Disclosure of Invention
The invention mainly aims to provide an information security processing method, an information security processing device, information security processing equipment and a computer storage medium, and aims to perform discrete Fourier transform on electronic information and add invisible watermarks, so that a user is prevented from manually removing watermark information, the information security is improved, and information leakage is effectively prevented.
In order to achieve the above object, the present invention provides an information security processing method, comprising the steps of:
judging whether the information is in an information protection mode, if so, acquiring initial information associated with a sending instruction when the sending instruction is detected;
performing discrete Fourier transform on the initial information to generate information to be edited;
acquiring a preset user identifier, and encoding the user identifier to generate an identifier watermark;
superposing the information to be edited and the identification watermark, and performing inverse Fourier transform to generate transmission information corresponding to a transmission instruction;
and sending the sending information to a receiving account associated with the sending instruction, so that a user corresponding to the receiving account can check the sending information.
Optionally, the step of superposing the information to be edited and the identification watermark includes:
Acquiring the size of the initial information and the size of the identification watermark, obtaining the relative proportion of the size of the initial information and the size of the identification watermark, and judging whether the relative proportion of the size is matched with a preset proportion or not;
if the relative size proportion is matched with the preset proportion, placing the identification watermarks according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermarks;
if the relative size proportion is not matched with the preset proportion, displaying prompt information for the user to adjust the size of the identification watermark;
and after finishing the size adjustment of the identification watermark is detected, placing the identification watermark according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermark.
Optionally, after the step of determining whether to be in the information protection mode, the method further includes:
if the display screen is in the information protection mode, acquiring a current display interface of the display screen;
analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information;
if the photographing prevention mode is started, acquiring a preset user identifier for encoding, and generating an encoding graph;
And converting the coded graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen so as to prevent information leakage caused by photographing.
Optionally, the step of analyzing the current display interface to obtain display information contained in the current display interface to determine whether to start the anti-photographing mode according to the display information includes:
analyzing the current display interface to obtain display information contained in the current display interface, and obtaining a character set in the display information;
performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base to judge whether the character set contains the sensitive characters or not;
if the character set contains the sensitive characters, determining the sensitivity level of the current display interface according to the character quantity of the sensitive characters;
and if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
Optionally, after the step of sending the sending information to the receiving account associated with the sending instruction so that the user corresponding to the receiving account views the sending information, the method includes:
When an analysis request triggered based on the sending information is detected, carrying out Fourier transform on the sending information;
when the completion of the Fourier transform of the sending information is detected, the identification watermark contained in the sending information is obtained, and the identification watermark is decoded to obtain the user identification corresponding to the identification watermark.
Optionally, the step of obtaining the preset user identifier, and encoding the user identifier to generate the identifier watermark further includes:
acquiring a preset user identifier, and encrypting the preset user identifier according to a preset rule;
when the preset user identification is detected to be encrypted, the preset user identification is randomly coded to generate an identification watermark, so that the identification watermark and the information to be edited are subjected to superposition processing.
Optionally, when the fourier transform of the sending information is detected to be completed, the step of acquiring the identification watermark contained in the sending information and decoding the identification watermark to obtain the user identifier corresponding to the identification watermark includes:
when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not;
if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark;
And decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
In addition, in order to achieve the above object, the present invention also provides an information security processing apparatus including:
the mode judging module is used for judging whether the information is in an information protection mode, and if the information is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected;
the information processing module is used for performing discrete Fourier transform on the initial information to generate information to be edited;
the identification processing module is used for acquiring a preset user identification, and encoding the user identification to generate an identification watermark;
the watermark processing module is used for carrying out superposition processing on the information to be edited and the identification watermark, carrying out inverse Fourier transform and generating transmission information corresponding to the transmission instruction;
and the information sending module is used for sending the sending information to a receiving account associated with the sending instruction so that the receiving account can be corresponding to a user to check the sending information.
In addition, in order to achieve the above object, the present invention also provides an information security processing apparatus including: a memory, a processor, and an information security handler stored on the memory and executable on the processor, wherein:
The information security processing program, when executed by the processor, implements the steps of the information security processing method described above.
In addition, in order to achieve the above object, the present invention also provides a computer storage medium;
the computer storage medium stores an information security processing program which, when executed by a processor, implements the steps of the information security processing method described above.
The embodiment of the invention provides an information security processing method, an information security processing device, information security processing equipment and a computer storage medium, wherein a user identifier is stored on a personal computer of an enterprise or a public institution, an information protection mode is set on the computer, when a user uses the computer to process information, the computer firstly judges whether the user is in the information protection mode, and if the user is in the information protection mode, initial information associated with a sending instruction is acquired when the sending instruction is detected; performing discrete Fourier transform on the initial information to generate information to be edited; meanwhile, the terminal acquires a preset user identifier in the local storage, and encodes the user identifier to generate an identifier watermark; the terminal carries out superposition processing on the information to be edited and the identification watermark, carries out inverse Fourier transform, and generates transmission information corresponding to the transmission instruction, wherein the transmission information carries the invisible watermark of the user identification; and the terminal sends the sending information to a receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user. When information leakage occurs, the information can be analyzed to obtain a corresponding user identifier so as to determine the information leakage source and ensure the information safety.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: storing user identification information on a terminal used by a user, generating a corresponding identification watermark by the identification information of the user when the user sends the information, combining the generated identification watermark with the information sent by the user, and performing inverse Fourier transform to generate an invisible watermark, so that the user identification information is added to the information sent by the user, and meanwhile, the reading of a receiver is not influenced by the information sent by the user; when information leakage occurs, the terminal carries out Fourier transform on the information, so that user identification information is displayed to determine the source of the information leakage.
Because the prior art adds the watermark on the electronic document, a user can delete personal information through means such as PS (PS) and the like when sending the information, the method can protect secret-related data to a certain extent, and the risk of stealing the secret-related data is reduced; however, the protection mode can only embed watermarks in certain specific positions of the secret-related data at first, and cannot fully cover all secret-related contents, so that a stealer can intentionally avoid the watermarks to steal other parts of the secret-related data, the source of information leakage cannot be determined when information leakage occurs, and the information security cannot be effectively protected.
As shown in fig. 1, fig. 1 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a fixed terminal or a mobile terminal, wherein the fixed terminal is such as 'Internet of things equipment', an intelligent air conditioner with a networking function, an intelligent electric lamp, an intelligent power supply and the like; mobile terminals, such as AR/VR devices with networking functions, smart speakers, autopilot cars, smart phones, tablet computers, electronic book readers, portable computers, and other terminal devices with display functions.
As shown in fig. 1, the terminal may include: processor 1001, (e.g. central processor Central Processing Unit, CPU), network interface 1004, user interface 1003, memory 1005, communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., WIreless-FIdelity, WIFI interface). The memory 1005 may be a high-speed random access memory (random access memory, RAM) or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 1 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, the computer software product is stored in a storage medium (storage medium: also called computer storage medium, computer medium, readable storage medium, computer readable storage medium, or direct called medium, such as RAM, magnetic disk, optical disk, etc.), and includes several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to execute the method according to the embodiments of the present invention, and the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and an information security processing application.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be used to call an information security processing application stored in the memory 1005 and perform steps in the information security processing method provided in the following embodiment of the present invention.
Referring to fig. 2, in a first embodiment of the information security processing method of the present invention, the information security processing method includes:
step S10, judging whether the information is in an information protection mode, and if the information is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected.
When a user starts the terminal or the user performs terminal operation, the terminal judges whether the mode in which the terminal is positioned is an information protection mode, and it is required to be noted that the terminal information protection mode can be automatically set by a server or other monitoring devices, or can be set by the terminal user independently, if the terminal is determined to be in the information protection mode, when the terminal detects that the user performs operation based on the terminal, the terminal automatically triggers an operation detection request, a terminal processor receives the operation detection request and detects an operation performed on the terminal, when the terminal processor detects that an operation corresponding instruction triggered by the user is a sending instruction, the terminal acquires initial information associated with the sending instruction, wherein the initial information can be different types of information such as image information, electronic documents or instant messages, for example, a science and technology company sets work computers of all staff as the information protection mode, when the work computer processor detects that the sending instruction of a screen capture image is triggered on instant communication software of the terminal, the terminal acquires the screen capture image associated with the sending instruction, and the terminal performs information security processing by taking the screen capture image as the initial information.
And S20, performing discrete Fourier transform on the initial information to generate information to be edited.
The terminal performs a discrete fourier transform (Fourier Transform) on the initial information. For example, the initial information is a screen capturing image, the terminal processes the screen capturing image through a preset discrete fourier transform formula, wherein the frequency and the like of the image in the preset discrete fourier transform formula can be set according to actual conditions so as to distinguish low-frequency information from high-frequency information in the image, the terminal filters a frequency domain after the discrete fourier transform to obtain information to be edited which accords with information superposition, and it is required to supplement that parameters in the discrete fourier transform in the invention are not particularly limited and can be determined according to the effect of the processed initial information.
Step S30, obtaining a preset user identifier, and encoding the user identifier to generate an identifier watermark.
The terminal obtains preset user identification in the local storage, wherein the user identification is user name, user work number or other user post information, the user identification can be input in advance by a user, the user identification information can be automatically obtained according to user operation, the user identification information is identification information which can uniquely identify the user identification and is obtained through discrete Fourier transform, and the terminal carries out coding processing on the preset user identification, wherein the coding processing is a technology for representing images by using fewer symbols (bit numbers); the image coding method mainly comprises symbol coding, predictive coding, transformation coding, sub-band coding, wavelet transformation coding, split-dimension coding and the like, and generates an identification watermark corresponding to the user identification.
And S40, superposing the information to be edited and the identification watermark, performing inverse Fourier transform, and generating transmission information corresponding to the transmission instruction.
And the terminal performs superposition processing on the information to be edited and the identification watermark and performs inverse Fourier transform, namely, the terminal performs superposition processing on the information to be edited and the identification watermark which are subjected to superposition processing, so that the tangible identification watermark is converted into an invisible identification watermark, and the terminal takes the information obtained through inverse Fourier transform as transmitting information so as to transmit the transmitting information to a corresponding user.
In step S40, the information to be edited and the identification watermark of the terminal may be superimposed in different manners;
for example, in the first mode, the size of the superimposition processing is performed according to the information to be edited and the identification watermark: the terminal obtains the size of the information to be edited and the size of the identification watermark, calculates the area of the information to be edited and the area of the identification watermark, and automatically sets the position relationship between the information to be edited and the identification watermark according to the area ratio of the information to be edited and the area ratio of the identification watermark so as to carry out superposition processing on the information to be edited and the identification watermark; for example, the size of the information to be edited is 20cmx10cm, the size of the identification watermark is 5cmx5cm, the area ratio of the information to be edited to the identification watermark obtained by the terminal is 8:1, the terminal equally divides the surface of the information to be edited into 8 parts, and the identification watermark is correspondingly placed on the information to be edited; and the second mode is that the terminal sets the information to be edited and the identification watermark to carry out superposition processing, namely, the terminal sets the identification watermark to be smaller in size, and the terminal randomly sets the identification watermark on the information to be edited to finish superposition processing of the information to be edited and the identification watermark.
In this embodiment, the terminal performs superposition processing on the information to be edited and the identification watermark, and performs inverse fourier transform to hide the identification watermark, so that the user identification is added and fused with the information to be edited on the premise of not affecting the reading of the user, and meanwhile, in this embodiment, the position of the identification watermark is set according to the size of the identification watermark, so that the identification watermark is randomly and comprehensively set on the information to be edited, and the user cannot reject the identification watermark, thereby improving the information security.
And step S50, the sending information is sent to a receiving account associated with the sending instruction, so that the receiving account corresponds to a user to check the sending information.
And the terminal sends the sending information to the receiving account associated with the sending instruction, so that the receiving account can be used for corresponding to the user to check the sending information, namely, the terminal extracts the sending account information of the user in the sending instruction and sends the sending information to the receiving account associated with the sending instruction.
In the embodiment, by storing a user identifier on a personal computer of an enterprise or a public institution and setting a computer security mode, when a user processes information, judging whether the user is in an information protection mode, if the user is in the information protection mode, acquiring initial information associated with a sending instruction when the sending instruction is detected; performing discrete Fourier transform on the initial information to generate information to be edited; meanwhile, the terminal acquires a preset user identifier in the local storage, and encodes the user identifier to generate an identifier watermark; the terminal carries out superposition processing on the information to be edited and the identification watermark, carries out inverse Fourier transform, and generates transmission information corresponding to the transmission instruction, wherein the transmission information carries the invisible watermark of the user identification; and the terminal sends the sending information to a receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user. When information leakage occurs, the information can be analyzed to obtain a corresponding user identifier so as to determine the information leakage source and ensure the information safety.
Further, the present embodiment of the present invention is provided on the basis of the first embodiment of the present invention, which is a refinement of step S30 in the first embodiment, and specifically illustrates a processing step of identifying a watermark.
Specifically, referring to fig. 3, in step S30 of the information security processing method, the information security processing method includes:
step S31, obtaining a preset user identifier, and encrypting the preset user identifier according to a preset rule.
The terminal acquires a preset user identifier in the local storage, and encrypts the preset user identifier according to a preset rule (the preset rule refers to a preset encryption rule, that is, the terminal or the user is an encryption rule preset according to factors such as conditions input by an information type user), wherein the asymmetric encryption is described as the preset rule, and an asymmetric encryption algorithm on the terminal needs two keys: public keys (publickeys) and private keys (privatekeys). The public key and the private key are a pair, and if the data is encrypted by the public key, the data can be decrypted by the corresponding private key; if the data is encrypted with a private key, it can only be decrypted with the corresponding public key.
In the implementation, because two different keys are used for encryption and decryption, when information leakage occurs, only the characteristic decryption rule can decrypt the leaked information, so that the watermark addition of the information to be edited is realized while the security of the user identification information is ensured.
And step S32, after the completion of the encryption of the preset user identification is detected, carrying out random encoding on the preset user identification to generate an identification watermark, so that the identification watermark and the information to be edited are subjected to superposition processing.
After the terminal detects that the encryption of the preset user identification is finished, for example, corresponding prompt information is generated after the encryption of the identification watermark is finished, the terminal detects that the encryption of the preset user identification is finished after receiving the prompt information, and the terminal carries out random encoding on the preset user identification to generate the identification watermark so as to enable the identification watermark and the information to be edited to be overlapped.
In this embodiment, the terminal encrypts the user identifier according to a preset rule, so that on one hand, the user can be prevented from maliciously imitating the identifier information of other users, and the user identifier is prevented from being revealed, and on the other hand, the terminal can analyze the user identifier information only by being used for decoding the secret key, and the security of the identifier watermark corresponding to the user identifier information is ensured.
The present embodiment of the present invention is further provided on the basis of the first embodiment of the present invention, where the refinement of step S40 in the first embodiment specifically illustrates the setting manner of the location of the identification watermark.
Specifically, referring to fig. 4, step S40 in the information security processing method includes:
step S41, the size of the information to be edited and the size of the identification watermark are obtained, the relative size proportion of the information to be edited and the identification watermark is obtained, and whether the relative size proportion accords with the preset proportion is judged.
The method comprises the steps that a terminal obtains the size of information to be edited and the size of a mark watermark to obtain the relative size of the information to be edited and the size of the mark watermark, wherein the size of the information to be edited and the size of the mark watermark can refer to corresponding side length information, the size of the information to be edited and the area of the mark watermark can also be the size of the information to be edited, the relative size of the information to be edited and the size of the mark watermark is determined according to the size of the information to be edited and the size of the mark watermark, for example, the size of the information to be edited is 20cmx10cm, the size of the mark watermark is 5cmx5cm, the relative size of the information to be edited and the area of the mark watermark obtained by the terminal is 8:1, and the terminal judges whether the relative size accords with a preset proportion or not.
The preset proportion is a preset proportion, and the preset proportion can be set to be 10:1, or other preset proportions are set to ensure that the size of the information to be edited is larger than that of the identification watermark, and ensure that the information of the identification watermark is complete and clear.
And step S42, if the relative size proportion is matched with the preset proportion, placing the identification watermarks according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermarks.
If the terminal determines that the relative size proportion is matched with the preset proportion, the terminal sets the corresponding positions of the identification watermarks according to a preset arrangement rule (the preset arrangement rule refers to the arrangement rule of the positions of the identification watermarks set according to the proportion, for example, the relative area proportion is 9:1, and the corresponding arrangement rule in the preset arrangement rule is 9 palace), so that superposition processing of the information to be edited and the identification watermarks is completed.
Further, the step of superposing the information to be edited and the identification watermark includes:
after the files with the display watermark images are formed according to the preset arrangement rules, overlapping the arranged identification watermarks with the information to be edited, namely, determining the frequency spectrums of the identification watermarks and the frequency spectrums of the information to be edited, wherein the frequency spectrums are patterns with the amplitudes arranged according to the frequencies, the x-axis is the frequency, the y-axis is the amplitude, overlapping the frequency spectrums of the identification watermarks and the frequency spectrums of the information to be edited, so that the identification watermarks are invisible on the information to be edited, and corresponding transmitting information is obtained. It should be noted that, the user may set the spectrogram according to the actual situation, and select the required frequency and amplitude.
And step S43, if the relative size proportion is not matched with the preset proportion, displaying prompt information for the user to adjust the size of the identification watermark, placing the adjusted identification watermark according to a preset arrangement rule, and carrying out superposition processing on the information to be edited and the identification watermark.
If the relative size proportion is not matched with the preset proportion, prompt information is displayed for the user to adjust the size of the identification watermark, for example, the terminal displays that the identification watermark cannot be completely displayed on the information to be edited and the user reduces the identification watermark according to the prompt information. When the identification watermark meets the requirement, a prompt message is displayed to prompt a user to stop adjusting the identification watermark, after the terminal detects that the size adjustment of the identification watermark is finished, the terminal places the identification watermark according to a preset arrangement rule, and carries out superposition processing on the information to be edited and the identification watermark.
In this embodiment, a method for determining the position of the identification watermark according to the size of the identification watermark and the size of the information to be edited is specifically described, so that the identification watermark is completely and clearly displayed.
Further, referring to fig. 5, on the basis of the first embodiment of the present invention, a second embodiment of the information security processing method of the present invention is proposed, in which an encoded image is generated on a display screen of a terminal to prevent information leakage caused by screen photographing;
specifically, the information security processing method includes:
step S60, if the information is in the information protection mode, the current display interface of the display screen is obtained.
And if the terminal is in the information protection mode, the terminal acquires the current display interface of the display screen to judge whether to display the coded image of the user identifier on the display screen of the terminal according to the display information of the display interface of the terminal so as to prevent information leakage caused by screen photographing. Specifically:
step S70, analyzing the current display interface to obtain display information contained in the current display interface, so as to determine whether to start a photographing prevention mode according to the display information; if the photographing prevention mode is started, acquiring a preset user identifier to encode, and generating an encoding graph.
The terminal analyzes the current display interface to obtain display information contained in the current display interface, wherein the current display interface possibly contains different information, such as a document, application software, a program and the like, the document is displayed on the current display interface for illustration, the terminal takes text information in the document as display information, the terminal determines whether to start an anti-photographing mode according to the content of the display information, and if the anti-photographing mode is started, the terminal obtains a preset user identifier for encoding to generate an encoding graph.
Further, referring to fig. 6, the step of determining whether to start the anti-photographing mode according to the display information in step S70 further includes:
step S71, analyzing the current display interface to obtain display information contained in the current display interface, and obtaining a character set in the display information.
The terminal analyzes the current display interface to obtain display information contained in the current display interface, and acquires a character set in the display information, namely, the terminal analyzes the display information corresponding to the current display interface to obtain the display information, wherein the display information can contain image information, character information and the like, and the terminal acquires the character set in the display information.
Step S72, performing traversal matching on the characters in the character set and the sensitive characters in the preset sensitive information base to judge whether the character set contains the sensitive characters or not.
The terminal performs traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base (the preset sensitive information base refers to preset sensitive characters, the sensitive characters are e.g. financial transaction data and user personal information) so as to judge whether the character set contains the sensitive characters, and if the characters in the character set are matched with the sensitive characters in the preset sensitive information base, the character set contains the sensitive characters; if the characters in the character set are not matched with the sensitive characters in the preset sensitive information base, the character set does not contain the sensitive characters.
Step S73, if the character set contains sensitive characters, determining the sensitivity level of the current display interface according to the quantity of the sensitive characters.
The terminal determines that the character set contains sensitive characters, and determines the sensitivity level of the current display interface according to the number of the sensitive characters, for example, the terminal determines that the sensitivity level is first-level when the number of the sensitive characters is more than 100, determines that the sensitivity level is second-level when the number of the sensitive characters is more than 100-20, and determines that the sensitivity level is third-level when the number of the sensitive characters is more than 20.
Step S74, if the sensitivity level of the current display interface exceeds a preset threshold, starting a photographing prevention mode.
If the sensitivity level of the current display interface of the terminal exceeds a preset threshold (the preset threshold is a preset sensitivity information level critical value, for example, the preset threshold is set as a second level according to specific conditions), for example, the sensitivity level of the current display interface is a first level, the preset threshold is a second level of the sensitivity level, the sensitivity level of the current display interface exceeds the preset threshold, the terminal starts a photographing prevention mode, and if the photographing prevention mode is started, a preset user identifier is acquired to encode, and a coding graph is generated.
Step S80, converting the coding graph into a preset format vector graph, and scattering and distributing the preset format vector graph on a display screen to prevent information leakage caused by photographing.
The terminal converts the coded graphics into a preset format vector diagram (the preset format vector diagram is a vector diagram which can be set according to factors such as the size of a terminal screen, for example, an SVG vector diagram, also called a scalable vector diagram (Scalable Vector Graphics)), and disperses and distributes the preset format vector diagram onto a display screen so as to prevent information leakage caused by photographing, for example, a graphic creation layer above a current display interface, so that the generated preset format vector diagram is displayed on the graphic creation layer, and an effect that the preset format vector diagram is distributed onto the display screen is generated.
It should be noted that the technical solution in this embodiment may be combined with the technical solution in the first embodiment, that is, the vector diagram is generated on the terminal display screen, and the watermark image is generated on the electronic information sent by the user.
In this embodiment, the user identifier corresponding vector diagram is displayed on the display screen of the terminal according to the current interface display information of the terminal, so that on one hand, leakage of terminal display information caused by photographing of the user can be prevented, and on the other hand, if the display information on the terminal does not relate to sensitive information, the user identifier corresponding vector diagram is not displayed on the display screen of the terminal, so that the user can use the terminal conveniently, convenience in use is considered for the user in this embodiment, and humanized information protection is realized in consideration of safety of information leakage.
Further, referring to fig. 7, a third embodiment of the information security processing method of the present invention is provided on the basis of the first embodiment of the present invention, in this embodiment, the information added with the identification watermark is parsed, and the user identifier included in the information is determined to obtain the information source;
specifically, the information security processing method includes:
step S90, when the analysis request triggered based on the transmission information is detected, the transmission information is subjected to Fourier transformation.
When the terminal detects an analysis request triggered by sending information, the triggered analysis request can adopt different modes, for example, a user clicks a key of an information sending interface to manually trigger the analysis request, or the terminal receives a control instruction and automatically triggers the analysis request according to the control instruction, and when the terminal detects the analysis request, the terminal carries out Fourier transform on the sent information, namely, the terminal carries out Fourier transform on the information corresponding to the analysis request, so that the identification watermark contained in the information is displayed.
And step S100, when the completion of Fourier transform of the transmitted information is detected, acquiring the identification watermark contained in the transmitted information, and decoding the identification watermark to obtain the user identification corresponding to the identification watermark.
When detecting that fourier transform of the transmission information is completed, the terminal acquires the identification watermark contained in the transmission information and decodes the identification watermark to obtain the user identification corresponding to the identification watermark, and it should be additionally explained that the step of information analysis in this embodiment is an inverse process of adding the watermark in the information in the first embodiment, so as to display the user identification information in the information and determine the source of information leakage.
Further, step S100 includes:
step a, when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not;
step b, if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark;
and c, decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
Specifically, when the completion of Fourier transform of the transmitted information is detected, acquiring an identification watermark contained in the transmitted information, and judging whether the identification watermark is subjected to encryption processing or not; if the identification watermark is encrypted, acquiring a decryption rule and a decoding rule corresponding to the identification watermark; the terminal decodes and decrypts the identification watermark to obtain the user identification corresponding to the identification watermark
In this embodiment, the information is analyzed, and when the information is propagated by this processing method, the propagation source can be tracked. Meanwhile, the watermark is encrypted, the picture processing software cannot be removed by the existing image processing software, and the information security can be effectively ensured only by displaying in a corresponding analysis mode.
In addition, referring to fig. 8, an embodiment of the present invention also proposes an information security processing apparatus including:
the mode judging module 10 is configured to judge whether the mode is in an information protection mode, and if the mode is in the information protection mode, when a sending instruction is detected, obtain initial information associated with the sending instruction;
the information processing module 20 is used for performing discrete fourier transform on the initial information to generate information to be edited;
the identification processing module 30 is configured to obtain a preset user identification, and encode the user identification to generate an identification watermark;
the watermark processing module 40 is configured to superimpose the information to be edited and the identification watermark, and perform inverse fourier transform to generate transmission information corresponding to a transmission instruction;
and the information sending module 50 is used for sending the sending information to the receiving account associated with the sending instruction so that the receiving account can view the sending information corresponding to the user.
Further, the watermarking module 40 includes:
the acquisition judging unit is used for acquiring the size of the initial information and the size of the identification watermark, obtaining the relative size proportion of the initial information and the identification watermark, and judging whether the relative size proportion is matched with a preset proportion or not;
the placement superposition unit is used for placing the identification watermarks according to a preset arrangement rule if the relative size proportion is matched with the preset proportion, and superposing the information to be edited and the identification watermarks;
the prompting adjustment unit is used for displaying prompting information for a user to adjust the size of the identification watermark if the relative size proportion is not matched with the preset proportion;
and the adjustment processing unit is used for placing the identification watermarks according to a preset arrangement rule after the size adjustment of the identification watermarks is detected, and carrying out superposition processing on the information to be edited and the identification watermarks.
Further, the information security processing includes:
the interface acquisition module is used for acquiring the current display interface of the display screen if the information is in the information protection mode;
the analysis determining module is used for analyzing the current display interface to obtain display information contained in the current display interface so as to determine whether to start a photographing prevention mode according to the display information;
The starting acquisition module is used for acquiring a preset user identifier to encode if the photographing prevention mode is started, and generating an encoded graph;
the conversion module is used for converting the coded graph into a preset format vector graph and scattering and distributing the preset format vector graph to a display screen so as to prevent information leakage caused by photographing.
Further, the parsing determination module includes:
the analysis acquisition unit is used for analyzing the current display interface to obtain display information contained in the current display interface and acquiring a character set in the display information;
the information matching unit is used for performing traversal matching on the characters in the character set and the sensitive characters in a preset sensitive information base so as to judge whether the character set contains the sensitive characters or not;
the grade determining module is used for determining the sensitivity grade of the current display interface according to the character quantity of the sensitive characters if the character set contains the sensitive characters;
and the module starting module is used for starting the photographing prevention mode if the sensitivity level of the current display interface exceeds a preset threshold value.
Further, the information security processing includes:
The information analysis module is used for carrying out Fourier transform on the sending information when an analysis request triggered based on the sending information is detected;
and the identification decoding module is used for acquiring the identification watermark contained in the sending information when the completion of the Fourier transform of the sending information is detected, and decoding the identification watermark to obtain the user identification corresponding to the identification watermark.
Further, the watermarking module further includes:
the acquisition encryption unit is used for acquiring preset user identifiers and encrypting the preset user identifiers according to preset rules;
and the code superposition module is used for carrying out random coding on the preset user identification to generate an identification watermark after the completion of the encryption of the preset user identification is detected, so that the identification watermark and the information to be edited are subjected to superposition processing.
Further, the identification decoding module includes:
the encryption judging unit is used for acquiring the identification watermark contained in the sending information and judging whether the identification watermark is subjected to encryption processing or not when the completion of Fourier transform of the sending information is detected;
the acquisition rule unit is used for acquiring a decryption rule and a decoding rule corresponding to the identification watermark if the identification watermark is subjected to encryption processing;
And the identification determining unit is used for decoding and decrypting the identification watermark to obtain the user identification corresponding to the identification watermark.
The steps of implementing each functional module of the information security processing apparatus may refer to each embodiment of the information security processing method of the present invention, which is not described herein again.
In addition, the embodiment of the invention also provides a computer storage medium.
The computer storage medium stores an information security processing program which, when executed by a processor, implements the operations in the information security processing method provided by the above embodiment.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity/operation/object from another entity/operation/object without necessarily requiring or implying any actual such relationship or order between such entities/operations/objects; the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.