CN110022280A - A kind of watermark information processing method, device and computer storage medium - Google Patents

A kind of watermark information processing method, device and computer storage medium Download PDF

Info

Publication number
CN110022280A
CN110022280A CN201810013876.8A CN201810013876A CN110022280A CN 110022280 A CN110022280 A CN 110022280A CN 201810013876 A CN201810013876 A CN 201810013876A CN 110022280 A CN110022280 A CN 110022280A
Authority
CN
China
Prior art keywords
information
data
watermark
user
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810013876.8A
Other languages
Chinese (zh)
Inventor
杨亭亭
张恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201810013876.8A priority Critical patent/CN110022280A/en
Publication of CN110022280A publication Critical patent/CN110022280A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Abstract

The invention discloses a kind of information processing method towards big data platform structural data, device and computer storage mediums, wherein, the described method includes: receiving registration request, the identification information and operation permission information of unique identification user identity are generated according to the registration request;Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.

Description

A kind of watermark information processing method, device and computer storage medium
Technical field
The present invention relates to the information processing technology more particularly to a kind of watermark information processing methods, device and computer storage Medium.
Background technique
In information processing towards big data platform structural data, for data watermark, it is broadly divided into fragility at present Watermark and multipurpose watermarking.Fragile watermarking changes more sensitivity to content, is suitable for integrity verification.Multipurpose watermarking refers to Data in database are after conventional database manipulation or malicious attack, still extractable watermark information out.Digital watermarking at present Research is typically used for the data such as protection video, picture, database.Database water mark technology can resist in database to data Conventional modification operation, there is preferable robustness.
Containing there are many acquiring structural data in traditional database in telecom operators' big data platform, as subscriber data, Ticket etc., and the different visitor of big data platform has different operating rights to data.However for Downloadable data , whether data lose control after leaving big data platform, can not identify user and go beyond one's commission to data and distort, propagate Operation.Big data platform watermark need to can resist data and go out the normal modification operation after platform, and can normally mention after the modification Take watermark information.
Although traditional database watermark has preferable robustness, it can be used for operator's big data platform data protection.It can Due to can not identification operation permission and lead to not carry out subsequent tracing, and in big data platform, the data scale of construction is big, carries out water Print embedding operation can bring no small expense.In this regard, not yet there is effective solution at present.
Summary of the invention
In view of this, the embodiment of the present invention is desirable to provide a kind of information processing side towards big data platform structural data Method, device and computer storage medium solve at least problem of the existing technology.
The technical solution of the embodiment of the present invention is achieved in that
The watermark information processing method of the embodiment of the present invention, which comprises
Registration request is received, the identification information and operating right of unique identification user identity are generated according to the registration request Information;
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
In above scheme, the method also includes:
Access request is received, by the information parsed from the access request and the identification information and the operating rights Limit information is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse the access or legal of illegal user The unauthorized access of user.
In above scheme, the identification information and the operation permission information after being generated according to the registration request, with The identification information identifies the user right sheet form of the operation permission information and is safeguarded to correspond to;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
In above scheme, the method also includes:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information and first for including in the watermark information Operation permission information.
In above scheme, the method also includes:
When tracing inquiry, the first identifier information recovered and the first operation permission information and data to be checked are carried out It compares, obtains comparison result;
When the comparison result is not have operating right that user identity can authorize access data, will for it is described to The illegal operation result of inquiry data is exported.
In above scheme, watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark Information, comprising:
The watermark raw information being made of the identification information and the operation permission information is subjected to character string conversion, is obtained To the first information indicated with ASCII character decimal form;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t, respectively as the t of lagrange polynomial by the value of n in order A coefficient, using obtained result as the watermark information.
The information processing unit towards big data platform structural data of the embodiment of the present invention, described device include permission Control module and watermark embedding module;Wherein,
The permission control module, is used for:
Registration request is received, the identification information and operating right of unique identification user identity are generated according to the registration request Information;
Watermark embedding module is used for:
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
In above scheme, the permission control module is further used for:
Access request is received, by the information parsed from the access request and the identification information and the operating rights Limit information is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse the access or legal of illegal user The unauthorized access of user.
In above scheme, the permission control module is further used for:
