CN110363020A - Screenshotss monitoring method, device, computer equipment and storage medium - Google Patents

Screenshotss monitoring method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110363020A
CN110363020A CN201910506134.3A CN201910506134A CN110363020A CN 110363020 A CN110363020 A CN 110363020A CN 201910506134 A CN201910506134 A CN 201910506134A CN 110363020 A CN110363020 A CN 110363020A
Authority
CN
China
Prior art keywords
screenshotss
client
image
information
screenshotss image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910506134.3A
Other languages
Chinese (zh)
Other versions
CN110363020B (en
Inventor
陈琳琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910506134.3A priority Critical patent/CN110363020B/en
Publication of CN110363020A publication Critical patent/CN110363020A/en
Application granted granted Critical
Publication of CN110363020B publication Critical patent/CN110363020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a kind of screenshotss monitoring method, device, computer equipment and storage mediums;By the operational order for monitoring client in real time;If operational order is screen interception instruction, obtains screen interception and instruct corresponding screenshotss image;Infomation detection is carried out to screenshotss image, judges that snapshot seems no comprising sensitive information;If screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image;Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is illegal behavior to the operation behavior of screenshotss image, it then sends warning information and executes lock operation if not receiving client within a preset time to the cancel an order of illegal behavior to client;First real-time detection snapshot seems no if reminding user to cancel again comprising sensitive information not only to avoid the leakage of sensitive information in screenshotss image comprising sensitive information, it is ensured that the accuracy being monitored to screenshotss image.

Description

Screenshotss monitoring method, device, computer equipment and storage medium
Technical field
The present invention relates to cloud monitoring fields more particularly to a kind of screenshotss monitoring method, device, computer equipment and storage to be situated between Matter.
Background technique
With the fast development of internet, guarantee that the safety of information plays more and more important work in information transmission With.The routine work of people and it is social during, people often by using screenshotss tool to webpage or document content into Row saves or shares, and so as to cause passing through, the case where screenshotss image carries out information leakage is also more and more therewith.Therefore, effectively Screenshotss image, which is managed or is monitored, has considerable effect.Currently, screenshotss image is managed or is supervised in the market The method of control is most of all fairly simple, if there are screenshotss movements by discovery user, lock operation is just directly executed, to give user Use bring great inconvenience.
Summary of the invention
The embodiment of the present invention provides a kind of screenshotss monitoring method, device, computer equipment and storage medium, to solve to cutting The monitoring inaccuracy problem of screen behavior.
A kind of screenshotss monitoring method, comprising:
Monitor the operational order of client in real time;
If the operational order is screenshotss instruction, obtains the screenshotss and instruct corresponding screenshotss image;
Infomation detection is carried out to the screenshotss image, judges that the snapshot seems no comprising sensitive information;
If the screenshotss image includes the sensitive information, the client is monitored in real time to the behaviour of the screenshotss image Make behavior;
Judge whether the client is illegal behavior to the operation behavior of the screenshotss image, if the client pair The operation behavior of the screenshotss image is illegal behavior, then sends warning information to the client;
If not receiving the client within a preset time to the cancel an order of the illegal behavior, locking is executed Operation.
A kind of screenshotss monitoring device, comprising:
Operational order monitoring module, for monitoring the operational order of client in real time;
Screenshotss image collection module, for obtaining the screenshotss instruction and corresponding to when the operational order is that screenshotss instruct Screenshotss image;
Information detecting module judges that the snapshot seems no and includes for carrying out infomation detection to the screenshotss image Sensitive information;
Operation behavior monitoring module, for monitoring the visitor in real time when the screenshotss image includes the sensitive information Operation behavior of the family end to the screenshotss image;
Whether first judgment module is illegal row to the operation behavior of the screenshotss image for judging the client To send warning information to the client if the client is illegal behavior to the operation behavior of the screenshotss image End;
Lock operation module, for not receiving revocation of the client to the illegal behavior within a preset time When instruction, lock operation is executed.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing The computer program run on device, the processor realize above-mentioned screenshotss monitoring method when executing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter Calculation machine program realizes above-mentioned screenshotss monitoring method when being executed by processor.
Above-mentioned screenshotss monitoring method, device, computer equipment and storage medium, the operation by monitoring client in real time refer to It enables;If operational order is screen interception instruction, obtains screen interception and instruct corresponding screenshotss image;Letter is carried out to screenshotss image Breath detection judges that snapshot seems no comprising sensitive information;If screenshotss image includes sensitive information, the client is monitored in real time Hold the operation behavior to screenshotss image;Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client Holding the operation behavior to screenshotss image is illegal behavior, then sends warning information to client, if not connecing within a preset time Client is received to the cancel an order of illegal behavior, then executes lock operation;First real-time detection snapshot seems no comprising quick Feel information and not only avoid the leakage of sensitive information in screenshotss image if reminding user to cancel again comprising sensitive information, also It ensure that the accuracy being monitored to screenshotss behavior.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of screenshotss monitoring method in one embodiment of the invention;
Fig. 2 is the exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 3 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 4 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 5 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 6 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 7 is a functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Fig. 8 is another functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Fig. 9 is another functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Figure 10 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Screenshotss monitoring method provided in an embodiment of the present invention, the screenshotss monitoring method can apply ring using as shown in Figure 1 In border.Specifically, which applies in screenshotss monitoring system, which includes as shown in Figure 1 Client and server-side, client are communicated with server-side by network, for solving the inaccuracy of the monitoring to screenshotss image Problem.Wherein, client is also known as user terminal, refers to corresponding with server-side, provides the program of local service for client.Client Hold it is mountable but be not limited to various personal computers, laptop, smart phone, tablet computer and portable wearable set It is standby upper.Server-side can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of screenshotss monitoring method, the service in Fig. 1 is applied in this way It is illustrated, includes the following steps: for end
S10: the operational order of client is monitored in real time.
Wherein, the operational order of client refers to user in the operation behavior instruction generated of client executing.It is exemplary Ground, after the operation behaviors such as user touchs, clicks in client executing, slides, frame choosing or screenshotss, client forms corresponding behaviour It instructs.Client can be computer terminal or mobile terminal etc..Optionally, the operational order for monitoring client in real time can lead to It crosses and monitors script plug-in unit, operation behavior of the real-time monitoring users in customer terminal webpage in customer terminal webpage insertion one.When monitoring foot This plug-in unit listens to user in the operation behavior of customer terminal webpage, generates corresponding operational order in real time, and the operation is referred to It enables and is sent to server-side in real time.Additionally, use can also be monitored in real time by computer behavior supervisory systems or monitor supervision platform Family generates corresponding operational order in the operation behavior of client, and sends server-side in real time for the operational order.
S20: it if operational order is screenshotss instruction, obtains screen interception and instructs corresponding screenshotss image.
Wherein, screenshotss refer to user's instruction generated after client executing screenshotss behavior.Screenshotss image refers to user The image generated after client executing screenshotss behavior.Specifically, user can carry out screenshotss to entire screen in client, Or screenshotss are carried out to certain a part in screen in client.Optionally, screenshotss image can for one or multiple.Specifically Ground obtains screen interception instruction and corresponds to if server-side receives the operational order of client transmission as screen interception instruction Screenshotss image.
S30: carrying out infomation detection to screenshotss image, judges that snapshot seems no comprising sensitive information.
Wherein, sensitive information refers to preset, inconvenient to outward leakage or disclosed information.Such as: sensitive information can Think personal information, financial data, or is related to the information etc. of classified papers.In a specific embodiment, server-side It is previously provided with dedicated for saving the customized sensitive information library of sensitive information.Specifically, information inspection is carried out to screenshotss image Survey includes: to carry out information identification to the screenshotss image using character recognition tool, is obtained from the screenshotss image corresponding to be tested Information is demonstrate,proved, then judges whether in the information to be verified obtained include sensitive information.Optionally, judge be in information to be verified No includes sensitive information, can be used string matching algorithm will be prestored in information to be verified and customized sensitive information library it is quick Sense information is matched one by one;Or canonical matching method is used, by what is prestored in information to be verified and customized sensitive information library Sensitive information is matched one by one.If the sensitive information successful match prestored in information to be verified and customized sensitive information library, Then indicate that the screenshotss image includes sensitive information, if the sensitive information prestored in information to be verified and customized sensitive information library With failure, then it represents that the screenshotss image does not include sensitive information.
S40: if screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image.
Specifically, if judging to obtain screenshotss image to include sensitive information according to step S30, user is monitored in real time in client Hold the operation behavior to the screenshotss image.It in this step, can by real time monitoring client to the operation behavior of screenshotss image Prevent include the screenshotss image of sensitive information leakage.
In a specific embodiment, it if judging to obtain screenshotss image not comprising sensitive information according to step S30, removes Monitor client is sold to the operation behavior of the screenshotss image.Under the premise of guaranteeing the information security of screenshotss image, moreover it is possible to save Save background service resource.
S50: judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is to screenshotss image Operation behavior be illegal behavior, then send warning information to client.
Wherein, illegal behavior refers to the behavior that illegal operation is executed to the screenshotss image comprising sensitive information.Such as: it is non- Lawful acts can be the screenshotss image comprising sensitive information to be sent/is shared with non-permitted personnel, or will include sensitive letter The screenshotss image of breath is saved to non-designated file;Or the screenshotss image comprising sensitive information is printed;Or will include The screenshotss image of sensitive information is published to bulletin website etc..
Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is to the behaviour of screenshotss image Making behavior is illegal behavior, then sends warning information to client.Wherein, warning information is for prompting user to snapshot The operation of picture is the information of illegal behavior.Specifically, warning information includes the sensitivity for highlighting the screenshotss image and being included Information, and prompt the user whether the option information cancelled to the operation of the screenshotss image.
Specifically, judge whether client is illegal behavior to the operation behavior of screenshotss image, it can be by obtaining client Hold to the operation behavior of screenshotss image command information generated judge client to the operation behavior of screenshotss image whether be Illegal behavior.It is to be appreciated that user can generate corresponding after client executes any operation behavior to screenshotss image Then command information, the command information that server-side is sent by obtaining client carry out information identification, judgement to the command information Whether the command information is illegal command information;If it is illegal command information, judgement pair that identification, which obtains the command information, The operation behavior answered is illegal behavior.Conversely, being then lawful acts.Wherein, illegal command information refers to preset use It whether is illegal information to the operation behavior of screenshotss image in detecting client.
In one embodiment, if judging to obtain client to the operation behavior of screenshotss image as lawful acts, no Warning information is sent to client, and continues monitor client to the subsequent operation behavior of screenshotss image, can be further prevented Sensitive information leakage.
S60: if not receiving client within a preset time to the cancel an order of illegal behavior, locking behaviour is executed Make.
Specifically, if not receiving client within a preset time returns to cancel an order, lock operation is executed.Wherein, Preset time referred to for the period to user's revocation to the operation behavior of screenshotss image.Optionally, preset time can be set For 5s, 10s, 30s, 45s or 60s etc..It is to be appreciated that within a preset period of time, the revocable behaviour to screenshotss image of user Make behavior.If within a preset period of time, user does not cancel the operation behavior to screenshotss image, i.e. server-side does not receive client The cancel an order of return, then execute lock operation.Optionally, since the client in this programme can be computer end/mobile terminal, Therefore, executing lock operation can be for the locking of computer end/mobile terminal, or to the certain function in computer end/mobile terminal The locking of energy, or the locking to certain application-specifics on computer end/mobile terminal.Such as: it can be disconnected to be automatic The network connection of computer end/mobile terminal, or the mailbox on computer end/mobile terminal is locked, to guarantee that this is carried The screenshotss image of sensitive information can not be to outward leakage.
In one embodiment, if receiving the cancel an order of client return within a preset time, lock is not executed Fixed operation guarantees that user can normally execute other operations in customer terminal webpage.
In the present embodiment, pass through the operational order of real time monitoring client;If operational order is screen interception instruction, It obtains screen interception and instructs corresponding screenshotss image;Infomation detection is carried out to screenshotss image, judges that snapshot seems no comprising quick Feel information;If screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image;Judge client Whether the operation behavior to screenshotss image is illegal behavior, if client is illegal row to the operation behavior of screenshotss image For, then warning information is sent to client, if not receiving client within a preset time to the cancel an order of illegal behavior, Then execute lock operation;First real-time detection snapshot seems no comprising sensitive information, if reminded again comprising sensitive information user into Row revocation, not only avoids the leakage of sensitive information in screenshotss image, it is ensured that the accuracy that is monitored to screenshotss behavior.
In one embodiment, as shown in figure 3, carrying out infomation detection to screenshotss image, judge that snapshot seems no comprising quick Feel information, specifically comprises the following steps:
S301: information identification is carried out to screenshotss image, obtains the information to be verified in screenshotss image.
Wherein, information to be verified refers to the information that screenshotss image is included.Specifically, the pre-set text of server-side can be used Word identification facility (such as OCR software for discerning characters) carries out information identification to the screenshotss image of acquisition, to obtain the screenshotss image institute The information to be verified for including.Wherein, character recognition tool refers to the tool of text in picture for identification.Text in the present embodiment OCR software for discerning characters can be used in word identification facility, and OCR software for discerning characters has the advantages that recognition accuracy is high.
S302: information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching knot Fruit.
Wherein, the database of non-sensitive information database to be pre-set include several default sensitive informations.User can This is then preset sensitive information previously according to the default sensitive information of preset requirement setting predetermined quantity in the client It stores in the non-sensitive information database of server-side.
Specifically, after getting the information to be verified in screenshotss image, by information to be verified and sensitive information data Default sensitive information in library is matched, to judge in information to be verified with the presence or absence of sensitive information;If in information to be verified There are sensitive informations, then obtaining matching result is successful match.Conversely, if sensitive information is not present in information to be verified, It is that it fails to match to matching result.
In a specific implementation method, judging can be according to preset standard with the presence or absence of sensitive information in information to be verified Or mode is configured.Specifically, default sensitive information can be set as including special sensitive information and common sensitive information. Firstly, after getting the information to be verified in screenshotss image, first according to using specific character the characteristics of special sensitive information As long as perhaps preset field of going here and there, which is treated verification information and inquired in information to be verified, there is above-mentioned specific character string or pre- If field, it is assumed that there are sensitive informations in information to be verified.Such as: it can be by phone number, bank card number, identification card number Code regards as special sensitive information;Specific field can also be regarded as into special sensitive information, for example, user name, user The information such as location or the amount of money.Then, then string matching method is used, it will be general in the information to be verified and non-sensitive information database Logical sensitive information is matched one by one, if being not matched to information identical with common sensitive information in information to be verified, Illustrate not including common sensitive information in the information to be verified;If being matched in information to be verified identical with common sensitive information Information, then illustrate in the information to be verified comprising common sensitive information.
Preferably, in order to improve the accuracy of matching result, a matching threshold can be preset, if in information to be verified In be matched to the quantity of information identical with common sensitive information and be greater than matching threshold, then it represents that comprising general in the information to be verified Logical sensitive information;If the quantity for being matched to information identical with common sensitive information in information to be verified is equal to or less than matching Threshold value, then it represents that do not include common sensitive information in the information to be verified.Wherein, matching threshold refer to judge be in information to be verified The no critical value comprising common sensitive information.Matching threshold can be 20%, 30% or 50% etc., and user can be according to the actual situation Customized setting.
S303: if matching result is successful match, judge that screenshotss image includes sensitive information.
Specifically, if obtaining matching result according to step S302 is successful match, judge that the screenshotss image includes sensitivity Information.
S304: if matching result is that it fails to match, judge that screenshotss image does not include sensitive information.
Specifically, if obtaining matching result according to step S302 is that it fails to match, it is quick to judge that the screenshotss image does not include Feel information.
In the present embodiment, by carrying out information identification to screenshotss image, the information to be verified in screenshotss image is obtained;It will Information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching result;If matching result is Successful match then judges that screenshotss image includes sensitive information;If matching result is that it fails to match, judge that screenshotss image does not include Sensitive information;It ensure that the efficiency and accuracy detected to screenshotss image.
In one embodiment, if as shown in figure 4, operational order be screen interception instruction, obtain screen interception instruction After corresponding screenshotss image, and before carrying out infomation detection to screenshotss image, screenshotss monitoring method further includes following steps:
S21: the screenshotss page where screenshotss image is determined.
Wherein, the screenshotss page refers to that user executes the page where screenshotss operation behavior.Such as: user logs in a certain using journey When sequence, screenshotss operation is carried out to the login page in the application program and generates screenshotss image, then the login page is the screenshotss The screenshotss page where image.
S22: according to application program belonging to the screenshotss page, judge whether the screenshotss page belongs to sensitive page.
Wherein, sensitive page refer to may include sensitive information the page.Sensitive page can be intra-company's confidentiality The page where strong application program.Such as: the page being related to where the application program of company's operation report, or it is related to company The page etc. where the application program of internal information.In the present embodiment, application program includes but is not limited to App software.
Optionally it is determined that application program belonging to the screenshotss page can carry out the page to the screenshotss page by page detection tool Detection judges that the screenshotss page is realized with the presence or absence of the distinctive display mark of a certain application program.Optionally, application program is peculiar Display mark can for application program logo identify.Alternatively, answering in front stage operation when executing screenshotss operation by detection With program which includes.Such as: if detecting, the corresponding application program of Foxmail is in front stage operation when executing screenshotss operation, Then judge application program belonging to the screenshotss page for Foxmail.
After application program belonging to the screenshotss page has been determined, the condition managing of an application program can be preset Strategy, the condition managing strategy include each application program and corresponding status indicator.Wherein, status indicator includes sensitive mark Know and non-sensitive mark.In one embodiment, each application program is associated with corresponding status indicator in advance.Such as: The application program of intra-company's strong security is associated with sensitive identification, some inessential application programs and non-sensitive mark It is associated.Specifically, it after getting the screenshotss page, first determines application program belonging to the screenshotss page, is then answered according to this Corresponding status indicator is obtained with program, if the status indicator obtained is sensitive identification, judges that the screenshotss page belongs to sensitivity The page judges that the screenshotss page belongs to the non-sensitive page if the status indicator obtained is non-sensitive mark.It is to be appreciated that If the screenshotss page obtained directly judges that the screenshotss page belongs to the non-sensitive page not in any one application program.
S23: it if the screenshotss page belongs to sensitive page, executes and infomation detection is carried out to screenshotss image.
Specifically, belong to sensitive page if judging to obtain the screenshotss page according to step S22, trigger execution to screenshotss image The step of carrying out infomation detection.
In a specific embodiment, it is not belonging to sensitive page if judging to obtain the screenshotss page according to step S202, The step of infomation detection is carried out to screenshotss image is not executed, but starts preset common monitoring module, the operation to client Behavior is monitored, and under the common monitoring mode, if the behavior for monitoring client is non-generic lawful acts, is sent pre- To client, watchful user cancels alert information.If the behavior for monitoring client is common lawful acts, do not send pre- Alert information continues under the common monitoring mode monitor client to the subsequent operation behavior of screenshotss image to client.Its In, common lawful acts can be to be placed on screenshotss image in specified file, or screenshotss image is sent to specifically User.Non-generic lawful acts can paste in non-designated file to replicate screenshotss image, or screenshotss image is sent out Give external staff.
In the present embodiment, pass through the screenshotss page where determining screenshotss image;According to application journey belonging to the screenshotss page Sequence, judges whether the screenshotss page belongs to sensitive page;If the screenshotss page belongs to sensitive page, execution carries out letter to screenshotss image Breath detection;Before carrying out infomation detection to screenshotss image, the page where first judging screenshotss image is to belong to sensitive page, to quick Feel screenshotss image corresponding to the page and carry out infomation detection, not only alleviates background system burden, also improve to screenshotss behavior The accuracy being monitored.In one embodiment, as shown in figure 5, judging whether client is non-to the operation row of screenshotss image Lawful acts specifically comprise the following steps:
S501: if client is interbehavior to the operation behavior of screenshotss image, client identification is obtained.
Wherein, client identification refers to the identity information mark in the user of client executing operation behavior.Optionally, client End mark can be the identification number that phone number, work number or ID card No. of user etc. represent user's unique identity information. In a specific embodiment, it can be corresponding user when operating system logs in the user of client executing operation behavior, It is also possible to log in corresponding user when specified application program.If the user of client executing operation behavior be log in it is specified Application program when corresponding user, then client mark can be corresponding with the logon information of user's login application program.Specifically, If monitoring client is interbehavior to the operation behavior of screenshotss image, client identification is directly acquired.
S502: according to client identification, the interaction Permission Levels of user are obtained.
Wherein, interaction Permission Levels refer to the Permission Levels that user interacts screenshotss image.Such as: to screenshotss image into The Permission Levels that row is sent.Specifically, different users has different interaction Permission Levels, such as common employee to snapshot Permission is checked as only having, and can not carry out transmission operation, middle administrative staff only has sending permission to specified receiving end, and Senior management staff has and has sending permission to any receiving end.In a specific embodiment, different clients identify It is associated in advance with corresponding interactive Permission Levels and stores in the database.It, can direct root after getting client identification The interaction Permission Levels of corresponding user are obtained from database according to client identification.In the present embodiment, pass through client identification The interaction Permission Levels for determining user, different delineations of power is carried out to different users, is guaranteeing the safety of screenshotss image Simultaneously, moreover it is possible to meet the use demand of different user.
S503: if interaction Permission Levels meet default access grade, the corresponding receiving end mark of interbehavior is obtained.
Wherein, default access grade refer to seem to snapshot for judging user no specific interactive permission standard.It is optional Ground, default access grade, which can be set as middle administrative staff and senior management staff, has interaction permission to screenshotss image.Tool Body, if being middle administrative staff according to client identification to the interaction Permission Levels for obtaining user, that is, meet default access etc. Grade then obtains the corresponding receiving end mark of the interbehavior.Receiving end mark refers to that another terminal institute for receiving the screenshotss image is right The mark answered.In a specific embodiment, before user executes interbehavior to screenshotss image, it need to determine or choose and be handed over Mutual reception terminal therefore, can be directly from visitor if the interaction Permission Levels that judgement obtains the user meet default access grade Family end obtains the corresponding receiving end mark of the interbehavior.Optionally, receiving end mark can for receive terminal terminal name, IP address or the network interface card number of terminal etc..
S504: judging that receiving end identifies whether in default access mark, if receiving end mark is not identified in default access It is interior, it is determined that client is illegal behavior to the operation behavior of screenshotss image.
Wherein, default access mark refers to the terminal iidentification number of preset receivable screenshotss image.Such as: default access Mark can be terminal iidentification number or preset particular terminal identification number corresponding to intra-company personnel.In a tool In body embodiment, the database of server-side is previously stored with several default access marks.Specifically, judging receiving end mark is The no receiving end mark that in default access mark, can be will acquire carries out one with default access mark pre-stored in database One matching, if pre-stored all default access marks all mismatch in the receiving end mark and database that obtain, then it represents that Receiving end mark is not in default access mark.Conversely, if pre-stored in the receiving end mark and database that obtain A default access of anticipating mark matches, then it represents that receiving end mark is in default access mark.
In one embodiment, if judging to obtain receiving end mark not in default access mark through above-mentioned steps, Then determine that client is illegal behavior to the operation behavior of screenshotss image.
In the present embodiment, if client is interbehavior to the operation behavior of screenshotss image, client identification is obtained; According to client identification, the interaction Permission Levels of user are obtained;If interaction Permission Levels meet default access grade, friendship is obtained The mutually corresponding receiving end mark of behavior;Judge that receiving end identifies whether in default access mark, if receiving end mark is not pre- If in capability identification, it is determined that client is illegal behavior to the operation behavior of screenshotss image;It is true to first pass through client identification The interaction Permission Levels for determining user, for the interaction Permission Levels that different users has, in the safety for guaranteeing screenshotss image Meanwhile the use demand of different user is also met, improve user experience.
In one embodiment, as shown in fig. 6, after judging that receiving end identifies whether in default access identifies, this section Shielding monitoring method further includes following steps:
S505: if receiving end mark judges that client is to the operation behavior of screenshotss image in default access mark Lawful acts.
Specifically, if judgement obtains receiving end mark in default access mark, judge client to screenshotss image Operation behavior is lawful acts.
S506: regional location locating for sensitive information in screenshotss image is determined.
Wherein, regional location refers to sensitive information specific location locating in screenshotss image.In one embodiment, quick The regional location for feeling information can be indicated by the coordinate position in screenshotss image where sensitive information.It is alternatively possible to be quick The top left co-ordinate for feeling the rectangular area where information, is also possible to bottom right angular coordinate, can also be centre coordinate, it is preferable that Regional location in the present embodiment is indicated using the centre coordinate of the rectangular area where sense information.Specifically, it is determined that snapshot Regional location locating for sensitive information can be realized by using openCV method as in.
S507: virtualization processing is carried out to the sensitive information of corresponding region position, obtains target screenshotss image.
Wherein, target screenshotss image, which refers to, carries out resulting image after virtualization processing to the sensitive information in screenshotss image.Tool Body, the sensitive information of corresponding region position is subjected to virtualization processing and is referred to the position of region locating for sensitive information in screenshotss image It sets, the process of Information hiding is carried out by certain mode.Optionally, the sensitive information of corresponding region position is subjected to virtualization processing It can realize automatically by image processing tool, or be realized by using java language to the sensitive information region in screenshotss image Virtualization processing is carried out, target screenshotss image is obtained.
S508: target screenshotss image is sent to corresponding reception terminal.
Specifically, will virtualization treated that target screenshotss image is sent to corresponding reception terminal, for example, user pass through it is micro- Letter sends target screenshotss image to corresponding reception terminal.The virtualization processing of virtualization processing is sent to correspondence in the present embodiment Reception terminal;In the case where guaranteeing that screenshotss image is integrally unaffected, the leakage of sensitive information is avoided, user is improved Experience.
In the present embodiment, if receiving end mark judges client to the behaviour of screenshotss image in default access mark Making behavior is lawful acts;Determine regional location locating for sensitive information in screenshotss image;To the sensitivity letter of corresponding region position Breath carries out virtualization processing, obtains target screenshotss image;Target screenshotss image is sent to corresponding reception terminal;It is cut by determining Regional location locating for sensitive information in screen image, to carrying out virtualization processing at sensitive information, guarantee to screenshotss image into Row sends unaffected situation, further improves the safety of screenshotss image.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
In one embodiment, a kind of screenshotss monitoring device is provided, screenshotss are supervised in the screenshotss monitoring device and above-described embodiment Prosecutor method corresponds.As shown in fig. 7, the screenshotss monitoring device includes operational order monitoring module 10, screenshotss image acquisition mould Block 20, information detecting module 30, operation behavior monitoring module 40, first judgment module 50 and lock operation module 60.Each function Detailed description are as follows for module:
Operational order monitoring module 10, for monitoring the operational order of client in real time;
Screenshotss image collection module 20, for obtaining screenshotss and instructing corresponding screenshotss when operational order is that screenshotss instruct Image;
Information detecting module 30 judges that snapshot seems no comprising sensitive letter for carrying out infomation detection to screenshotss image Breath;
Operation behavior monitoring module 40, for monitoring client in real time to screenshotss when screenshotss image includes sensitive information The operation behavior of image;
Whether first judgment module 50 is illegal behavior to the operation behavior of screenshotss image for judging client, if Client is illegal behavior to the operation behavior of screenshotss image, then sends warning information to client;
Lock operation module 60, for not receiving client within a preset time to the cancel an order of illegal behavior When, execute lock operation.
Preferably, as shown in figure 8, information detecting module 30 includes:
Information identificating unit 301 obtains the letter to be verified in screenshotss image for carrying out information identification to screenshotss image Breath;
Matching unit 302, for information to be verified to be matched with the default sensitive information in non-sensitive information database, Obtain matching result;
First judging unit 303, for when matching result is successful match, judging that screenshotss image includes sensitive information;
Second judgment unit 304, for judging that screenshotss image does not include sensitive letter when matching result is that it fails to match Breath.
Preferably, as shown in figure 9, screenshotss monitoring device further include:
Screenshotss page determining module 21, for determining the screenshotss page where screenshotss image;
It is quick to judge whether the screenshotss page belongs to for the application program according to belonging to the screenshotss page for second judgment module 22 Feel the page;
Trigger module 23, for when the screenshotss page belongs to sensitive page, triggering to be executed to the progress information inspection of screenshotss image The step of survey.
Preferably, first judgment module 50 includes:
Client identification acquiring unit, for obtaining when operation behavior of the client to screenshotss image is interbehavior Client identification;
Interaction Permission Levels unit, for obtaining the interaction Permission Levels of user according to client identification;
Receiving end mark acquiring unit, for obtaining interbehavior when interaction Permission Levels meet default access grade Corresponding receiving end mark;
Third judging unit, for judging that receiving end identifies whether in default access mark, if receiving end mark does not exist In default access mark, it is determined that client is illegal behavior to the operation behavior of screenshotss image.
Preferably, screenshotss monitoring device further include:
Third judgment module, for judging client to screenshotss image when receiving end mark is in default access mark Operation behavior be lawful acts;
Regional location determining module, for determining regional location locating for sensitive information in screenshotss image;
Processing module is blurred, virtualization processing is carried out for the sensitive information to corresponding region position, obtains target snapshot Picture;
Sending module, for target screenshotss image to be sent to corresponding reception terminal.
Specific about screenshotss monitoring device limits the restriction that may refer to above for screenshotss monitoring method, herein not It repeats again.Modules in above-mentioned screenshotss monitoring device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be stored in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 10.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The data used in database storage above-described embodiment screenshotss monitoring method of machine equipment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize a kind of screenshotss prison when the computer program is executed by processor Prosecutor method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory And the computer program that can be run on a processor, processor realize the screenshotss prison in above-described embodiment when executing computer program Prosecutor method.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes the screenshotss monitoring method in above-described embodiment when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of screenshotss monitoring method characterized by comprising
Monitor the operational order of client in real time;
If the operational order is screenshotss instruction, obtains the screenshotss and instruct corresponding screenshotss image;
Infomation detection is carried out to the screenshotss image, judges that the snapshot seems no comprising sensitive information;
If the screenshotss image includes the sensitive information, the client is monitored in real time to the operation row of the screenshotss image For;
Judge whether the client is illegal behavior to the operation behavior of the screenshotss image, if the client is to described The operation behavior of screenshotss image is illegal behavior, then sends warning information to the client;
If not receiving the client within a preset time to the cancel an order of the illegal behavior, locking behaviour is executed Make.
2. screenshotss monitoring method as described in claim 1, which is characterized in that described to carry out information inspection to the screenshotss image It surveys, judges that the snapshot seems no comprising sensitive information, comprising:
Information identification is carried out to the screenshotss image, obtains the information to be verified in the screenshotss image;
The information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching result;
If the matching result is successful match, judge that the screenshotss image includes sensitive information;
If the matching result is that it fails to match, judge that the screenshotss image does not include sensitive information.
3. screenshotss monitoring method as described in claim 1, which is characterized in that if being screenshotss instruction in the operational order, After obtaining the corresponding screenshotss image of the screenshotss instruction, and before carrying out infomation detection to the screenshotss image, described section Shield monitoring method further include:
Determine the screenshotss page where the screenshotss image;
According to application program belonging to the screenshotss page, judge whether the screenshotss page belongs to sensitive page;
If the screenshotss page belongs to the sensitive page, trigger to execute described infomation detection is carried out to the screenshotss image Step.
4. screenshotss monitoring method as described in claim 1, which is characterized in that the judgement client is to the snapshot Whether the operation row of picture is illegal behavior, comprising:
If the client is interbehavior to the operation behavior of the screenshotss image, the client identification is obtained;
According to the client identification, the interaction Permission Levels of user are obtained;
If the interactive Permission Levels meet default access grade, the corresponding receiving end mark of the interbehavior is obtained;
Judge that the receiving end identifies whether in default access mark, if receiving end mark is not in the default access mark In knowledge, it is determined that the client is illegal behavior to the operation behavior of the screenshotss image.
5. screenshotss monitoring method as claimed in claim 4, which is characterized in that identified whether in the judgement receiving end After in default access mark, the screenshotss monitoring method further include:
If the receiving end mark judges operation of the client to the screenshotss image in default access mark Behavior is lawful acts;
Determine regional location locating for sensitive information described in the screenshotss image;
Virtualization processing is carried out to the sensitive information of the corresponding region position, obtains target screenshotss image;
The target screenshotss image is sent to corresponding reception terminal.
6. a kind of screenshotss monitoring device characterized by comprising
Operational order monitoring module, for monitoring the operational order of client in real time;
Screenshotss image collection module, for obtaining the screenshotss and instructing corresponding section when the operational order is that screenshotss instruct Screen image;
Information detecting module judges that the snapshot seems no comprising sensitivity for carrying out infomation detection to the screenshotss image Information;
Operation behavior monitoring module, for monitoring the client in real time when the screenshotss image includes the sensitive information To the operation behavior of the screenshotss image;
Whether first judgment module is illegal behavior to the operation behavior of the screenshotss image for judging the client, If the client is illegal behavior to the operation behavior of the screenshotss image, warning information is sent to the client;
Lock operation module, for not receiving the client within a preset time to the cancel an order of the illegal behavior When, execute lock operation.
7. screenshotss monitoring device as claimed in claim 6, which is characterized in that the information detecting module includes:
Information identificating unit obtains the letter to be verified in the screenshotss image for carrying out information identification to the screenshotss image Breath;
Matching unit is obtained for matching the information to be verified with the default sensitive information in non-sensitive information database To matching result;
First judging unit, for when the matching result is successful match, judging that the screenshotss image includes sensitive information;
Second judgment unit, for judging that the screenshotss image does not include sensitive letter when the matching result is that it fails to match Breath.
8. screenshotss monitoring device as claimed in claim 6, which is characterized in that the screenshotss monitoring device further include:
Screenshotss page determining module, for determining the screenshotss page where the screenshotss image;
Second judgment module judges whether the screenshotss page belongs to for the application program according to belonging to the screenshotss page Sensitive page;
Trigger module, for when the screenshotss page belongs to the sensitive page, triggering to execute described to the screenshotss image The step of carrying out infomation detection.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to Any one of 5 screenshotss monitoring methods.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In realization screenshotss monitoring method as described in any one of claim 1 to 5 when the computer program is executed by processor.
CN201910506134.3A 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium Active CN110363020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910506134.3A CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910506134.3A CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110363020A true CN110363020A (en) 2019-10-22
CN110363020B CN110363020B (en) 2023-07-04

Family

ID=68217221

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910506134.3A Active CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110363020B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111199046A (en) * 2019-11-29 2020-05-26 云深互联(北京)科技有限公司 Content protection method and device based on enterprise browser
CN112491835A (en) * 2020-11-16 2021-03-12 平安信托有限责任公司 Screenshot sending method and device, computer equipment and storage medium
CN113221890A (en) * 2021-05-25 2021-08-06 深圳市瑞驰信息技术有限公司 OCR-based cloud mobile phone text content supervision method, system and system
CN113569861A (en) * 2021-08-03 2021-10-29 天翼爱音乐文化科技有限公司 Mobile application illegal content scanning method, system, equipment and medium
CN114268480A (en) * 2021-12-15 2022-04-01 奇安信科技集团股份有限公司 Picture transmission monitoring method and device, storage medium and terminal
CN114547632A (en) * 2020-11-19 2022-05-27 成都鼎桥通信技术有限公司 Information protection method, device, equipment and storage medium
CN115984971A (en) * 2023-03-17 2023-04-18 宁德时代新能源科技股份有限公司 User behavior monitoring method and device and electronic equipment
CN116361847A (en) * 2023-02-20 2023-06-30 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system
CN116738485A (en) * 2023-06-21 2023-09-12 江苏克胜集团股份有限公司 Safety management platform based on digital information transmission

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
KR20140022354A (en) * 2013-10-15 2014-02-24 주식회사 안랩 Apparatus and method for preventing screen capture
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108170844A (en) * 2018-01-17 2018-06-15 广东欧珀移动通信有限公司 Storage method, device, terminal and the storage medium of record screen file
CN108509533A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 Control method, device, equipment and the computer storage media of screenshotss sharing files
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication
CN109756539A (en) * 2017-11-06 2019-05-14 腾讯科技(深圳)有限公司 A kind of screenshotss control method and relevant device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
KR20140022354A (en) * 2013-10-15 2014-02-24 주식회사 안랩 Apparatus and method for preventing screen capture
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN109756539A (en) * 2017-11-06 2019-05-14 腾讯科技(深圳)有限公司 A kind of screenshotss control method and relevant device
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108170844A (en) * 2018-01-17 2018-06-15 广东欧珀移动通信有限公司 Storage method, device, terminal and the storage medium of record screen file
CN108509533A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 Control method, device, equipment and the computer storage media of screenshotss sharing files
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111199046A (en) * 2019-11-29 2020-05-26 云深互联(北京)科技有限公司 Content protection method and device based on enterprise browser
CN112491835A (en) * 2020-11-16 2021-03-12 平安信托有限责任公司 Screenshot sending method and device, computer equipment and storage medium
CN114547632A (en) * 2020-11-19 2022-05-27 成都鼎桥通信技术有限公司 Information protection method, device, equipment and storage medium
CN114547632B (en) * 2020-11-19 2023-10-13 成都鼎桥通信技术有限公司 Information protection method, device, equipment and storage medium
CN113221890A (en) * 2021-05-25 2021-08-06 深圳市瑞驰信息技术有限公司 OCR-based cloud mobile phone text content supervision method, system and system
CN113569861B (en) * 2021-08-03 2022-12-06 天翼爱音乐文化科技有限公司 Mobile application illegal content scanning method, system, equipment and medium
CN113569861A (en) * 2021-08-03 2021-10-29 天翼爱音乐文化科技有限公司 Mobile application illegal content scanning method, system, equipment and medium
CN114268480A (en) * 2021-12-15 2022-04-01 奇安信科技集团股份有限公司 Picture transmission monitoring method and device, storage medium and terminal
CN116361847A (en) * 2023-02-20 2023-06-30 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system
CN116361847B (en) * 2023-02-20 2024-03-12 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system
CN115984971A (en) * 2023-03-17 2023-04-18 宁德时代新能源科技股份有限公司 User behavior monitoring method and device and electronic equipment
CN116738485A (en) * 2023-06-21 2023-09-12 江苏克胜集团股份有限公司 Safety management platform based on digital information transmission
CN116738485B (en) * 2023-06-21 2023-12-05 江苏克胜集团股份有限公司 Security management system based on digital information transmission

Also Published As

Publication number Publication date
CN110363020B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN110363020A (en) Screenshotss monitoring method, device, computer equipment and storage medium
CN104091140B (en) A kind of information processing method and electronic equipment
CN109145590A (en) A kind of function hook detection method, detection device and computer-readable medium
CN106878108A (en) Network flow playback method of testing and device
CN104811461B (en) Data push method and device
CN110855652A (en) Safety baseline configuration compliance detection method and device, computer equipment and medium
CN108920357A (en) Operation system detection method, device, computer equipment and storage medium
CN108335191B (en) Financial account opening method, financial service system terminal and computer storage medium
CN108062714B (en) Annuity data sending method and device, computer equipment and storage medium
CN113569541A (en) Message generation method, device, equipment and medium
CN110347565B (en) Application program abnormity analysis method and device and electronic equipment
CN107168844B (en) Performance monitoring method and device
CN107944841A (en) Emolument computing system and method
CN109840403B (en) Application login method and device, computer readable storage medium and computer equipment
CN116797345A (en) Task processing method, device, computer equipment and storage medium
CN111274577A (en) Information protection method, device, system and computer readable storage medium
CN108140128A (en) Link association
CN112633619A (en) Risk assessment method and device
CN113190200B (en) Exhibition data security protection method and device
CN111786991B (en) Block chain-based platform authentication login method and related device
KR20190071905A (en) Data backup reporting method and system
CN108053510A (en) Intelligent attendance system and method
CN113610535A (en) Risk monitoring method and device suitable for consumption staging business process
CN113076369A (en) Real-time fire-fighting supervision method and system
CN110827021A (en) Digital asset extraction monitoring method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant