CN109446761A - A kind of information security processing method, storage medium and terminal device - Google Patents

A kind of information security processing method, storage medium and terminal device Download PDF

Info

Publication number
CN109446761A
CN109446761A CN201811237563.7A CN201811237563A CN109446761A CN 109446761 A CN109446761 A CN 109446761A CN 201811237563 A CN201811237563 A CN 201811237563A CN 109446761 A CN109446761 A CN 109446761A
Authority
CN
China
Prior art keywords
watermark
user
terminal device
character
resolution ratio
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811237563.7A
Other languages
Chinese (zh)
Other versions
CN109446761B (en
Inventor
谭曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Hengjun Software Development Co ltd
Original Assignee
CHANGSHA YUBANG SOFTWARE DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHANGSHA YUBANG SOFTWARE DEVELOPMENT Co Ltd filed Critical CHANGSHA YUBANG SOFTWARE DEVELOPMENT Co Ltd
Priority to CN201811237563.7A priority Critical patent/CN109446761B/en
Publication of CN109446761A publication Critical patent/CN109446761A/en
Application granted granted Critical
Publication of CN109446761B publication Critical patent/CN109446761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Multimedia (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of information security processing method, computer readable storage medium and terminal devices, the described method includes: when terminal device listens to user and logs in, the user identifier and login time of the user are obtained, and watermark character is generated according to the user identifier and login time;The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries the watermark view.The user identifier and login time that the present invention passes through acquisition user, and the user identifier and login time are converted into Hex character and are made into watermark superposition to the interface containing debtor's information, user is avoided to reveal debtor's information screenshotss or by way of taking pictures, to improve the safety of information.

Description

A kind of information security processing method, storage medium and terminal device
Technical field
The present invention relates to information security fields, and in particular to a kind of information security processing method, storage medium and terminal Equipment.
Background technique
During asset management and collection, inevitably it is related to the individual privacy data of debtor, generally comprises The personally identifiable information of debtor, contact method and debt situation etc..Therefore, the process linked up in collection company and debtor In, how to guarantee the validity and compliance of operation, is very big challenge.And ensure information security in existing collection system Method is to be blocked external interface by customization office computer, and system accesses network by a kind of Secure Local Area Network, shields file And the upload and transmission of information.But existing collection system can not prevent the individual privacy information of debtor from passing through screenshotss and bat According to mode be leaked.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the deficiencies of the prior art, providing a kind of information security processing side Method, storage medium and terminal device, to prevent the individual privacy information of debtor from being let out by screenshotss or in a manner of taking pictures Dew.
To solve the above problems, The technical solution adopted by the invention is as follows:
A kind of information security processing method comprising:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained, and according to described User identifier and login time generate watermark character;
The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;
The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries The watermark view, wherein the interface image includes at least debtor's information interface.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user User identifier and login time, and watermark character is generated according to the user identifier and login time and is specifically included:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained;
The user identifier and login time are converted into hex character respectively, and by the hex character being converted to according to default Rule combination is to generate the watermark character.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user User identifier and login time specifically include:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre- If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase Association.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user User identifier and login time further include:
When not finding user identifier, identified for user's distributing user, and by the user identifier and user's account It is number associated;
User's login time is obtained, and the user identifier is associated with the login time.
The information security processing method, wherein it is described obtain terminal device resolution ratio, and according to the resolution ratio with And watermark character generates watermark view and specifically includes:
The resolution ratio of terminal device and the first size of watermark character are obtained, and is calculated according to the resolution ratio and first size The number of watermark character, wherein the first size includes height and width;
The watermark character of the number is arranged according to array to generate watermark view, wherein the second of the watermark view Size matches with the resolution ratio.
The information security processing method, wherein the first of the resolution ratio for obtaining terminal device and watermark character Size, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number is not up to watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio Height zoom factor;
When watermark columns is not up to watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size Number.
The information security processing method, wherein the first of the resolution ratio for obtaining terminal device and watermark character Size, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Obtain the resolution ratio of the terminal device and the font information of preset watermark character, wherein the font information packet Include font size and font;
The first size of the watermark character is determined according to the font information, and according to the resolution ratio and first size meter Calculate the number of the open ended watermark character of the display interface.
The information security processing method, wherein the display interface that the watermark view is superimposed to terminal device On, it is specifically included so that the interface image that display interface is shown carries the watermark view:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described Watermark recovery is added on the interface image.
A kind of computer readable storage medium, wherein the computer-readable recording medium storage has one or more Program, one or more of programs can be executed by one or more processor, to realize that content as above is any described Step in information security processing method.
A kind of terminal device, wherein include: processor, memory and communication bus;Being stored on the memory can quilt The computer-readable program that the processor executes;
The communication bus realizes the connection communication between processor and memory;
The processor realizes content as above any information security processing method when executing the computer-readable program In step.
The utility model has the advantages that compared with prior art, the present invention provides a kind of information security processing method, storage medium and Terminal device, which comprises when terminal device, which listens to user, to be logged in, obtain the user identifier of the user and step on It records the time, and watermark character is generated according to the user identifier and login time;The resolution ratio of acquisition terminal device, and according to The resolution ratio and watermark character generate watermark view;The watermark view is superimposed on the display interface of terminal device, So that the interface image that display interface is shown carries the watermark view, wherein the interface image includes at least debtor Information interface.The present invention according to the watermark recovery of the user identifier of user and login time generation by will be added to containing debt The interface of people's information by screenshotss or can be taken pictures with encrypting to the interface containing debtor's information to avoid user in this way Mode reveal debtor's information, improve the safety of debtor's information.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of information security processing method provided by the invention.
Fig. 2 is the flow chart of step S10 in one embodiment of information security processing method provided by the invention.
Fig. 3 is the flow chart of step S20 in one embodiment of information security processing method provided by the invention.
Fig. 4 is the flow chart of step S21 in one embodiment of information security processing method provided by the invention.
Fig. 5 is a kind of structure principle chart of terminal device preferred embodiment provided by the invention.
Specific embodiment
The present invention provides information security processing method, storage medium and terminal device, to make the purpose of the present invention, technology Scheme and effect are clearer, clear, and the present invention is described in more detail as follows in conjunction with drawings and embodiments.It should manage Solution, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
With reference to the accompanying drawing, by the description of the embodiment, further explanation of the contents of the invention are made.
A kind of information security processing method is present embodiments provided, as shown in Figure 1, which comprises
S10, when terminal device listens to user and logs in, obtain the user identifier and login time of the user, and according to The user identifier and login time generate watermark character.
Specifically, the user identifier is the unique identification for being in advance user's distribution, and the user identifier is deposited in advance It is stored in subscriber identity data library, wherein the subscriber identity data library can store in the terminal device, can also be pre- It is first stored in the background server being connect with the terminal device.The user identifier is associated with the user account of user, In order to get the user identifier according to the user account.That is, when terminal device listens to user and logs in, The user account inputted when the user logs in is extracted, and according to the user account in preset subscriber identity data Ku Neicha Its corresponding user identifier is looked for, to obtain the corresponding user identifier of the user.
Further, the login time is time of user when logining successfully, can by user log at The current time of system is obtained when function and is determined, and after getting the login time, when the login can be logged in Between it is associated with the user identifier, in order to know the login time of the user according to the user identifier.That is, When user logins successfully, the current time of system is obtained as login time, in order to determine it according to the user identifier Corresponding login time.Currently, in practical application, the login time is also possible to terminal device and shows need to be arranged watermark The time at interface can determine user and the login time for logging in the interface by the watermark character in this way, improve root The accuracy of user is determined according to watermark character.
In addition, the user identifier is stored in presetting database, when user logins successfully, need according to the user User account search its corresponding user identifier.Correspondingly, it is described when terminal device listens to user and logs in, described in acquisition The user identifier and login time of user specifically includes:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre- If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase Association.
When not finding user identifier, identified for user's distributing user, and by the user identifier and the use Family account is associated;
User's login time is obtained, and the user identifier is associated with the login time.
Specifically, the subscriber identity data library is to preset, for storing user identifier.The subscriber identity data Inventory is stored in terminal device, and user identifier is to the corresponding user cipher device of the user account, in this way can be to avoid user The user identifier for voluntarily modifying its own improves the safety of watermark character.In addition, when not finding user identifier, for institute State user account and distribute unique user identifier, and by the user account it is associated with the user identifier after be stored in user Identification database.Certainly, in practical applications, in order to improve information security row, the user account can be Real Name, work Number and ID card No. etc..
Simultaneously in this embodiment, the watermark character uses hex character style, i.e., when getting user identifier and logging in Between after, need user identifier and login time being converted to hex character.Correspondingly, as shown in Fig. 2, described when terminal device is supervised When hearing that user logs in, the user identifier and login time of the user are obtained, and according to the user identifier and login Time generates watermark character and specifically includes:
S11, when terminal device listen to user log in when, obtain the user identifier and login time of the user;
S12, the user identifier and login time be converted into hex character respectively, and by the hex character being converted to according to Preset rules are combined to generate the watermark character.
Specifically, the preset rules are pre-set, are by the corresponding Hex character of user identifier and login time pair The Hex character adding answered generates the rule of watermark character.Wherein, the preset rules can be that the login time is corresponding In Hex character radom insertion to the corresponding Hex character of the user identifier, it can be the corresponding Hex character of user identifier Hex character corresponding with login time is arranged according to user identifier+login time sequence, can also be user identifier pair The corresponding Hex character of the Hex character and login time answered is arranged according to login time+user identifier sequence.In the present embodiment, The preset rules are preferably by the corresponding Hex character radom insertion of the login time to the corresponding Hex of the user identifier In character.For example, the user identifier is 15084652, the Hex character being converted to is E62C6C.The login time is 180726(2018 July 26), the Hex character being converted to is 2C1F6, then the watermark character is E622C1F6C6C.The insertion rule of other different insertion sequences can also be arranged in the preset rules.By the way that user is corresponding User identifier and specific login time are combined together, and form watermark character, the debt in the form of in leakage screenshot or photo When people's information, leakage source can be traced.
S20, the resolution ratio for obtaining terminal device, and watermark view is generated according to the resolution ratio and watermark character.
Specifically, the watermark view is shown on the display interface of the terminal device, and the covering of watermark view is whole A display interface.So, several watermark characters can be distributed on the watermark view.The quantity of the watermark character can root It is determined according to the resolution ratio of the terminal device and the size of watermark character, wherein the size of the watermark character is around institute State the rectangular size of minimum of watermark character.
Illustratively, as shown in figure 3, the resolution ratio for obtaining terminal device, and according to the resolution ratio and watermark Character generates watermark view and specifically includes:
The first size of S21, the resolution ratio for obtaining terminal device and watermark character, and according to the resolution ratio and first size Calculate the number of watermark character, wherein the first size includes height and width;
S22, the watermark character of the number is arranged according to array to generate watermark view, wherein the watermark view Second size matches with the resolution ratio.
Specifically, second size includes width and height, and second size and the resolution ratio match finger It is that the watermark view width is equal with the width of the resolution ratio, the height phase of the watermark view altitude and the resolution ratio Deng so that the watermark view covers the display interface of the terminal device.The first size includes the watermark character Height and width, be referred to as height and width, wherein the first size of watermark character that different user generates may not Together.In the present embodiment, the first size is the rectangular height of minimum and width that the watermark character is surrounded by obtaining Degree obtains.The length being located on the resolution width direction that the width refers to, the height refer to being located at the resolution Length in rate short transverse.Here the width that the first size includes is denoted as the first width comprising height be denoted as First height.
Further, after the resolution ratio for getting the terminal device, display interface can be determined according to resolution ratio Second width and the second height, and watermark columns can be determined according to second width and the first width, it is high according to first Degree and the second height can determine watermark line number, can determine watermark number according to the columns and line number.In the present embodiment In, it can be rounded by the quotient to the second width and the first width and the second height and the first height respectively to obtain watermark columns With watermark line number;The watermark character is arranged according to watermark columns and watermark line number according to array format to generate water again Print view.
Further, in order to improve the area coverage of the watermark character that the watermark view carries, the watermark view is constituted Watermark character array line number and columns be both needed to be more than or equal to corresponding threshold value.Correspondingly, as shown in figure 4, The first size of the resolution ratio for obtaining terminal device and watermark character, and calculated according to the resolution ratio and first size The number of watermark character specifically includes:
The font information of S211, the resolution ratio for obtaining the terminal device and preset watermark character, wherein the font letter Breath includes font size and font;
S212, the first size that the watermark character is determined according to the font information, and according to the resolution ratio and first Size calculates the number of the open ended watermark character of the display interface.
Specifically, the font information is set in terminal device in advance, the font information include font size with And font, in the present embodiment, the font information is preferably refined black No. 18 of Microsoft.Refined black No. 18 of Microsoft has corresponding length Degree and width, therefore can be after obtaining the resolution ratio of terminal device, it can/width wide by resolution ratio and resolution ratio High/height, is respectively rounded two quotient, and what is obtained is exactly watermark line number and watermark columns, wherein the watermark line number with The product of watermark columns is the number of the open ended watermark character of the display interface.
Illustratively, the first size of the resolution ratio for obtaining terminal device and watermark character, and according to described point The number that resolution and first size calculate watermark character specifically includes:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number does not reach watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio Height zoom factor;
When watermark columns does not reach watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size Number.
Specifically, watermark line number threshold value is the minimum value for the watermark line number for including in the display interface, in this implementation In example, the watermark line number threshold value is preferably 3, that is to say, that at least to include 3 row watermarks in display interface.The watermark Columns threshold value is the minimum value for the watermark columns for including, in the present embodiment, the watermark columns threshold in the display interface Value preferably 4, that is to say, that at least to include 4 column watermarks in display interface.
Further, if watermark line number is not up to watermark line number threshold value, pass through watermark line number threshold value, width and resolution ratio Width calculates width zoom factor, wherein the width zoom factor is (resolution width-width)/4, according to being calculated The width zoom factor width of the watermark character is zoomed in and out.If watermark columns is not up to watermark columns threshold Value, passes through watermark columns threshold value, height and resolution height computed altitude zoom factor, wherein the height zoom factor For (resolution height-height)/3, carried out according to height of the height zoom factor being calculated to the watermark character Scaling.
Simultaneously in this embodiment, the third size includes the width and height of the watermark character after scaling processing, It is referred to as third watermark width and third watermark height.Watermark character number is calculated according to the third size and resolution ratio Method is identical with the method for calculating watermark character number according to the first size and resolution ratio, and which is not described herein again.
S30, the watermark view is superimposed on the display interface of terminal device, so that the interface that display interface is shown Image carries the watermark view, wherein the interface image includes at least debtor's information interface.
Specifically, the watermark view is arranged by the watermark character according to the watermark line number and watermark columns being calculated Composition, and the second size of the watermark view matches with the resolution ratio.The watermark view the second size and In the case that the resolution ratio matches, the watermark view is superimposed to the display page of terminal device.In this way in terminal device The display page in comprising by watermark view, wherein show at least include debtor's information interface on the interface image of the page. That is, in mobile terminal it is any include debtor's information the display page on, be all superimposed with watermark corresponding to user View, to prevent user from revealing debtor's information by screenshot or in a manner of taking pictures, to improve the safety of debtor's information Property.
Illustratively, described that the watermark view is superimposed on the display interface of terminal device, so that display interface The interface image of display carries the watermark view and specifically includes:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described Watermark recovery is added on the interface image.
Specifically, when the display interface of terminal device is nondebtor's information interface, the watermark interface is hidden in institute It states in display interface, does not influence display and the copy of current display interface information;When the display interface of terminal device is debtor When information interface, the watermark interface is placed in front of the display interface, using image layered superimposing technique, is on display interface Existing watermark character.In this way, the watermark information of user being tracked is superimposed on debtor's information interface, prevent from using The information of debtor is revealed at family screenshot or by way of taking pictures, and improves debtor's information security.
Further, when the display interface of terminal device updates interface image, watermark figure is generated according to the watermark interface Case, and the watermark recovery is added on the interface image.Wherein, the interface image includes at least debtor's information bound Face.Specifically, when the display interface of terminal device updates interface image, if updated interface image includes debtor's information bound Face then the watermark interface generates watermark recovery, and the watermark recovery is added on the interface image, therefore described There is watermark recovery on display interface including debtor's information interface.If updated interface does not include debtor's information The operation of addition watermark recovery is not done at interface then to the display interface.
It is described the present invention also provides a kind of computer readable storage medium based on the method for above- mentioned information safe handling Computer can storage medium have one or more programs, one or more of programs can be held by one or more processors Row, the step of to realize information security processing method as described in above-described embodiment.
Based on above- mentioned information security processing, the present invention also provides a kind of terminal devices, as shown in Figure 5, comprising: this Invention additionally provides a kind of application server comprising at least one processor (processor) 20;Display screen 21;And it deposits Reservoir (memory) 22 can also include communication interface (Communications Interface) 23 and bus 24.Wherein, locate Reason device 20, display screen 21, memory 22 and communication interface 23 can complete mutual communication by bus 24.Display screen 21 is set It is set to preset user in display initial setting mode and guides interface.Communication interface 23 can transmit information.Processor 20 can be with The logical order in memory 22 is called, to execute the method in above-described embodiment.
In addition, the logical order in above-mentioned memory 22 can be realized and as only by way of SFU software functional unit Vertical product when selling or using, can store in a computer readable storage medium.
Memory 22 is used as a kind of computer readable storage medium, and it is executable to may be configured as storage software program, computer Program, such as the corresponding program instruction of method or module in the embodiment of the present disclosure.Processor 20 is stored in memory by operation Software program, instruction or module in 22, thereby executing functional application and data processing, i.e. side in realization above-described embodiment Method.
Memory 22 may include storing program area and storage data area, wherein storing program area can storage program area, extremely Application program needed for a few function;Storage data area, which can be stored, uses created data etc. according to terminal device.This Outside, memory 22 may include high-speed random access memory, can also include nonvolatile memory.For example, USB flash disk, movement Hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), a variety of media that can store program code such as magnetic or disk, are also possible to transitory memory medium.
In addition, a plurality of instruction processing unit in above-mentioned storage medium and mobile terminal loads and the detailed process executed exists It has been described in detail in the above method, has just no longer stated one by one herein.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of information security processing method, characterized in that it comprises:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained, and according to described User identifier and login time generate watermark character;
The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;
The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries The watermark view, wherein the interface image includes at least debtor's information interface.
2. information security processing method according to claim 1, which is characterized in that described to be stepped on when terminal device listens to user When record, the user identifier and login time of the user are obtained, and water is generated according to the user identifier and login time Lettering symbol specifically includes:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained;
The user identifier and login time are converted into hex character respectively, and by the hex character being converted to according to default Rule combination is to generate the watermark character.
3. information security processing method according to claim 2, which is characterized in that described to be stepped on when terminal device listens to user When record, the user identifier and login time for obtaining the user are specifically included:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre- If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase Association.
4. information security processing method according to claim 2, which is characterized in that described to be stepped on when terminal device listens to user When record, the user identifier and login time of the user are obtained further include:
When not finding user identifier, identified for user's distributing user, and by the user identifier and user's account It is number associated;
User's login time is obtained, and the user identifier is associated with the login time.
5. information security processing method according to claim 1, which is characterized in that the resolution ratio for obtaining terminal device, And watermark view is generated according to the resolution ratio and watermark character and is specifically included:
The resolution ratio of terminal device and the first size of watermark character are obtained, and is calculated according to the resolution ratio and first size The number of watermark character, wherein the first size includes height and width;
The watermark character of the number is arranged according to array to generate watermark view, wherein the second of the watermark view Size matches with the resolution ratio.
6. information security processing method according to claim 5, which is characterized in that it is described obtain terminal device resolution ratio with And the first size of watermark character, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number is not up to watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio Height zoom factor;
When watermark columns is not up to watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size Number.
7. according to the information security processing method of claim 5 or 6, which is characterized in that the resolution for obtaining terminal device The first size of rate and watermark character, and specifically wrapped according to the number that the resolution ratio and first size calculate watermark character It includes:
Obtain the resolution ratio of the terminal device and the font information of preset watermark character, wherein the font information packet Include font size and font;
The first size of the watermark character is determined according to the font information, and according to the resolution ratio and first size meter Calculate the number of the open ended watermark character of the display interface.
8. information security processing method according to claim 1, which is characterized in that described that the watermark view is superimposed to end On the display interface of end equipment, specifically included so that the interface image that display interface is shown carries the watermark view:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described Watermark recovery is added on the interface image.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1~8 Step in information security processing method described in any one.
10. a kind of terminal device characterized by comprising processor, memory and communication bus;It is stored on the memory There is the computer-readable program that can be executed by the processor;
The communication bus realizes the connection communication between processor and memory;
The processor realizes the information security as described in claim 1-8 any one when executing the computer-readable program Step in processing method.
CN201811237563.7A 2018-10-23 2018-10-23 Information security processing method, storage medium and terminal equipment Active CN109446761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811237563.7A CN109446761B (en) 2018-10-23 2018-10-23 Information security processing method, storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811237563.7A CN109446761B (en) 2018-10-23 2018-10-23 Information security processing method, storage medium and terminal equipment

Publications (2)

Publication Number Publication Date
CN109446761A true CN109446761A (en) 2019-03-08
CN109446761B CN109446761B (en) 2022-04-26

Family

ID=65548303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811237563.7A Active CN109446761B (en) 2018-10-23 2018-10-23 Information security processing method, storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN109446761B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN113542206A (en) * 2020-11-27 2021-10-22 腾讯科技(深圳)有限公司 Image processing method and device and computer readable storage medium
CN113630606A (en) * 2020-05-07 2021-11-09 百度在线网络技术(北京)有限公司 Video watermark processing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996206A (en) * 2009-08-11 2011-03-30 阿里巴巴集团控股有限公司 Method, device and system for displaying web page
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996206A (en) * 2009-08-11 2011-03-30 阿里巴巴集团控股有限公司 Method, device and system for displaying web page
CN102622560A (en) * 2011-01-27 2012-08-01 昆山玛斯特软件有限公司 Method for preventing electronic secret documents from being divulged in shooting or printing mode
CN102799398A (en) * 2012-06-27 2012-11-28 用友软件股份有限公司 Table body scaling device and table body scaling method
CN104517046A (en) * 2014-12-24 2015-04-15 江苏敏捷科技股份有限公司 Screen display data protection method
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990800A (en) * 2019-11-26 2020-04-10 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN110990800B (en) * 2019-11-26 2022-04-12 合肥高维数据技术有限公司 Watermark processing method and system based on application program
CN111488559A (en) * 2020-04-10 2020-08-04 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN111488559B (en) * 2020-04-10 2023-03-10 腾讯科技(深圳)有限公司 Webpage watermark generation method and device, computer equipment and storage medium
CN113630606A (en) * 2020-05-07 2021-11-09 百度在线网络技术(北京)有限公司 Video watermark processing method and device, electronic equipment and storage medium
CN113630606B (en) * 2020-05-07 2024-04-19 百度在线网络技术(北京)有限公司 Video watermark processing method, video watermark processing device, electronic equipment and storage medium
CN113542206A (en) * 2020-11-27 2021-10-22 腾讯科技(深圳)有限公司 Image processing method and device and computer readable storage medium
CN113542206B (en) * 2020-11-27 2023-07-04 腾讯科技(深圳)有限公司 Image processing method, device and computer readable storage medium

Also Published As

Publication number Publication date
CN109446761B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
CN109446761A (en) A kind of information security processing method, storage medium and terminal device
CN105577684B (en) Method, server-side, client and the system of anti-crawler capturing
CN109815742B (en) Data desensitization method and device
US8955143B1 (en) Use of decoy data in a data store
CN110166465B (en) Access request processing method, device, server and storage medium
KR20180082504A (en) Methods and equipment for application information risk management
CN110210883A (en) The recognition methods of team control account, device, server and storage medium
CN107943949A (en) A kind of method and server of definite web crawlers
KR102111192B1 (en) Method and apparatus for identity information verification
CN110245469A (en) Watermark generation method, watermark analytic method, device and the storage medium of webpage
CN108229158A (en) A kind of guard method of the user privacy information stored in Android
CN107948199B (en) Method and device for rapidly detecting terminal shared access
CN103701600A (en) Input validation method and device
CN109847365A (en) A kind of anti-cheating method and system towards the application of block chain
CN106934245A (en) A kind of DICOM image display methods, device and system
CN109472847A (en) A kind of image processing method, system and terminal device
CN108809913A (en) The method, apparatus and equipment of data desensitization
CN104022913A (en) Test method and device for data cluster
CN106992975A (en) The recognition methods of malice network address and device
DE112021005364T5 (en) DEFENSE TARGETED DATABASE ATTACKS THROUGH DYNAMIC HONEYPOT DATABASE RESPONSE GENERATION
CN108733374A (en) Application program homepage development approach and terminal device
CN111309578A (en) Method and device for identifying object
CN113434588B (en) Data mining analysis method and device based on mobile communication ticket
CN105988998B (en) Relational network construction method and device
CN116305294B (en) Data leakage tracing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220928

Address after: Room 501-2, 5th Floor, Building 7, Xincheng Science and Technology Park, No. 588, Yuelu West Avenue, High-tech Development Zone, Changsha City, Hunan Province 410000

Patentee after: Hunan Hengjun Software Development Co.,Ltd.

Address before: 6 / F, building 7, Xincheng Science Park, 588 Yuelu West Avenue, high tech Development Zone, Changsha City, Hunan Province, 410205

Patentee before: CHANGSHA YUBANG SOFTWARE DEVELOPMENT Co.,Ltd.

TR01 Transfer of patent right