The identification information and the operation permission information according to the registration request after generating, with the identification information It identifies the user right sheet form of the operation permission information to correspond to and is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
In above scheme, described device further include:
Trace back block is used for:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information and first for including in the watermark information Operation permission information.
In above scheme, the trace back block is further used for:
When tracing inquiry, the first identifier information recovered and the first operation permission information and data to be checked are carried out It compares, obtains comparison result;
When the comparison result is not have operating right that user identity can authorize access data, will for it is described to The illegal operation result of inquiry data is exported.
In above scheme, the watermark embedding module is further used for:
The watermark raw information being made of the identification information and the operation permission information is subjected to character string conversion, is obtained To the first information indicated with ASCII character decimal form;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t, respectively as the t of lagrange polynomial by the value of n in order A coefficient, using obtained result as the watermark information.
In above scheme, the permission control module is located at the gateway side in described device;
The watermark embedding module is integrated in described device in the form of plug-in unit, and is set independently of the gateway side It sets.
The information processing unit towards big data platform structural data of the embodiment of the present invention, comprising: processor and use In the memory for the computer program that storage can be run on a processor;
Wherein, the processor is for when running the computer program, executing any one of above scheme the method The step of.
The computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer program quilt The step of any one of above scheme the method is realized when processor executes.
Using the embodiment of the present invention, registration request is received, unique identification user identity is generated according to the registration request Identification information and operation permission information;Watermark pretreatment is carried out according to the identification information and the operation permission information, is obtained Watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, the second data are obtained, due to can To be that identification information and operation permission information are carried out to watermark pretreatment, therefore obtained watermark information can be grasped by mark Subsequent retrospect processing is carried out as permission, and the generation of watermark information is divided in different modules respectively from the management of permission Cloth processing, avoid in big data platform it is big for the data scale of construction carry out the brought expense of watermark embedding operation greatly ask Topic.
Detailed description of the invention
Fig. 1 is the implementation flow chart of one method of the embodiment of the present invention;
Fig. 2 is using one system construction drawing of the embodiment of the present invention;
Fig. 3 is using one big data platform process flow diagram of the embodiment of the present invention;
Fig. 4 is using one trace back block process flow diagram of the embodiment of the present invention.
Specific embodiment
The implementation of technical solution is described in further detail with reference to the accompanying drawing.
A kind of watermark information processing method of the embodiment of the present invention, as shown in Figure 1, which comprises
Step 101, receive registration request, according to the registration request generate unique identification user identity identification information and Operation permission information.
Step 102 carries out watermark pretreatment according to the identification information and the operation permission information, obtains watermark letter Breath.
Step 103 carries out watermark insertion processing to received first data according to the watermark information, obtains the second number According to.
Using the embodiment of the present invention, registration request is received, unique identification user identity is generated according to the registration request Identification information and operation permission information;Watermark pretreatment is carried out according to the identification information and the operation permission information, is obtained Watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, the second data are obtained, due to can To be that identification information and operation permission information are carried out to watermark pretreatment, therefore obtained watermark information can be grasped by mark Subsequent retrospect processing is carried out as permission, and the generation of watermark information is divided in different modules respectively from the management of permission Cloth processing, avoid in big data platform it is big for the data scale of construction carry out the brought expense of watermark embedding operation greatly ask Topic.
In one embodiment of the embodiment of the present invention, it can will be parsed from the access request by receiving access request Information out is compared with the identification information and the operation permission information, to determine that user identity can authorize access data Operating right.When having the operating right that user identity can authorize access data, pass through the access request of legitimate user.And When not having the operating right that user identity can authorize access data, refuse the access of illegal user or getting over for legitimate user Power access.
In one embodiment of the embodiment of the present invention, the identification information and the operation permission information are according to the registration After request generates, identifies the user right sheet form of the operation permission information to correspond to the identification information and safeguarded; The data access authority that user identity can be authorized is determined according to the user right sheet form.
In one embodiment of the embodiment of the present invention, the method also includes: acquisition second data extract insertion institute State the watermark information in the second data.The watermark information is converted, to recover include in the watermark information One identification information and the first operation permission information.
In one embodiment of the embodiment of the present invention, the method also includes: when tracing inquiry, by the recover first mark Know information and the first operation permission information is compared with data to be checked, obtains comparison result.When the comparison result is not When having the operating right that user identity can authorize access data, it will be carried out for the illegal operation result of the data to be checked Output.
In one embodiment of the embodiment of the present invention, it is pre- that watermark is carried out according to the identification information and the operation permission information Processing, obtain watermark information, comprising: by the watermark raw information being made of the identification information and the operation permission information into The conversion of line character string, obtains the first information indicated with ASCII character decimal form.The first information is located as integer Reason, as dividing the key k deposited.According to thresholding t, the k is divided into the part t, respectively as glug by the value of n in order The polynomial t coefficient of Lang, using obtained result as the watermark information.
For the watermark pretreatment involved in above-described embodiment and watermark insertion processing, a kind of watermarking algorithm (watermarking algorithm for being based on (t, n) thresholding is realized using Lagrangian difference arithmetic) includes following content:
1) watermark pretreatment: being converted to ASCII character decimal form for the character string of the raw information containing watermark and be expressed as X, X is handled as one big integer, as dividing the key k deposited.Then according to thresholding t, the value of n divides k in order At the part t, respectively as Lagrangian (Lagrange) polynomial t coefficient (including constant term), segmentation is abided by this way Rule: the higher item of power in multinomial, corresponding coefficient value are smaller.
2) it marks: using hash function that tuple is marked using major key P, key Key as parameter and calculate each attribute Hash mark value Hash (P, Key), in the case where major key is not attacked, attacker does not know key Key, is difficult to find watermark Embedded location destroy watermark.
3) watermark is embedded in: embedding information in the numeric type data of relational database can usually be held using numeric type data Certain error is born to realize.Assuming that the attribute A of embeddable watermark1,A2...AnIn the decimal system digit that can be embedded into be c, i.e., It can be by modifying attribute AiLow c of (i ∈ [1, n]) are embedded in watermark, then integer X are divided into r group by formula (1), convert For decimal integer sequence W.Shown in the calculation method of r such as formula (2), arbitrary integer W, length c are taken in formula (1), if not Sufficient C then mends 0.
W={ w1,w2,...wi,...wr|wi∈ Z+ } formula (1)
Wherein lxFor decimal system digit formula (2) shared by X
For Shamir (t, n) threshold schemes and Lagrange interpolation polynomial, Shamir proposed one in 1979 (t, the n) threshold schemes of kind based on Lagrange interpolation polynomial, are divided into n sub-secret for secret, then at least need t son secret Close owner could restore initial secret.If p is a Big prime, shared key k ∈ K=Zp(finite field ZpFor integer item Z mould p Residual class ring).Distributing sub-key to n participant, steps are as follows:
(1) t-1 order polynomial f (x)=a is selectedt-1xt-1+...+a1x+a0∈Zp, coefficient a0=k, i.e. f (x)=k; Wherein, at- 1 ... ... a0Refer to coefficient.ZpRefer to finite field.
(2) secret is divided into n sub-secret x1,x2...xn, and calculate yi=f (xi),1≤i≤n;
(3) f (x) that t sub-key can reconstruct is given are as follows:
It is easy to calculate k=f (0), so
A kind of information processing unit towards big data platform structural data of the embodiment of the present invention, described device include Permission control module and watermark embedding module;Wherein, the permission control module, is used for: registration request is received, according to the note Volume request generates the identification information and operation permission information of unique identification user identity;Watermark embedding module is used for: according to described Identification information and the operation permission information carry out watermark pretreatment, obtain watermark information;According to the watermark information to reception The first data carry out watermark insertion processing, obtain the second data.
Using the embodiment of the present invention, registration request is received by permission control module, is generated only according to the registration request The identification information and operation permission information of one identity user identity;By watermark embedding module according to the identification information and described Operation permission information carries out watermark pretreatment, obtains watermark information;Received first data are carried out according to the watermark information Watermark insertion processing, obtains the second data, and since permission control module can be located at gateway, and watermark embedding module can not be set It is placed in gateway, then the function of watermark pretreatment is transferred into watermark embedding module from gateway and individually handled, therefore, saved net The processing pressure of pass.In watermark embedding module, identification information and operation permission information can be subjected to watermark pretreatment, obtained Watermark information, subsequent retrospect processing can also be carried out by identification operation permission, by the generation and permission of watermark information Management carry out distributed treatment in different module respectively, avoid in progress big for the data scale of construction in big data platform The big problem of the brought expense of watermark embedding operation.
In one embodiment of the embodiment of the present invention, the permission control module is further used for: access request is received, it will The information parsed from the access request is compared with the identification information and the operation permission information, to determine to use Family identity can authorize the operating right of access data;When having the operating right that user identity can authorize access data, pass through The access request of legitimate user;When not having the operating right that user identity can authorize access data, refuse illegal user's The unauthorized access of access or legitimate user.
In one embodiment of the embodiment of the present invention, the permission control module is further used for: the identification information and institute Operation permission information is stated after generating according to the registration request, is believed with the identification information to correspond to the mark operating right The user right sheet form of breath is safeguarded;The data access that user identity can be authorized is determined according to the user right sheet form Permission.
