CN108510426B - Information security processing method, device, equipment and computer storage medium - Google Patents

Information security processing method, device, equipment and computer storage medium Download PDF

Info

Publication number
CN108510426B
CN108510426B CN201810330715.1A CN201810330715A CN108510426B CN 108510426 B CN108510426 B CN 108510426B CN 201810330715 A CN201810330715 A CN 201810330715A CN 108510426 B CN108510426 B CN 108510426B
Authority
CN
China
Prior art keywords
information
identification
watermark
preset
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810330715.1A
Other languages
Chinese (zh)
Other versions
CN108510426A (en
Inventor
林泽全
高林龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Li'ang Electronic Technology Co ltd
Original Assignee
Guangdong Li'ang Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Li'ang Electronic Technology Co ltd filed Critical Guangdong Li'ang Electronic Technology Co ltd
Priority to CN201810330715.1A priority Critical patent/CN108510426B/en
Publication of CN108510426A publication Critical patent/CN108510426A/en
Application granted granted Critical
Publication of CN108510426B publication Critical patent/CN108510426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The invention discloses an information security processing method, which comprises the following steps: judging whether the terminal is in an information protection mode, if so, acquiring initial information associated with a sending instruction by the terminal when the terminal detects the sending instruction; performing discrete Fourier transform on the initial information to generate information to be edited; the preset user identification in the terminal is obtained, and the user identification is encoded to generate an identification watermark; superposing the information to be edited and the identification watermark, and performing inverse Fourier transform to generate transmission information corresponding to the transmission instruction; and sending the sending information to a receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user. The invention also discloses an information security processing device, equipment and a computer storage medium. According to the invention, the invisible watermark corresponding to the user identifier is added to the transmitted information, and when information leakage occurs, the information source can be determined, so that information security is realized.

