CN110022280A - A kind of watermark information processing method, device and computer storage medium - Google Patents
A kind of watermark information processing method, device and computer storage medium Download PDFInfo
- Publication number
- CN110022280A CN110022280A CN201810013876.8A CN201810013876A CN110022280A CN 110022280 A CN110022280 A CN 110022280A CN 201810013876 A CN201810013876 A CN 201810013876A CN 110022280 A CN110022280 A CN 110022280A
- Authority
- CN
- China
- Prior art keywords
- information
- data
- watermark
- user
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Abstract
The invention discloses a kind of information processing method towards big data platform structural data, device and computer storage mediums, wherein, the described method includes: receiving registration request, the identification information and operation permission information of unique identification user identity are generated according to the registration request;Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
Description
Technical field
The present invention relates to the information processing technology more particularly to a kind of watermark information processing methods, device and computer storage
Medium.
Background technique
In information processing towards big data platform structural data, for data watermark, it is broadly divided into fragility at present
Watermark and multipurpose watermarking.Fragile watermarking changes more sensitivity to content, is suitable for integrity verification.Multipurpose watermarking refers to
Data in database are after conventional database manipulation or malicious attack, still extractable watermark information out.Digital watermarking at present
Research is typically used for the data such as protection video, picture, database.Database water mark technology can resist in database to data
Conventional modification operation, there is preferable robustness.
Containing there are many acquiring structural data in traditional database in telecom operators' big data platform, as subscriber data,
Ticket etc., and the different visitor of big data platform has different operating rights to data.However for Downloadable data
, whether data lose control after leaving big data platform, can not identify user and go beyond one's commission to data and distort, propagate
Operation.Big data platform watermark need to can resist data and go out the normal modification operation after platform, and can normally mention after the modification
Take watermark information.
Although traditional database watermark has preferable robustness, it can be used for operator's big data platform data protection.It can
Due to can not identification operation permission and lead to not carry out subsequent tracing, and in big data platform, the data scale of construction is big, carries out water
Print embedding operation can bring no small expense.In this regard, not yet there is effective solution at present.
Summary of the invention
In view of this, the embodiment of the present invention is desirable to provide a kind of information processing side towards big data platform structural data
Method, device and computer storage medium solve at least problem of the existing technology.
The technical solution of the embodiment of the present invention is achieved in that
The watermark information processing method of the embodiment of the present invention, which comprises
Registration request is received, the identification information and operating right of unique identification user identity are generated according to the registration request
Information;
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
In above scheme, the method also includes:
Access request is received, by the information parsed from the access request and the identification information and the operating rights
Limit information is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse the access or legal of illegal user
The unauthorized access of user.
In above scheme, the identification information and the operation permission information after being generated according to the registration request, with
The identification information identifies the user right sheet form of the operation permission information and is safeguarded to correspond to;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
In above scheme, the method also includes:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information and first for including in the watermark information
Operation permission information.
In above scheme, the method also includes:
When tracing inquiry, the first identifier information recovered and the first operation permission information and data to be checked are carried out
It compares, obtains comparison result;
When the comparison result is not have operating right that user identity can authorize access data, will for it is described to
The illegal operation result of inquiry data is exported.
In above scheme, watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark
Information, comprising:
The watermark raw information being made of the identification information and the operation permission information is subjected to character string conversion, is obtained
To the first information indicated with ASCII character decimal form;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t, respectively as the t of lagrange polynomial by the value of n in order
A coefficient, using obtained result as the watermark information.
The information processing unit towards big data platform structural data of the embodiment of the present invention, described device include permission
Control module and watermark embedding module;Wherein,
The permission control module, is used for:
Registration request is received, the identification information and operating right of unique identification user identity are generated according to the registration request
Information;
Watermark embedding module is used for:
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
In above scheme, the permission control module is further used for:
Access request is received, by the information parsed from the access request and the identification information and the operating rights
Limit information is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse the access or legal of illegal user
The unauthorized access of user.
In above scheme, the permission control module is further used for:
The identification information and the operation permission information according to the registration request after generating, with the identification information
It identifies the user right sheet form of the operation permission information to correspond to and is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
In above scheme, described device further include:
Trace back block is used for:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information and first for including in the watermark information
Operation permission information.
In above scheme, the trace back block is further used for:
When tracing inquiry, the first identifier information recovered and the first operation permission information and data to be checked are carried out
It compares, obtains comparison result;
When the comparison result is not have operating right that user identity can authorize access data, will for it is described to
The illegal operation result of inquiry data is exported.
In above scheme, the watermark embedding module is further used for:
The watermark raw information being made of the identification information and the operation permission information is subjected to character string conversion, is obtained
To the first information indicated with ASCII character decimal form;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t, respectively as the t of lagrange polynomial by the value of n in order
A coefficient, using obtained result as the watermark information.
In above scheme, the permission control module is located at the gateway side in described device;
The watermark embedding module is integrated in described device in the form of plug-in unit, and is set independently of the gateway side
It sets.
The information processing unit towards big data platform structural data of the embodiment of the present invention, comprising: processor and use
In the memory for the computer program that storage can be run on a processor;
Wherein, the processor is for when running the computer program, executing any one of above scheme the method
The step of.
The computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer program quilt
The step of any one of above scheme the method is realized when processor executes.
Using the embodiment of the present invention, registration request is received, unique identification user identity is generated according to the registration request
Identification information and operation permission information;Watermark pretreatment is carried out according to the identification information and the operation permission information, is obtained
Watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, the second data are obtained, due to can
To be that identification information and operation permission information are carried out to watermark pretreatment, therefore obtained watermark information can be grasped by mark
Subsequent retrospect processing is carried out as permission, and the generation of watermark information is divided in different modules respectively from the management of permission
Cloth processing, avoid in big data platform it is big for the data scale of construction carry out the brought expense of watermark embedding operation greatly ask
Topic.
Detailed description of the invention
Fig. 1 is the implementation flow chart of one method of the embodiment of the present invention;
Fig. 2 is using one system construction drawing of the embodiment of the present invention;
Fig. 3 is using one big data platform process flow diagram of the embodiment of the present invention;
Fig. 4 is using one trace back block process flow diagram of the embodiment of the present invention.
Specific embodiment
The implementation of technical solution is described in further detail with reference to the accompanying drawing.
A kind of watermark information processing method of the embodiment of the present invention, as shown in Figure 1, which comprises
Step 101, receive registration request, according to the registration request generate unique identification user identity identification information and
Operation permission information.
Step 102 carries out watermark pretreatment according to the identification information and the operation permission information, obtains watermark letter
Breath.
Step 103 carries out watermark insertion processing to received first data according to the watermark information, obtains the second number
According to.
Using the embodiment of the present invention, registration request is received, unique identification user identity is generated according to the registration request
Identification information and operation permission information;Watermark pretreatment is carried out according to the identification information and the operation permission information, is obtained
Watermark information;Watermark insertion processing is carried out to received first data according to the watermark information, the second data are obtained, due to can
To be that identification information and operation permission information are carried out to watermark pretreatment, therefore obtained watermark information can be grasped by mark
Subsequent retrospect processing is carried out as permission, and the generation of watermark information is divided in different modules respectively from the management of permission
Cloth processing, avoid in big data platform it is big for the data scale of construction carry out the brought expense of watermark embedding operation greatly ask
Topic.
In one embodiment of the embodiment of the present invention, it can will be parsed from the access request by receiving access request
Information out is compared with the identification information and the operation permission information, to determine that user identity can authorize access data
Operating right.When having the operating right that user identity can authorize access data, pass through the access request of legitimate user.And
When not having the operating right that user identity can authorize access data, refuse the access of illegal user or getting over for legitimate user
Power access.
In one embodiment of the embodiment of the present invention, the identification information and the operation permission information are according to the registration
After request generates, identifies the user right sheet form of the operation permission information to correspond to the identification information and safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
In one embodiment of the embodiment of the present invention, the method also includes: acquisition second data extract insertion institute
State the watermark information in the second data.The watermark information is converted, to recover include in the watermark information
One identification information and the first operation permission information.
In one embodiment of the embodiment of the present invention, the method also includes: when tracing inquiry, by the recover first mark
Know information and the first operation permission information is compared with data to be checked, obtains comparison result.When the comparison result is not
When having the operating right that user identity can authorize access data, it will be carried out for the illegal operation result of the data to be checked
Output.
In one embodiment of the embodiment of the present invention, it is pre- that watermark is carried out according to the identification information and the operation permission information
Processing, obtain watermark information, comprising: by the watermark raw information being made of the identification information and the operation permission information into
The conversion of line character string, obtains the first information indicated with ASCII character decimal form.The first information is located as integer
Reason, as dividing the key k deposited.According to thresholding t, the k is divided into the part t, respectively as glug by the value of n in order
The polynomial t coefficient of Lang, using obtained result as the watermark information.
For the watermark pretreatment involved in above-described embodiment and watermark insertion processing, a kind of watermarking algorithm
(watermarking algorithm for being based on (t, n) thresholding is realized using Lagrangian difference arithmetic) includes following content:
1) watermark pretreatment: being converted to ASCII character decimal form for the character string of the raw information containing watermark and be expressed as X,
X is handled as one big integer, as dividing the key k deposited.Then according to thresholding t, the value of n divides k in order
At the part t, respectively as Lagrangian (Lagrange) polynomial t coefficient (including constant term), segmentation is abided by this way
Rule: the higher item of power in multinomial, corresponding coefficient value are smaller.
2) it marks: using hash function that tuple is marked using major key P, key Key as parameter and calculate each attribute
Hash mark value Hash (P, Key), in the case where major key is not attacked, attacker does not know key Key, is difficult to find watermark
Embedded location destroy watermark.
3) watermark is embedded in: embedding information in the numeric type data of relational database can usually be held using numeric type data
Certain error is born to realize.Assuming that the attribute A of embeddable watermark1,A2...AnIn the decimal system digit that can be embedded into be c, i.e.,
It can be by modifying attribute AiLow c of (i ∈ [1, n]) are embedded in watermark, then integer X are divided into r group by formula (1), convert
For decimal integer sequence W.Shown in the calculation method of r such as formula (2), arbitrary integer W, length c are taken in formula (1), if not
Sufficient C then mends 0.
W={ w1,w2,...wi,...wr|wi∈ Z+ } formula (1)
Wherein lxFor decimal system digit formula (2) shared by X
For Shamir (t, n) threshold schemes and Lagrange interpolation polynomial, Shamir proposed one in 1979
(t, the n) threshold schemes of kind based on Lagrange interpolation polynomial, are divided into n sub-secret for secret, then at least need t son secret
Close owner could restore initial secret.If p is a Big prime, shared key k ∈ K=Zp(finite field ZpFor integer item Z mould p
Residual class ring).Distributing sub-key to n participant, steps are as follows:
(1) t-1 order polynomial f (x)=a is selectedt-1xt-1+...+a1x+a0∈Zp, coefficient a0=k, i.e. f (x)=k;
Wherein, at- 1 ... ... a0Refer to coefficient.ZpRefer to finite field.
(2) secret is divided into n sub-secret x1,x2...xn, and calculate yi=f (xi),1≤i≤n;
(3) f (x) that t sub-key can reconstruct is given are as follows:
It is easy to calculate k=f (0), so
A kind of information processing unit towards big data platform structural data of the embodiment of the present invention, described device include
Permission control module and watermark embedding module;Wherein, the permission control module, is used for: registration request is received, according to the note
Volume request generates the identification information and operation permission information of unique identification user identity;Watermark embedding module is used for: according to described
Identification information and the operation permission information carry out watermark pretreatment, obtain watermark information;According to the watermark information to reception
The first data carry out watermark insertion processing, obtain the second data.
Using the embodiment of the present invention, registration request is received by permission control module, is generated only according to the registration request
The identification information and operation permission information of one identity user identity;By watermark embedding module according to the identification information and described
Operation permission information carries out watermark pretreatment, obtains watermark information;Received first data are carried out according to the watermark information
Watermark insertion processing, obtains the second data, and since permission control module can be located at gateway, and watermark embedding module can not be set
It is placed in gateway, then the function of watermark pretreatment is transferred into watermark embedding module from gateway and individually handled, therefore, saved net
The processing pressure of pass.In watermark embedding module, identification information and operation permission information can be subjected to watermark pretreatment, obtained
Watermark information, subsequent retrospect processing can also be carried out by identification operation permission, by the generation and permission of watermark information
Management carry out distributed treatment in different module respectively, avoid in progress big for the data scale of construction in big data platform
The big problem of the brought expense of watermark embedding operation.
In one embodiment of the embodiment of the present invention, the permission control module is further used for: access request is received, it will
The information parsed from the access request is compared with the identification information and the operation permission information, to determine to use
Family identity can authorize the operating right of access data;When having the operating right that user identity can authorize access data, pass through
The access request of legitimate user;When not having the operating right that user identity can authorize access data, refuse illegal user's
The unauthorized access of access or legitimate user.
In one embodiment of the embodiment of the present invention, the permission control module is further used for: the identification information and institute
Operation permission information is stated after generating according to the registration request, is believed with the identification information to correspond to the mark operating right
The user right sheet form of breath is safeguarded;The data access that user identity can be authorized is determined according to the user right sheet form
Permission.
In one embodiment of the embodiment of the present invention, described device further include: trace back block is used for: acquisition second number
According to extracting the watermark information being embedded in second data;The watermark information is converted, to recover the watermark
The first identifier information and the first operation permission information for including in information.
In one embodiment of the embodiment of the present invention, the trace back block is further used for: when tracing inquiry, will restore
First identifier information and the first operation permission information out is compared with data to be checked, obtains comparison result;When the ratio
It is that when not having user identity to authorize the operating right for accessing data, the illegal behaviour of the data to be checked will be directed to result
It is exported as result.
The identification information and the operation permission information have backup in watermark embedding module and trace back block, so as to
It is compared and traces to the source, determine that user identity can authorize the operating right etc. of access data.
In one embodiment of the embodiment of the present invention, the watermark embedding module is further used for: will be by the identification information
Character string conversion is carried out with the watermark raw information that the operation permission information is constituted, is obtained with ASCII character decimal form table
The first information shown;The first information is handled as integer, as dividing the key k deposited;According to thresholding t, n's is taken
Value, is divided into the part t for the k in order, respectively as t coefficient of lagrange polynomial, using obtained result as
The watermark information.
In one embodiment of the embodiment of the present invention, the permission control module is located at the gateway side in described device;It is described
Watermark embedding module is integrated in described device in the form of plug-in unit, and is configured independently of the gateway side.
A kind of information processing unit towards big data platform structural data of the embodiment of the present invention, comprising: processor
With the memory for storing the computer program that can be run on a processor;Wherein, the processor is described for running
When computer program, the step of executing any one of above-described embodiment the method.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey
The step of any one of above-described embodiment the method is realized when sequence is executed by processor.
The embodiment of the present invention is described below by taking a practical application scene as an example:
Digital watermarking is typically used for the data such as protection video, picture, database.Traditional database digital watermark can support
To the conventional modification operation of data in anti-database, there is preferable robustness.Traditional database digital watermark can to entire or
A part of database data carries out watermark embedding operation.And in big data platform, the data scale of construction is big, carries out to entire database
It is excessive that watermark is embedded in expense.The information of digital watermark embedding is generally identity information at present, so as to stage appraising datum source of tracing to the source,
But user's operation permission is identified not in watermark.Access user is more in big data platform, and different user is for phase
Operating right with data is also not quite similar, and after especially data leave big data platform, can not control user behavior,
It is difficult to find user and illegally distorts, propagates etc. behaviors to data.Current digital watermarking does not differentiate between different user to data
Different operating rights, it is whether legal in the operation that the retrospect stage can not intuitively find out that user executes data.In this regard, transporting
It seeks in the application scenarios of quotient's big data platform, digital watermark technology needs to adapt to the demand of big data platform, can be to big data
Structural data is embedded in multipurpose watermarking and carries out protection of tracing to the source in platform.Wherein, the multipurpose watermarking refers in database
Data after conventional database manipulation or malicious attack, still it is extractable go out watermark information.In addition to protection of tracing to the source, it is also necessary to will
Watermark is associated with operating right of the user to data, to show that user's is legal by the watermark of extraction in the retrospect stage
Lawful authority is compared with the data manipulation (such as data modification, transmitting) actually occurred, can find to use by operating right
Whether family has carried out unauthorized operation to the data taken in platform.
This application scene application embodiments of the present invention are a kind of suitable for operator's big data platform, towards big number
It traces to the source scheme according to the digital watermarking of platform structure data.One system architecture is as shown in Fig. 2, mainly comprise the following modules:
1) line module (not showing in Fig. 2), line module can be located at big data platform or independently of big data platforms,
For receiving the request of user:
User refers to that the user of access big data platform data, user carry personally identifiable information to big data platform Shen first
It please register, the operating right for obtaining big data platform access account and corresponding data (is checked after such as read-only, modification, downloading, downloaded
And modify, download and transmit, wherein transmitting uses data sharing to other people after referring to user's downloading).
2) permission control module:
Permission control module is deployed in big data platform exit with gateway module, can receive all visits of external user
It asks and delivers big data platform corresponding assembly after application is handled, deliver user after receiving unit feedback data inspection, and be responsible for
Complete registration, the authorization, access control of user:
A. user identity is audited in registration phase, generates unique identity for each user;
B. user is authorized, determines the data access authority that user identity can be authorized, safeguard user right table;
C. in user's dial-tone stage, the access of user identity and application is determined, refuses unauthorized users to access and conjunction
The unauthorized access of method user delivers component plug-in module to the Lawful access of legitimate user.
3) watermark embedding module:
Watermark embedding module is integrated with plug-in mode and each component of big data platform, is responsible for reception authority module and is delivered
User identity and authority information, carry out watermark pretreatment form binary watermark sequence.The data that receiving unit returns are looked into
It askes as a result, and carrying out watermark embedding operation.
4) trace back block (not showing in Fig. 2), trace back block can be located at big data platform or independently of big data platforms,
For being traced to watermark information:
Trace back block is mainly used for the later period to collected data progress watermark extracting and Authority Verification, can count independently of big
According to system, it is primarily adapted for use in and audits to the data after outflow big data platform.
For the data (there is user permission to be downloaded to data) of big data platform can be gone out, it should be limited and go out platform
Permission afterwards prevents from the operation such as illegally distorting, propagate.Trace back block has watermark extracting and transfer capability, extracts insertion number
Watermark in recovering the identity information and authority information for including in watermark, is compared (as recovered with practical operation
Whether identity information matches with the user for actually holding this data, and carrying out the data of watermark extracting, whether some is difficult to mention
Take, it is difficult to which the part for extracting watermark may be tampered), to find the illegal operation of user.
The process flow realized using above system framework is as shown in Figure 3, comprising:
Step 201 sends identity information to permission control module by line module;
Step 202, permission control module carry out account authority distribution;
Step 203 sends request of data to permission control module by line module;
Step 204, permission control module carry out identity and Authority Verification and then follow the steps 205 if authentication failed;Such as
Fruit is proved to be successful, and thens follow the steps 206;
Step 205, permission control module return to failed message to line module;
Step 206, permission control module send the request comprising identity, permission and access request to watermark embedding module and disappear
Breath;
Step 207-211, data query, watermark pretreatment, watermark insertion are carried out in watermark embedding module, data is returned
Permission control module is given, then line module is returned data to by permission control module.
It include line module, permission control module and watermark embedding module in big data platform in present treatment process.?
User complete registration after can login user module initiate data access request, permission control module receive user access request, it is right
User name and access authority are checked, if request, beyond the authorization to this user, denied access then will if valid operation
The operation permission information of subscriber identity information and requested data is forwarded to watermark embedding module.Watermark embedding module receives permission
After control module operation requests, completion data query task first, then using subscriber identity information and operation permission information as
Watermark data is pre-processed to obtain binary system watermark sequence, is embedded in query result data by original watermark data, finally will place
It manages result and returns to permission control module.Processing result is returned to by line module by permission control module again.
For can be independently of the trace back block of above-mentioned big data platform, a process flow be as shown in Figure 4, comprising:
Step 301, data collection;
Step 302, watermark extracting;
Step 303, permission compare;
Step 304, result output.
In present treatment process, trace back block carries out trace-back operation to the data being collected into: first with watermark extraction algorithm
Watermark extracting is carried out to data, obtains user identity and authority information, then by identity and authority and the practical holder of data into
Row compares, and carrying out result output to illegal operation, (such as watermark information is that user A there is downloading to check permission without transmitting this data
Permission, and this data is obtained from user B when data collection, then it is assumed that A, which goes beyond one's commission, transmits data or B generation stealing).
In this application scene, using user right as watermark information, i.e., data manipulation permission is combined with watermark, is realized
Two-dimensions data based on user identity and permission are traced to the source, and with big data platform gateway combination big data platform plug-in unit or are inserted
Part module (such as watermark embedding module is integrated with plug-in mode and each component of big data platform) mode is realized, thus refinement
Big data platform is traced to the source granularity.Using gateway and big data platform plug-in unit or card module, (such as watermark embedding module is with plug-in unit
Mode is integrated with each component of big data platform) mode that combines, by big data platform gateway realize to user identity,
Permission is uniformly controlled, and card module realizes watermark insertion, and calculating task is distributed to various components and is completed, gateway mould is reduced
Block bottleneck risk.
If the module integrated described in the embodiment of the present invention is realized in the form of software function module and as independent production
Product when selling or using, also can store in a computer readable storage medium.Based on this understanding, the present invention is real
Applying the technical solution of example, substantially the part that contributes to existing technology can embody in the form of software products in other words
Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can
To be personal computer, server or network equipment etc.) execute the whole or portion of each embodiment the method for the present invention
Point.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random
The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
It is combined in this way, the embodiment of the present invention is not limited to any specific hardware and software.
Correspondingly, the embodiment of the present invention also provides a kind of computer storage medium, wherein it is stored with computer program, the meter
Calculation machine program is used to execute the information processing method towards big data platform structural data of the embodiment of the present invention.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (15)
1. a kind of watermark information processing method, which is characterized in that the described method includes:
Registration request is received, the identification information of unique identification user identity is generated according to the registration request and operating right is believed
Breath;
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
2. the method according to claim 1, wherein the method also includes:
Access request is received, the information parsed from the access request and the identification information and the operating right are believed
Breath is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse access or the legitimate user of illegal user
Unauthorized access.
3. method according to claim 1 or 2, which is characterized in that the identification information and the operation permission information exist
After generating according to the registration request, the user right table shape for identifying the operation permission information is corresponded to the identification information
Formula is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
4. method according to claim 1 or 2, which is characterized in that the method also includes:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information for including in the watermark information and the first operation
Authority information.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
When tracing inquiry, the first identifier information recovered and the first operation permission information are compared with data to be checked
It is right, obtain comparison result;
When the comparison result is not have user identity to authorize the operating right for accessing data, will be directed to described to be checked
The illegal operation result of data is exported.
6. method according to claim 1 or 2, which is characterized in that believed according to the identification information and the operating right
Breath carries out watermark pretreatment, obtains watermark information, comprising:
By the watermark raw information being made of the identification information and the operation permission information carry out character string conversion, obtain with
The first information that ASCII character decimal form indicates;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t by the value of n in order, respectively as t system of lagrange polynomial
Number, using obtained result as the watermark information.
7. a kind of information processing unit towards big data platform structural data, which is characterized in that described device includes permission
Control module and watermark embedding module;Wherein,
The permission control module, is used for:
Registration request is received, the identification information of unique identification user identity is generated according to the registration request and operating right is believed
Breath;
Watermark embedding module is used for:
Watermark pretreatment is carried out according to the identification information and the operation permission information, obtains watermark information;
Watermark insertion processing is carried out to received first data according to the watermark information, obtains the second data.
8. device according to claim 7, which is characterized in that the permission control module is further used for:
Access request is received, the information parsed from the access request and the identification information and the operating right are believed
Breath is compared, to determine that user identity can authorize the operating right of access data;
When having the operating right that user identity can authorize access data, pass through the access request of legitimate user;
When not having the operating right that user identity can authorize access data, refuse access or the legitimate user of illegal user
Unauthorized access.
9. device according to claim 7 or 8, which is characterized in that the permission control module is further used for:
The identification information and the operation permission information are come pair after being generated according to the registration request with the identification information
The user right sheet form that the operation permission information should be identified is safeguarded;
The data access authority that user identity can be authorized is determined according to the user right sheet form.
10. device according to claim 7 or 8, which is characterized in that described device further include:
Trace back block is used for:
Second data are acquired, the watermark information being embedded in second data is extracted;
The watermark information is converted, to recover the first identifier information for including in the watermark information and the first operation
Authority information.
11. device according to claim 10, which is characterized in that the trace back block is further used for:
When tracing inquiry, the first identifier information recovered and the first operation permission information are compared with data to be checked
It is right, obtain comparison result;
When the comparison result is not have user identity to authorize the operating right for accessing data, will be directed to described to be checked
The illegal operation result of data is exported.
12. device according to claim 7 or 8, which is characterized in that the watermark embedding module is further used for:
By the watermark raw information being made of the identification information and the operation permission information carry out character string conversion, obtain with
The first information that ASCII character decimal form indicates;
The first information is handled as integer, as dividing the key k deposited;
According to thresholding t, the k is divided into the part t by the value of n in order, respectively as t system of lagrange polynomial
Number, using obtained result as the watermark information.
13. device according to claim 7 or 8, which is characterized in that the permission control module is located in described device
Gateway side;
The watermark embedding module is integrated in described device in the form of plug-in unit, and is configured independently of the gateway side.
14. a kind of information processing unit towards big data platform structural data, comprising: processor and can be for storing
The memory of the computer program run on processor;
Wherein, the processor is for when running the computer program, executing any one of the claims 1-6 the method
The step of.
15. a kind of computer storage medium, is stored thereon with computer program, wherein the computer program is executed by processor
The step of any one of Shi Shixian claim 1-6 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810013876.8A CN110022280A (en) | 2018-01-08 | 2018-01-08 | A kind of watermark information processing method, device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810013876.8A CN110022280A (en) | 2018-01-08 | 2018-01-08 | A kind of watermark information processing method, device and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110022280A true CN110022280A (en) | 2019-07-16 |
Family
ID=67187384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810013876.8A Pending CN110022280A (en) | 2018-01-08 | 2018-01-08 | A kind of watermark information processing method, device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110022280A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101105832A (en) * | 2007-08-13 | 2008-01-16 | 浙江工业大学 | Relational database water mark embed and extraction method based on (t,n) threshold |
CN103377329A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities |
CN103425920A (en) * | 2013-08-26 | 2013-12-04 | 江苏物联网研究发展中心 | Audio information-based database security access control method of digital watermark |
CN107026825A (en) * | 2016-02-02 | 2017-08-08 | 中国移动通信集团陕西有限公司 | A kind of method and system for accessing big data system |
-
2018
- 2018-01-08 CN CN201810013876.8A patent/CN110022280A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101105832A (en) * | 2007-08-13 | 2008-01-16 | 浙江工业大学 | Relational database water mark embed and extraction method based on (t,n) threshold |
CN103377329A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Method for protecting CAD (computer-aided design) data on basis of watermark encryption identities |
CN103425920A (en) * | 2013-08-26 | 2013-12-04 | 江苏物联网研究发展中心 | Audio information-based database security access control method of digital watermark |
CN107026825A (en) * | 2016-02-02 | 2017-08-08 | 中国移动通信集团陕西有限公司 | A kind of method and system for accessing big data system |
Non-Patent Citations (1)
Title |
---|
王具龙,陈继红: ""基于(t,n)门限的数据库水印算法研究"", 《计算机科学》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Anand et al. | Watermarking techniques for medical data authentication: a survey | |
Halder et al. | Watermarking techniques for relational databases: Survey, classification and comparison | |
CN110324143A (en) | Data transmission method, electronic equipment and storage medium | |
CN109658078B (en) | Block chain private key generation method, device and medium based on biological characteristics | |
WO2017044554A1 (en) | Biometric verification of a blockchain database transaction contributor | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
JP7024788B2 (en) | Devices and methods for authenticating user equipment | |
EP1374464A1 (en) | Method and apparatus for camouflaging of data, information and functional transformations | |
CN110855430A (en) | Providing a secure object store using a hierarchical key system | |
CN113348455A (en) | Apparatus and method for providing authentication, non-repudiation, managed access, and twin discrimination of data using data control signatures | |
CN111242611A (en) | Method and system for recovering digital wallet key | |
KR20200136829A (en) | User apparatus and method for the protection of confidential data | |
CN111739200B (en) | Fingerprint electronic lock and encryption and decryption authentication method thereof | |
Iftikhar et al. | A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing | |
Uludag | Secure biometric systems | |
CN110516425B (en) | Secret sharing method and system | |
Cao et al. | Using image sensor PUF as root of trust for birthmarking of perceptual image hash | |
JP2019109680A (en) | Device, secure element, program, information processing method and information processing system | |
US11601291B2 (en) | Authentication method and device for matrix pattern authentication | |
CN115051853B (en) | Digital collection platform system | |
CN116049792A (en) | Face registration and recognition method and face data protection system | |
CN110022280A (en) | A kind of watermark information processing method, device and computer storage medium | |
Abboud | Multifactor authentication for software protection | |
Ahmad et al. | Fingerprinting non-numeric datasets using row association and pattern generation | |
US9882879B1 (en) | Using steganography to protect cryptographic information on a mobile device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190716 |
|
RJ01 | Rejection of invention patent application after publication |