In one embodiment of the embodiment of the present invention, described device further include: trace back block is used for: acquisition second number According to extracting the watermark information being embedded in second data;The watermark information is converted, to recover the watermark The first identifier information and the first operation permission information for including in information.
In one embodiment of the embodiment of the present invention, the trace back block is further used for: when tracing inquiry, will restore First identifier information and the first operation permission information out is compared with data to be checked, obtains comparison result;When the ratio It is that when not having user identity to authorize the operating right for accessing data, the illegal behaviour of the data to be checked will be directed to result It is exported as result.
The identification information and the operation permission information have backup in watermark embedding module and trace back block, so as to It is compared and traces to the source, determine that user identity can authorize the operating right etc. of access data.
In one embodiment of the embodiment of the present invention, the watermark embedding module is further used for: will be by the identification information Character string conversion is carried out with the watermark raw information that the operation permission information is constituted, is obtained with ASCII character decimal form table The first information shown;The first information is handled as integer, as dividing the key k deposited;According to thresholding t, n's is taken Value, is divided into the part t for the k in order, respectively as t coefficient of lagrange polynomial, using obtained result as The watermark information.
In one embodiment of the embodiment of the present invention, the permission control module is located at the gateway side in described device;It is described Watermark embedding module is integrated in described device in the form of plug-in unit, and is configured independently of the gateway side.
A kind of information processing unit towards big data platform structural data of the embodiment of the present invention, comprising: processor With the memory for storing the computer program that can be run on a processor;Wherein, the processor is described for running When computer program, the step of executing any one of above-described embodiment the method.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey The step of any one of above-described embodiment the method is realized when sequence is executed by processor.
The embodiment of the present invention is described below by taking a practical application scene as an example:
Digital watermarking is typically used for the data such as protection video, picture, database.Traditional database digital watermark can support To the conventional modification operation of data in anti-database, there is preferable robustness.Traditional database digital watermark can to entire or A part of database data carries out watermark embedding operation.And in big data platform, the data scale of construction is big, carries out to entire database It is excessive that watermark is embedded in expense.The information of digital watermark embedding is generally identity information at present, so as to stage appraising datum source of tracing to the source, But user's operation permission is identified not in watermark.Access user is more in big data platform, and different user is for phase Operating right with data is also not quite similar, and after especially data leave big data platform, can not control user behavior, It is difficult to find user and illegally distorts, propagates etc. behaviors to data.Current digital watermarking does not differentiate between different user to data Different operating rights, it is whether legal in the operation that the retrospect stage can not intuitively find out that user executes data.In this regard, transporting It seeks in the application scenarios of quotient's big data platform, digital watermark technology needs to adapt to the demand of big data platform, can be to big data Structural data is embedded in multipurpose watermarking and carries out protection of tracing to the source in platform.Wherein, the multipurpose watermarking refers in database Data after conventional database manipulation or malicious attack, still it is extractable go out watermark information.In addition to protection of tracing to the source, it is also necessary to will Watermark is associated with operating right of the user to data, to show that user's is legal by the watermark of extraction in the retrospect stage Lawful authority is compared with the data manipulation (such as data modification, transmitting) actually occurred, can find to use by operating right Whether family has carried out unauthorized operation to the data taken in platform.
This application scene application embodiments of the present invention are a kind of suitable for operator's big data platform, towards big number It traces to the source scheme according to the digital watermarking of platform structure data.One system architecture is as shown in Fig. 2, mainly comprise the following modules:
1) line module (not showing in Fig. 2), line module can be located at big data platform or independently of big data platforms, For receiving the request of user:
User refers to that the user of access big data platform data, user carry personally identifiable information to big data platform Shen first It please register, the operating right for obtaining big data platform access account and corresponding data (is checked after such as read-only, modification, downloading, downloaded And modify, download and transmit, wherein transmitting uses data sharing to other people after referring to user's downloading).
2) permission control module:
Permission control module is deployed in big data platform exit with gateway module, can receive all visits of external user It asks and delivers big data platform corresponding assembly after application is handled, deliver user after receiving unit feedback data inspection, and be responsible for Complete registration, the authorization, access control of user:
A. user identity is audited in registration phase, generates unique identity for each user;
B. user is authorized, determines the data access authority that user identity can be authorized, safeguard user right table;
C. in user's dial-tone stage, the access of user identity and application is determined, refuses unauthorized users to access and conjunction The unauthorized access of method user delivers component plug-in module to the Lawful access of legitimate user.
3) watermark embedding module:
Watermark embedding module is integrated with plug-in mode and each component of big data platform, is responsible for reception authority module and is delivered User identity and authority information, carry out watermark pretreatment form binary watermark sequence.The data that receiving unit returns are looked into It askes as a result, and carrying out watermark embedding operation.
4) trace back block (not showing in Fig. 2), trace back block can be located at big data platform or independently of big data platforms, For being traced to watermark information:
Trace back block is mainly used for the later period to collected data progress watermark extracting and Authority Verification, can count independently of big According to system, it is primarily adapted for use in and audits to the data after outflow big data platform.
For the data (there is user permission to be downloaded to data) of big data platform can be gone out, it should be limited and go out platform Permission afterwards prevents from the operation such as illegally distorting, propagate.Trace back block has watermark extracting and transfer capability, extracts insertion number Watermark in recovering the identity information and authority information for including in watermark, is compared (as recovered with practical operation Whether identity information matches with the user for actually holding this data, and carrying out the data of watermark extracting, whether some is difficult to mention Take, it is difficult to which the part for extracting watermark may be tampered), to find the illegal operation of user.
The process flow realized using above system framework is as shown in Figure 3, comprising:
Step 201 sends identity information to permission control module by line module;
Step 202, permission control module carry out account authority distribution;
Step 203 sends request of data to permission control module by line module;
Step 204, permission control module carry out identity and Authority Verification and then follow the steps 205 if authentication failed;Such as Fruit is proved to be successful, and thens follow the steps 206;
Step 205, permission control module return to failed message to line module;
Step 206, permission control module send the request comprising identity, permission and access request to watermark embedding module and disappear Breath;
Step 207-211, data query, watermark pretreatment, watermark insertion are carried out in watermark embedding module, data is returned Permission control module is given, then line module is returned data to by permission control module.
It include line module, permission control module and watermark embedding module in big data platform in present treatment process.? User complete registration after can login user module initiate data access request, permission control module receive user access request, it is right User name and access authority are checked, if request, beyond the authorization to this user, denied access then will if valid operation The operation permission information of subscriber identity information and requested data is forwarded to watermark embedding module.Watermark embedding module receives permission After control module operation requests, completion data query task first, then using subscriber identity information and operation permission information as Watermark data is pre-processed to obtain binary system watermark sequence, is embedded in query result data by original watermark data, finally will place It manages result and returns to permission control module.Processing result is returned to by line module by permission control module again.
For can be independently of the trace back block of above-mentioned big data platform, a process flow be as shown in Figure 4, comprising:
Step 301, data collection;
Step 302, watermark extracting;
Step 303, permission compare;
Step 304, result output.
In present treatment process, trace back block carries out trace-back operation to the data being collected into: first with watermark extraction algorithm Watermark extracting is carried out to data, obtains user identity and authority information, then by identity and authority and the practical holder of data into Row compares, and carrying out result output to illegal operation, (such as watermark information is that user A there is downloading to check permission without transmitting this data Permission, and this data is obtained from user B when data collection, then it is assumed that A, which goes beyond one's commission, transmits data or B generation stealing).
In this application scene, using user right as watermark information, i.e., data manipulation permission is combined with watermark, is realized Two-dimensions data based on user identity and permission are traced to the source, and with big data platform gateway combination big data platform plug-in unit or are inserted Part module (such as watermark embedding module is integrated with plug-in mode and each component of big data platform) mode is realized, thus refinement Big data platform is traced to the source granularity.Using gateway and big data platform plug-in unit or card module, (such as watermark embedding module is with plug-in unit Mode is integrated with each component of big data platform) mode that combines, by big data platform gateway realize to user identity, Permission is uniformly controlled, and card module realizes watermark insertion, and calculating task is distributed to various components and is completed, gateway mould is reduced Block bottleneck risk.
If the module integrated described in the embodiment of the present invention is realized in the form of software function module and as independent production Product when selling or using, also can store in a computer readable storage medium.Based on this understanding, the present invention is real Applying the technical solution of example, substantially the part that contributes to existing technology can embody in the form of software products in other words Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can To be personal computer, server or network equipment etc.) execute the whole or portion of each embodiment the method for the present invention Point.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk. It is combined in this way, the embodiment of the present invention is not limited to any specific hardware and software.
Correspondingly, the embodiment of the present invention also provides a kind of computer storage medium, wherein it is stored with computer program, the meter Calculation machine program is used to execute the information processing method towards big data platform structural data of the embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (15)

1. a kind of watermark information processing method, which is characterized in that the described method includes:
Registration request is received, the identification information of unique identification user identity is generated according to the registration request and operating right is believed Breath;
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
2. the method according to claim 1, wherein the method also includes:
Access request is received, the information parsed from the access request and the identification information and the operating right are believed Breath is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse access or the legitimate user of illegal user Unauthorized access.
3. method according to claim 1 or 2, which is characterized in that the identification information and the operation permission information exist After generating according to the registration request, the user right table shape for identifying the operation permission information is corresponded to the identification information Formula is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information for including in the watermark information and the first operation Authority information.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
When tracing inquiry, the first identifier information recovered and the first operation permission information are compared with data to be checked It is right, obtain comparison result;
When the comparison result is not have user identity to authorize the operating right for accessing data, will be directed to described to be checked The illegal operation result of data is exported.
6. method according to claim 1 or 2, which is characterized in that believed according to the identification information and the operating right Breath carries out watermark pretreatment, obtains watermark information, comprising:
By the watermark raw information being made of the identification information and the operation permission information carry out character string conversion, obtain with The first information that ASCII character decimal form indicates;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t by the value of n in order, respectively as t system of lagrange polynomial Number, using obtained result as the watermark information.
7. a kind of information processing unit towards big data platform structural data, which is characterized in that described device includes permission Control module and watermark embedding module;Wherein,
The permission control module, is used for:
Registration request is received, the identification information of unique identification user identity is generated according to the registration request and operating right is believed Breath;
Watermark embedding module is used for:
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
8. device according to claim 7, which is characterized in that the permission control module is further used for:
Access request is received, the information parsed from the access request and the identification information and the operating right are believed Breath is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse access or the legitimate user of illegal user Unauthorized access.
9. device according to claim 7 or 8, which is characterized in that the permission control module is further used for:
The identification information and the operation permission information are come pair after being generated according to the registration request with the identification information The user right sheet form that the operation permission information should be identified is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
10. device according to claim 7 or 8, which is characterized in that described device further include:
Trace back block is used for:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information for including in the watermark information and the first operation Authority information.
11. device according to claim 10, which is characterized in that the trace back block is further used for:
When tracing inquiry, the first identifier information recovered and the first operation permission information are compared with data to be checked It is right, obtain comparison result;
When the comparison result is not have user identity to authorize the operating right for accessing data, will be directed to described to be checked The illegal operation result of data is exported.
12. device according to claim 7 or 8, which is characterized in that the watermark embedding module is further used for:
By the watermark raw information being made of the identification information and the operation permission information carry out character string conversion, obtain with The first information that ASCII character decimal form indicates;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t by the value of n in order, respectively as t system of lagrange polynomial Number, using obtained result as the watermark information.
13. device according to claim 7 or 8, which is characterized in that the permission control module is located in described device Gateway side;
The watermark embedding module is integrated in described device in the form of plug-in unit, and is configured independently of the gateway side.
14. a kind of information processing unit towards big data platform structural data, comprising: processor and can be for storing The memory of the computer program run on processor;
Wherein, the processor is for when running the computer program, executing any one of the claims 1-6 the method The step of.
15. a kind of computer storage medium, is stored thereon with computer program, wherein the computer program is executed by processor The step of any one of Shi Shixian claim 1-6 the method.
CN201810013876.8A 2018-01-08 2018-01-08 A kind of watermark information processing method, device and computer storage medium Pending CN110022280A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810013876.8A CN110022280A (en) 2018-01-08 2018-01-08 A kind of watermark information processing method, device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810013876.8A CN110022280A (en) 2018-01-08 2018-01-08 A kind of watermark information processing method, device and computer storage medium

Publications (1)

Publication Number Publication Date
CN110022280A true CN110022280A (en) 2019-07-16

Family

ID=67187384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810013876.8A Pending CN110022280A (en) 2018-01-08 2018-01-08 A kind of watermark information processing method, device and computer storage medium

Country Status (1)

Country Link
CN (1) CN110022280A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101105832A (en) * 2007-08-13 2008-01-16 浙江工业大学 Relational database water mark embed and extraction method based on (t,n) threshold
CN103377329A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities
CN103425920A (en) * 2013-08-26 2013-12-04 江苏物联网研究发展中心 Audio information-based database security access control method of digital watermark
CN107026825A (en) * 2016-02-02 2017-08-08 中国移动通信集团陕西有限公司 A kind of method and system for accessing big data system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101105832A (en) * 2007-08-13 2008-01-16 浙江工业大学 Relational database water mark embed and extraction method based on (t,n) threshold
CN103377329A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities
CN103425920A (en) * 2013-08-26 2013-12-04 江苏物联网研究发展中心 Audio information-based database security access control method of digital watermark
CN107026825A (en) * 2016-02-02 2017-08-08 中国移动通信集团陕西有限公司 A kind of method and system for accessing big data system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王具龙,陈继红: ""基于(t,n)门限的数据库水印算法研究"", 《计算机科学》 *

Similar Documents

Publication Publication Date Title
Anand et al. Watermarking techniques for medical data authentication: a survey
Halder et al. Watermarking techniques for relational databases: Survey, classification and comparison
CN110324143A (en) Data transmission method, electronic equipment and storage medium
CN109658078B (en) Block chain private key generation method, device and medium based on biological characteristics
WO2017044554A1 (en) Biometric verification of a blockchain database transaction contributor
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
JP7024788B2 (en) Devices and methods for authenticating user equipment
EP1374464A1 (en) Method and apparatus for camouflaging of data, information and functional transformations
CN110855430A (en) Providing a secure object store using a hierarchical key system
CN113348455A (en) Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures
CN111242611A (en) Method and system for recovering digital wallet key
KR20200136829A (en) User apparatus and method for the protection of confidential data
CN111739200B (en) Fingerprint electronic lock and encryption and decryption authentication method thereof
Iftikhar et al. A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing
Uludag Secure biometric systems
CN110516425B (en) Secret sharing method and system
Cao et al. Using image sensor PUF as root of trust for birthmarking of perceptual image hash
JP2019109680A (en) Device, secure element, program, information processing method and information processing system
US11601291B2 (en) Authentication method and device for matrix pattern authentication
CN115051853B (en) Digital collection platform system
CN116049792A (en) Face registration and recognition method and face data protection system
CN110022280A (en) A kind of watermark information processing method, device and computer storage medium
Abboud Multifactor authentication for software protection
Ahmad et al. Fingerprinting non-numeric datasets using row association and pattern generation
US9882879B1 (en) Using steganography to protect cryptographic information on a mobile device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190716

RJ01 Rejection of invention patent application after publication