Description

Information security processing method, device, equipment and computer storage medium
Technical Field
The present invention relates to the field of information security, and in particular, to an information security processing method, apparatus, device, and computer storage medium.
Background
With the continuous development of computer technology and network technology, more and more electronic files are used, stored and transmitted. However, electronic information communication is also facing a threat of being illegally used or stolen while providing rapidness and convenience. Therefore, data security and protection means are becoming more and more important.
Aiming at the situation, a watermark adding mode is generally adopted at home and abroad at present, so that secret-related data is protected, namely watermark information is directly displayed at a designated position of a related data document in a semitransparent mode, when the secret-related data in a browser and a database is accessed, due to the specificity of data formats, a plurality of inconveniences exist when the watermark is embedded in the data, and the secret data is more likely to be leaked out in modes such as screen shooting, video recording or screenshot; after the leakage event occurs, the leakage source cannot be rapidly positioned and searched, so that timely and necessary treatment and protection improvement can be performed.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide an information security processing method, an information security processing device, information security processing equipment and a computer storage medium, and aims to perform discrete Fourier transform on electronic information and add invisible watermarks, so that a user is prevented from manually removing watermark information, the information security is improved, and information leakage is effectively prevented.
In order to achieve the above object, the present invention provides an information security processing method, comprising the steps of:
judging whether the information is in an information protection mode, if so, acquiring initial information associated with a sending instruction when the sending instruction is detected;
performing discrete Fourier transform on the initial information to generate information to be edited;
acquiring a preset user identifier, and encoding the user identifier to generate an identifier watermark;
superposing the information to be edited and the identification watermark, and performing inverse Fourier transform to generate transmission information corresponding to a transmission instruction;
and sending the sending information to a receiving account associated with the sending instruction, so that a user corresponding to the receiving account can check the sending information.
Optionally, the step of superposing the information to be edited and the identification watermark includes:
Acquiring the size of the initial information and the size of the identification watermark, obtaining the relative proportion of the size of the initial information and the size of the identification watermark, and judging whether the relative proportion of the size is matched with a preset proportion or not;
if the relative size proportion is matched with the preset proportion, placing the identification watermarks according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermarks;
if the relative size proportion is not matched with the preset proportion, displaying prompt information for the user to adjust the size of the identification watermark;
and after finishing the size adjustment of the identification watermark is detected, placing the identification watermark according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermark.
Optionally, after the step of determining whether to be in the information protection mode, the method further includes:
if the display screen is in the information protection mode, acquiring a current display interface of the display screen;
analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information;
if the photographing prevention mode is started, acquiring a preset user identifier for encoding, and generating an encoding graph;
And converting the coded graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen so as to prevent information leakage caused by photographing.
Optionally, the step of analyzing the current display interface to obtain display information contained in the current display interface to determine whether to start the anti-photographing mode according to the display information includes:
analyzing the current display interface to obtain display information contained in the current display interface, and obtaining a character set in the display information;
performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base to judge whether the character set contains the sensitive characters or not;
if the character set contains the sensitive characters, determining the sensitivity level of the current display interface according to the character quantity of the sensitive characters;
and if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
Optionally, after the step of sending the sending information to the receiving account associated with the sending instruction so that the user corresponding to the receiving account views the sending information, the method includes:
When an analysis request triggered based on the sending information is detected, carrying out Fourier transform on the sending information;
when the completion of the Fourier transform of the sending information is detected, the identification watermark contained in the sending information is obtained, and the identification watermark is decoded to obtain the user identification corresponding to the identification watermark.
Optionally, the step of obtaining the preset user identifier, and encoding the user identifier to generate the identifier watermark further includes:
acquiring a preset user identifier, and encrypting the preset user identifier according to a preset rule;
when the preset user identification is detected to be encrypted, the preset user identification is randomly coded to generate an identification watermark, so that the identification watermark and the information to be edited are subjected to superposition processing.
Optionally, when the fourier transform of the sending information is detected to be completed, the step of acquiring the identification watermark contained in the sending information and decoding the identification watermark to obtain the user identifier corresponding to the identification watermark includes:
when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not;
if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark;
And decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
In addition, in order to achieve the above object, the present invention also provides an information security processing apparatus including:
the mode judging module is used for judging whether the information is in an information protection mode, and if the information is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected;
the information processing module is used for performing discrete Fourier transform on the initial information to generate information to be edited;
the identification processing module is used for acquiring a preset user identification, and encoding the user identification to generate an identification watermark;
the watermark processing module is used for carrying out superposition processing on the information to be edited and the identification watermark, carrying out inverse Fourier transform and generating transmission information corresponding to the transmission instruction;
and the information sending module is used for sending the sending information to a receiving account associated with the sending instruction so that the receiving account can be corresponding to a user to check the sending information.
In addition, in order to achieve the above object, the present invention also provides an information security processing apparatus including: a memory, a processor, and an information security handler stored on the memory and executable on the processor, wherein:
The information security processing program, when executed by the processor, implements the steps of the information security processing method described above.
In addition, in order to achieve the above object, the present invention also provides a computer storage medium;
the computer storage medium stores an information security processing program which, when executed by a processor, implements the steps of the information security processing method described above.
The embodiment of the invention provides an information security processing method, an information security processing device, information security processing equipment and a computer storage medium, wherein a user identifier is stored on a personal computer of an enterprise or a public institution, an information protection mode is set on the computer, when a user uses the computer to process information, the computer firstly judges whether the user is in the information protection mode, and if the user is in the information protection mode, initial information associated with a sending instruction is acquired when the sending instruction is detected; performing discrete Fourier transform on the initial information to generate information to be edited; meanwhile, the terminal acquires a preset user identifier in the local storage, and encodes the user identifier to generate an identifier watermark; the terminal carries out superposition processing on the information to be edited and the identification watermark, carries out inverse Fourier transform, and generates transmission information corresponding to the transmission instruction, wherein the transmission information carries the invisible watermark of the user identification; and the terminal sends the sending information to a receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user. When information leakage occurs, the information can be analyzed to obtain a corresponding user identifier so as to determine the information leakage source and ensure the information safety.
Drawings
FIG. 1 is a schematic diagram of a device architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart of a first embodiment of an information security processing method according to the present invention;
FIG. 3 is a detailed flowchart of step S30 of the information security processing method in FIG. 2;
FIG. 4 is a detailed flowchart of step S40 of the information security processing method in FIG. 2;
FIG. 5 is a flowchart of a second embodiment of an information security processing method according to the present invention;
FIG. 6 is a detailed flowchart of step S70 of the information security processing method in FIG. 5;
FIG. 7 is a flowchart of a third embodiment of an information security processing method according to the present invention;
fig. 8 is a schematic diagram of functional modules of an embodiment of an information security processing apparatus according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: storing user identification information on a terminal used by a user, generating a corresponding identification watermark by the identification information of the user when the user sends the information, combining the generated identification watermark with the information sent by the user, and performing inverse Fourier transform to generate an invisible watermark, so that the user identification information is added to the information sent by the user, and meanwhile, the reading of a receiver is not influenced by the information sent by the user; when information leakage occurs, the terminal carries out Fourier transform on the information, so that user identification information is displayed to determine the source of the information leakage.
Because the prior art adds the watermark on the electronic document, a user can delete personal information through means such as PS (PS) and the like when sending the information, the method can protect secret-related data to a certain extent, and the risk of stealing the secret-related data is reduced; however, the protection mode can only embed watermarks in certain specific positions of the secret-related data at first, and cannot fully cover all secret-related contents, so that a stealer can intentionally avoid the watermarks to steal other parts of the secret-related data, the source of information leakage cannot be determined when information leakage occurs, and the information security cannot be effectively protected.
As shown in fig. 1, fig. 1 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a fixed terminal or a mobile terminal, wherein the fixed terminal is such as 'Internet of things equipment', an intelligent air conditioner with a networking function, an intelligent electric lamp, an intelligent power supply and the like; mobile terminals, such as AR/VR devices with networking functions, smart speakers, autopilot cars, smart phones, tablet computers, electronic book readers, portable computers, and other terminal devices with display functions.
As shown in fig. 1, the terminal may include: processor 1001, (e.g. central processor Central Processing Unit, CPU), network interface 1004, user interface 1003, memory 1005, communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., WIreless-FIdelity, WIFI interface). The memory 1005 may be a high-speed random access memory (random access memory, RAM) or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 1 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, the computer software product is stored in a storage medium (storage medium: also called computer storage medium, computer medium, readable storage medium, computer readable storage medium, or direct called medium, such as RAM, magnetic disk, optical disk, etc.), and includes several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method according to the embodiments of the present invention, and the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an information security processing application.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be used to call an information security processing application stored in the memory 1005 and perform steps in the information security processing method provided in the following embodiment of the present invention.
Referring to fig. 2, in a first embodiment of the information security processing method of the present invention, the information security processing method includes:
step S10, judging whether the information is in an information protection mode, and if the information is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected.
When a user starts the terminal or the user performs terminal operation, the terminal judges whether the mode in which the terminal is positioned is an information protection mode, and it is required to be noted that the terminal information protection mode can be automatically set by a server or other monitoring devices, or can be set by the terminal user independently, if the terminal is determined to be in the information protection mode, when the terminal detects that the user performs operation based on the terminal, the terminal automatically triggers an operation detection request, a terminal processor receives the operation detection request and detects an operation performed on the terminal, when the terminal processor detects that an operation corresponding instruction triggered by the user is a sending instruction, the terminal acquires initial information associated with the sending instruction, wherein the initial information can be different types of information such as image information, electronic documents or instant messages, for example, a science and technology company sets work computers of all staff as the information protection mode, when the work computer processor detects that the sending instruction of a screen capture image is triggered on instant communication software of the terminal, the terminal acquires the screen capture image associated with the sending instruction, and the terminal performs information security processing by taking the screen capture image as the initial information.
And S20, performing discrete Fourier transform on the initial information to generate information to be edited.
The terminal performs a discrete fourier transform (Fourier Transform) on the initial information. For example, the initial information is a screen capturing image, the terminal processes the screen capturing image through a preset discrete fourier transform formula, wherein the frequency and the like of the image in the preset discrete fourier transform formula can be set according to actual conditions so as to distinguish low-frequency information from high-frequency information in the image, the terminal filters a frequency domain after the discrete fourier transform to obtain information to be edited which accords with information superposition, and it is required to supplement that parameters in the discrete fourier transform in the invention are not particularly limited and can be determined according to the effect of the processed initial information.
Step S30, obtaining a preset user identifier, and encoding the user identifier to generate an identifier watermark.
The terminal obtains preset user identification in the local storage, wherein the user identification is user name, user work number or other user post information, the user identification can be input in advance by a user, the user identification information can be automatically obtained according to user operation, the user identification information is identification information which can uniquely identify the user identification and is obtained through discrete Fourier transform, and the terminal carries out coding processing on the preset user identification, wherein the coding processing is a technology for representing images by using fewer symbols (bit numbers); the image coding method mainly comprises symbol coding, predictive coding, transformation coding, sub-band coding, wavelet transformation coding, split-dimension coding and the like, and generates an identification watermark corresponding to the user identification.
And S40, superposing the information to be edited and the identification watermark, performing inverse Fourier transform, and generating transmission information corresponding to the transmission instruction.
And the terminal performs superposition processing on the information to be edited and the identification watermark and performs inverse Fourier transform, namely, the terminal performs superposition processing on the information to be edited and the identification watermark which are subjected to superposition processing, so that the tangible identification watermark is converted into an invisible identification watermark, and the terminal takes the information obtained through inverse Fourier transform as transmitting information so as to transmit the transmitting information to a corresponding user.
In step S40, the information to be edited and the identification watermark of the terminal may be superimposed in different manners;
for example, in the first mode, the size of the superimposition processing is performed according to the information to be edited and the identification watermark: the terminal obtains the size of the information to be edited and the size of the identification watermark, calculates the area of the information to be edited and the area of the identification watermark, and automatically sets the position relationship between the information to be edited and the identification watermark according to the area ratio of the information to be edited and the area ratio of the identification watermark so as to carry out superposition processing on the information to be edited and the identification watermark; for example, the size of the information to be edited is 20cmx10cm, the size of the identification watermark is 5cmx5cm, the area ratio of the information to be edited to the identification watermark obtained by the terminal is 8:1, the terminal equally divides the surface of the information to be edited into 8 parts, and the identification watermark is correspondingly placed on the information to be edited; and the second mode is that the terminal sets the information to be edited and the identification watermark to carry out superposition processing, namely, the terminal sets the identification watermark to be smaller in size, and the terminal randomly sets the identification watermark on the information to be edited to finish superposition processing of the information to be edited and the identification watermark.
In this embodiment, the terminal performs superposition processing on the information to be edited and the identification watermark, and performs inverse fourier transform to hide the identification watermark, so that the user identification is added and fused with the information to be edited on the premise of not affecting the reading of the user, and meanwhile, in this embodiment, the position of the identification watermark is set according to the size of the identification watermark, so that the identification watermark is randomly and comprehensively set on the information to be edited, and the user cannot reject the identification watermark, thereby improving the information security.
And step S50, the sending information is sent to a receiving account associated with the sending instruction, so that the receiving account corresponds to a user to check the sending information.
And the terminal sends the sending information to the receiving account associated with the sending instruction, so that the receiving account can be used for corresponding to the user to check the sending information, namely, the terminal extracts the sending account information of the user in the sending instruction and sends the sending information to the receiving account associated with the sending instruction.
In the embodiment, by storing a user identifier on a personal computer of an enterprise or a public institution and setting a computer security mode, when a user processes information, judging whether the user is in an information protection mode, if the user is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected; performing discrete Fourier transform on the initial information to generate information to be edited; meanwhile, the terminal acquires a preset user identifier in the local storage, and encodes the user identifier to generate an identifier watermark; the terminal carries out superposition processing on the information to be edited and the identification watermark, carries out inverse Fourier transform, and generates transmission information corresponding to the transmission instruction, wherein the transmission information carries the invisible watermark of the user identification; and the terminal sends the sending information to a receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user. When information leakage occurs, the information can be analyzed to obtain a corresponding user identifier so as to determine the information leakage source and ensure the information safety.
Further, the present embodiment of the present invention is provided on the basis of the first embodiment of the present invention, which is a refinement of step S30 in the first embodiment, and specifically illustrates a processing step of identifying a watermark.
Specifically, referring to fig. 3, in step S30 of the information security processing method, the information security processing method includes:
step S31, obtaining a preset user identifier, and encrypting the preset user identifier according to a preset rule.
The terminal acquires a preset user identifier in the local storage, and encrypts the preset user identifier according to a preset rule (the preset rule refers to a preset encryption rule, that is, the terminal or the user is an encryption rule preset according to factors such as conditions input by an information type user), wherein the asymmetric encryption is described as the preset rule, and an asymmetric encryption algorithm on the terminal needs two keys: public keys (publickeys) and private keys (privatekeys). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted by the corresponding private key; if the data is encrypted with a private key, it can only be decrypted with the corresponding public key.
In the implementation, because two different keys are used for encryption and decryption, when information leakage occurs, only the characteristic decryption rule can decrypt the leaked information, so that the watermark addition of the information to be edited is realized while the security of the user identification information is ensured.
And step S32, after the completion of the encryption of the preset user identification is detected, carrying out random encoding on the preset user identification to generate an identification watermark, so that the identification watermark and the information to be edited are subjected to superposition processing.
After the terminal detects that the encryption of the preset user identification is finished, for example, corresponding prompt information is generated after the encryption of the identification watermark is finished, the terminal detects that the encryption of the preset user identification is finished after receiving the prompt information, and the terminal carries out random encoding on the preset user identification to generate the identification watermark so as to enable the identification watermark and the information to be edited to be overlapped.
In this embodiment, the terminal encrypts the user identifier according to a preset rule, so that on one hand, the user can be prevented from maliciously imitating the identifier information of other users, and the user identifier is prevented from being revealed, and on the other hand, the terminal can analyze the user identifier information only by being used for decoding the secret key, and the security of the identifier watermark corresponding to the user identifier information is ensured.
The present embodiment of the present invention is further provided on the basis of the first embodiment of the present invention, where the refinement of step S40 in the first embodiment specifically illustrates the setting manner of the location of the identification watermark.
Specifically, referring to fig. 4, step S40 in the information security processing method includes:
step S41, the size of the information to be edited and the size of the identification watermark are obtained, the relative size proportion of the information to be edited and the identification watermark is obtained, and whether the relative size proportion accords with the preset proportion is judged.
The method comprises the steps that a terminal obtains the size of information to be edited and the size of a mark watermark to obtain the relative size of the information to be edited and the size of the mark watermark, wherein the size of the information to be edited and the size of the mark watermark can refer to corresponding side length information, the size of the information to be edited and the area of the mark watermark can also be the size of the information to be edited, the relative size of the information to be edited and the size of the mark watermark is determined according to the size of the information to be edited and the size of the mark watermark, for example, the size of the information to be edited is 20cmx10cm, the size of the mark watermark is 5cmx5cm, the relative size of the information to be edited and the area of the mark watermark obtained by the terminal is 8:1, and the terminal judges whether the relative size accords with a preset proportion or not.
The preset proportion is a preset proportion, and the preset proportion can be set to be 10:1, or other preset proportions are set to ensure that the size of the information to be edited is larger than that of the identification watermark, and ensure that the information of the identification watermark is complete and clear.
And step S42, if the relative size proportion is matched with the preset proportion, placing the identification watermarks according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermarks.
If the terminal determines that the relative size proportion is matched with the preset proportion, the terminal sets the corresponding positions of the identification watermarks according to a preset arrangement rule (the preset arrangement rule refers to the arrangement rule of the positions of the identification watermarks set according to the proportion, for example, the relative area proportion is 9:1, and the corresponding arrangement rule in the preset arrangement rule is 9 palace), so that superposition processing of the information to be edited and the identification watermarks is completed.
Further, the step of superposing the information to be edited and the identification watermark includes:
after the files with the display watermark images are formed according to the preset arrangement rules, overlapping the arranged identification watermarks with the information to be edited, namely, determining the frequency spectrums of the identification watermarks and the frequency spectrums of the information to be edited, wherein the frequency spectrums are patterns with the amplitudes arranged according to the frequencies, the x-axis is the frequency, the y-axis is the amplitude, overlapping the frequency spectrums of the identification watermarks and the frequency spectrums of the information to be edited, so that the identification watermarks are invisible on the information to be edited, and corresponding transmitting information is obtained. It should be noted that, the user may set the spectrogram according to the actual situation, and select the required frequency and amplitude.
And step S43, if the relative size proportion is not matched with the preset proportion, displaying prompt information for the user to adjust the size of the identification watermark, placing the adjusted identification watermark according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermark.
If the relative size proportion is not matched with the preset proportion, prompt information is displayed for the user to adjust the size of the identification watermark, for example, the terminal displays that the identification watermark cannot be completely displayed on the information to be edited and the user reduces the identification watermark according to the prompt information. When the identification watermark meets the requirement, a prompt message is displayed to prompt a user to stop adjusting the identification watermark, after the terminal detects that the size adjustment of the identification watermark is finished, the terminal places the identification watermark according to a preset arrangement rule, and carries out superposition processing on the information to be edited and the identification watermark.
In this embodiment, a method for determining the position of the identification watermark according to the size of the identification watermark and the size of the information to be edited is specifically described, so that the identification watermark is completely and clearly displayed.
Further, referring to fig. 5, on the basis of the first embodiment of the present invention, a second embodiment of the information security processing method of the present invention is proposed, in which an encoded image is generated on a display screen of a terminal to prevent information leakage caused by screen photographing;
specifically, the information security processing method includes:
step S60, if the information is in the information protection mode, the current display interface of the display screen is obtained.
And if the terminal is in the information protection mode, the terminal acquires the current display interface of the display screen to judge whether to display the coded image of the user identifier on the display screen of the terminal according to the display information of the display interface of the terminal so as to prevent information leakage caused by screen photographing. Specifically:
step S70, analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information; if the photographing prevention mode is started, acquiring a preset user identifier to encode, and generating an encoding graph.
The terminal analyzes the current display interface to obtain display information contained in the current display interface, wherein the current display interface possibly contains different information, such as a document, application software, a program and the like, the document is displayed on the current display interface for illustration, the terminal takes text information in the document as display information, the terminal determines whether to start an anti-photographing mode according to the content of the display information, and if the anti-photographing mode is started, the terminal obtains a preset user identifier for encoding to generate an encoding graph.
Further, referring to fig. 6, the step of determining whether to start the anti-photographing mode according to the display information in step S70 further includes:
step S71, analyzing the current display interface to obtain display information contained in the current display interface, and obtaining a character set in the display information.
The terminal analyzes the current display interface to obtain display information contained in the current display interface, and acquires a character set in the display information, namely, the terminal analyzes the display information corresponding to the current display interface to obtain the display information, wherein the display information can contain image information, character information and the like, and the terminal acquires the character set in the display information.
Step S72, performing traversal matching on the characters in the character set and the sensitive characters in the preset sensitive information base to judge whether the character set contains the sensitive characters or not.
The terminal performs traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base (the preset sensitive information base refers to preset sensitive characters, the sensitive characters are e.g. financial transaction data and user personal information) so as to judge whether the character set contains the sensitive characters, and if the characters in the character set are matched with the sensitive characters in the preset sensitive information base, the character set contains the sensitive characters; if the characters in the character set are not matched with the sensitive characters in the preset sensitive information base, the character set does not contain the sensitive characters.
Step S73, if the character set contains sensitive characters, determining the sensitivity level of the current display interface according to the quantity of the sensitive characters.
The terminal determines that the character set contains sensitive characters, and determines the sensitivity level of the current display interface according to the number of the sensitive characters, for example, the terminal determines that the sensitivity level is first-level when the number of the sensitive characters is more than 100, determines that the sensitivity level is second-level when the number of the sensitive characters is more than 100-20, and determines that the sensitivity level is third-level when the number of the sensitive characters is more than 20.
Step S74, if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
If the sensitivity level of the current display interface of the terminal exceeds a preset threshold (the preset threshold is a preset sensitivity information level critical value, for example, the preset threshold is set as a second level according to specific conditions), for example, the sensitivity level of the current display interface is a first level, the preset threshold is a second level of the sensitivity level, the sensitivity level of the current display interface exceeds the preset threshold, the terminal starts a photographing prevention mode, and if the photographing prevention mode is started, a preset user identifier is acquired to encode, and a coding graph is generated.
Step S80, converting the coding graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen to prevent information leakage caused by photographing.
The terminal converts the coded graphics into a preset format vector diagram (the preset format vector diagram is a vector diagram which can be set according to factors such as the size of a terminal screen, for example, an SVG vector diagram, also called a scalable vector diagram (Scalable Vector Graphics)), and disperses and distributes the preset format vector diagram onto a display screen so as to prevent information leakage caused by photographing, for example, a graphic creation layer above a current display interface, so that the generated preset format vector diagram is displayed on the graphic creation layer, and an effect that the preset format vector diagram is distributed onto the display screen is generated.
It should be noted that the technical solution in this embodiment may be combined with the technical solution in the first embodiment, that is, the vector diagram is generated on the terminal display screen, and the watermark image is generated on the electronic information sent by the user.
In this embodiment, the user identifier corresponding vector diagram is displayed on the display screen of the terminal according to the current interface display information of the terminal, so that on one hand, leakage of terminal display information caused by photographing of the user can be prevented, and on the other hand, if the display information on the terminal does not relate to sensitive information, the user identifier corresponding vector diagram is not displayed on the display screen of the terminal, so that the user can use the terminal conveniently, convenience in use is considered for the user in this embodiment, and humanized information protection is realized in consideration of safety of information leakage.
Further, referring to fig. 7, a third embodiment of the information security processing method of the present invention is provided on the basis of the first embodiment of the present invention, in this embodiment, the information added with the identification watermark is parsed, and the user identifier included in the information is determined to obtain the information source;
specifically, the information security processing method includes:
step S90, when the analysis request triggered based on the transmission information is detected, the transmission information is subjected to Fourier transformation.
When the terminal detects an analysis request triggered by sending information, the triggered analysis request can adopt different modes, for example, a user clicks a key of an information sending interface to manually trigger the analysis request, or the terminal receives a control instruction and automatically triggers the analysis request according to the control instruction, and when the terminal detects the analysis request, the terminal carries out Fourier transform on the sent information, namely, the terminal carries out Fourier transform on the information corresponding to the analysis request, so that the identification watermark contained in the information is displayed.
And step S100, when the completion of Fourier transform of the transmitted information is detected, acquiring the identification watermark contained in the transmitted information, and decoding the identification watermark to obtain the user identification corresponding to the identification watermark.
When detecting that fourier transform of the transmission information is completed, the terminal acquires the identification watermark contained in the transmission information and decodes the identification watermark to obtain the user identification corresponding to the identification watermark, and it should be additionally explained that the step of information analysis in this embodiment is an inverse process of adding the watermark in the information in the first embodiment, so as to display the user identification information in the information and determine the source of information leakage.
Further, step S100 includes:
step a, when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not;
step b, if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark;
and c, decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
Specifically, when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not; if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark; the terminal decodes and decrypts the identification watermark to obtain the user identification corresponding to the identification watermark
In this embodiment, the information is analyzed, and when the information is propagated by this processing method, the propagation source can be tracked. Meanwhile, the watermark is encrypted, the picture processing software cannot be removed by the existing image processing software, and the information security can be effectively ensured only by displaying in a corresponding analysis mode.
In addition, referring to fig. 8, an embodiment of the present invention also proposes an information security processing apparatus including:
the mode judging module 10 is configured to judge whether the mode is in an information protection mode, and if the mode is in the information protection mode, when a sending instruction is detected, obtain initial information associated with the sending instruction;
the information processing module 20 is used for performing discrete fourier transform on the initial information to generate information to be edited;
the identification processing module 30 is configured to obtain a preset user identification, and encode the user identification to generate an identification watermark;
the watermark processing module 40 is configured to superimpose the information to be edited and the identification watermark, and perform inverse fourier transform to generate transmission information corresponding to a transmission instruction;
and the information sending module 50 is used for sending the sending information to the receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user.
Further, the watermarking module 40 includes:
the acquisition judging unit is used for acquiring the size of the initial information and the size of the identification watermark, obtaining the relative size proportion of the initial information and the identification watermark, and judging whether the relative size proportion is matched with a preset proportion or not;
the placement superposition unit is used for placing the identification watermarks according to a preset arrangement rule if the relative size proportion is matched with the preset proportion, and superposing the information to be edited and the identification watermarks;
the prompting adjustment unit is used for displaying prompting information for a user to adjust the size of the identification watermark if the relative size proportion is not matched with the preset proportion;
and the adjustment processing unit is used for placing the identification watermarks according to a preset arrangement rule after the size adjustment of the identification watermarks is detected, and carrying out superposition processing on the information to be edited and the identification watermarks.
Further, the information security processing includes:
the interface acquisition module is used for acquiring the current display interface of the display screen if the information is in the information protection mode;
the analysis determining module is used for analyzing the current display interface to obtain display information contained in the current display interface so as to determine whether to start a photographing prevention mode according to the display information;
The starting acquisition module is used for acquiring a preset user identifier to encode if the photographing prevention mode is started, and generating an encoded graph;
the conversion module is used for converting the coded graph into a preset format vector graph and scattering and distributing the preset format vector graph to a display screen so as to prevent information leakage caused by photographing.
Further, the parsing determination module includes:
the analysis acquisition unit is used for analyzing the current display interface to obtain display information contained in the current display interface and acquiring a character set in the display information;
the information matching unit is used for performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base so as to judge whether the character set contains the sensitive characters or not;
the grade determining module is used for determining the sensitivity grade of the current display interface according to the character quantity of the sensitive characters if the character set contains the sensitive characters;
and the module starting module is used for starting the photographing prevention mode if the sensitivity level of the current display interface exceeds a preset threshold value.
Further, the information security processing includes:
The information analysis module is used for carrying out Fourier transform on the sending information when an analysis request triggered based on the sending information is detected;
and the identification decoding module is used for acquiring the identification watermark contained in the sending information when the completion of the Fourier transform of the sending information is detected, and decoding the identification watermark to obtain the user identification corresponding to the identification watermark.
Further, the watermarking module further includes:
the acquisition encryption unit is used for acquiring preset user identifiers and encrypting the preset user identifiers according to preset rules;
and the code superposition module is used for carrying out random coding on the preset user identification to generate an identification watermark after the completion of the encryption of the preset user identification is detected, so that the identification watermark and the information to be edited are subjected to superposition processing.
Further, the identification decoding module includes:
the encryption judging unit is used for acquiring the identification watermark contained in the sending information and judging whether the identification watermark is subjected to encryption processing or not when the completion of Fourier transform of the sending information is detected;
the acquisition rule unit is used for acquiring a decryption rule and a decoding rule corresponding to the identification watermark if the identification watermark is subjected to encryption processing;
And the identification determining unit is used for decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
The steps of implementing each functional module of the information security processing apparatus may refer to each embodiment of the information security processing method of the present invention, which is not described herein again.
In addition, the embodiment of the invention also provides a computer storage medium.
The computer storage medium stores an information security processing program which, when executed by a processor, implements the operations in the information security processing method provided by the above embodiment.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity/operation/object from another entity/operation/object without necessarily requiring or implying any actual such relationship or order between such entities/operations/objects; the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. An information security processing method, characterized in that the information security processing method comprises the following steps:
Judging whether the information is in an information protection mode, if so, acquiring initial information associated with a sending instruction when the sending instruction is detected;
performing discrete Fourier transform on the initial information to generate information to be edited;
acquiring a preset user identifier, and encoding the user identifier to generate an identifier watermark;
superposing the information to be edited and the identification watermark, and performing inverse Fourier transform to generate transmission information corresponding to a transmission instruction;
transmitting the transmission information to a receiving account associated with a transmission instruction so that a user corresponding to the receiving account can check the transmission information;
after the step of determining whether the information protection mode is in the information protection mode, the method further includes:
if the display screen is in the information protection mode, acquiring a current display interface of the display screen;
analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information;
if the photographing prevention mode is started, acquiring a preset user identifier for encoding, and generating an encoding graph;
converting the coded graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen to prevent information leakage caused by photographing;
The step of analyzing the current display interface to obtain display information contained in the current display interface so as to determine whether to start the anti-photographing mode according to the display information comprises the following steps:
analyzing the current display interface to obtain display information contained in the current display interface, and obtaining a character set in the display information;
performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base to judge whether the character set contains the sensitive characters or not;
if the character set contains the sensitive characters, determining the sensitivity level of the current display interface according to the character quantity of the sensitive characters;
and if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
2. The information security processing method according to claim 1, wherein the step of superposing the information to be edited and the identification watermark includes:
acquiring the size of the initial information and the size of the identification watermark, obtaining the relative proportion of the size of the initial information and the size of the identification watermark, and judging whether the relative proportion of the size is matched with a preset proportion or not;
If the relative size proportion is matched with the preset proportion, placing the identification watermarks according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermarks;
if the relative size proportion is not matched with the preset proportion, displaying prompt information for the user to adjust the size of the identification watermark;
and after finishing the size adjustment of the identification watermark is detected, placing the identification watermark according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermark.
3. The information security processing method according to any one of claims 1 to 2, wherein the step of transmitting the transmission information to a receiving account associated with a transmission instruction so that a user corresponding to the receiving account views the transmission information, comprises:
when an analysis request triggered based on the sending information is detected, carrying out Fourier transform on the sending information;
when the completion of the Fourier transform of the sending information is detected, the identification watermark contained in the sending information is obtained, and the identification watermark is decoded to obtain the user identification corresponding to the identification watermark.
4. The information security processing method of claim 1, wherein the step of obtaining a preset user identifier, and encoding the user identifier to generate an identifier watermark further comprises:
Acquiring a preset user identifier, and encrypting the preset user identifier according to a preset rule;
when the preset user identification is detected to be encrypted, the preset user identification is randomly coded to generate an identification watermark, so that the identification watermark and the information to be edited are subjected to superposition processing.
5. The information security processing method as claimed in claim 4, wherein the step of acquiring the identification watermark included in the transmission information and decoding the identification watermark to obtain the user identification corresponding to the identification watermark when the completion of fourier transform of the transmission information is detected comprises:
when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not;
if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark;
and decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
6. An information security processing apparatus, characterized in that the information security processing apparatus comprises:
the mode judging module is used for judging whether the information is in an information protection mode, and if the information is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected;
The information processing module is used for performing discrete Fourier transform on the initial information to generate information to be edited;
the identification processing module is used for acquiring a preset user identification, and encoding the user identification to generate an identification watermark;
the watermark processing module is used for carrying out superposition processing on the information to be edited and the identification watermark, carrying out inverse Fourier transform and generating transmission information corresponding to the transmission instruction;
the information sending module is used for sending the sending information to a receiving account associated with the sending instruction so that the receiving account corresponds to a user to check the sending information;
the mode judging module is further used for acquiring a current display interface of the display screen if the mode is in the information protection mode; analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information; if the photographing prevention mode is started, acquiring a preset user identifier for encoding, and generating an encoding graph; converting the coded graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen to prevent information leakage caused by photographing;
the mode judging module is further used for analyzing the current display interface to obtain display information contained in the current display interface and obtaining a character set in the display information; performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base to judge whether the character set contains the sensitive characters or not; if the character set contains the sensitive characters, determining the sensitivity level of the current display interface according to the character quantity of the sensitive characters; and if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
7. An information security processing apparatus, characterized by comprising: a memory, a processor, and an information security handler stored on the memory and executable on the processor, wherein:
the information security processing program, when executed by the processor, implements the steps of the information security processing method according to any one of claims 1 to 5.
8. A computer storage medium, wherein an information security processing program is stored on the computer storage medium, which when executed by a processor, implements the steps of the information security processing method according to any one of claims 1 to 5.
CN201810330715.1A 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium Active CN108510426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810330715.1A CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810330715.1A CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN108510426A CN108510426A (en) 2018-09-07
CN108510426B true CN108510426B (en) 2023-12-29

Family

ID=63381791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810330715.1A Active CN108510426B (en) 2018-04-13 2018-04-13 Information security processing method, device, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN108510426B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741232A (en) * 2018-12-29 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of image watermark detection method, device and electronic equipment
CN109767378B (en) * 2019-01-02 2021-07-20 腾讯科技(深圳)有限公司 Image processing method and device
CN111506905A (en) * 2019-01-31 2020-08-07 百度在线网络技术(北京)有限公司 Data processing method, device, server and storage medium
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
US11019407B2 (en) * 2019-08-27 2021-05-25 Synamedia Limited Systems and methods for providing watermarked content
CN111639313B (en) * 2020-05-13 2023-08-11 广州国音智能科技有限公司 File transmission method, device, terminal and computer readable storage medium
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system
CN112182605A (en) * 2020-09-24 2021-01-05 建信金融科技有限责任公司 Operation request processing method and device, electronic equipment and readable storage medium
CN112532878A (en) * 2020-11-25 2021-03-19 平安信托有限责任公司 Anti-photographing method, device and equipment based on artificial intelligence and storage medium
CN113542206B (en) * 2020-11-27 2023-07-04 腾讯科技(深圳)有限公司 Image processing method, device and computer readable storage medium
CN112669192A (en) * 2021-01-14 2021-04-16 视联动力信息技术股份有限公司 Watermark acquisition method, watermark acquisition device, terminal equipment and storage medium
CN114780187A (en) * 2022-04-11 2022-07-22 北京有竹居网络技术有限公司 Prompting method and device
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000278505A (en) * 1999-03-24 2000-10-06 Hitachi Ltd Secrecy method and device for image data by electronic watermark
JP2006270988A (en) * 2006-04-25 2006-10-05 Nec Corp Method for inserting electronic watermark data, its device and electronic watermark data detector
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
WO2015090170A1 (en) * 2013-12-16 2015-06-25 成都宇飞信息工程有限责任公司 Digital watermarking data processing module, chip and smart digital watermarking mobile phone
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20010097834A (en) * 2000-04-26 2001-11-08 이영아 Realtime digital watermarking system and operating method in encrypt
JPWO2006115128A1 (en) * 2005-04-21 2008-12-18 松下電器産業株式会社 Digital watermark detection device, method, program, and integrated circuit device
US20130125196A1 (en) * 2005-05-18 2013-05-16 William M. Shapiro Method and apparatus for combining encryption and steganography in a file control system
JP2008141391A (en) * 2006-11-30 2008-06-19 Toshiba Corp Digital watermark embedding method, device and program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000278505A (en) * 1999-03-24 2000-10-06 Hitachi Ltd Secrecy method and device for image data by electronic watermark
JP2006270988A (en) * 2006-04-25 2006-10-05 Nec Corp Method for inserting electronic watermark data, its device and electronic watermark data detector
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
WO2015090170A1 (en) * 2013-12-16 2015-06-25 成都宇飞信息工程有限责任公司 Digital watermarking data processing module, chip and smart digital watermarking mobile phone
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张玉梅等.浏览器端定位篡改的网页脆弱水印算法.《计算机研究与发展》.2014,第51卷(第12期),文章第1.2-1.3部分. *

Also Published As

Publication number Publication date
CN108510426A (en) 2018-09-07

Similar Documents

Publication Publication Date Title
CN108510426B (en) Information security processing method, device, equipment and computer storage medium
US7725718B2 (en) Authenticating images identified by a software application
JPH1011509A (en) Electronic document security system, electronic stamping security system and electronic signature security system
JP2007122143A (en) Electronic ticket distribution method, mobile terminal, server, system and program
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
US20110016512A1 (en) Method for authorising a connection between a computer terminal and a source server
CN108280369B (en) Cloud document offline access system, intelligent terminal and method
CN109660494A (en) The signature method, apparatus and server of electronic contract
CN107103577A (en) Half fragile uniqueness image watermark insertion and extracting method for integrity protection
JP2007142930A (en) Image processing apparatus, job log generating method, and program
JP2007043321A (en) Authenticity verification method and system of electronic document
CN109246062A (en) A kind of authentication method and system based on browser plug-in
CN110753257A (en) Data display method, display terminal, server, display system, and storage medium
JP2013080329A (en) Information provision system
KR101451638B1 (en) Identification and theft prevention system, and method thereof
CN107545154A (en) Copy-right protection method, apparatus and system based on biological characteristic
US20200396055A1 (en) Method and Apparatus for Use in Information Processing
CN112434327B (en) Information protection method and device and electronic equipment
Mohamed et al. A novel watermarking technique in data transmission between QR codes and database
CN111860726A (en) Two-dimensional code display method, verification method, equipment and computer-readable storage medium
CN104182698B (en) A kind of data clearing method and electronic equipment
JP6578659B2 (en) Transaction system and transaction method
CN111382420A (en) Data transaction method, device, system, electronic equipment and readable storage medium
KR100727960B1 (en) Apparatus and method for managing secure file
KR101427733B1 (en) Device and method for authenticating server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231103

Address after: Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510000, 518.519

Applicant after: Liang Shiquan

Address before: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen LIAN intellectual property service center

Effective date of registration: 20231103

Address after: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen LIAN intellectual property service center

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231120

Address after: Room 206, No.1 Futong Street, Tianhe District, Guangzhou City, Guangdong Province, 510000

Applicant after: Zhu Na

Address before: Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510000, 518.519

Applicant before: Liang Shiquan

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231128

Address after: Room 518.519, Creative Center, No. 69 Spectral West Road, Huangpu District, Guangzhou City, Guangdong Province, 510670

Applicant after: GUANGDONG LI'ANG ELECTRONIC TECHNOLOGY CO.,LTD.

Address before: Room 206, No.1 Futong Street, Tianhe District, Guangzhou City, Guangdong Province, 510000

Applicant before: Zhu Na

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant