confidentiality, consequently, how to strengthen finance APP's data security becomes an important subject.
at present, financial APP usually adds watermarks of company LOGO to increase data security, and the data can play a certain tracing role when being illegally transmitted, but specific illegal transmitters cannot be accurately determined. Moreover, when general financial APP is registered, as long as the input user information meets certain requirements, such as the user name is not repeated and the password length is sufficient, the user information can be stored in the user database of the APP, and the validity of the financial APP user cannot be guaranteed.
disclosure of Invention
the embodiment of the invention provides a display method, a display device, display equipment and a storage medium of a financial APP interface, which are used for solving the problems that an illegal transmitter cannot be accurately determined and the legality of a user using a financial APP cannot be guaranteed in the prior art.
the embodiment of the invention is realized as follows:
The invention provides a display method of a financial APP interface, which comprises the following steps:
Acquiring an address of a user information database, and associating the address with the user information database;
When a user logs in the financial APP, obtaining login information of the user, and judging whether the login information exists in the user information database;
If the login information does not exist in the user information database, refusing to log in the financial APP;
and if the login information exists in the user information database, generating watermark information according to the login information, and embedding the watermark information into an interface of the financial APP to generate interface data with a watermark.
The second aspect of the present invention provides a display device of a financial APP interface, including:
the user information association module is used for acquiring the address of a user information database and associating the address with the user information database;
the user information judging module is used for acquiring login information of a user when the user logs in the financial APP, judging whether the login information exists in the user information database, and refusing to log in the financial APP when the login information does not exist in the user information database;
And the watermark information display module is used for generating watermark information according to the login information and embedding the watermark information into an interface of the financial APP to generate interface data with watermarks if the login information exists in the user information database.
A third aspect of the present invention provides a terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first aspect of the present invention when executing the computer program.
a fourth aspect of the invention provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to the first aspect of the invention.
The invention provides a display method, a device, equipment and a storage medium of a financial APP interface, which are characterized in that the user information of a login financial APP is checked, when the user information is judged to exist in a user information database, the login of the financial APP is allowed, the legality of a financial APP user is ensured, meanwhile, watermark information generated by the user information is added into the financial APP, and in case of illegal transmission of data, illegal transmitters can be tracked, and the purpose of protecting the data safety is achieved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flow chart of a method for displaying a financial APP interface provided in an embodiment of the present invention;
FIG. 2 is another flow diagram of the embodiment shown in FIG. 1;
FIG. 3 is a flow chart of a method for displaying a financial APP interface provided in accordance with another embodiment of the present invention;
FIG. 4 is a flowchart of a method for displaying a financial APP interface provided in accordance with another embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a display device of a financial APP interface according to another embodiment of the present invention;
FIG. 6 is another schematic structural view of the embodiment shown in FIG. 5;
Fig. 7 is a schematic structural diagram of a terminal device according to yet another embodiment of the present invention.
Detailed Description
in order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
financial APP includes APP that banks, securities, insurance, trust and other financial field companies use, because the data that these APP related to are very important, therefore, how to prevent data from being illegally transmitted is the problem that all companies all pay close attention to, must guarantee user's legitimacy, in case data suffer illegal transmission, need trace to the source to the data of illegal transmission, retrieve the loss of company.
referring to fig. 1, a flowchart of a method for displaying a financial APP interface according to an embodiment of the present invention is shown, where the method for displaying a financial APP interface includes the following steps:
and S100, acquiring the address of the user information database, and associating the address with the user information database.
The user information database is financial APP's third party database, can acquire through the user input address, also can network according to the company name of user input and acquire or download the connection information and acquire, be in the same place user information database and financial APP relevance, as the database at backstage, manage by the company that uses financial APP, when new staff that entries, with this staff's information entry to this user information database, when staff leaves the position, delete from this user information database with the staff that will work, protect this user information database's renewal state.
The information of the employee comprises a user name and a password of the employee for using the financial APP.
The association between the user information database and the financial APP is performed through the address of the database, for example, the user information database of the company A is associated with the financial APP through the database address of the company A, the user information database of the company B is associated with the financial APP through the database address of the company B, when the employee of the company A logs in the financial APP, the user information database of the company A is associated with the APP, and when the employee of the company B logs in the APP, the user information database of the company B is associated with the APP.
step S101, when a user logs in a financial APP, login information of the user is obtained.
When a user logs in the financial APP through a login interface of the financial APP, the financial APP acquires information input by the user, specifically, a user name and a password input by the user at the login interface of the financial APP, and the user name and the password are used for being compared with an associated user information database.
step S102, judging whether the login information exists in the user information database.
After obtaining the information input by the user, the financial APP compares the information with a user information database of a company selected by the user, and if the user login information has unique data corresponding to the unique data in the user information database, the user is judged to be in the user information database and is a legal user of the company; if the user login information does not have data corresponding to the user login information in the user information database, the user login information is judged to be not in the user information database, and the user is an illegal user of the company or a user who does not open the authority in the company.
and step S103, if the login judgment result is that the user information does not exist in the user information database, refusing to login the financial APP.
specifically, if the login judgment result is that the user information does not exist in the user information database, the user is judged to be an illegal user or a user who does not open the authority, the user is refused to login the financial APP, the user cannot acquire related data of the financial APP, the legality of the user is guaranteed, and the illegal user is prevented from acquiring data information of a company and causing loss to the company.
And step S104, if the login judgment result is that the user information exists in the user information database, generating watermark information according to the login information, and embedding the watermark information into an interface of the financial APP to generate interface data with the watermark.
Specifically, if the login judgment result indicates that the user information exists in the user information database, the user is judged to be a legal user, the user is allowed to log in, and after the login is successful, the financial APP generates watermark information according to the login information of the user, wherein the watermark information includes but is not limited to the following modes:
1. and generating watermark information according to the company information and the user name of the user, wherein the company information is used as display content which can be identified by naked eyes, and the user name is used as watermark content which cannot be seen by naked eyes. The information of the company may be short name of the company or LOGO, for example: "xx company" in this way, when using APP, the user only sees the information of the company, but cannot see the information of the user, and thus, the user is prevented from actively attacking the watermark, such as altering after screen capture, and the like, to shield the information of the watermark, and then illegal transmission of data is performed.
2. Generating watermark information according to the company information, the user name and the login time of the user, wherein the company information is used as display content which can be identified by naked eyes, and the user name and the login time are used as watermark content which cannot be seen by naked eyes. Therefore, when the watermark is extracted, the login time information of the user can be extracted, the illegal transmission data can be traced and traced, and the tracing efficiency and precision are improved.
Referring to fig. 2, another flowchart of a display method of a financial APP interface according to an embodiment of the present invention is shown, specifically, the embedding of the watermark information into the financial APP interface in step S104 includes the following steps:
and step S1041, generating a label according to the watermark information.
and encrypting the watermark information by a preset key to generate a corresponding watermark ciphertext, and generating a corresponding label according to the watermark ciphertext.
Specifically, the generated tag includes two parts: a plaintext part and an encrypted part. The plaintext part is the information of the company, and is directly displayed as the plaintext, such as: "xx company", a plain text label is generated based on "xx company". The encryption part includes: and encrypting the watermark information based on the preset key to obtain a corresponding watermark ciphertext and generating a corresponding label based on the watermark ciphertext by using the user information such as the user name, the login time and the like. Therefore, the watermark seen by the user is only the plaintext part, but the encrypted part cannot be seen by the user, and the illegal transmission of the data can be prevented from being carried out due to active attack on the watermark to a great extent.
In practical application, if the obtained watermark information needs to be kept secret, the obtained watermark information needs to be encrypted by an Encryption algorithm, such as an Advanced Encryption Standard (AES) algorithm, based on a preset key, and then is encoded by an encoding algorithm, such as a Base64 algorithm, to generate a corresponding watermark ciphertext, and then generates a corresponding label based on the watermark ciphertext. Therefore, when a user browses a file, the user cannot visually acquire the watermark information before encryption through the displayed label, and the purpose of watermark encryption is achieved.
for example: when the user name information 'zhang san' is encrypted, the watermark information can be encrypted based on a preset key, then coding is carried out to obtain a string of character string watermark ciphertext 'ABC', a corresponding label is generated based on the watermark ciphertext, a user sees the watermark ciphertext obtained after the watermark information is encrypted when using the APP, and the user cannot visually know the watermark information before encryption.
in case of data being illegally transmitted and watermark information needing to be extracted, the watermark ciphertext can be decoded through an encoding and decoding algorithm such as Base64, and then decrypted through an encryption and decryption algorithm such as an AES algorithm to obtain corresponding watermark information, so that an illegal transmitter can be traced.
For example, the encrypted watermark information is "CDF", and is decoded by a decoding algorithm, and decrypted by a decryption algorithm to obtain the decrypted watermark information which is "lie four".
further, in the process of generating the label, the transparency of the label can also be set.
For example: the user sets the attribute of the label and sets the transparency bit of the label to be 90%.
by setting the transparency of the label, a user can not be influenced by the label when browsing the APP.
Step S1042, add the label to the preset map layer.
The preset image layer covers the whole APP interface for the size matched with the screen of the mobile phone of the user, the image layer is divided into N multiplied by N areas, the value of N can be set, and is optimal, the value of N is larger than 3, therefore, the data in each area of the financial APP can be guaranteed to have watermark information, and the effects of protecting data safety and tracing are achieved.
For example, if N is 4, the preset image layer is divided into 16 regions, that is, the interface corresponding to the financial APP is also divided into 16 regions, and all of the 16 regions have watermark information, so that it is difficult for a user to illegally transmit data of a certain region by means of screen capture, because at least 1 complete watermark information is likely to be included in the screen capture region.
And step S1043, overlapping the layer and the APP data for presentation.
Specifically, the attribute parameters of the layer may be adjusted first; and then, placing the adjusted layer above the APP interface to enable the layer and the APP interface to be displayed in an overlapping mode.
When adjusting the attribute parameters of the layer, at least one or any combination of the following parameters is adjusted: the image layer shape, the image layer transparency, the image layer center coordinate and the image layer rotation angle.
For example, adjusting attribute parameters of the layer, setting the shape of the layer as a rectangle, the transparency of the layer as 80%, the center coordinate of the layer as the center of the screen, and the rotation angle of the layer as 0 degree.
The required coverage effect of the image layer is achieved by setting the position, the shape, the transparency and the like of the image layer.
In addition, the layer after adjusting is arranged above the finance APP interface, so that the layer and the APP interface are overlapped and displayed, and thus, a user can see the layer and the APP interface simultaneously.
Further, when it is determined that the user instructs to perform scrolling, page turning, or zooming operations on the APP interface, in order to ensure that the tag always covers the financial APP interface, the following two ways may be adopted, but are not limited to:
The first method is as follows: and when the user is determined to indicate that the APP interface is scrolled, paged or zoomed, keeping the position and the display content of the layer unchanged.
By adopting the first mode, when the APP interface is scrolled, turned or zoomed, the central coordinate of the layer and the rotation angle of the layer are kept unchanged, the number of the labels in the layer is always unchanged, and the labels in the layer are arranged according to the preset N multiplied by N arrangement mode all the time, so that the labels in the layer can cover the screen according to the preset N multiplied by N arrangement mode all the time.
The second method comprises the following steps: when the fact that a user indicates to perform scrolling or page turning operation on the APP interface is determined, synchronously scrolling and page turning are performed on the layer and the APP interface, the number of labels currently displayed in the layer is detected, and the labels in the layer are additionally added in an N multiplied by N arrangement mode based on a detection result; when it is determined that the user indicates to perform scaling operation on the APP interface, the layer and the APP interface are synchronously scaled, the number of currently displayed labels in the layer is detected, and the labels in the layer are additionally added by adopting an NxN arrangement mode based on a detection result.
For example: arranging the labels in the layer in a 4 × 4 matrix manner, setting the size of the layer as the size of the whole screen, when determining that a user indicates to perform a rolling operation on the APP interface, synchronously rolling the layer and the APP interface, detecting the number of the labels currently displayed in the layer, and supplementing and adding 4 labels to corresponding positions in the layer in a 4 × 4 arrangement manner when the number of the labels in the layer is less than 4 × 4, if the number of the labels remaining in the layer is 3 × 4, and recovering the number of the labels to 16; another example is: when it is determined that the user indicates to perform page turning operation on the APP interface, the number of the remaining tags in the layer is 0 x 0, adding the 16 tags to corresponding positions in the layer in a 4 x 4 arrangement manner, and recovering the number of the tags to 16; for another example, when it is determined that the user instructs to perform the enlarging operation on the APP interface, and the number of the remaining tags in the layer is 3 × 3, 7 tags are complementarily added to corresponding positions in the layer in a 4 × 4 arrangement manner.
And by adopting the second mode, the labels displayed in the layer are arranged in an NxN arrangement mode all the time, so that the coverage rate of the labels in the layer on the financial APP interface is ensured.
Through above three steps, with watermark information embedding to finance APP interface, make APP interface data combine together with the watermark, played the purpose that prevents APP data by illegal transmission.
according to the display method of the financial APP interface provided by the embodiment of the invention, the login information of the user is compared with the APP associated user information database, an illegal user is rejected, the legality of the financial APP user is ensured, meanwhile, the watermark information is generated according to the information of the user, and the watermark information is generated into plaintext and ciphertext to be embedded into the APP interface through the secret key, so that the user can only see the plaintext watermark information, the possibility that the watermark is attacked and damaged is reduced, in case that the data is illegally transmitted, the source tracing can be carried out on an illegal transmitter, and the safety of the financial APP data is improved.
On the basis of the former embodiment, when a user forwards a financial APP interface data file, the watermark information on the interface data is decrypted, the user information of the watermark is extracted, whether the user information accords with the use authority or not is checked, if not, the user is prohibited from forwarding the data, and if the user information accords with the use authority, the interface data is decrypted, and the user is permitted to forward the data.
In the practical application of financial APP, for reasons such as communication in work, forwarding operation needs to be performed on APP interface data, for example, the APP interface data is forwarded to a mail or other communication tools; in addition, the data of the financial APP interface has different operation permissions for different users, common users, namely common employees, do not have the permission to forward the data, and users above a senior level use supervisor level have the permission to forward the data; or the staff of each branch of the company can check the data information of the whole company, but only the branch information of the company can be forwarded. For example, a company has a Shenzhen subsection and a Guangzhou subsection, and then a certain employee of the Shenzhen subsection can view data of both the Shenzhen subsection and the Guangzhou subsection, but can only forward data of the Shenzhen subsection.
Referring to fig. 3, a flowchart of a display method of a financial APP interface provided in an embodiment of the present invention is shown, specifically, the monitoring forwarding operation of the user includes the following steps:
And step S200, the user requires to forward the financial APP interface data.
The user can select the instruction of forwarding at the financial APP interface according to own needs, and the financial APP receives the instruction that the user requires to forward financial APP interface data at this moment.
Step S201, extracting watermark information of a financial APP interface.
When the financial APP receives an instruction that a user requires to forward financial APP interface data, the financial APP extracts watermark information in a preset layer, decodes the watermark ciphertext through a coding and decoding algorithm such as Base64, and then decrypts through an encryption and decryption algorithm such as an AES algorithm to obtain corresponding watermark information.
Step S202, judging whether the user accords with the use authority.
Specifically, after the watermark information is acquired, the information related to the user is acquired, the grade or the company part of the user is verified, and if the user is judged to be a common user or the user part is different from the company part to which the financial APP interface data belongs, the user is judged not to conform to the use permission; and if the user is judged to be a high-level user and the part of the company to which the APP interface data belongs is the same, judging that the user accords with the use permission.
Step S203, if the user does not accord with the use authority, the forwarding operation of the user is forbidden.
Specifically, if the judgment result after the user information is extracted indicates that the user does not accord with the use right, the user is prohibited from forwarding, so that the threshold of data safety is improved, and the safety of financial APP interface data is further improved.
And step S204, if the use authority is met, allowing the forwarding operation of the user.
Specifically, if the judgment result after the user information is extracted is that the user accords with the use right, the user is allowed to forward the operation, specifically, the data on the financial APP interface is decrypted first, the permission of transferring is released, the user can forward the operation, and the user of the financial APP is provided with the convenience in use.
according to the display method of the financial APP interface provided by the embodiment of the invention, through the verification of one authority of the user requiring to forward the financial APP interface data, the user who does not conform to the use authority is prevented from performing forwarding operation on the APP interface data, and the possibility that the data is illegally transmitted is further reduced. Meanwhile, the APP user conforming to the use authority is allowed to carry out forwarding operation, and convenience is brought to work of the user.
On the basis of the former embodiment, in order to encrypt the forwarded data and prevent the data from being illegally transmitted, the embodiment of the invention adds a watermark to the forwarded APP interface data in a scrambling encryption mode by using the user information, and can trace the source of a transmitter in case of illegally transmitting the data.
Referring to fig. 4, a flowchart of a display method of a financial APP interface provided in an embodiment of the present invention is shown, specifically, the watermarking the forwarded information includes the following steps:
And step S300, generating a watermark matrix according to the watermark information.
In the second embodiment, when the user performs the forwarding operation, the financial APP extracts the watermark information, and after it is determined that the user conforms to the permission of the usage permission to allow the user to perform the forwarding operation, before actual APP interface data is forwarded, the watermark information is represented in a matrix form to generate a watermark matrix.
Step S301, generating a thread relation matrix according to a program corresponding to interface data of the financial APP.
Because the embodiment of the invention is based on the thread relation of the financial APP, and the relations among the threads are of various types, the most suitable relation type can be selected according to the self condition of the financial APP in the actual process, such as the sequence relation of thread execution, the main control relation in the thread execution process and the like. In order to utilize and modify the relationship between threads, the existing thread relationship of the financial APP needs to be obtained, the executing process of the financial APP is monitored through a debugger, the thread relationship of the financial APP is recorded, the thread relationship is numbered, and then a thread relationship matrix is generated according to the numbered thread relationship.
step S302, the arnold transformation scrambling processing is carried out on the thread relation matrix, and a disorder thread relation matrix is generated.
Scrambling the thread relation matrix generated after the financial APP runs, scrambling the thread relation matrix by using Arnold transformation in the embodiment of the invention, and scattering the thread relation matrix.
Step S303, the watermark matrix is embedded into the disordered thread relation matrix, and inverse scrambling processing is carried out to restore the disordered thread relation matrix into a sequential thread relation matrix.
The watermark matrix is embedded into the disordered thread relation matrix, and in order to increase the resistance to malicious attacks, a quantization technology is used to enable a plurality of elements in the thread relation matrix to correspond to one element in the watermark matrix, so that even if the elements in the thread relation matrix are tampered, the watermark data cannot be tampered. In the embodiment of the invention, the parity of the elements in the 4 thread relation matrixes corresponding to the value of one element of the embedded watermark is used. The likelihood of the watermark element having a value of 0 or 1 is the same, so half of the four elements may not need to be modified. Meanwhile, the thread relation matrix mostly belongs to a sparse matrix, namely most values in the thread relation matrix are 0, so that only one 0 of the 4 elements needs to be modified into 1 even if the modification is carried out. And carrying out inverse scrambling on the disorder thread relation matrix embedded with the software watermark matrix, and recovering the disorder thread relation matrix into a sequence thread relation matrix.
And step S304, modifying the source code of the financial APP according to the sequential thread relation matrix, and generating a final program with the watermark.
Because the watermark matrix is embedded in the thread relation matrix, the financial APP is modified to reflect the change of the thread relation matrix, two threads influenced by the watermark matrix are determined by determining the positions of the values of the thread relation matrix, which change before and after the watermark is embedded, codes at corresponding threads in the financial APP source codes are modified according to the selected relation type, and the final program after the watermark is embedded can be obtained after the modification of the threads corresponding to all the variable elements is completed.
Because various conventional changes in the propagation process of the financial APP cannot influence the thread relationship, and simultaneously, the user cannot completely determine the relationship between threads due to the fact that the user does not have a source code of software, the financial APP cannot be normally used due to the fact that the user carries out modification, and therefore the watermark based on the thread relationship has high safety.
According to the financial APP interface display method provided by the embodiment of the invention, the watermark of the thread relation is added to the financial APP information of the forwarding operation, so that the safety of the financial APP data is further improved, and the aim of preventing the data from being illegally transmitted is fulfilled.
Referring to fig. 5, which shows a schematic structural diagram of a display device of a financial APP interface according to an embodiment of the present invention, a display device 50 of a financial APP interface includes: a user information correlation module 501, a user information judgment module 502 and a watermark information display module 503.
A user information association module 501, configured to obtain an address of a user information database, and associate the address with the user information database;
The user information judging module 502 is used for acquiring login information of a user when the user logs in the financial APP, judging whether the login information exists in the user information database, and refusing to log in the financial APP when the login information does not exist in the user information database;
And if the login information exists in the user information database, the watermark information display module 503 is configured to generate watermark information according to the login information, and embed the watermark information into an interface of the financial APP to generate interface data with a watermark.
Further, in an embodiment, the watermark information display module 503 is configured to generate watermark information according to the login information, add the watermark information to a preset image layer, and perform overlapping presentation on the image layer and an interface of the financial APP to generate interface data with a watermark.
In another embodiment, the watermark information display module 503 is configured to generate watermark information according to the login information, encrypt the watermark information according to a preset key, add the encrypted watermark information to a preset layer, and overlay an interface between the layer and the financial APP to generate interface data with a watermark.
Referring to fig. 6, another schematic structural diagram of a display device of a financial APP interface according to an embodiment of the present invention is shown, in which the display device 50 of the financial APP interface further includes: a watermark information extraction module 504 and a usage authority judgment module 505.
The watermark information extraction module 504 is configured to, when the user performs forwarding operation on the financial APP interface data file, perform decryption processing on watermark information on the interface data, and extract user information of a watermark;
And the use permission judging module 505 is configured to judge whether the user information conforms to the use permission, prohibit the user from performing a forwarding operation on the data if the user information does not conform to the use permission, and decrypt the interface data if the user information conforms to the use permission to allow the user to perform the forwarding operation.
The specific working process of the module in the terminal device may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
according to the display device of the financial APP interface provided by the embodiment of the invention, through the verification of the user information for logging in the financial APP, when the user information is judged to exist in the user information database, the financial APP is allowed to log in, so that the legality of a financial APP user is ensured, meanwhile, the user information is generated into watermark information and added into the financial APP, and in case of illegal transmission of data, an illegal transmitter can be tracked, so that the purpose of protecting the data safety is achieved.
another embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method for displaying a financial APP interface in the foregoing embodiment is implemented, and for avoiding repetition, details are not described here again. Alternatively, the computer program is executed by the processor to implement the functions of each module/unit in the display device of the financial APP interface in the above embodiments, and details are not repeated here to avoid repetition.
Referring to fig. 7, a schematic diagram of a terminal device according to an embodiment of the present invention is shown. The terminal device 6 comprises a processor 60, a memory 61 and a computer program 62 stored in the memory 61 and executable on the processor 60. The processor 60, when executing the computer program 62, implements the various steps of the financial product display method in the above-described embodiment, such as steps S100, S101, S102, and S103 shown in fig. 1. Alternatively, the processor 60 executes the computer program 62 to implement the functions of the modules/units of the display device of the financial APP interface in the above-described embodiment, such as the user information association module 501, the user information determination module 502 and the watermark information display module 503 shown in fig. 5.
The computer program 62 may be divided into one or more modules/units, which are stored in the memory 61 and executed by the processor 60 to implement the present invention. One or more of the modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program 62 in the terminal device 6. For example, the computer program 62 may be divided into a user information association module 501, a user information judgment module 502, and a watermark information display module 503 (a module in a virtual device).
The terminal device 6 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 7 is merely an example of a terminal device 6 and does not constitute a limitation of terminal device 6 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
the Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
the storage 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk provided on the terminal device 6, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 61 may also include both an internal storage unit of the terminal device 6 and an external storage device. The memory 61 is used for storing computer programs and other programs and data required by the terminal device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
The terminal device 6 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 60, a memory 61. Those skilled in the art will appreciate that fig. 7 is merely an example of a terminal device 6 and does not constitute a limitation of terminal device 6 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
the Processor 60 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
the storage 61 may be an internal storage unit of the terminal device 6, such as a hard disk or a memory of the terminal device 6. The memory 61 may also be an external storage device of the terminal device 6, such as a plug-in hard disk provided on the terminal device 6, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the memory 61 may also include both an internal storage unit of the terminal device 6 and an external storage device. The memory 61 is used for storing computer programs and other programs and data required by the terminal device. The memory 61 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (5)

1. A display method of a financial APP interface is characterized by comprising the following steps:
Acquiring an address of a user information database, and associating the address with the user information database;
When a user logs in the financial APP, obtaining login information of the user, and judging whether the login information exists in the user information database;
If the login information does not exist in the user information database, refusing to log in the financial APP;
if the login information exists in the user information database, generating watermark information according to the login information, and embedding the watermark information into an interface of the financial APP to generate interface data with a watermark;
generating watermark information according to the login information, embedding the watermark information into an interface of the financial APP to generate interface data with a watermark, and the method comprises the following steps:
Generating watermark information according to the login information, adding the watermark information into a preset image layer, and overlapping and presenting the image layer and the interface of the financial APP to generate interface data with a watermark; or generating watermark information according to the login information, encrypting the watermark information according to a preset key, adding the encrypted watermark information into a preset image layer, and overlapping and presenting the image layer and the interface of the financial APP to generate interface data with the watermark;
When a user forwards the financial APP interface data file, decrypting watermark information on the interface data, and extracting user information of the watermark;
Judging whether the user information accords with the use authority, if not, forbidding the user to carry out forwarding operation on the data, and if so, decrypting the interface data and allowing the user to carry out forwarding operation;
Decrypting the interface data to allow the user to perform forwarding operation, and then:
Generating a watermark matrix according to the watermark information;
Generating a thread relation matrix according to a program corresponding to the interface data of the financial APP;
Performing arnold transformation scrambling processing on the thread relation matrix to generate a disorder thread relation matrix;
Embedding the watermark matrix into the out-of-order thread relation matrix, performing inverse scrambling processing, and restoring the watermark matrix into an order thread relation matrix;
And modifying the source code of the financial APP according to the sequential thread relation matrix to generate the final program with the watermark.
2. The display method of the financial APP interface as claimed in claim 1, wherein encrypting the watermark information according to a preset key, and adding the encrypted watermark information to a preset map layer includes:
And encrypting the watermark information through a preset key to generate a corresponding watermark ciphertext, generating a corresponding label according to the watermark ciphertext, and adding the label to a preset layer.
3. The utility model provides a display device at finance APP interface which characterized in that, display device at finance APP interface includes:
The user information association module is used for acquiring the address of a user information database and associating the address with the user information database;
The user information judging module is used for acquiring login information of a user when the user logs in the financial APP, judging whether the login information exists in the user information database, and refusing to log in the financial APP when the login information does not exist in the user information database;
The watermark information display module is used for generating watermark information according to the login information and embedding the watermark information into an interface of the financial APP to generate interface data with a watermark if the login information exists in the user information database;
The watermark information display module is used for generating watermark information according to the login information, adding the watermark information into a preset image layer, and overlapping and presenting the image layer and the interface of the financial APP to generate interface data with watermarks; or the watermark information display module is used for generating watermark information according to the login information, encrypting the watermark information according to a preset key, adding the encrypted watermark information into a preset image layer, and overlapping and presenting the image layer and the interface of the financial APP to generate interface data with a watermark;
Display device at finance APP interface still includes:
the watermark information extraction module is used for decrypting the watermark information on the interface data and extracting the user information of the watermark when a user forwards the financial APP interface data file;
The use permission judging module is used for judging whether the user information accords with the use permission, if not, the user is prohibited from forwarding the data, and if so, the interface data is decrypted and the user is allowed to forward; generating a watermark matrix according to the watermark information; generating a thread relation matrix according to a program corresponding to the interface data of the financial APP; performing arnold transformation scrambling processing on the thread relation matrix to generate a disorder thread relation matrix; embedding the watermark matrix into the out-of-order thread relation matrix, performing inverse scrambling processing, and restoring the watermark matrix into an order thread relation matrix; and modifying the source code of the financial APP according to the sequential thread relation matrix to generate the final program with the watermark.
4. a terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 2 when executing the computer program.
5. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 2.
CN201711052046.8A 2017-10-30 2017-10-30 Display method, device and equipment of financial APP interface and storage medium Active CN107784207B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711052046.8A CN107784207B (en) 2017-10-30 2017-10-30 Display method, device and equipment of financial APP interface and storage medium
PCT/CN2017/113779 WO2019085126A1 (en) 2017-10-30 2017-11-30 Display method, device and apparatus for financial application interface, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711052046.8A CN107784207B (en) 2017-10-30 2017-10-30 Display method, device and equipment of financial APP interface and storage medium

Publications (2)

Publication Number Publication Date
CN107784207A CN107784207A (en) 2018-03-09
CN107784207B true CN107784207B (en) 2019-12-10

Family

ID=61432341

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711052046.8A Active CN107784207B (en) 2017-10-30 2017-10-30 Display method, device and equipment of financial APP interface and storage medium

Country Status (2)

Country Link
CN (1) CN107784207B (en)
WO (1) WO2019085126A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109658123A (en) * 2018-10-23 2019-04-19 平安普惠企业管理有限公司 The method, apparatus and storage medium of financial business are promoted by small routine
CN109598140A (en) * 2018-11-28 2019-04-09 国家电网有限公司 A kind of guard method of webpage information and device
CN109801205B (en) * 2018-12-21 2022-02-25 苏宁易购集团股份有限公司 Traceable implicit watermark adding method and device
CN112084516A (en) * 2020-09-14 2020-12-15 洛阳众智软件科技股份有限公司 Method and equipment for safely protecting CAD drawing information
CN113780798B (en) * 2021-09-07 2024-05-28 杭州天宽科技有限公司 Key index display system based on cloud computing
CN115167969B (en) * 2022-09-07 2022-12-23 平安银行股份有限公司 Remote collaboration method and device based on cloud

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102521536A (en) * 2011-12-06 2012-06-27 杭州安恒信息技术有限公司 Method and system for detecting inner core object invasion of database
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN103929473A (en) * 2014-03-25 2014-07-16 冯力新 Method and system for accessing multiple subsystems and public subsystem with distributed storage personalized data through single APP program
CN106023059A (en) * 2016-05-26 2016-10-12 北京启迪思创科技有限公司 Watermarking information generation method and apparatus
CN107066491A (en) * 2016-12-28 2017-08-18 北京五八信息技术有限公司 The method and device of quick log-on webpage application

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379101A (en) * 2012-04-20 2013-10-30 腾讯科技(深圳)有限公司 Watermark generation method, client side and server
CN103116717B (en) * 2013-01-25 2015-11-18 东莞宇龙通信科技有限公司 User login method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609890A (en) * 2011-01-20 2012-07-25 北京中盈信安科技发展有限责任公司 Image digital watermark embedding and detecting system
CN102521536A (en) * 2011-12-06 2012-06-27 杭州安恒信息技术有限公司 Method and system for detecting inner core object invasion of database
CN103929473A (en) * 2014-03-25 2014-07-16 冯力新 Method and system for accessing multiple subsystems and public subsystem with distributed storage personalized data through single APP program
CN106023059A (en) * 2016-05-26 2016-10-12 北京启迪思创科技有限公司 Watermarking information generation method and apparatus
CN107066491A (en) * 2016-12-28 2017-08-18 北京五八信息技术有限公司 The method and device of quick log-on webpage application

Also Published As

Publication number Publication date
WO2019085126A1 (en) 2019-05-09
CN107784207A (en) 2018-03-09

Similar Documents

Publication Publication Date Title
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
KR102113937B1 (en) Memory integrity
CN104469767B (en) The implementation method of integrated form security protection subsystem in a set of mobile office system
CN106506159A (en) Encryption method and equipment for key safety
US9654279B2 (en) Security module for secure function execution on untrusted platform
CN105740725A (en) File protection method and system
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
Focardi et al. Security threats and solutions for two-dimensional barcodes: a comparative study
CN105718763A (en) Binding white-box implementation to reduced secure element
CN108319822B (en) Method, storage medium, electronic device and system for protecting webpage code
CN102831335A (en) Safety protecting method and safety protecting system of Windows operating system
CN106548351A (en) A kind of optimization method and terminal of fingerprint payment flow
CN106789051B (en) method, device and computing equipment for protecting files
CN117592108A (en) Interface data desensitization processing method and device
KR101267875B1 (en) Apparatus for message encryption and decryption using virtual keyboard and recording medium storing program for executing method of the same in computer
CN117237174A (en) Data processing method and device, electronic equipment and storage medium
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
CN102708069A (en) Protection method for memory data in Android system
Vaidya et al. Data leakage detection and security in cloud computing
CN104463003A (en) File encryption protecting method
KR101572242B1 (en) Preventing system and method for copying electronic book
KR102047547B1 (en) System for security using encryption mode in self-protected javascript and method thereof
CN114726655B (en) Character set encryption method based on digital certificate identity authentication
Sivabalan et al. Securing Sensitive Web Based Student Academic Performance System with Base64 Encoding and Systematic Mirroring
Dharmadhikari et al. Review of digital data protection using the traditional methods, steganography and cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant