CN109446761A - A kind of information security processing method, storage medium and terminal device - Google Patents
A kind of information security processing method, storage medium and terminal device Download PDFInfo
- Publication number
- CN109446761A CN109446761A CN201811237563.7A CN201811237563A CN109446761A CN 109446761 A CN109446761 A CN 109446761A CN 201811237563 A CN201811237563 A CN 201811237563A CN 109446761 A CN109446761 A CN 109446761A
- Authority
- CN
- China
- Prior art keywords
- watermark
- user
- terminal device
- character
- resolution ratio
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 32
- 238000011084 recovery Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 11
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 2
- 238000000034 method Methods 0.000 abstract description 15
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Technology Law (AREA)
- General Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Multimedia (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of information security processing method, computer readable storage medium and terminal devices, the described method includes: when terminal device listens to user and logs in, the user identifier and login time of the user are obtained, and watermark character is generated according to the user identifier and login time;The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries the watermark view.The user identifier and login time that the present invention passes through acquisition user, and the user identifier and login time are converted into Hex character and are made into watermark superposition to the interface containing debtor's information, user is avoided to reveal debtor's information screenshotss or by way of taking pictures, to improve the safety of information.
Description
Technical field
The present invention relates to information security fields, and in particular to a kind of information security processing method, storage medium and terminal
Equipment.
Background technique
During asset management and collection, inevitably it is related to the individual privacy data of debtor, generally comprises
The personally identifiable information of debtor, contact method and debt situation etc..Therefore, the process linked up in collection company and debtor
In, how to guarantee the validity and compliance of operation, is very big challenge.And ensure information security in existing collection system
Method is to be blocked external interface by customization office computer, and system accesses network by a kind of Secure Local Area Network, shields file
And the upload and transmission of information.But existing collection system can not prevent the individual privacy information of debtor from passing through screenshotss and bat
According to mode be leaked.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the deficiencies of the prior art, providing a kind of information security processing side
Method, storage medium and terminal device, to prevent the individual privacy information of debtor from being let out by screenshotss or in a manner of taking pictures
Dew.
To solve the above problems, The technical solution adopted by the invention is as follows:
A kind of information security processing method comprising:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained, and according to described
User identifier and login time generate watermark character;
The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;
The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries
The watermark view, wherein the interface image includes at least debtor's information interface.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user
User identifier and login time, and watermark character is generated according to the user identifier and login time and is specifically included:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained;
The user identifier and login time are converted into hex character respectively, and by the hex character being converted to according to default
Rule combination is to generate the watermark character.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user
User identifier and login time specifically include:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre-
If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase
Association.
The information security processing method, wherein it is described when terminal device listens to user and logs in, obtain the user
User identifier and login time further include:
When not finding user identifier, identified for user's distributing user, and by the user identifier and user's account
It is number associated;
User's login time is obtained, and the user identifier is associated with the login time.
The information security processing method, wherein it is described obtain terminal device resolution ratio, and according to the resolution ratio with
And watermark character generates watermark view and specifically includes:
The resolution ratio of terminal device and the first size of watermark character are obtained, and is calculated according to the resolution ratio and first size
The number of watermark character, wherein the first size includes height and width;
The watermark character of the number is arranged according to array to generate watermark view, wherein the second of the watermark view
Size matches with the resolution ratio.
The information security processing method, wherein the first of the resolution ratio for obtaining terminal device and watermark character
Size, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and
The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number is not up to watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio
Height zoom factor;
When watermark columns is not up to watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio
Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated
It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size
Number.
The information security processing method, wherein the first of the resolution ratio for obtaining terminal device and watermark character
Size, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Obtain the resolution ratio of the terminal device and the font information of preset watermark character, wherein the font information packet
Include font size and font;
The first size of the watermark character is determined according to the font information, and according to the resolution ratio and first size meter
Calculate the number of the open ended watermark character of the display interface.
The information security processing method, wherein the display interface that the watermark view is superimposed to terminal device
On, it is specifically included so that the interface image that display interface is shown carries the watermark view:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute
It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described
Watermark recovery is added on the interface image.
A kind of computer readable storage medium, wherein the computer-readable recording medium storage has one or more
Program, one or more of programs can be executed by one or more processor, to realize that content as above is any described
Step in information security processing method.
A kind of terminal device, wherein include: processor, memory and communication bus;Being stored on the memory can quilt
The computer-readable program that the processor executes;
The communication bus realizes the connection communication between processor and memory;
The processor realizes content as above any information security processing method when executing the computer-readable program
In step.
The utility model has the advantages that compared with prior art, the present invention provides a kind of information security processing method, storage medium and
Terminal device, which comprises when terminal device, which listens to user, to be logged in, obtain the user identifier of the user and step on
It records the time, and watermark character is generated according to the user identifier and login time;The resolution ratio of acquisition terminal device, and according to
The resolution ratio and watermark character generate watermark view;The watermark view is superimposed on the display interface of terminal device,
So that the interface image that display interface is shown carries the watermark view, wherein the interface image includes at least debtor
Information interface.The present invention according to the watermark recovery of the user identifier of user and login time generation by will be added to containing debt
The interface of people's information by screenshotss or can be taken pictures with encrypting to the interface containing debtor's information to avoid user in this way
Mode reveal debtor's information, improve the safety of debtor's information.
Detailed description of the invention
Fig. 1 is the flow chart of one embodiment of information security processing method provided by the invention.
Fig. 2 is the flow chart of step S10 in one embodiment of information security processing method provided by the invention.
Fig. 3 is the flow chart of step S20 in one embodiment of information security processing method provided by the invention.
Fig. 4 is the flow chart of step S21 in one embodiment of information security processing method provided by the invention.
Fig. 5 is a kind of structure principle chart of terminal device preferred embodiment provided by the invention.
Specific embodiment
The present invention provides information security processing method, storage medium and terminal device, to make the purpose of the present invention, technology
Scheme and effect are clearer, clear, and the present invention is described in more detail as follows in conjunction with drawings and embodiments.It should manage
Solution, described herein specific examples are only used to explain the present invention, is not intended to limit the present invention.
With reference to the accompanying drawing, by the description of the embodiment, further explanation of the contents of the invention are made.
A kind of information security processing method is present embodiments provided, as shown in Figure 1, which comprises
S10, when terminal device listens to user and logs in, obtain the user identifier and login time of the user, and according to
The user identifier and login time generate watermark character.
Specifically, the user identifier is the unique identification for being in advance user's distribution, and the user identifier is deposited in advance
It is stored in subscriber identity data library, wherein the subscriber identity data library can store in the terminal device, can also be pre-
It is first stored in the background server being connect with the terminal device.The user identifier is associated with the user account of user,
In order to get the user identifier according to the user account.That is, when terminal device listens to user and logs in,
The user account inputted when the user logs in is extracted, and according to the user account in preset subscriber identity data Ku Neicha
Its corresponding user identifier is looked for, to obtain the corresponding user identifier of the user.
Further, the login time is time of user when logining successfully, can by user log at
The current time of system is obtained when function and is determined, and after getting the login time, when the login can be logged in
Between it is associated with the user identifier, in order to know the login time of the user according to the user identifier.That is,
When user logins successfully, the current time of system is obtained as login time, in order to determine it according to the user identifier
Corresponding login time.Currently, in practical application, the login time is also possible to terminal device and shows need to be arranged watermark
The time at interface can determine user and the login time for logging in the interface by the watermark character in this way, improve root
The accuracy of user is determined according to watermark character.
In addition, the user identifier is stored in presetting database, when user logins successfully, need according to the user
User account search its corresponding user identifier.Correspondingly, it is described when terminal device listens to user and logs in, described in acquisition
The user identifier and login time of user specifically includes:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre-
If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase
Association.
When not finding user identifier, identified for user's distributing user, and by the user identifier and the use
Family account is associated;
User's login time is obtained, and the user identifier is associated with the login time.
Specifically, the subscriber identity data library is to preset, for storing user identifier.The subscriber identity data
Inventory is stored in terminal device, and user identifier is to the corresponding user cipher device of the user account, in this way can be to avoid user
The user identifier for voluntarily modifying its own improves the safety of watermark character.In addition, when not finding user identifier, for institute
State user account and distribute unique user identifier, and by the user account it is associated with the user identifier after be stored in user
Identification database.Certainly, in practical applications, in order to improve information security row, the user account can be Real Name, work
Number and ID card No. etc..
Simultaneously in this embodiment, the watermark character uses hex character style, i.e., when getting user identifier and logging in
Between after, need user identifier and login time being converted to hex character.Correspondingly, as shown in Fig. 2, described when terminal device is supervised
When hearing that user logs in, the user identifier and login time of the user are obtained, and according to the user identifier and login
Time generates watermark character and specifically includes:
S11, when terminal device listen to user log in when, obtain the user identifier and login time of the user;
S12, the user identifier and login time be converted into hex character respectively, and by the hex character being converted to according to
Preset rules are combined to generate the watermark character.
Specifically, the preset rules are pre-set, are by the corresponding Hex character of user identifier and login time pair
The Hex character adding answered generates the rule of watermark character.Wherein, the preset rules can be that the login time is corresponding
In Hex character radom insertion to the corresponding Hex character of the user identifier, it can be the corresponding Hex character of user identifier
Hex character corresponding with login time is arranged according to user identifier+login time sequence, can also be user identifier pair
The corresponding Hex character of the Hex character and login time answered is arranged according to login time+user identifier sequence.In the present embodiment,
The preset rules are preferably by the corresponding Hex character radom insertion of the login time to the corresponding Hex of the user identifier
In character.For example, the user identifier is 15084652, the Hex character being converted to is E62C6C.The login time is
180726(2018 July 26), the Hex character being converted to is 2C1F6, then the watermark character is
E622C1F6C6C.The insertion rule of other different insertion sequences can also be arranged in the preset rules.By the way that user is corresponding
User identifier and specific login time are combined together, and form watermark character, the debt in the form of in leakage screenshot or photo
When people's information, leakage source can be traced.
S20, the resolution ratio for obtaining terminal device, and watermark view is generated according to the resolution ratio and watermark character.
Specifically, the watermark view is shown on the display interface of the terminal device, and the covering of watermark view is whole
A display interface.So, several watermark characters can be distributed on the watermark view.The quantity of the watermark character can root
It is determined according to the resolution ratio of the terminal device and the size of watermark character, wherein the size of the watermark character is around institute
State the rectangular size of minimum of watermark character.
Illustratively, as shown in figure 3, the resolution ratio for obtaining terminal device, and according to the resolution ratio and watermark
Character generates watermark view and specifically includes:
The first size of S21, the resolution ratio for obtaining terminal device and watermark character, and according to the resolution ratio and first size
Calculate the number of watermark character, wherein the first size includes height and width;
S22, the watermark character of the number is arranged according to array to generate watermark view, wherein the watermark view
Second size matches with the resolution ratio.
Specifically, second size includes width and height, and second size and the resolution ratio match finger
It is that the watermark view width is equal with the width of the resolution ratio, the height phase of the watermark view altitude and the resolution ratio
Deng so that the watermark view covers the display interface of the terminal device.The first size includes the watermark character
Height and width, be referred to as height and width, wherein the first size of watermark character that different user generates may not
Together.In the present embodiment, the first size is the rectangular height of minimum and width that the watermark character is surrounded by obtaining
Degree obtains.The length being located on the resolution width direction that the width refers to, the height refer to being located at the resolution
Length in rate short transverse.Here the width that the first size includes is denoted as the first width comprising height be denoted as
First height.
Further, after the resolution ratio for getting the terminal device, display interface can be determined according to resolution ratio
Second width and the second height, and watermark columns can be determined according to second width and the first width, it is high according to first
Degree and the second height can determine watermark line number, can determine watermark number according to the columns and line number.In the present embodiment
In, it can be rounded by the quotient to the second width and the first width and the second height and the first height respectively to obtain watermark columns
With watermark line number;The watermark character is arranged according to watermark columns and watermark line number according to array format to generate water again
Print view.
Further, in order to improve the area coverage of the watermark character that the watermark view carries, the watermark view is constituted
Watermark character array line number and columns be both needed to be more than or equal to corresponding threshold value.Correspondingly, as shown in figure 4,
The first size of the resolution ratio for obtaining terminal device and watermark character, and calculated according to the resolution ratio and first size
The number of watermark character specifically includes:
The font information of S211, the resolution ratio for obtaining the terminal device and preset watermark character, wherein the font letter
Breath includes font size and font;
S212, the first size that the watermark character is determined according to the font information, and according to the resolution ratio and first
Size calculates the number of the open ended watermark character of the display interface.
Specifically, the font information is set in terminal device in advance, the font information include font size with
And font, in the present embodiment, the font information is preferably refined black No. 18 of Microsoft.Refined black No. 18 of Microsoft has corresponding length
Degree and width, therefore can be after obtaining the resolution ratio of terminal device, it can/width wide by resolution ratio and resolution ratio
High/height, is respectively rounded two quotient, and what is obtained is exactly watermark line number and watermark columns, wherein the watermark line number with
The product of watermark columns is the number of the open ended watermark character of the display interface.
Illustratively, the first size of the resolution ratio for obtaining terminal device and watermark character, and according to described point
The number that resolution and first size calculate watermark character specifically includes:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and
The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number does not reach watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio
Height zoom factor;
When watermark columns does not reach watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio
Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated
It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size
Number.
Specifically, watermark line number threshold value is the minimum value for the watermark line number for including in the display interface, in this implementation
In example, the watermark line number threshold value is preferably 3, that is to say, that at least to include 3 row watermarks in display interface.The watermark
Columns threshold value is the minimum value for the watermark columns for including, in the present embodiment, the watermark columns threshold in the display interface
Value preferably 4, that is to say, that at least to include 4 column watermarks in display interface.
Further, if watermark line number is not up to watermark line number threshold value, pass through watermark line number threshold value, width and resolution ratio
Width calculates width zoom factor, wherein the width zoom factor is (resolution width-width)/4, according to being calculated
The width zoom factor width of the watermark character is zoomed in and out.If watermark columns is not up to watermark columns threshold
Value, passes through watermark columns threshold value, height and resolution height computed altitude zoom factor, wherein the height zoom factor
For (resolution height-height)/3, carried out according to height of the height zoom factor being calculated to the watermark character
Scaling.
Simultaneously in this embodiment, the third size includes the width and height of the watermark character after scaling processing,
It is referred to as third watermark width and third watermark height.Watermark character number is calculated according to the third size and resolution ratio
Method is identical with the method for calculating watermark character number according to the first size and resolution ratio, and which is not described herein again.
S30, the watermark view is superimposed on the display interface of terminal device, so that the interface that display interface is shown
Image carries the watermark view, wherein the interface image includes at least debtor's information interface.
Specifically, the watermark view is arranged by the watermark character according to the watermark line number and watermark columns being calculated
Composition, and the second size of the watermark view matches with the resolution ratio.The watermark view the second size and
In the case that the resolution ratio matches, the watermark view is superimposed to the display page of terminal device.In this way in terminal device
The display page in comprising by watermark view, wherein show at least include debtor's information interface on the interface image of the page.
That is, in mobile terminal it is any include debtor's information the display page on, be all superimposed with watermark corresponding to user
View, to prevent user from revealing debtor's information by screenshot or in a manner of taking pictures, to improve the safety of debtor's information
Property.
Illustratively, described that the watermark view is superimposed on the display interface of terminal device, so that display interface
The interface image of display carries the watermark view and specifically includes:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute
It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described
Watermark recovery is added on the interface image.
Specifically, when the display interface of terminal device is nondebtor's information interface, the watermark interface is hidden in institute
It states in display interface, does not influence display and the copy of current display interface information;When the display interface of terminal device is debtor
When information interface, the watermark interface is placed in front of the display interface, using image layered superimposing technique, is on display interface
Existing watermark character.In this way, the watermark information of user being tracked is superimposed on debtor's information interface, prevent from using
The information of debtor is revealed at family screenshot or by way of taking pictures, and improves debtor's information security.
Further, when the display interface of terminal device updates interface image, watermark figure is generated according to the watermark interface
Case, and the watermark recovery is added on the interface image.Wherein, the interface image includes at least debtor's information bound
Face.Specifically, when the display interface of terminal device updates interface image, if updated interface image includes debtor's information bound
Face then the watermark interface generates watermark recovery, and the watermark recovery is added on the interface image, therefore described
There is watermark recovery on display interface including debtor's information interface.If updated interface does not include debtor's information
The operation of addition watermark recovery is not done at interface then to the display interface.
It is described the present invention also provides a kind of computer readable storage medium based on the method for above- mentioned information safe handling
Computer can storage medium have one or more programs, one or more of programs can be held by one or more processors
Row, the step of to realize information security processing method as described in above-described embodiment.
Based on above- mentioned information security processing, the present invention also provides a kind of terminal devices, as shown in Figure 5, comprising: this
Invention additionally provides a kind of application server comprising at least one processor (processor) 20;Display screen 21;And it deposits
Reservoir (memory) 22 can also include communication interface (Communications Interface) 23 and bus 24.Wherein, locate
Reason device 20, display screen 21, memory 22 and communication interface 23 can complete mutual communication by bus 24.Display screen 21 is set
It is set to preset user in display initial setting mode and guides interface.Communication interface 23 can transmit information.Processor 20 can be with
The logical order in memory 22 is called, to execute the method in above-described embodiment.
In addition, the logical order in above-mentioned memory 22 can be realized and as only by way of SFU software functional unit
Vertical product when selling or using, can store in a computer readable storage medium.
Memory 22 is used as a kind of computer readable storage medium, and it is executable to may be configured as storage software program, computer
Program, such as the corresponding program instruction of method or module in the embodiment of the present disclosure.Processor 20 is stored in memory by operation
Software program, instruction or module in 22, thereby executing functional application and data processing, i.e. side in realization above-described embodiment
Method.
Memory 22 may include storing program area and storage data area, wherein storing program area can storage program area, extremely
Application program needed for a few function;Storage data area, which can be stored, uses created data etc. according to terminal device.This
Outside, memory 22 may include high-speed random access memory, can also include nonvolatile memory.For example, USB flash disk, movement
Hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory,
RAM), a variety of media that can store program code such as magnetic or disk, are also possible to transitory memory medium.
In addition, a plurality of instruction processing unit in above-mentioned storage medium and mobile terminal loads and the detailed process executed exists
It has been described in detail in the above method, has just no longer stated one by one herein.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of information security processing method, characterized in that it comprises:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained, and according to described
User identifier and login time generate watermark character;
The resolution ratio of terminal device is obtained, and watermark view is generated according to the resolution ratio and watermark character;
The watermark view is superimposed on the display interface of terminal device, so that the interface image that display interface is shown carries
The watermark view, wherein the interface image includes at least debtor's information interface.
2. information security processing method according to claim 1, which is characterized in that described to be stepped on when terminal device listens to user
When record, the user identifier and login time of the user are obtained, and water is generated according to the user identifier and login time
Lettering symbol specifically includes:
When terminal device, which listens to user, to be logged in, the user identifier and login time of the user are obtained;
The user identifier and login time are converted into hex character respectively, and by the hex character being converted to according to default
Rule combination is to generate the watermark character.
3. information security processing method according to claim 2, which is characterized in that described to be stepped on when terminal device listens to user
When record, the user identifier and login time for obtaining the user are specifically included:
When terminal device, which listens to user, to be logged in, the user account of the user is obtained, and according to the user account pre-
If searching its corresponding user identifier in subscriber identity data library;
When finding user identifier, user's login time is obtained, and by the user identifier and the login time phase
Association.
4. information security processing method according to claim 2, which is characterized in that described to be stepped on when terminal device listens to user
When record, the user identifier and login time of the user are obtained further include:
When not finding user identifier, identified for user's distributing user, and by the user identifier and user's account
It is number associated;
User's login time is obtained, and the user identifier is associated with the login time.
5. information security processing method according to claim 1, which is characterized in that the resolution ratio for obtaining terminal device,
And watermark view is generated according to the resolution ratio and watermark character and is specifically included:
The resolution ratio of terminal device and the first size of watermark character are obtained, and is calculated according to the resolution ratio and first size
The number of watermark character, wherein the first size includes height and width;
The watermark character of the number is arranged according to array to generate watermark view, wherein the second of the watermark view
Size matches with the resolution ratio.
6. information security processing method according to claim 5, which is characterized in that it is described obtain terminal device resolution ratio with
And the first size of watermark character, and specifically included according to the number that the resolution ratio and first size calculate watermark character:
Calculate the watermark line number along short transverse according to the height of the height and resolution ratio, and according to the width and
The width of resolution ratio calculates the columns line number along short transverse;
When watermark line number is not up to watermark line number threshold value, calculated according to the height of watermark line number threshold value, height and resolution ratio
Height zoom factor;
When watermark columns is not up to watermark columns threshold value, calculated according to the width of watermark columns threshold value, width and resolution ratio
Width zoom factor;
It is contracted respectively to the height and width of watermark character according to the height zoom factor and width zoom factor being calculated
It puts;
The third size of watermark character after obtaining scaling, and a of watermark character is calculated according to the resolution ratio and first size
Number.
7. according to the information security processing method of claim 5 or 6, which is characterized in that the resolution for obtaining terminal device
The first size of rate and watermark character, and specifically wrapped according to the number that the resolution ratio and first size calculate watermark character
It includes:
Obtain the resolution ratio of the terminal device and the font information of preset watermark character, wherein the font information packet
Include font size and font;
The first size of the watermark character is determined according to the font information, and according to the resolution ratio and first size meter
Calculate the number of the open ended watermark character of the display interface.
8. information security processing method according to claim 1, which is characterized in that described that the watermark view is superimposed to end
On the display interface of end equipment, specifically included so that the interface image that display interface is shown carries the watermark view:
It is hidden in the display interface according to the watermark view generation watermark interface, and by the watermark interface, wherein institute
It states before watermark interface is placed in display interface;
When the display interface of terminal device updates interface image, watermark recovery is generated according to the watermark interface, and will be described
Watermark recovery is added on the interface image.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1~8
Step in information security processing method described in any one.
10. a kind of terminal device characterized by comprising processor, memory and communication bus;It is stored on the memory
There is the computer-readable program that can be executed by the processor;
The communication bus realizes the connection communication between processor and memory;
The processor realizes the information security as described in claim 1-8 any one when executing the computer-readable program
Step in processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811237563.7A CN109446761B (en) | 2018-10-23 | 2018-10-23 | Information security processing method, storage medium and terminal equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811237563.7A CN109446761B (en) | 2018-10-23 | 2018-10-23 | Information security processing method, storage medium and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109446761A true CN109446761A (en) | 2019-03-08 |
CN109446761B CN109446761B (en) | 2022-04-26 |
Family
ID=65548303
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811237563.7A Active CN109446761B (en) | 2018-10-23 | 2018-10-23 | Information security processing method, storage medium and terminal equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109446761B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990800A (en) * | 2019-11-26 | 2020-04-10 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN111488559A (en) * | 2020-04-10 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN113542206A (en) * | 2020-11-27 | 2021-10-22 | 腾讯科技(深圳)有限公司 | Image processing method and device and computer readable storage medium |
CN113630606A (en) * | 2020-05-07 | 2021-11-09 | 百度在线网络技术(北京)有限公司 | Video watermark processing method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996206A (en) * | 2009-08-11 | 2011-03-30 | 阿里巴巴集团控股有限公司 | Method, device and system for displaying web page |
CN102622560A (en) * | 2011-01-27 | 2012-08-01 | 昆山玛斯特软件有限公司 | Method for preventing electronic secret documents from being divulged in shooting or printing mode |
CN102799398A (en) * | 2012-06-27 | 2012-11-28 | 用友软件股份有限公司 | Table body scaling device and table body scaling method |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
-
2018
- 2018-10-23 CN CN201811237563.7A patent/CN109446761B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996206A (en) * | 2009-08-11 | 2011-03-30 | 阿里巴巴集团控股有限公司 | Method, device and system for displaying web page |
CN102622560A (en) * | 2011-01-27 | 2012-08-01 | 昆山玛斯特软件有限公司 | Method for preventing electronic secret documents from being divulged in shooting or printing mode |
CN102799398A (en) * | 2012-06-27 | 2012-11-28 | 用友软件股份有限公司 | Table body scaling device and table body scaling method |
CN104517046A (en) * | 2014-12-24 | 2015-04-15 | 江苏敏捷科技股份有限公司 | Screen display data protection method |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990800A (en) * | 2019-11-26 | 2020-04-10 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN110990800B (en) * | 2019-11-26 | 2022-04-12 | 合肥高维数据技术有限公司 | Watermark processing method and system based on application program |
CN111488559A (en) * | 2020-04-10 | 2020-08-04 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN111488559B (en) * | 2020-04-10 | 2023-03-10 | 腾讯科技(深圳)有限公司 | Webpage watermark generation method and device, computer equipment and storage medium |
CN113630606A (en) * | 2020-05-07 | 2021-11-09 | 百度在线网络技术(北京)有限公司 | Video watermark processing method and device, electronic equipment and storage medium |
CN113630606B (en) * | 2020-05-07 | 2024-04-19 | 百度在线网络技术(北京)有限公司 | Video watermark processing method, video watermark processing device, electronic equipment and storage medium |
CN113542206A (en) * | 2020-11-27 | 2021-10-22 | 腾讯科技(深圳)有限公司 | Image processing method and device and computer readable storage medium |
CN113542206B (en) * | 2020-11-27 | 2023-07-04 | 腾讯科技(深圳)有限公司 | Image processing method, device and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109446761B (en) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109446761A (en) | A kind of information security processing method, storage medium and terminal device | |
CN105577684B (en) | Method, server-side, client and the system of anti-crawler capturing | |
CN109815742B (en) | Data desensitization method and device | |
US8955143B1 (en) | Use of decoy data in a data store | |
CN110166465B (en) | Access request processing method, device, server and storage medium | |
KR20180082504A (en) | Methods and equipment for application information risk management | |
CN110210883A (en) | The recognition methods of team control account, device, server and storage medium | |
CN107943949A (en) | A kind of method and server of definite web crawlers | |
KR102111192B1 (en) | Method and apparatus for identity information verification | |
CN110245469A (en) | Watermark generation method, watermark analytic method, device and the storage medium of webpage | |
CN108229158A (en) | A kind of guard method of the user privacy information stored in Android | |
CN107948199B (en) | Method and device for rapidly detecting terminal shared access | |
CN103701600A (en) | Input validation method and device | |
CN109847365A (en) | A kind of anti-cheating method and system towards the application of block chain | |
CN106934245A (en) | A kind of DICOM image display methods, device and system | |
CN109472847A (en) | A kind of image processing method, system and terminal device | |
CN108809913A (en) | The method, apparatus and equipment of data desensitization | |
CN104022913A (en) | Test method and device for data cluster | |
CN106992975A (en) | The recognition methods of malice network address and device | |
DE112021005364T5 (en) | DEFENSE TARGETED DATABASE ATTACKS THROUGH DYNAMIC HONEYPOT DATABASE RESPONSE GENERATION | |
CN108733374A (en) | Application program homepage development approach and terminal device | |
CN111309578A (en) | Method and device for identifying object | |
CN113434588B (en) | Data mining analysis method and device based on mobile communication ticket | |
CN105988998B (en) | Relational network construction method and device | |
CN116305294B (en) | Data leakage tracing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220928 Address after: Room 501-2, 5th Floor, Building 7, Xincheng Science and Technology Park, No. 588, Yuelu West Avenue, High-tech Development Zone, Changsha City, Hunan Province 410000 Patentee after: Hunan Hengjun Software Development Co.,Ltd. Address before: 6 / F, building 7, Xincheng Science Park, 588 Yuelu West Avenue, high tech Development Zone, Changsha City, Hunan Province, 410205 Patentee before: CHANGSHA YUBANG SOFTWARE DEVELOPMENT Co.,Ltd. |
|
TR01 | Transfer of patent right |