CN108985081A - A kind of watermark encrypting method, apparatus, medium and electronic equipment - Google Patents
A kind of watermark encrypting method, apparatus, medium and electronic equipment Download PDFInfo
- Publication number
- CN108985081A CN108985081A CN201810734471.3A CN201810734471A CN108985081A CN 108985081 A CN108985081 A CN 108985081A CN 201810734471 A CN201810734471 A CN 201810734471A CN 108985081 A CN108985081 A CN 108985081A
- Authority
- CN
- China
- Prior art keywords
- watermark
- user
- file
- predetermined registration
- registration operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
Abstract
The embodiment of the present invention provides a kind of watermark encrypting method, apparatus, medium and electronic equipment.Method includes: to obtain monitoring information after monitoring that user triggers predetermined registration operation, and the monitoring information includes the device identification of the equipment of response predetermined registration operation, timestamp, customer position information and the user identifier for triggering predetermined registration operation;A string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain encrypted character string;According to the encrypted text string generation watermark;The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention is by monitoring user behavior; after user triggers predetermined registration operation; increase encrypted watermark in the operation object of predetermined registration operation; protect user sensitive information; prevent user sensitive information from revealing and being maliciously tampered; according to monitoring information information leakage source can be traced simultaneously, is there is information leakage behavior according to can seek.
Description
Technical field
The present invention relates to watermark encrypting technical fields more particularly to a kind of watermark encrypting method, apparatus, medium and electronics to set
It is standby.
Background technique
Because the core of different insurance products protects range, regular and Claims Resolution process difference of accepting insurance, user needs to difference
Insurance products distinguish screening.Specifically, user can pass through store official website, cell phone application, mobile official website, wechat public platform
It is seeked advice from etc. various channels with intelligent customer service or artificial customer service, so that the purchase for oneself whether meeting corresponding insurance products screened
It is required that, whether can accept insurance and seek advice from corresponding Claims Resolution process data corresponding to supplement during Claims Resolution, to facilitate user
Efficiently, quickly complete accept insurance, core guarantor, surrender, Claims Resolution, the service such as health control.
It is unavoidable to be related to the important sensitive information of user in user's consultation process, such as the identity document of user
Number, cell-phone number, the history of disease of user etc., these as the sensitive information for judging can whether user can accept insurance, settle a claim etc., once
By taking pictures, the means such as screenshotss, malicious modification be stolen, after sensitive information leakage event occurs, for victim often very
Difficulty finds the source that sensitive information is divulged a secret, and brings great threat to user information safety, and then can not for insurance company
The true and false in information source is screened, this is to judging user in the future and whether can purchase other products, whether can enjoy health service, be
No can settle a claim etc. causes huge interference.
Summary of the invention
In view of this, the present invention provides a kind of watermark encrypting method, apparatus, medium and electronic equipment, user can be protected
Sensitive information prevents user sensitive information from revealing and being maliciously tampered, while traceable information leakage source, to information leakage row
To be had according to can seek.Technical solution is as follows:
Based on an aspect of of the present present invention, the embodiment of the present invention provides a kind of watermark encrypting method, comprising:
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding described preset
The device identification of the equipment of operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted
Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted
Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation
Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, it is described the watermark is loaded onto screenshot figure layer after, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot
Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation
Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, after in the every page in the file that the watermark is loaded onto user's downloading, the method is also
Include:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark
File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user
Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, after the watermark being loaded onto described in every page in the file of user's upload, the method
Further include:
Judge the number for the file load watermark that the user uploads;
If the number for the file load watermark that the user uploads is 1, it is determined that the file that the user uploads is third
The file just provided;
If the number for the file load watermark that the user uploads is greater than 1, the use is pushed away according to watermark encrypting rule is counter
Whether the monitoring information of file that family uploads is consistent with the relevant information of the user;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined
Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined
Part is untrue.
Optionally, described after monitoring that user triggers predetermined registration operation, the method also includes:
According to the type of the predetermined registration operation, corresponding label is added for the predetermined registration operation;
Wherein, the monitoring information further includes the label.
Based on another aspect of the present invention, the embodiment of the present invention provides a kind of watermark encrypting device, comprising:
Monitoring information acquiring unit, for obtaining monitoring information, the monitoring after monitoring that user triggers predetermined registration operation
Information includes the device identification of equipment for responding the predetermined registration operation, the timestamp of the triggering predetermined registration operation, user location letter
Breath and user identifier;
Character string acquiring unit, for obtaining a string of character strings based on the monitoring information got, and to the character string
It is encrypted to obtain encrypted character string;
Watermark generation unit, for according to the encrypted text string generation watermark;
Watermark loading unit, for the watermark to be loaded onto the operation object of the predetermined registration operation.
Based on another aspect of the invention, the embodiment of the present invention provides a kind of storage medium, is stored thereon with program, described
Previously described watermark encrypting method is realized when program is executed by processor.
Based on another aspect of the invention, the embodiment of the present invention provides a kind of electronic equipment, comprising: processor;And it deposits
Reservoir, for storing the executable instruction of the processor;Wherein, the processor is configured to via the execution executable finger
It enables to execute previously described watermark encrypting method.
In watermark encrypting method, apparatus provided in an embodiment of the present invention, medium and electronic equipment, monitoring that user triggers
After predetermined registration operation, monitoring information is obtained, the monitoring information includes responding device identification, the triggering of the equipment of the predetermined registration operation
Timestamp, customer position information and the user identifier of the predetermined registration operation;A string of characters are obtained based on the monitoring information got
String, and the character string is encrypted to obtain encrypted character string;According to the encrypted text string generation watermark;It will
The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention by monitoring user behavior,
After user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protects user sensitive information,
It prevents user sensitive information from revealing and being maliciously tampered, while information leakage source can be traced according to monitoring information, information is let out
Dew behavior is had according to can seek.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of watermark encrypting method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 5 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of watermark encrypting device provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of character string acquiring unit in the embodiment of the present invention;
Fig. 8 is the structural schematic diagram of watermark generation unit in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, it illustrates a kind of flow chart of watermark encrypting method provided in an embodiment of the present invention, method can be with
Include:
Step 101, after monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes response
The device identification of the equipment of the predetermined registration operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation.
Wherein predetermined registration operation may include screenshotss operation, downloading file operation, upload file operation etc..
Specifically in embodiments of the present invention, can be arranged in the customer service interface of equipment in advance for preset monitored operation
Monitoring mechanism, for example, in the customer service interface of certain company APP setting for monitoring users client seek advice from the page carry out take pictures,
The operations such as screenshotss, video recording, upper transmitting file or downloading file.After listening to user's triggering predetermined registration operation, monitoring information, institute are obtained
Stating monitoring information includes the device identification of equipment for responding the predetermined registration operation, the timestamp of the triggering predetermined registration operation, user
Location information and user identifier (CustID).
It should be noted that the merely exemplary property citing of content in the embodiment of the present invention for monitoring information, without
As the restriction to it, it is possible to understand that ground, monitoring information can also include subscriber identity information, file identification information etc..
The embodiment of the present invention, can be by user behavior by the behavior of monitoring mechanism monitoring users (i.e. user triggers predetermined registration operation)
Information is preserved in the form of user behaviors log, is recorded in system log.The content wherein saved uses character string forms, because
Device identification, timestamp, customer position information, user identifier in this embodiment of the present invention etc. are respectively a string of character strings.
Step 102, a string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain
Encrypted character string.
Specifically, the device identification for the equipment of the response predetermined registration operation got, the triggering predetermined registration operation
Timestamp, customer position information and CustID, the embodiment of the present invention obtains required content respectively from each character string, into
And all the elements that will acquire are integrated, and include setting in the string of binary characters to obtain a string of strings of binary characters
Standby mark, timestamp, customer position information and CustID, and then the embodiment of the present invention adds the string of binary characters using default
Close algorithm is encrypted, for example carries out the encryption of sign sign test, to obtain encrypted character string.Certain embodiment of the present invention is also
Monitoring information can be converted to octal character string, hexadecimal string etc., it is not limited in the embodiment of the present invention.
Step 103, according to the encrypted text string generation watermark.
Specifically, the embodiment of the present invention is first depending on one watermark information of encrypted text string generation;And then it obtains
Watermark configuration information configures watermark information according to the watermark configuration information, generates watermark.
In the embodiment of the present invention, watermark information be device identification accessed after user to be carried out to predetermined registration operation every time,
The encrypted character strings such as the timestamp, customer position information, user identifier of the predetermined registration operation are triggered, because triggering is pre- every time
If the timestamp of operation is different, so the watermark information generated every time must be unique.
Watermark configuration information be by the configuration information of the final bandwagon effect of watermark information, for example including text size, position,
Font color etc..
Step 104, the watermark is loaded onto the operation object of the predetermined registration operation.
For the watermark of generation, the embodiment of the present invention is directly loaded into the operation object of predetermined registration operation.
Watermark encrypting method provided in an embodiment of the present invention obtains prison after monitoring that user triggers predetermined registration operation first
Control information, the monitoring information include the device identification of equipment for responding the predetermined registration operation, the triggering predetermined registration operation when
Between stamp, customer position information and user identifier;And then a string of character strings are obtained based on the monitoring information got, and to the word
Symbol string is encrypted to obtain encrypted character string;Further according to the encrypted text string generation watermark;Finally will
The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention by monitoring user behavior,
After user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protects user sensitive information,
It prevents user sensitive information from revealing and being maliciously tampered, while information leakage source can be traced according to monitoring information, information is let out
Dew behavior is had according to can seek.
For the ease of being more clearly understood that applicant will be with citing to watermark encrypting method provided in an embodiment of the present invention
Watermark encrypting method provided in an embodiment of the present invention is described in more detail in mode.
As shown in Fig. 2, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method
It is described so that the predetermined registration operation of user's triggering is screenshotss operation as an example, method may include:
Step 201, when monitoring that user carries out screenshotss operation, device identification, the touching of the equipment for carrying out screenshotss are obtained
Hair executes timestamp, customer position information and the CustID of screenshotss operation.
By taking the online APP of certain company as an example, when which monitors that user carries out screenshotss operation, acquisition is carrying out screenshotss
Device identification, the triggering of equipment execute the CustID of timestamp, customer position information and user in APP of screenshotss operation.
Step 202, based on get device identification, triggering execute screenshotss operation timestamp, customer position information with
And CustID obtains a string of strings of binary characters.
Step 203, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 204, according to encrypted text string generation watermark information.
Step 205, watermark configuration information is obtained.
Step 206, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 207, the watermark is loaded onto screenshot figure layer.
In the embodiment of the present invention, user executes in the screenshot that screenshotss operate and carries the watermark, increases user
The protection of sensitive information effectively prevents user sensitive information leakage and is maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 207
Step 208, top set shows the watermark in the screen of equipment for responding the screenshotss operation.
It is possible thereby to which user is allowed observably to notice the watermark.
Step 209, the screenshot with the watermark is pushed into customer service consulting interface, to prompt the user whether described in transmission
Screenshot is seeked advice from.
Wherein when user, which determines, sends the screenshot, the screenshot with the watermark is sent to phase by the embodiment of the present invention
It answers customer service to be seeked advice from, and saves the screenshot for having the watermark;When user, which determines, does not send the screenshot, the present invention is real
Example is applied to save the screenshot with the watermark into equipment.
As shown in figure 3, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method
It is described so that the predetermined registration operation of user's triggering is downloading file operation as an example, method may include:
Step 301, when monitoring that user is downloaded file operation, the equipment for being downloaded the equipment of file is obtained
Mark, triggering execute timestamp, customer position information and the CustID of downloading file operation.
By taking the online APP of certain company as an example, when which monitors that user is downloaded file operation, acquisition is carried out down
Device identification, the triggering of the equipment of published article part execute timestamp, customer position information and the user of downloading file operation at this
The CustID of APP.
Step 302, the timestamp of downloading file operation, user location letter are executed based on device identification, the triggering got
Breath and CustID obtain a string of strings of binary characters.
Step 303, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 304, according to encrypted text string generation watermark information.
Step 305, watermark configuration information is obtained.
Step 306, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 307, the watermark is loaded onto the every page in the file of user's downloading.
In order to guarantee to download the safety of file, watermark is respectively loaded in the file of user's downloading by the embodiment of the present invention
Every page in, increase the protection of user sensitive information, effectively prevent user sensitive information leakage and be maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 307
Step 308, top set has shown the band of user's downloading in the screen of equipment for responding the downloading file operation
State the file of watermark.
It is possible thereby to which user is allowed observably to notice the watermark in downloading file.
As shown in figure 4, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method
It is described so that the predetermined registration operation of user's triggering is to upload file operation as an example, method may include:
Step 401, when monitoring that user carries out upload file operation, the equipment for carrying out the equipment of transmitting file is obtained
Mark, triggering execute the text of the upper transmitting file of the timestamp for uploading file operation, customer position information, user identifier and user
Part channel mark (channelID).
In the embodiment of the present invention, the file that user uploads can be picture, document, audio, video etc..
For the file that user uploads, the embodiment of the present invention needs to be labeled it to show this document for user's upload
File.Specifically, by taking the online APP of certain company as an example, which can carry out channelID coding to the file that user uploads, should
ChannelID coding is for indicating that file is the file that user uploads.
In embodiments of the present invention, when APP monitors that user carries out upload file operation, acquisition is carrying out transmitting file
Equipment device identification, triggering execute upload the timestamp of file operation, customer position information, user APP CustID
(i.e. user identifier) and APP are the channelID coding of this document configuration.
Step 402, the timestamp for uploading file operation, user location letter are executed based on device identification, the triggering got
The channelID of the upper transmitting file of breath, CustID and user encodes to obtain a string of strings of binary characters.
Step 403, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 404, according to encrypted text string generation watermark information.
Step 405, watermark configuration information is obtained.
Step 406, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 407, the watermark is loaded onto the every page in the file of user's upload.
In order to guarantee the safety of upper transmitting file, watermark is respectively loaded in the file of user's upload by the embodiment of the present invention
Every page in, increase the protection of user sensitive information, effectively prevent user sensitive information leakage and be maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 407
Step 408, after the file for receiving user's upload, judge the number of the file load watermark.
Step 409, if the number of file load watermark is 1, it is determined that the file is the file that third party provides.
Specifically in embodiments of the present invention, when the number of file load watermark is 1, it was demonstrated that transmitting file is third party on this
The file of offer, and not customer service offer or stayed evidence in APP, did not occurred or recorded in APP before transmitting file on this
It crosses.So, if transmitting file is related with APP customer service consulting on this, it can be concluded that this file, can not for fraud, modification content
As user's Claims Resolution foundation.
Step 410, if the number of file load watermark is greater than 1, the file is pushed away according to watermark encrypting rule is counter
Monitoring information and the relevant information of the user whether be consistent.If consistent, execute step 411 and held if inconsistent
Row step 412.
Step 411, the file for determining that the user uploads is true.
Step 412, the file for determining that the user uploads is untrue.
Specifically in embodiments of the present invention, when the number of file load watermark is greater than 1, it was demonstrated that transmitting file exists before on this
APP occurred, and thus can be executed according to the anti-device identification for pushing away transmitting file on this of watermark encrypting rule, triggering and upload file operation
Timestamp, customer position information, CustID and channelID coding, and when it really to upload with user to this document
Device identification, triggering execute upload file operation timestamp, customer position information, CustID and channelID encode into
Row compares, and checks whether the two is consistent, to judge the authenticity of the upper transmitting file of user.
Therefore the embodiment of the present invention provides information to whether source is APP true using the reversed verifying user of watermark encrypting rule
Data effectively counter can be cheated, prevent the behaviors such as user's malice insurance fraud.
Further, anti-fraud result (the i.e. upper transmitting file of user of transmitting file on obtaining user of the embodiment of the present invention
Authenticity result) after, can be that true subscriber data be uploaded to cloud storage service by anti-fraud result by artificial intelligence
Device, and have a question to anti-fraud result, passes to artificial customer service by way of transmitting user CustID, by artificial customer service into
Row user pays a return visit, the authenticity of the upper transmitting file of confirmation user.
Therefore the embodiment of the present invention is by the regular anti-relevant information for pushing to transmitting file of watermark encrypting, sentences on this basis
The disconnected operation whether carried out at that time by user, to judge the authenticity of the upper transmitting file of user.And further by user
Behavioural analysis can increase blacklist judgment rule, screen high-quality user for seat personnel.
Three above embodiment as screenshotss operation, downloading file operation and uploads text using the predetermined registration operation of user's triggering respectively
It is described in detail for part operation, in the treatment process of three embodiments, the embodiment of the present invention passes through to user behavior
It is monitored, after user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protect use
Family sensitive information prevents user sensitive information from revealing and being maliciously tampered, while in subsequent actual application, can basis
Preset Encryption Algorithm is carried out reversely extrapolating the user information in watermark, and is compared with the user information advanced for,
In this, as the important evidence of verifying subscriber data authenticity.Furthermore the embodiment of the present invention can also trace according to monitoring information and believe
, there is according to can seek information leakage behavior in breath leakage source.
On the basis of previous embodiment, the embodiment of the present invention it is further proposed that, do not gone together by monitoring mechanism to user
It is respectively that it adds different labels further directed to different behaviors after being monitored for (screenshotss, upper transmitting file, downloading file), it can
Effectively to record different operation behavior of the user for operation object.For example, user to same file carried out screenshotss operation, under
Carry file operation and upload file operation, then the embodiment of the present invention will be respectively its add screenshotss label, downloading label and on
Pass label, all operation behaviors that record user carries out this document.
Specifically, as shown in figure 5, method can it illustrates another watermark encrypting method provided in an embodiment of the present invention
To include:
It step 501, is described default according to the type of the predetermined registration operation after monitoring that user triggers predetermined registration operation
Corresponding label is added in operation.
Wherein, a kind of type of predetermined registration operation corresponds to a kind of label, such as screenshotss operate corresponding screenshotss label, download file
The corresponding downloading label of operation, upload file operation is corresponding to upload label.
Step 502, monitoring information is obtained, the monitoring information includes the equipment mark for the equipment for responding the predetermined registration operation
Timestamp, customer position information, user identifier and the label known, trigger the predetermined registration operation.
Step 503, a string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain
Encrypted character string.
The embodiment of the present invention is by the same device identification of label added for predetermined registration operation, the time of the triggering predetermined registration operation
Stamp, customer position information and user identifier are integrated obtain a string of strings of binary characters together, and carry out to the string of binary characters
The encryption of sign sign test, obtains encrypted character string.
Step 504, according to the encrypted text string generation watermark.
Step 505, the watermark is loaded onto the operation object of the predetermined registration operation.
The embodiment of the present invention is according to the different behaviors of user (screenshotss operation, uploads file operation at downloading file operation)
Type adds corresponding label for the predetermined registration operation of user's triggering, and by the same device identification of the label, the triggering predetermined registration operation
Timestamp, customer position information and user identifier integrate obtain a string of character strings together, and the character string encrypt
To encrypted character string.Encrypted character string can not only protect user sensitive information at this time, further comprise user behavior
Label information.The user behavior label information clearly has recorded user to all operation behaviors of operation object.
In the actual application of the embodiment of the present invention, the embodiment of the present invention can also use preset decryption method,
Decryption obtains the watermark on file, to obtain each label in watermark and be obtained by each label corresponding time point
Time shaft record, the authenticity of file is judged with this.
A kind of watermark is also provided based on a kind of watermark encrypting method provided in an embodiment of the present invention, the embodiment of the present invention above
Encryption device, as described in Figure 6, watermark encrypting device includes:
Monitoring information acquiring unit 100, it is described for obtaining monitoring information after monitoring that user triggers predetermined registration operation
Monitoring information includes the device identification of equipment for responding the predetermined registration operation, timestamp, the Yong Huwei of the triggering predetermined registration operation
Confidence breath and user identifier;
Character string acquiring unit 200, for obtaining a string of character strings based on the monitoring information got, and to the character
String is encrypted to obtain an encrypted character string;
Watermark generation unit 300, for according to the encrypted text string generation watermark;
Watermark loading unit 400, for the watermark to be loaded onto the operation object of the predetermined registration operation.
Wherein the character string acquiring unit 200 in the embodiment of the present invention may include, as shown in Figure 7:
Subelement 210 is integrated, the monitoring information for will acquire is integrated to obtain a string of strings of binary characters;
Encryption sub-unit operable 220 obtains described encrypted for carrying out the encryption of sign sign test to the string of binary characters
Character string.
Watermark generation unit 300 in the embodiment of the present invention may include, as shown in Figure 8:
Watermark information generates subelement 310, for according to the encrypted text string generation watermark information;
Watermark configuration information obtains subelement 320, for obtaining watermark configuration information;
Watermark generates subelement 330, for being configured according to the watermark configuration information to the watermark information, generates
Watermark.
Further, when the predetermined registration operation in the embodiment of the present invention is that screenshotss operate, the watermark loading unit 400 is specific
For the watermark to be loaded onto screenshot figure layer.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include: the first top set unit and/or
Push unit;Wherein,
First top set unit is used for the top set in the screen of equipment for responding the screenshotss operation and shows the watermark;
Push unit is used to pushing to the screenshot with the watermark into customer service consulting interface, to prompt the user whether to send
The screenshot is seeked advice from.
Further, when the predetermined registration operation in the embodiment of the present invention is downloading file operation, the watermark loading unit 400
It is specifically used for, the watermark is loaded onto the every page in the file of user's downloading.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include: the second top set unit;
Second top set unit is used for the top set in the screen of equipment for responding the downloading file operation and shows user's downloading
The file with the watermark.
Further, the predetermined registration operation in the embodiment of the present invention is when uploading file operation, and the monitoring information further includes
The file channel mark of the upper transmitting file of user;The watermark loading unit 400 is specifically used for, and the watermark is loaded on user
In every page in the file of biography.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include:
First judging unit, for after receiving the file that the user uploads, judging the file load watermark
Number;
First determination unit, when for judging the number of file load watermark for 1 in first judging unit, really
The fixed file is the file that third party provides;
Second judgment unit, when for judging that the number of the file load watermark is greater than 1 in first judging unit,
Whether it is consistent according to the anti-monitoring information for pushing away the file of watermark encrypting rule and the relevant information of the user;
Second determination unit, for judging the monitoring information of the file with the user's in the second judgment unit
When relevant information is consistent, the file for determining that the user uploads is true;
Third determination unit, for judging the monitoring information of the file with the user's in the second judgment unit
When relevant information is inconsistent, the file for determining that the user uploads is untrue.
Still optionally further, watermark encrypting device provided in an embodiment of the present invention can also include:
Label adding unit, for according to the type of the predetermined registration operation, being after monitoring that user triggers predetermined registration operation
The predetermined registration operation adds corresponding label;The monitoring information that the monitoring information acquiring unit 100 is got at this time further includes
The label.
The watermark encrypting device includes processor and memory, and above-mentioned monitoring information acquiring unit 100, character string obtain
Unit 200, watermark generation unit 300 and watermark loading unit 400 etc. are stored as program unit in memory, by handling
Device executes above procedure unit stored in memory to realize corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be set one
Or more, watermark encrypting is realized by adjusting kernel parameter.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include that at least one is deposited
Store up chip.
The embodiment of the invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor
The existing watermark encrypting method.
The embodiment of the invention provides a kind of processor, the processor is for running program, wherein described program operation
Watermark encrypting method described in Shi Zhihang.
The embodiment of the invention provides a kind of electronic equipment, equipment includes processor, memory and stores on a memory
And the program that can be run on a processor, processor perform the steps of when executing program
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding described preset
The device identification of the equipment of operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted
Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted
Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation
Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot
Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation
Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, the method also includes:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark
File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user
Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, the method also includes:
After receiving the file that the user uploads, the number of the file load watermark is judged;
If the number of the file load watermark is 1, it is determined that the file is the file that third party provides;
If the number of the file load watermark is greater than 1, believed according to the anti-monitoring for pushing away the file of watermark encrypting rule
It ceases with whether the relevant information of the user is consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined
Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined
Part is untrue.
Optionally, the method also includes:
After monitoring that user triggers predetermined registration operation, according to the type of the predetermined registration operation, added for the predetermined registration operation
Corresponding label;
The monitoring information further includes the label at this time.
Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just
The program of beginningization there are as below methods step: after monitoring that user triggers predetermined registration operation, monitoring information, the monitoring information are obtained
Including respond the device identification of the equipment of the predetermined registration operation, the timestamp of the triggering predetermined registration operation, customer position information and
User identifier;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted
Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted
Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation
Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot
Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation
Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, the method also includes:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark
File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user
Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, the method also includes:
After receiving the file that the user uploads, the number of the file load watermark is judged;
If the number of the file load watermark is 1, it is determined that the file is the file that third party provides;
If the number of the file load watermark is greater than 1, believed according to the anti-monitoring for pushing away the file of watermark encrypting rule
It ceases with whether the relevant information of the user is consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined
Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined
Part is untrue.
Optionally, the method also includes:
After monitoring that user triggers predetermined registration operation, according to the type of the predetermined registration operation, added for the predetermined registration operation
Corresponding label;
The monitoring information further includes the label at this time.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/
Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie
The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element
There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the present invention
Form.It is deposited moreover, the present invention can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The above is only the embodiment of the present invention, are not intended to restrict the invention.To those skilled in the art,
The invention may be variously modified and varied.It is all within the spirit and principles of the present invention made by any modification, equivalent replacement,
Improve etc., it should be included within scope of the presently claimed invention.
Claims (13)
1. a kind of watermark encrypting method characterized by comprising
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding the predetermined registration operation
The device identification of equipment, the triggering predetermined registration operation timestamp, customer position information and user identifier;
A string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain encrypted character
String;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
2. the method according to claim 1, wherein described obtain a string of characters based on the monitoring information got
String, and the character string is encrypted to obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
3. the method according to claim 1, wherein described according to the encrypted text string generation watermark packet
It includes:
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
4. method according to claim 1-3, which is characterized in that the predetermined registration operation is screenshotss operation;It is described
The watermark is loaded onto the operation object of the predetermined registration operation and includes:
The watermark is loaded onto screenshot figure layer.
5. according to the method described in claim 4, it is characterized in that, the watermark is loaded onto it in screenshot figure layer described
Afterwards, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is consulted with prompting the user whether to send the screenshot
It askes.
6. method according to claim 1-3, which is characterized in that the predetermined registration operation is downloading file operation;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's downloading.
7. according to the method described in claim 6, it is characterized in that, in the file that the watermark is loaded onto user's downloading
In every page in after, the method also includes:
Top set shows the file with the watermark of user's downloading in the screen of equipment for responding the downloading file operation.
8. method according to claim 1-3, which is characterized in that the predetermined registration operation is to upload file operation;
The monitoring information further includes the file channel mark of the upper transmitting file of user;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
9. according to the method described in claim 8, it is characterized in that, in the file that the watermark is loaded onto user's upload
In every page in after, the method also includes:
Judge the number for the file load watermark that the user uploads;
If the number for the file load watermark that the user uploads is 1, it is determined that the file that the user uploads mentions for third party
The file of confession;
If the number for the file load watermark that the user uploads is greater than 1, pushed away on the user according to watermark encrypting rule is counter
Whether the monitoring information of the file of biography and the relevant information of the user are consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file for determining that the user uploads is true
It is real;
If the monitoring information of the file and the relevant information of the user are inconsistent, the file of user's upload is determined not
Really.
10. method according to claim 1-3, which is characterized in that after monitoring that user triggers predetermined registration operation,
The method also includes:
According to the type of the predetermined registration operation, corresponding label is added for the predetermined registration operation;
Wherein, institute's monitoring information further includes the label.
11. a kind of watermark encrypting device characterized by comprising
Monitoring information acquiring unit, for obtaining monitoring information, the monitoring information after monitoring that user triggers predetermined registration operation
Including respond the device identification of the equipment of the predetermined registration operation, the timestamp of the triggering predetermined registration operation, customer position information and
User identifier;
Character string acquiring unit is carried out for being obtained a string of character strings based on the monitoring information got, and to the character string
Encryption obtains encrypted character string;
Watermark generation unit, for according to the encrypted text string generation watermark;
Watermark loading unit, for the watermark to be loaded onto the operation object of the predetermined registration operation.
12. a kind of storage medium, which is characterized in that be stored thereon with program, right is realized when described program is executed by processor
It is required that watermark encrypting method described in any one of 1 to 10.
13. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to come any one of perform claim requirement 1 to 10 institute via the execution executable instruction
The watermark encrypting method stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810734471.3A CN108985081B (en) | 2018-07-06 | 2018-07-06 | Watermark encryption method, device, medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810734471.3A CN108985081B (en) | 2018-07-06 | 2018-07-06 | Watermark encryption method, device, medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108985081A true CN108985081A (en) | 2018-12-11 |
CN108985081B CN108985081B (en) | 2022-02-01 |
Family
ID=64536247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810734471.3A Active CN108985081B (en) | 2018-07-06 | 2018-07-06 | Watermark encryption method, device, medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108985081B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
CN109767377A (en) * | 2018-12-25 | 2019-05-17 | 航天信息股份有限公司 | Retrospective image watermark adding method |
CN109828810A (en) * | 2018-12-28 | 2019-05-31 | 北京达佳互联信息技术有限公司 | Screen shots intercept method, watermark adding method, device, equipment and medium |
CN109901981A (en) * | 2019-02-28 | 2019-06-18 | 北京智游网安科技有限公司 | A kind of screenshotss leakage processing method, intelligent terminal and storage medium |
CN109919823A (en) * | 2019-02-13 | 2019-06-21 | 阿里巴巴集团控股有限公司 | A kind of watermark generation method and device |
CN110232263A (en) * | 2019-05-24 | 2019-09-13 | 杭州世平信息科技有限公司 | The method that a kind of pair of relational data is traced to the source |
CN110245469A (en) * | 2019-06-24 | 2019-09-17 | 苏州睿威博科技有限公司 | Watermark generation method, watermark analytic method, device and the storage medium of webpage |
CN110489944A (en) * | 2019-07-17 | 2019-11-22 | 招联消费金融有限公司 | Background picture generation method, device and the storage medium of information management system |
CN110941813A (en) * | 2019-12-02 | 2020-03-31 | 随锐科技集团股份有限公司 | Intelligent terminal equipment control method and device and computer readable storage medium |
CN111191414A (en) * | 2019-11-11 | 2020-05-22 | 苏州亿歌网络科技有限公司 | Page watermark generation method, identification method, device, equipment and storage medium |
CN111325652A (en) * | 2018-12-17 | 2020-06-23 | 北京京东尚科信息技术有限公司 | Information embedding method, information extracting method, information embedding device, information extracting device, information embedding equipment and computer readable storage medium |
CN111950003A (en) * | 2020-08-05 | 2020-11-17 | 北京每日优鲜电子商务有限公司 | Method and device for generating unique identification information of user equipment and electronic equipment |
CN112016900A (en) * | 2020-09-02 | 2020-12-01 | 中国平安财产保险股份有限公司 | Electronic policy information security management and control method and system |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112653994A (en) * | 2019-09-26 | 2021-04-13 | 中国移动通信集团重庆有限公司 | Historical position management method and device and computing equipment |
CN112800449A (en) * | 2021-02-03 | 2021-05-14 | 网易(杭州)网络有限公司 | Encryption method and device for page screenshot, electronic equipment and storage medium |
EP4135279A4 (en) * | 2020-05-28 | 2024-01-10 | Siemens Ag | Information leakage detection method and apparatus, and computer-readable medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN105631359A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Control method and device of webpage operation |
CN106407820A (en) * | 2016-08-31 | 2017-02-15 | 江苏中威科技软件系统有限公司 | Method and system for preventing document from being tampered and leaked through watermark encryption |
CN107862647A (en) * | 2017-11-15 | 2018-03-30 | 平安科技(深圳)有限公司 | Display methods, device, computer equipment and the storage medium of screen watermark |
-
2018
- 2018-07-06 CN CN201810734471.3A patent/CN108985081B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN105631359A (en) * | 2015-12-23 | 2016-06-01 | 北京奇虎科技有限公司 | Control method and device of webpage operation |
CN106407820A (en) * | 2016-08-31 | 2017-02-15 | 江苏中威科技软件系统有限公司 | Method and system for preventing document from being tampered and leaked through watermark encryption |
CN107862647A (en) * | 2017-11-15 | 2018-03-30 | 平安科技(深圳)有限公司 | Display methods, device, computer equipment and the storage medium of screen watermark |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111325652A (en) * | 2018-12-17 | 2020-06-23 | 北京京东尚科信息技术有限公司 | Information embedding method, information extracting method, information embedding device, information extracting device, information embedding equipment and computer readable storage medium |
CN109767377A (en) * | 2018-12-25 | 2019-05-17 | 航天信息股份有限公司 | Retrospective image watermark adding method |
CN109828810A (en) * | 2018-12-28 | 2019-05-31 | 北京达佳互联信息技术有限公司 | Screen shots intercept method, watermark adding method, device, equipment and medium |
CN109726348A (en) * | 2018-12-29 | 2019-05-07 | 上海携程商务有限公司 | The method and system of webpage watermark protection |
CN109919823A (en) * | 2019-02-13 | 2019-06-21 | 阿里巴巴集团控股有限公司 | A kind of watermark generation method and device |
CN109901981A (en) * | 2019-02-28 | 2019-06-18 | 北京智游网安科技有限公司 | A kind of screenshotss leakage processing method, intelligent terminal and storage medium |
CN110232263A (en) * | 2019-05-24 | 2019-09-13 | 杭州世平信息科技有限公司 | The method that a kind of pair of relational data is traced to the source |
CN110245469A (en) * | 2019-06-24 | 2019-09-17 | 苏州睿威博科技有限公司 | Watermark generation method, watermark analytic method, device and the storage medium of webpage |
CN110489944A (en) * | 2019-07-17 | 2019-11-22 | 招联消费金融有限公司 | Background picture generation method, device and the storage medium of information management system |
CN112653994A (en) * | 2019-09-26 | 2021-04-13 | 中国移动通信集团重庆有限公司 | Historical position management method and device and computing equipment |
CN111191414A (en) * | 2019-11-11 | 2020-05-22 | 苏州亿歌网络科技有限公司 | Page watermark generation method, identification method, device, equipment and storage medium |
CN110941813A (en) * | 2019-12-02 | 2020-03-31 | 随锐科技集团股份有限公司 | Intelligent terminal equipment control method and device and computer readable storage medium |
EP4135279A4 (en) * | 2020-05-28 | 2024-01-10 | Siemens Ag | Information leakage detection method and apparatus, and computer-readable medium |
CN111950003A (en) * | 2020-08-05 | 2020-11-17 | 北京每日优鲜电子商务有限公司 | Method and device for generating unique identification information of user equipment and electronic equipment |
CN112016900A (en) * | 2020-09-02 | 2020-12-01 | 中国平安财产保险股份有限公司 | Electronic policy information security management and control method and system |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112616056B (en) * | 2020-12-18 | 2023-04-07 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112800449A (en) * | 2021-02-03 | 2021-05-14 | 网易(杭州)网络有限公司 | Encryption method and device for page screenshot, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108985081B (en) | 2022-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108985081A (en) | A kind of watermark encrypting method, apparatus, medium and electronic equipment | |
Chu et al. | Security and privacy analyses of internet of things children’s toys | |
CN104484599B (en) | A kind of behavior treating method and apparatus based on application program | |
Neyaz et al. | Security, privacy and steganographic analysis of FaceApp and TikTok | |
CN110598442A (en) | Sensitive data self-adaptive desensitization method and system | |
CN108537314A (en) | Product marketing system and method based on Quick Response Code | |
CN105871805A (en) | Anti-stealing-link method and device | |
CN111191195A (en) | Method and device for protecting APK | |
CN109040134A (en) | A kind of design method and relevant apparatus of information encryption | |
CN116662941B (en) | Information encryption method, device, computer equipment and storage medium | |
US10536276B2 (en) | Associating identical fields encrypted with different keys | |
CN110598377A (en) | Software serial number management method and device based on block chain | |
CN107342966A (en) | Authority credentials distribution method and device | |
CN108416224A (en) | A kind of data encryption/decryption method and device | |
Tahiri | Mastering mobile forensics | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
Wahsheh et al. | Evaluating Security, Privacy and Usability Features of QR Code Readers. | |
CN110247918A (en) | Number cochain method and its equipment are shaken applied to block chain | |
CN113792307A (en) | Seal management method and device and electronic equipment | |
Vella et al. | D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage | |
CN107026841B (en) | Method and device for publishing works in network | |
CN106603244B (en) | A kind of digital literary property protection method and device | |
CN112800467B (en) | Online model training method, device and equipment based on data privacy protection | |
CN115118520A (en) | Data processing method and device and server | |
CN111582954B (en) | False data identification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address | ||
CP03 | Change of name, title or address |
Address after: Floor 36, Zheshang Building, No. 718 Jianshe Avenue, Jiang'an District, Wuhan, Hubei 430019 Patentee after: TK.CN INSURANCE Co.,Ltd. Patentee after: TAIKANG INSURANCE GROUP Co.,Ltd. Address before: Taikang Life Building, 156 fuxingmennei street, Xicheng District, Beijing 100031 Patentee before: TAIKANG INSURANCE GROUP Co.,Ltd. Patentee before: TK.CN INSURANCE Co.,Ltd. |