CN108985081A - A kind of watermark encrypting method, apparatus, medium and electronic equipment - Google Patents

A kind of watermark encrypting method, apparatus, medium and electronic equipment Download PDF

Info

Publication number
CN108985081A
CN108985081A CN201810734471.3A CN201810734471A CN108985081A CN 108985081 A CN108985081 A CN 108985081A CN 201810734471 A CN201810734471 A CN 201810734471A CN 108985081 A CN108985081 A CN 108985081A
Authority
CN
China
Prior art keywords
watermark
user
file
predetermined registration
registration operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810734471.3A
Other languages
Chinese (zh)
Other versions
CN108985081B (en
Inventor
王海林
包照那斯塔
梁树伟
余小玲
马建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Taikang Online Property Insurance Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Taikang Online Property Insurance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd, Taikang Online Property Insurance Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201810734471.3A priority Critical patent/CN108985081B/en
Publication of CN108985081A publication Critical patent/CN108985081A/en
Application granted granted Critical
Publication of CN108985081B publication Critical patent/CN108985081B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Abstract

The embodiment of the present invention provides a kind of watermark encrypting method, apparatus, medium and electronic equipment.Method includes: to obtain monitoring information after monitoring that user triggers predetermined registration operation, and the monitoring information includes the device identification of the equipment of response predetermined registration operation, timestamp, customer position information and the user identifier for triggering predetermined registration operation;A string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain encrypted character string;According to the encrypted text string generation watermark;The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention is by monitoring user behavior; after user triggers predetermined registration operation; increase encrypted watermark in the operation object of predetermined registration operation; protect user sensitive information; prevent user sensitive information from revealing and being maliciously tampered; according to monitoring information information leakage source can be traced simultaneously, is there is information leakage behavior according to can seek.

Description

A kind of watermark encrypting method, apparatus, medium and electronic equipment
Technical field
The present invention relates to watermark encrypting technical fields more particularly to a kind of watermark encrypting method, apparatus, medium and electronics to set It is standby.
Background technique
Because the core of different insurance products protects range, regular and Claims Resolution process difference of accepting insurance, user needs to difference Insurance products distinguish screening.Specifically, user can pass through store official website, cell phone application, mobile official website, wechat public platform It is seeked advice from etc. various channels with intelligent customer service or artificial customer service, so that the purchase for oneself whether meeting corresponding insurance products screened It is required that, whether can accept insurance and seek advice from corresponding Claims Resolution process data corresponding to supplement during Claims Resolution, to facilitate user Efficiently, quickly complete accept insurance, core guarantor, surrender, Claims Resolution, the service such as health control.
It is unavoidable to be related to the important sensitive information of user in user's consultation process, such as the identity document of user Number, cell-phone number, the history of disease of user etc., these as the sensitive information for judging can whether user can accept insurance, settle a claim etc., once By taking pictures, the means such as screenshotss, malicious modification be stolen, after sensitive information leakage event occurs, for victim often very Difficulty finds the source that sensitive information is divulged a secret, and brings great threat to user information safety, and then can not for insurance company The true and false in information source is screened, this is to judging user in the future and whether can purchase other products, whether can enjoy health service, be No can settle a claim etc. causes huge interference.
Summary of the invention
In view of this, the present invention provides a kind of watermark encrypting method, apparatus, medium and electronic equipment, user can be protected Sensitive information prevents user sensitive information from revealing and being maliciously tampered, while traceable information leakage source, to information leakage row To be had according to can seek.Technical solution is as follows:
Based on an aspect of of the present present invention, the embodiment of the present invention provides a kind of watermark encrypting method, comprising:
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding described preset The device identification of the equipment of operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, it is described the watermark is loaded onto screenshot figure layer after, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, after in the every page in the file that the watermark is loaded onto user's downloading, the method is also Include:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, after the watermark being loaded onto described in every page in the file of user's upload, the method Further include:
Judge the number for the file load watermark that the user uploads;
If the number for the file load watermark that the user uploads is 1, it is determined that the file that the user uploads is third The file just provided;
If the number for the file load watermark that the user uploads is greater than 1, the use is pushed away according to watermark encrypting rule is counter Whether the monitoring information of file that family uploads is consistent with the relevant information of the user;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined Part is untrue.
Optionally, described after monitoring that user triggers predetermined registration operation, the method also includes:
According to the type of the predetermined registration operation, corresponding label is added for the predetermined registration operation;
Wherein, the monitoring information further includes the label.
Based on another aspect of the present invention, the embodiment of the present invention provides a kind of watermark encrypting device, comprising:
Monitoring information acquiring unit, for obtaining monitoring information, the monitoring after monitoring that user triggers predetermined registration operation Information includes the device identification of equipment for responding the predetermined registration operation, the timestamp of the triggering predetermined registration operation, user location letter Breath and user identifier;
Character string acquiring unit, for obtaining a string of character strings based on the monitoring information got, and to the character string It is encrypted to obtain encrypted character string;
Watermark generation unit, for according to the encrypted text string generation watermark;
Watermark loading unit, for the watermark to be loaded onto the operation object of the predetermined registration operation.
Based on another aspect of the invention, the embodiment of the present invention provides a kind of storage medium, is stored thereon with program, described Previously described watermark encrypting method is realized when program is executed by processor.
Based on another aspect of the invention, the embodiment of the present invention provides a kind of electronic equipment, comprising: processor;And it deposits Reservoir, for storing the executable instruction of the processor;Wherein, the processor is configured to via the execution executable finger It enables to execute previously described watermark encrypting method.
In watermark encrypting method, apparatus provided in an embodiment of the present invention, medium and electronic equipment, monitoring that user triggers After predetermined registration operation, monitoring information is obtained, the monitoring information includes responding device identification, the triggering of the equipment of the predetermined registration operation Timestamp, customer position information and the user identifier of the predetermined registration operation;A string of characters are obtained based on the monitoring information got String, and the character string is encrypted to obtain encrypted character string;According to the encrypted text string generation watermark;It will The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention by monitoring user behavior, After user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protects user sensitive information, It prevents user sensitive information from revealing and being maliciously tampered, while information leakage source can be traced according to monitoring information, information is let out Dew behavior is had according to can seek.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of watermark encrypting method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 5 is the flow chart of another watermark encrypting method provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of watermark encrypting device provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of character string acquiring unit in the embodiment of the present invention;
Fig. 8 is the structural schematic diagram of watermark generation unit in the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
As shown in Figure 1, it illustrates a kind of flow chart of watermark encrypting method provided in an embodiment of the present invention, method can be with Include:
Step 101, after monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes response The device identification of the equipment of the predetermined registration operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation.
Wherein predetermined registration operation may include screenshotss operation, downloading file operation, upload file operation etc..
Specifically in embodiments of the present invention, can be arranged in the customer service interface of equipment in advance for preset monitored operation Monitoring mechanism, for example, in the customer service interface of certain company APP setting for monitoring users client seek advice from the page carry out take pictures, The operations such as screenshotss, video recording, upper transmitting file or downloading file.After listening to user's triggering predetermined registration operation, monitoring information, institute are obtained Stating monitoring information includes the device identification of equipment for responding the predetermined registration operation, the timestamp of the triggering predetermined registration operation, user Location information and user identifier (CustID).
It should be noted that the merely exemplary property citing of content in the embodiment of the present invention for monitoring information, without As the restriction to it, it is possible to understand that ground, monitoring information can also include subscriber identity information, file identification information etc..
The embodiment of the present invention, can be by user behavior by the behavior of monitoring mechanism monitoring users (i.e. user triggers predetermined registration operation) Information is preserved in the form of user behaviors log, is recorded in system log.The content wherein saved uses character string forms, because Device identification, timestamp, customer position information, user identifier in this embodiment of the present invention etc. are respectively a string of character strings.
Step 102, a string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain Encrypted character string.
Specifically, the device identification for the equipment of the response predetermined registration operation got, the triggering predetermined registration operation Timestamp, customer position information and CustID, the embodiment of the present invention obtains required content respectively from each character string, into And all the elements that will acquire are integrated, and include setting in the string of binary characters to obtain a string of strings of binary characters Standby mark, timestamp, customer position information and CustID, and then the embodiment of the present invention adds the string of binary characters using default Close algorithm is encrypted, for example carries out the encryption of sign sign test, to obtain encrypted character string.Certain embodiment of the present invention is also Monitoring information can be converted to octal character string, hexadecimal string etc., it is not limited in the embodiment of the present invention.
Step 103, according to the encrypted text string generation watermark.
Specifically, the embodiment of the present invention is first depending on one watermark information of encrypted text string generation;And then it obtains Watermark configuration information configures watermark information according to the watermark configuration information, generates watermark.
In the embodiment of the present invention, watermark information be device identification accessed after user to be carried out to predetermined registration operation every time, The encrypted character strings such as the timestamp, customer position information, user identifier of the predetermined registration operation are triggered, because triggering is pre- every time If the timestamp of operation is different, so the watermark information generated every time must be unique.
Watermark configuration information be by the configuration information of the final bandwagon effect of watermark information, for example including text size, position, Font color etc..
Step 104, the watermark is loaded onto the operation object of the predetermined registration operation.
For the watermark of generation, the embodiment of the present invention is directly loaded into the operation object of predetermined registration operation.
Watermark encrypting method provided in an embodiment of the present invention obtains prison after monitoring that user triggers predetermined registration operation first Control information, the monitoring information include the device identification of equipment for responding the predetermined registration operation, the triggering predetermined registration operation when Between stamp, customer position information and user identifier;And then a string of character strings are obtained based on the monitoring information got, and to the word Symbol string is encrypted to obtain encrypted character string;Further according to the encrypted text string generation watermark;Finally will The watermark is loaded onto the operation object of the predetermined registration operation.The embodiment of the present invention by monitoring user behavior, After user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protects user sensitive information, It prevents user sensitive information from revealing and being maliciously tampered, while information leakage source can be traced according to monitoring information, information is let out Dew behavior is had according to can seek.
For the ease of being more clearly understood that applicant will be with citing to watermark encrypting method provided in an embodiment of the present invention Watermark encrypting method provided in an embodiment of the present invention is described in more detail in mode.
As shown in Fig. 2, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method It is described so that the predetermined registration operation of user's triggering is screenshotss operation as an example, method may include:
Step 201, when monitoring that user carries out screenshotss operation, device identification, the touching of the equipment for carrying out screenshotss are obtained Hair executes timestamp, customer position information and the CustID of screenshotss operation.
By taking the online APP of certain company as an example, when which monitors that user carries out screenshotss operation, acquisition is carrying out screenshotss Device identification, the triggering of equipment execute the CustID of timestamp, customer position information and user in APP of screenshotss operation.
Step 202, based on get device identification, triggering execute screenshotss operation timestamp, customer position information with And CustID obtains a string of strings of binary characters.
Step 203, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 204, according to encrypted text string generation watermark information.
Step 205, watermark configuration information is obtained.
Step 206, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 207, the watermark is loaded onto screenshot figure layer.
In the embodiment of the present invention, user executes in the screenshot that screenshotss operate and carries the watermark, increases user The protection of sensitive information effectively prevents user sensitive information leakage and is maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 207
Step 208, top set shows the watermark in the screen of equipment for responding the screenshotss operation.
It is possible thereby to which user is allowed observably to notice the watermark.
Step 209, the screenshot with the watermark is pushed into customer service consulting interface, to prompt the user whether described in transmission Screenshot is seeked advice from.
Wherein when user, which determines, sends the screenshot, the screenshot with the watermark is sent to phase by the embodiment of the present invention It answers customer service to be seeked advice from, and saves the screenshot for having the watermark;When user, which determines, does not send the screenshot, the present invention is real Example is applied to save the screenshot with the watermark into equipment.
As shown in figure 3, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method It is described so that the predetermined registration operation of user's triggering is downloading file operation as an example, method may include:
Step 301, when monitoring that user is downloaded file operation, the equipment for being downloaded the equipment of file is obtained Mark, triggering execute timestamp, customer position information and the CustID of downloading file operation.
By taking the online APP of certain company as an example, when which monitors that user is downloaded file operation, acquisition is carried out down Device identification, the triggering of the equipment of published article part execute timestamp, customer position information and the user of downloading file operation at this The CustID of APP.
Step 302, the timestamp of downloading file operation, user location letter are executed based on device identification, the triggering got Breath and CustID obtain a string of strings of binary characters.
Step 303, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 304, according to encrypted text string generation watermark information.
Step 305, watermark configuration information is obtained.
Step 306, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 307, the watermark is loaded onto the every page in the file of user's downloading.
In order to guarantee to download the safety of file, watermark is respectively loaded in the file of user's downloading by the embodiment of the present invention Every page in, increase the protection of user sensitive information, effectively prevent user sensitive information leakage and be maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 307
Step 308, top set has shown the band of user's downloading in the screen of equipment for responding the downloading file operation State the file of watermark.
It is possible thereby to which user is allowed observably to notice the watermark in downloading file.
As shown in figure 4, it illustrates the flow chart of another watermark encrypting method provided in an embodiment of the present invention, this method It is described so that the predetermined registration operation of user's triggering is to upload file operation as an example, method may include:
Step 401, when monitoring that user carries out upload file operation, the equipment for carrying out the equipment of transmitting file is obtained Mark, triggering execute the text of the upper transmitting file of the timestamp for uploading file operation, customer position information, user identifier and user Part channel mark (channelID).
In the embodiment of the present invention, the file that user uploads can be picture, document, audio, video etc..
For the file that user uploads, the embodiment of the present invention needs to be labeled it to show this document for user's upload File.Specifically, by taking the online APP of certain company as an example, which can carry out channelID coding to the file that user uploads, should ChannelID coding is for indicating that file is the file that user uploads.
In embodiments of the present invention, when APP monitors that user carries out upload file operation, acquisition is carrying out transmitting file Equipment device identification, triggering execute upload the timestamp of file operation, customer position information, user APP CustID (i.e. user identifier) and APP are the channelID coding of this document configuration.
Step 402, the timestamp for uploading file operation, user location letter are executed based on device identification, the triggering got The channelID of the upper transmitting file of breath, CustID and user encodes to obtain a string of strings of binary characters.
Step 403, the encryption of sign sign test is carried out to the string of binary characters, obtains an encrypted character string.
Step 404, according to encrypted text string generation watermark information.
Step 405, watermark configuration information is obtained.
Step 406, the watermark information is configured according to the watermark configuration information, generates watermark.
Step 407, the watermark is loaded onto the every page in the file of user's upload.
In order to guarantee the safety of upper transmitting file, watermark is respectively loaded in the file of user's upload by the embodiment of the present invention Every page in, increase the protection of user sensitive information, effectively prevent user sensitive information leakage and be maliciously tampered.
Optionally, the embodiment of the present invention can also include: after step 407
Step 408, after the file for receiving user's upload, judge the number of the file load watermark.
Step 409, if the number of file load watermark is 1, it is determined that the file is the file that third party provides.
Specifically in embodiments of the present invention, when the number of file load watermark is 1, it was demonstrated that transmitting file is third party on this The file of offer, and not customer service offer or stayed evidence in APP, did not occurred or recorded in APP before transmitting file on this It crosses.So, if transmitting file is related with APP customer service consulting on this, it can be concluded that this file, can not for fraud, modification content As user's Claims Resolution foundation.
Step 410, if the number of file load watermark is greater than 1, the file is pushed away according to watermark encrypting rule is counter Monitoring information and the relevant information of the user whether be consistent.If consistent, execute step 411 and held if inconsistent Row step 412.
Step 411, the file for determining that the user uploads is true.
Step 412, the file for determining that the user uploads is untrue.
Specifically in embodiments of the present invention, when the number of file load watermark is greater than 1, it was demonstrated that transmitting file exists before on this APP occurred, and thus can be executed according to the anti-device identification for pushing away transmitting file on this of watermark encrypting rule, triggering and upload file operation Timestamp, customer position information, CustID and channelID coding, and when it really to upload with user to this document Device identification, triggering execute upload file operation timestamp, customer position information, CustID and channelID encode into Row compares, and checks whether the two is consistent, to judge the authenticity of the upper transmitting file of user.
Therefore the embodiment of the present invention provides information to whether source is APP true using the reversed verifying user of watermark encrypting rule Data effectively counter can be cheated, prevent the behaviors such as user's malice insurance fraud.
Further, anti-fraud result (the i.e. upper transmitting file of user of transmitting file on obtaining user of the embodiment of the present invention Authenticity result) after, can be that true subscriber data be uploaded to cloud storage service by anti-fraud result by artificial intelligence Device, and have a question to anti-fraud result, passes to artificial customer service by way of transmitting user CustID, by artificial customer service into Row user pays a return visit, the authenticity of the upper transmitting file of confirmation user.
Therefore the embodiment of the present invention is by the regular anti-relevant information for pushing to transmitting file of watermark encrypting, sentences on this basis The disconnected operation whether carried out at that time by user, to judge the authenticity of the upper transmitting file of user.And further by user Behavioural analysis can increase blacklist judgment rule, screen high-quality user for seat personnel.
Three above embodiment as screenshotss operation, downloading file operation and uploads text using the predetermined registration operation of user's triggering respectively It is described in detail for part operation, in the treatment process of three embodiments, the embodiment of the present invention passes through to user behavior It is monitored, after user triggers predetermined registration operation, increases encrypted watermark in the operation object of predetermined registration operation, protect use Family sensitive information prevents user sensitive information from revealing and being maliciously tampered, while in subsequent actual application, can basis Preset Encryption Algorithm is carried out reversely extrapolating the user information in watermark, and is compared with the user information advanced for, In this, as the important evidence of verifying subscriber data authenticity.Furthermore the embodiment of the present invention can also trace according to monitoring information and believe , there is according to can seek information leakage behavior in breath leakage source.
On the basis of previous embodiment, the embodiment of the present invention it is further proposed that, do not gone together by monitoring mechanism to user It is respectively that it adds different labels further directed to different behaviors after being monitored for (screenshotss, upper transmitting file, downloading file), it can Effectively to record different operation behavior of the user for operation object.For example, user to same file carried out screenshotss operation, under Carry file operation and upload file operation, then the embodiment of the present invention will be respectively its add screenshotss label, downloading label and on Pass label, all operation behaviors that record user carries out this document.
Specifically, as shown in figure 5, method can it illustrates another watermark encrypting method provided in an embodiment of the present invention To include:
It step 501, is described default according to the type of the predetermined registration operation after monitoring that user triggers predetermined registration operation Corresponding label is added in operation.
Wherein, a kind of type of predetermined registration operation corresponds to a kind of label, such as screenshotss operate corresponding screenshotss label, download file The corresponding downloading label of operation, upload file operation is corresponding to upload label.
Step 502, monitoring information is obtained, the monitoring information includes the equipment mark for the equipment for responding the predetermined registration operation Timestamp, customer position information, user identifier and the label known, trigger the predetermined registration operation.
Step 503, a string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain Encrypted character string.
The embodiment of the present invention is by the same device identification of label added for predetermined registration operation, the time of the triggering predetermined registration operation Stamp, customer position information and user identifier are integrated obtain a string of strings of binary characters together, and carry out to the string of binary characters The encryption of sign sign test, obtains encrypted character string.
Step 504, according to the encrypted text string generation watermark.
Step 505, the watermark is loaded onto the operation object of the predetermined registration operation.
The embodiment of the present invention is according to the different behaviors of user (screenshotss operation, uploads file operation at downloading file operation) Type adds corresponding label for the predetermined registration operation of user's triggering, and by the same device identification of the label, the triggering predetermined registration operation Timestamp, customer position information and user identifier integrate obtain a string of character strings together, and the character string encrypt To encrypted character string.Encrypted character string can not only protect user sensitive information at this time, further comprise user behavior Label information.The user behavior label information clearly has recorded user to all operation behaviors of operation object.
In the actual application of the embodiment of the present invention, the embodiment of the present invention can also use preset decryption method, Decryption obtains the watermark on file, to obtain each label in watermark and be obtained by each label corresponding time point Time shaft record, the authenticity of file is judged with this.
A kind of watermark is also provided based on a kind of watermark encrypting method provided in an embodiment of the present invention, the embodiment of the present invention above Encryption device, as described in Figure 6, watermark encrypting device includes:
Monitoring information acquiring unit 100, it is described for obtaining monitoring information after monitoring that user triggers predetermined registration operation Monitoring information includes the device identification of equipment for responding the predetermined registration operation, timestamp, the Yong Huwei of the triggering predetermined registration operation Confidence breath and user identifier;
Character string acquiring unit 200, for obtaining a string of character strings based on the monitoring information got, and to the character String is encrypted to obtain an encrypted character string;
Watermark generation unit 300, for according to the encrypted text string generation watermark;
Watermark loading unit 400, for the watermark to be loaded onto the operation object of the predetermined registration operation.
Wherein the character string acquiring unit 200 in the embodiment of the present invention may include, as shown in Figure 7:
Subelement 210 is integrated, the monitoring information for will acquire is integrated to obtain a string of strings of binary characters;
Encryption sub-unit operable 220 obtains described encrypted for carrying out the encryption of sign sign test to the string of binary characters Character string.
Watermark generation unit 300 in the embodiment of the present invention may include, as shown in Figure 8:
Watermark information generates subelement 310, for according to the encrypted text string generation watermark information;
Watermark configuration information obtains subelement 320, for obtaining watermark configuration information;
Watermark generates subelement 330, for being configured according to the watermark configuration information to the watermark information, generates Watermark.
Further, when the predetermined registration operation in the embodiment of the present invention is that screenshotss operate, the watermark loading unit 400 is specific For the watermark to be loaded onto screenshot figure layer.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include: the first top set unit and/or Push unit;Wherein,
First top set unit is used for the top set in the screen of equipment for responding the screenshotss operation and shows the watermark;
Push unit is used to pushing to the screenshot with the watermark into customer service consulting interface, to prompt the user whether to send The screenshot is seeked advice from.
Further, when the predetermined registration operation in the embodiment of the present invention is downloading file operation, the watermark loading unit 400 It is specifically used for, the watermark is loaded onto the every page in the file of user's downloading.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include: the second top set unit;
Second top set unit is used for the top set in the screen of equipment for responding the downloading file operation and shows user's downloading The file with the watermark.
Further, the predetermined registration operation in the embodiment of the present invention is when uploading file operation, and the monitoring information further includes The file channel mark of the upper transmitting file of user;The watermark loading unit 400 is specifically used for, and the watermark is loaded on user In every page in the file of biography.
At this time optionally, watermark encrypting device provided in an embodiment of the present invention can also include:
First judging unit, for after receiving the file that the user uploads, judging the file load watermark Number;
First determination unit, when for judging the number of file load watermark for 1 in first judging unit, really The fixed file is the file that third party provides;
Second judgment unit, when for judging that the number of the file load watermark is greater than 1 in first judging unit, Whether it is consistent according to the anti-monitoring information for pushing away the file of watermark encrypting rule and the relevant information of the user;
Second determination unit, for judging the monitoring information of the file with the user's in the second judgment unit When relevant information is consistent, the file for determining that the user uploads is true;
Third determination unit, for judging the monitoring information of the file with the user's in the second judgment unit When relevant information is inconsistent, the file for determining that the user uploads is untrue.
Still optionally further, watermark encrypting device provided in an embodiment of the present invention can also include:
Label adding unit, for according to the type of the predetermined registration operation, being after monitoring that user triggers predetermined registration operation The predetermined registration operation adds corresponding label;The monitoring information that the monitoring information acquiring unit 100 is got at this time further includes The label.
The watermark encrypting device includes processor and memory, and above-mentioned monitoring information acquiring unit 100, character string obtain Unit 200, watermark generation unit 300 and watermark loading unit 400 etc. are stored as program unit in memory, by handling Device executes above procedure unit stored in memory to realize corresponding function.
Include kernel in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can be set one Or more, watermark encrypting is realized by adjusting kernel parameter.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, if read-only memory (ROM) or flash memory (flash RAM), memory include that at least one is deposited Store up chip.
The embodiment of the invention provides a kind of storage mediums, are stored thereon with program, real when which is executed by processor The existing watermark encrypting method.
The embodiment of the invention provides a kind of processor, the processor is for running program, wherein described program operation Watermark encrypting method described in Shi Zhihang.
The embodiment of the invention provides a kind of electronic equipment, equipment includes processor, memory and stores on a memory And the program that can be run on a processor, processor perform the steps of when executing program
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding described preset The device identification of the equipment of operation, timestamp, customer position information and the user identifier for triggering the predetermined registration operation;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, the method also includes:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, the method also includes:
After receiving the file that the user uploads, the number of the file load watermark is judged;
If the number of the file load watermark is 1, it is determined that the file is the file that third party provides;
If the number of the file load watermark is greater than 1, believed according to the anti-monitoring for pushing away the file of watermark encrypting rule It ceases with whether the relevant information of the user is consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined Part is untrue.
Optionally, the method also includes:
After monitoring that user triggers predetermined registration operation, according to the type of the predetermined registration operation, added for the predetermined registration operation Corresponding label;
The monitoring information further includes the label at this time.
Equipment herein can be server, PC, PAD, mobile phone etc..
Present invention also provides a kind of computer program products, when executing on data processing equipment, are adapted for carrying out just The program of beginningization there are as below methods step: after monitoring that user triggers predetermined registration operation, monitoring information, the monitoring information are obtained Including respond the device identification of the equipment of the predetermined registration operation, the timestamp of the triggering predetermined registration operation, customer position information and User identifier;
A string of character strings are obtained based on the monitoring information got, and the character string are encrypted to obtain encrypted Character string;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
Optionally, described that a string of character strings are obtained based on the monitoring information got, and the character string is encrypted Obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
Optionally, described to include: according to the encrypted text string generation watermark
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
Optionally, the predetermined registration operation is screenshotss operation;The operation that the watermark is loaded onto the predetermined registration operation Include: in object
The watermark is loaded onto screenshot figure layer.
Optionally, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is carried out with prompting the user whether to send the screenshot Consulting.
Optionally, the predetermined registration operation is downloading file operation;It is described that the watermark is loaded onto the predetermined registration operation Include: in operation object
The watermark is loaded onto the every page in the file of user's downloading.
Optionally, the method also includes:
What top set display user downloaded in the screen of equipment for responding the downloading file operation has the watermark File.
Optionally, the predetermined registration operation is to upload file operation;The monitoring information further includes the text of the upper transmitting file of user Part channel mark;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
Optionally, the method also includes:
After receiving the file that the user uploads, the number of the file load watermark is judged;
If the number of the file load watermark is 1, it is determined that the file is the file that third party provides;
If the number of the file load watermark is greater than 1, believed according to the anti-monitoring for pushing away the file of watermark encrypting rule It ceases with whether the relevant information of the user is consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file that the user uploads is determined Really;
If the monitoring information of the file and the relevant information of the user are inconsistent, the text that the user uploads is determined Part is untrue.
Optionally, the method also includes:
After monitoring that user triggers predetermined registration operation, according to the type of the predetermined registration operation, added for the predetermined registration operation Corresponding label;
The monitoring information further includes the label at this time.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/ Or the forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable Jie The example of matter.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the present invention Form.It is deposited moreover, the present invention can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above is only the embodiment of the present invention, are not intended to restrict the invention.To those skilled in the art, The invention may be variously modified and varied.It is all within the spirit and principles of the present invention made by any modification, equivalent replacement, Improve etc., it should be included within scope of the presently claimed invention.

Claims (13)

1. a kind of watermark encrypting method characterized by comprising
After monitoring that user triggers predetermined registration operation, monitoring information is obtained, the monitoring information includes responding the predetermined registration operation The device identification of equipment, the triggering predetermined registration operation timestamp, customer position information and user identifier;
A string of character strings are obtained based on the monitoring information got, and the character string is encrypted to obtain encrypted character String;
According to the encrypted text string generation watermark;
The watermark is loaded onto the operation object of the predetermined registration operation.
2. the method according to claim 1, wherein described obtain a string of characters based on the monitoring information got String, and the character string is encrypted to obtain encrypted character string, comprising:
The monitoring information that will acquire is integrated to obtain a string of strings of binary characters;
The encryption of sign sign test is carried out to the string of binary characters, obtains the encrypted character string.
3. the method according to claim 1, wherein described according to the encrypted text string generation watermark packet It includes:
According to the encrypted text string generation watermark information;
Obtain watermark configuration information;
The watermark information is configured according to the watermark configuration information, generates watermark.
4. method according to claim 1-3, which is characterized in that the predetermined registration operation is screenshotss operation;It is described The watermark is loaded onto the operation object of the predetermined registration operation and includes:
The watermark is loaded onto screenshot figure layer.
5. according to the method described in claim 4, it is characterized in that, the watermark is loaded onto it in screenshot figure layer described Afterwards, the method also includes:
Top set shows the watermark in the screen of equipment for responding the screenshotss operation;And/or
Screenshot with the watermark is pushed into customer service consulting interface, is consulted with prompting the user whether to send the screenshot It askes.
6. method according to claim 1-3, which is characterized in that the predetermined registration operation is downloading file operation; Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's downloading.
7. according to the method described in claim 6, it is characterized in that, in the file that the watermark is loaded onto user's downloading In every page in after, the method also includes:
Top set shows the file with the watermark of user's downloading in the screen of equipment for responding the downloading file operation.
8. method according to claim 1-3, which is characterized in that the predetermined registration operation is to upload file operation; The monitoring information further includes the file channel mark of the upper transmitting file of user;
Include: in the operation object that the watermark is loaded onto the predetermined registration operation
The watermark is loaded onto the every page in the file of user's upload.
9. according to the method described in claim 8, it is characterized in that, in the file that the watermark is loaded onto user's upload In every page in after, the method also includes:
Judge the number for the file load watermark that the user uploads;
If the number for the file load watermark that the user uploads is 1, it is determined that the file that the user uploads mentions for third party The file of confession;
If the number for the file load watermark that the user uploads is greater than 1, pushed away on the user according to watermark encrypting rule is counter Whether the monitoring information of the file of biography and the relevant information of the user are consistent;
If the monitoring information of the file is consistent with the relevant information of the user, the file for determining that the user uploads is true It is real;
If the monitoring information of the file and the relevant information of the user are inconsistent, the file of user's upload is determined not Really.
10. method according to claim 1-3, which is characterized in that after monitoring that user triggers predetermined registration operation, The method also includes:
According to the type of the predetermined registration operation, corresponding label is added for the predetermined registration operation;
Wherein, institute's monitoring information further includes the label.
11. a kind of watermark encrypting device characterized by comprising
Monitoring information acquiring unit, for obtaining monitoring information, the monitoring information after monitoring that user triggers predetermined registration operation Including respond the device identification of the equipment of the predetermined registration operation, the timestamp of the triggering predetermined registration operation, customer position information and User identifier;
Character string acquiring unit is carried out for being obtained a string of character strings based on the monitoring information got, and to the character string Encryption obtains encrypted character string;
Watermark generation unit, for according to the encrypted text string generation watermark;
Watermark loading unit, for the watermark to be loaded onto the operation object of the predetermined registration operation.
12. a kind of storage medium, which is characterized in that be stored thereon with program, right is realized when described program is executed by processor It is required that watermark encrypting method described in any one of 1 to 10.
13. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to come any one of perform claim requirement 1 to 10 institute via the execution executable instruction The watermark encrypting method stated.
CN201810734471.3A 2018-07-06 2018-07-06 Watermark encryption method, device, medium and electronic equipment Active CN108985081B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810734471.3A CN108985081B (en) 2018-07-06 2018-07-06 Watermark encryption method, device, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810734471.3A CN108985081B (en) 2018-07-06 2018-07-06 Watermark encryption method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108985081A true CN108985081A (en) 2018-12-11
CN108985081B CN108985081B (en) 2022-02-01

Family

ID=64536247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810734471.3A Active CN108985081B (en) 2018-07-06 2018-07-06 Watermark encryption method, device, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108985081B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection
CN109767377A (en) * 2018-12-25 2019-05-17 航天信息股份有限公司 Retrospective image watermark adding method
CN109828810A (en) * 2018-12-28 2019-05-31 北京达佳互联信息技术有限公司 Screen shots intercept method, watermark adding method, device, equipment and medium
CN109901981A (en) * 2019-02-28 2019-06-18 北京智游网安科技有限公司 A kind of screenshotss leakage processing method, intelligent terminal and storage medium
CN109919823A (en) * 2019-02-13 2019-06-21 阿里巴巴集团控股有限公司 A kind of watermark generation method and device
CN110232263A (en) * 2019-05-24 2019-09-13 杭州世平信息科技有限公司 The method that a kind of pair of relational data is traced to the source
CN110245469A (en) * 2019-06-24 2019-09-17 苏州睿威博科技有限公司 Watermark generation method, watermark analytic method, device and the storage medium of webpage
CN110489944A (en) * 2019-07-17 2019-11-22 招联消费金融有限公司 Background picture generation method, device and the storage medium of information management system
CN110941813A (en) * 2019-12-02 2020-03-31 随锐科技集团股份有限公司 Intelligent terminal equipment control method and device and computer readable storage medium
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN111325652A (en) * 2018-12-17 2020-06-23 北京京东尚科信息技术有限公司 Information embedding method, information extracting method, information embedding device, information extracting device, information embedding equipment and computer readable storage medium
CN111950003A (en) * 2020-08-05 2020-11-17 北京每日优鲜电子商务有限公司 Method and device for generating unique identification information of user equipment and electronic equipment
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112653994A (en) * 2019-09-26 2021-04-13 中国移动通信集团重庆有限公司 Historical position management method and device and computing equipment
CN112800449A (en) * 2021-02-03 2021-05-14 网易(杭州)网络有限公司 Encryption method and device for page screenshot, electronic equipment and storage medium
EP4135279A4 (en) * 2020-05-28 2024-01-10 Siemens Ag Information leakage detection method and apparatus, and computer-readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN107862647A (en) * 2017-11-15 2018-03-30 平安科技(深圳)有限公司 Display methods, device, computer equipment and the storage medium of screen watermark

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN105631359A (en) * 2015-12-23 2016-06-01 北京奇虎科技有限公司 Control method and device of webpage operation
CN106407820A (en) * 2016-08-31 2017-02-15 江苏中威科技软件系统有限公司 Method and system for preventing document from being tampered and leaked through watermark encryption
CN107862647A (en) * 2017-11-15 2018-03-30 平安科技(深圳)有限公司 Display methods, device, computer equipment and the storage medium of screen watermark

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111325652A (en) * 2018-12-17 2020-06-23 北京京东尚科信息技术有限公司 Information embedding method, information extracting method, information embedding device, information extracting device, information embedding equipment and computer readable storage medium
CN109767377A (en) * 2018-12-25 2019-05-17 航天信息股份有限公司 Retrospective image watermark adding method
CN109828810A (en) * 2018-12-28 2019-05-31 北京达佳互联信息技术有限公司 Screen shots intercept method, watermark adding method, device, equipment and medium
CN109726348A (en) * 2018-12-29 2019-05-07 上海携程商务有限公司 The method and system of webpage watermark protection
CN109919823A (en) * 2019-02-13 2019-06-21 阿里巴巴集团控股有限公司 A kind of watermark generation method and device
CN109901981A (en) * 2019-02-28 2019-06-18 北京智游网安科技有限公司 A kind of screenshotss leakage processing method, intelligent terminal and storage medium
CN110232263A (en) * 2019-05-24 2019-09-13 杭州世平信息科技有限公司 The method that a kind of pair of relational data is traced to the source
CN110245469A (en) * 2019-06-24 2019-09-17 苏州睿威博科技有限公司 Watermark generation method, watermark analytic method, device and the storage medium of webpage
CN110489944A (en) * 2019-07-17 2019-11-22 招联消费金融有限公司 Background picture generation method, device and the storage medium of information management system
CN112653994A (en) * 2019-09-26 2021-04-13 中国移动通信集团重庆有限公司 Historical position management method and device and computing equipment
CN111191414A (en) * 2019-11-11 2020-05-22 苏州亿歌网络科技有限公司 Page watermark generation method, identification method, device, equipment and storage medium
CN110941813A (en) * 2019-12-02 2020-03-31 随锐科技集团股份有限公司 Intelligent terminal equipment control method and device and computer readable storage medium
EP4135279A4 (en) * 2020-05-28 2024-01-10 Siemens Ag Information leakage detection method and apparatus, and computer-readable medium
CN111950003A (en) * 2020-08-05 2020-11-17 北京每日优鲜电子商务有限公司 Method and device for generating unique identification information of user equipment and electronic equipment
CN112016900A (en) * 2020-09-02 2020-12-01 中国平安财产保险股份有限公司 Electronic policy information security management and control method and system
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112616056B (en) * 2020-12-18 2023-04-07 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112800449A (en) * 2021-02-03 2021-05-14 网易(杭州)网络有限公司 Encryption method and device for page screenshot, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108985081B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
CN108985081A (en) A kind of watermark encrypting method, apparatus, medium and electronic equipment
Chu et al. Security and privacy analyses of internet of things children’s toys
CN104484599B (en) A kind of behavior treating method and apparatus based on application program
Neyaz et al. Security, privacy and steganographic analysis of FaceApp and TikTok
CN110598442A (en) Sensitive data self-adaptive desensitization method and system
CN108537314A (en) Product marketing system and method based on Quick Response Code
CN105871805A (en) Anti-stealing-link method and device
CN111191195A (en) Method and device for protecting APK
CN109040134A (en) A kind of design method and relevant apparatus of information encryption
CN116662941B (en) Information encryption method, device, computer equipment and storage medium
US10536276B2 (en) Associating identical fields encrypted with different keys
CN110598377A (en) Software serial number management method and device based on block chain
CN107342966A (en) Authority credentials distribution method and device
CN108416224A (en) A kind of data encryption/decryption method and device
Tahiri Mastering mobile forensics
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
Wahsheh et al. Evaluating Security, Privacy and Usability Features of QR Code Readers.
CN110247918A (en) Number cochain method and its equipment are shaken applied to block chain
CN113792307A (en) Seal management method and device and electronic equipment
Vella et al. D-Cloud-Collector: Admissible Forensic Evidence from Mobile Cloud Storage
CN107026841B (en) Method and device for publishing works in network
CN106603244B (en) A kind of digital literary property protection method and device
CN112800467B (en) Online model training method, device and equipment based on data privacy protection
CN115118520A (en) Data processing method and device and server
CN111582954B (en) False data identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Floor 36, Zheshang Building, No. 718 Jianshe Avenue, Jiang'an District, Wuhan, Hubei 430019

Patentee after: TK.CN INSURANCE Co.,Ltd.

Patentee after: TAIKANG INSURANCE GROUP Co.,Ltd.

Address before: Taikang Life Building, 156 fuxingmennei street, Xicheng District, Beijing 100031

Patentee before: TAIKANG INSURANCE GROUP Co.,Ltd.

Patentee before: TK.CN INSURANCE Co.,Ltd.