CN110363020A - Screenshotss monitoring method, device, computer equipment and storage medium - Google Patents
Screenshotss monitoring method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110363020A CN110363020A CN201910506134.3A CN201910506134A CN110363020A CN 110363020 A CN110363020 A CN 110363020A CN 201910506134 A CN201910506134 A CN 201910506134A CN 110363020 A CN110363020 A CN 110363020A
- Authority
- CN
- China
- Prior art keywords
- screenshotss
- client
- image
- information
- screenshotss image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention discloses a kind of screenshotss monitoring method, device, computer equipment and storage mediums;By the operational order for monitoring client in real time;If operational order is screen interception instruction, obtains screen interception and instruct corresponding screenshotss image;Infomation detection is carried out to screenshotss image, judges that snapshot seems no comprising sensitive information;If screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image;Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is illegal behavior to the operation behavior of screenshotss image, it then sends warning information and executes lock operation if not receiving client within a preset time to the cancel an order of illegal behavior to client;First real-time detection snapshot seems no if reminding user to cancel again comprising sensitive information not only to avoid the leakage of sensitive information in screenshotss image comprising sensitive information, it is ensured that the accuracy being monitored to screenshotss image.
Description
Technical field
The present invention relates to cloud monitoring fields more particularly to a kind of screenshotss monitoring method, device, computer equipment and storage to be situated between
Matter.
Background technique
With the fast development of internet, guarantee that the safety of information plays more and more important work in information transmission
With.The routine work of people and it is social during, people often by using screenshotss tool to webpage or document content into
Row saves or shares, and so as to cause passing through, the case where screenshotss image carries out information leakage is also more and more therewith.Therefore, effectively
Screenshotss image, which is managed or is monitored, has considerable effect.Currently, screenshotss image is managed or is supervised in the market
The method of control is most of all fairly simple, if there are screenshotss movements by discovery user, lock operation is just directly executed, to give user
Use bring great inconvenience.
Summary of the invention
The embodiment of the present invention provides a kind of screenshotss monitoring method, device, computer equipment and storage medium, to solve to cutting
The monitoring inaccuracy problem of screen behavior.
A kind of screenshotss monitoring method, comprising:
Monitor the operational order of client in real time;
If the operational order is screenshotss instruction, obtains the screenshotss and instruct corresponding screenshotss image;
Infomation detection is carried out to the screenshotss image, judges that the snapshot seems no comprising sensitive information;
If the screenshotss image includes the sensitive information, the client is monitored in real time to the behaviour of the screenshotss image
Make behavior;
Judge whether the client is illegal behavior to the operation behavior of the screenshotss image, if the client pair
The operation behavior of the screenshotss image is illegal behavior, then sends warning information to the client;
If not receiving the client within a preset time to the cancel an order of the illegal behavior, locking is executed
Operation.
A kind of screenshotss monitoring device, comprising:
Operational order monitoring module, for monitoring the operational order of client in real time;
Screenshotss image collection module, for obtaining the screenshotss instruction and corresponding to when the operational order is that screenshotss instruct
Screenshotss image;
Information detecting module judges that the snapshot seems no and includes for carrying out infomation detection to the screenshotss image
Sensitive information;
Operation behavior monitoring module, for monitoring the visitor in real time when the screenshotss image includes the sensitive information
Operation behavior of the family end to the screenshotss image;
Whether first judgment module is illegal row to the operation behavior of the screenshotss image for judging the client
To send warning information to the client if the client is illegal behavior to the operation behavior of the screenshotss image
End;
Lock operation module, for not receiving revocation of the client to the illegal behavior within a preset time
When instruction, lock operation is executed.
A kind of computer equipment, including memory, processor and storage are in the memory and can be in the processing
The computer program run on device, the processor realize above-mentioned screenshotss monitoring method when executing the computer program.
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter
Calculation machine program realizes above-mentioned screenshotss monitoring method when being executed by processor.
Above-mentioned screenshotss monitoring method, device, computer equipment and storage medium, the operation by monitoring client in real time refer to
It enables;If operational order is screen interception instruction, obtains screen interception and instruct corresponding screenshotss image;Letter is carried out to screenshotss image
Breath detection judges that snapshot seems no comprising sensitive information;If screenshotss image includes sensitive information, the client is monitored in real time
Hold the operation behavior to screenshotss image;Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client
Holding the operation behavior to screenshotss image is illegal behavior, then sends warning information to client, if not connecing within a preset time
Client is received to the cancel an order of illegal behavior, then executes lock operation;First real-time detection snapshot seems no comprising quick
Feel information and not only avoid the leakage of sensitive information in screenshotss image if reminding user to cancel again comprising sensitive information, also
It ensure that the accuracy being monitored to screenshotss behavior.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is an application environment schematic diagram of screenshotss monitoring method in one embodiment of the invention;
Fig. 2 is the exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 3 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 4 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 5 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 6 is another exemplary diagram that screenshotss monitor in one embodiment of the invention;
Fig. 7 is a functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Fig. 8 is another functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Fig. 9 is another functional block diagram of screenshotss monitoring device in one embodiment of the invention;
Figure 10 is a schematic diagram of computer equipment in one embodiment of the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
Screenshotss monitoring method provided in an embodiment of the present invention, the screenshotss monitoring method can apply ring using as shown in Figure 1
In border.Specifically, which applies in screenshotss monitoring system, which includes as shown in Figure 1
Client and server-side, client are communicated with server-side by network, for solving the inaccuracy of the monitoring to screenshotss image
Problem.Wherein, client is also known as user terminal, refers to corresponding with server-side, provides the program of local service for client.Client
Hold it is mountable but be not limited to various personal computers, laptop, smart phone, tablet computer and portable wearable set
It is standby upper.Server-side can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of screenshotss monitoring method, the service in Fig. 1 is applied in this way
It is illustrated, includes the following steps: for end
S10: the operational order of client is monitored in real time.
Wherein, the operational order of client refers to user in the operation behavior instruction generated of client executing.It is exemplary
Ground, after the operation behaviors such as user touchs, clicks in client executing, slides, frame choosing or screenshotss, client forms corresponding behaviour
It instructs.Client can be computer terminal or mobile terminal etc..Optionally, the operational order for monitoring client in real time can lead to
It crosses and monitors script plug-in unit, operation behavior of the real-time monitoring users in customer terminal webpage in customer terminal webpage insertion one.When monitoring foot
This plug-in unit listens to user in the operation behavior of customer terminal webpage, generates corresponding operational order in real time, and the operation is referred to
It enables and is sent to server-side in real time.Additionally, use can also be monitored in real time by computer behavior supervisory systems or monitor supervision platform
Family generates corresponding operational order in the operation behavior of client, and sends server-side in real time for the operational order.
S20: it if operational order is screenshotss instruction, obtains screen interception and instructs corresponding screenshotss image.
Wherein, screenshotss refer to user's instruction generated after client executing screenshotss behavior.Screenshotss image refers to user
The image generated after client executing screenshotss behavior.Specifically, user can carry out screenshotss to entire screen in client,
Or screenshotss are carried out to certain a part in screen in client.Optionally, screenshotss image can for one or multiple.Specifically
Ground obtains screen interception instruction and corresponds to if server-side receives the operational order of client transmission as screen interception instruction
Screenshotss image.
S30: carrying out infomation detection to screenshotss image, judges that snapshot seems no comprising sensitive information.
Wherein, sensitive information refers to preset, inconvenient to outward leakage or disclosed information.Such as: sensitive information can
Think personal information, financial data, or is related to the information etc. of classified papers.In a specific embodiment, server-side
It is previously provided with dedicated for saving the customized sensitive information library of sensitive information.Specifically, information inspection is carried out to screenshotss image
Survey includes: to carry out information identification to the screenshotss image using character recognition tool, is obtained from the screenshotss image corresponding to be tested
Information is demonstrate,proved, then judges whether in the information to be verified obtained include sensitive information.Optionally, judge be in information to be verified
No includes sensitive information, can be used string matching algorithm will be prestored in information to be verified and customized sensitive information library it is quick
Sense information is matched one by one;Or canonical matching method is used, by what is prestored in information to be verified and customized sensitive information library
Sensitive information is matched one by one.If the sensitive information successful match prestored in information to be verified and customized sensitive information library,
Then indicate that the screenshotss image includes sensitive information, if the sensitive information prestored in information to be verified and customized sensitive information library
With failure, then it represents that the screenshotss image does not include sensitive information.
S40: if screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image.
Specifically, if judging to obtain screenshotss image to include sensitive information according to step S30, user is monitored in real time in client
Hold the operation behavior to the screenshotss image.It in this step, can by real time monitoring client to the operation behavior of screenshotss image
Prevent include the screenshotss image of sensitive information leakage.
In a specific embodiment, it if judging to obtain screenshotss image not comprising sensitive information according to step S30, removes
Monitor client is sold to the operation behavior of the screenshotss image.Under the premise of guaranteeing the information security of screenshotss image, moreover it is possible to save
Save background service resource.
S50: judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is to screenshotss image
Operation behavior be illegal behavior, then send warning information to client.
Wherein, illegal behavior refers to the behavior that illegal operation is executed to the screenshotss image comprising sensitive information.Such as: it is non-
Lawful acts can be the screenshotss image comprising sensitive information to be sent/is shared with non-permitted personnel, or will include sensitive letter
The screenshotss image of breath is saved to non-designated file;Or the screenshotss image comprising sensitive information is printed;Or will include
The screenshotss image of sensitive information is published to bulletin website etc..
Judge whether client is illegal behavior to the operation behavior of screenshotss image, if client is to the behaviour of screenshotss image
Making behavior is illegal behavior, then sends warning information to client.Wherein, warning information is for prompting user to snapshot
The operation of picture is the information of illegal behavior.Specifically, warning information includes the sensitivity for highlighting the screenshotss image and being included
Information, and prompt the user whether the option information cancelled to the operation of the screenshotss image.
Specifically, judge whether client is illegal behavior to the operation behavior of screenshotss image, it can be by obtaining client
Hold to the operation behavior of screenshotss image command information generated judge client to the operation behavior of screenshotss image whether be
Illegal behavior.It is to be appreciated that user can generate corresponding after client executes any operation behavior to screenshotss image
Then command information, the command information that server-side is sent by obtaining client carry out information identification, judgement to the command information
Whether the command information is illegal command information;If it is illegal command information, judgement pair that identification, which obtains the command information,
The operation behavior answered is illegal behavior.Conversely, being then lawful acts.Wherein, illegal command information refers to preset use
It whether is illegal information to the operation behavior of screenshotss image in detecting client.
In one embodiment, if judging to obtain client to the operation behavior of screenshotss image as lawful acts, no
Warning information is sent to client, and continues monitor client to the subsequent operation behavior of screenshotss image, can be further prevented
Sensitive information leakage.
S60: if not receiving client within a preset time to the cancel an order of illegal behavior, locking behaviour is executed
Make.
Specifically, if not receiving client within a preset time returns to cancel an order, lock operation is executed.Wherein,
Preset time referred to for the period to user's revocation to the operation behavior of screenshotss image.Optionally, preset time can be set
For 5s, 10s, 30s, 45s or 60s etc..It is to be appreciated that within a preset period of time, the revocable behaviour to screenshotss image of user
Make behavior.If within a preset period of time, user does not cancel the operation behavior to screenshotss image, i.e. server-side does not receive client
The cancel an order of return, then execute lock operation.Optionally, since the client in this programme can be computer end/mobile terminal,
Therefore, executing lock operation can be for the locking of computer end/mobile terminal, or to the certain function in computer end/mobile terminal
The locking of energy, or the locking to certain application-specifics on computer end/mobile terminal.Such as: it can be disconnected to be automatic
The network connection of computer end/mobile terminal, or the mailbox on computer end/mobile terminal is locked, to guarantee that this is carried
The screenshotss image of sensitive information can not be to outward leakage.
In one embodiment, if receiving the cancel an order of client return within a preset time, lock is not executed
Fixed operation guarantees that user can normally execute other operations in customer terminal webpage.
In the present embodiment, pass through the operational order of real time monitoring client;If operational order is screen interception instruction,
It obtains screen interception and instructs corresponding screenshotss image;Infomation detection is carried out to screenshotss image, judges that snapshot seems no comprising quick
Feel information;If screenshotss image includes sensitive information, client is monitored in real time to the operation behavior of screenshotss image;Judge client
Whether the operation behavior to screenshotss image is illegal behavior, if client is illegal row to the operation behavior of screenshotss image
For, then warning information is sent to client, if not receiving client within a preset time to the cancel an order of illegal behavior,
Then execute lock operation;First real-time detection snapshot seems no comprising sensitive information, if reminded again comprising sensitive information user into
Row revocation, not only avoids the leakage of sensitive information in screenshotss image, it is ensured that the accuracy that is monitored to screenshotss behavior.
In one embodiment, as shown in figure 3, carrying out infomation detection to screenshotss image, judge that snapshot seems no comprising quick
Feel information, specifically comprises the following steps:
S301: information identification is carried out to screenshotss image, obtains the information to be verified in screenshotss image.
Wherein, information to be verified refers to the information that screenshotss image is included.Specifically, the pre-set text of server-side can be used
Word identification facility (such as OCR software for discerning characters) carries out information identification to the screenshotss image of acquisition, to obtain the screenshotss image institute
The information to be verified for including.Wherein, character recognition tool refers to the tool of text in picture for identification.Text in the present embodiment
OCR software for discerning characters can be used in word identification facility, and OCR software for discerning characters has the advantages that recognition accuracy is high.
S302: information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching knot
Fruit.
Wherein, the database of non-sensitive information database to be pre-set include several default sensitive informations.User can
This is then preset sensitive information previously according to the default sensitive information of preset requirement setting predetermined quantity in the client
It stores in the non-sensitive information database of server-side.
Specifically, after getting the information to be verified in screenshotss image, by information to be verified and sensitive information data
Default sensitive information in library is matched, to judge in information to be verified with the presence or absence of sensitive information;If in information to be verified
There are sensitive informations, then obtaining matching result is successful match.Conversely, if sensitive information is not present in information to be verified,
It is that it fails to match to matching result.
In a specific implementation method, judging can be according to preset standard with the presence or absence of sensitive information in information to be verified
Or mode is configured.Specifically, default sensitive information can be set as including special sensitive information and common sensitive information.
Firstly, after getting the information to be verified in screenshotss image, first according to using specific character the characteristics of special sensitive information
As long as perhaps preset field of going here and there, which is treated verification information and inquired in information to be verified, there is above-mentioned specific character string or pre-
If field, it is assumed that there are sensitive informations in information to be verified.Such as: it can be by phone number, bank card number, identification card number
Code regards as special sensitive information;Specific field can also be regarded as into special sensitive information, for example, user name, user
The information such as location or the amount of money.Then, then string matching method is used, it will be general in the information to be verified and non-sensitive information database
Logical sensitive information is matched one by one, if being not matched to information identical with common sensitive information in information to be verified,
Illustrate not including common sensitive information in the information to be verified;If being matched in information to be verified identical with common sensitive information
Information, then illustrate in the information to be verified comprising common sensitive information.
Preferably, in order to improve the accuracy of matching result, a matching threshold can be preset, if in information to be verified
In be matched to the quantity of information identical with common sensitive information and be greater than matching threshold, then it represents that comprising general in the information to be verified
Logical sensitive information;If the quantity for being matched to information identical with common sensitive information in information to be verified is equal to or less than matching
Threshold value, then it represents that do not include common sensitive information in the information to be verified.Wherein, matching threshold refer to judge be in information to be verified
The no critical value comprising common sensitive information.Matching threshold can be 20%, 30% or 50% etc., and user can be according to the actual situation
Customized setting.
S303: if matching result is successful match, judge that screenshotss image includes sensitive information.
Specifically, if obtaining matching result according to step S302 is successful match, judge that the screenshotss image includes sensitivity
Information.
S304: if matching result is that it fails to match, judge that screenshotss image does not include sensitive information.
Specifically, if obtaining matching result according to step S302 is that it fails to match, it is quick to judge that the screenshotss image does not include
Feel information.
In the present embodiment, by carrying out information identification to screenshotss image, the information to be verified in screenshotss image is obtained;It will
Information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching result;If matching result is
Successful match then judges that screenshotss image includes sensitive information;If matching result is that it fails to match, judge that screenshotss image does not include
Sensitive information;It ensure that the efficiency and accuracy detected to screenshotss image.
In one embodiment, if as shown in figure 4, operational order be screen interception instruction, obtain screen interception instruction
After corresponding screenshotss image, and before carrying out infomation detection to screenshotss image, screenshotss monitoring method further includes following steps:
S21: the screenshotss page where screenshotss image is determined.
Wherein, the screenshotss page refers to that user executes the page where screenshotss operation behavior.Such as: user logs in a certain using journey
When sequence, screenshotss operation is carried out to the login page in the application program and generates screenshotss image, then the login page is the screenshotss
The screenshotss page where image.
S22: according to application program belonging to the screenshotss page, judge whether the screenshotss page belongs to sensitive page.
Wherein, sensitive page refer to may include sensitive information the page.Sensitive page can be intra-company's confidentiality
The page where strong application program.Such as: the page being related to where the application program of company's operation report, or it is related to company
The page etc. where the application program of internal information.In the present embodiment, application program includes but is not limited to App software.
Optionally it is determined that application program belonging to the screenshotss page can carry out the page to the screenshotss page by page detection tool
Detection judges that the screenshotss page is realized with the presence or absence of the distinctive display mark of a certain application program.Optionally, application program is peculiar
Display mark can for application program logo identify.Alternatively, answering in front stage operation when executing screenshotss operation by detection
With program which includes.Such as: if detecting, the corresponding application program of Foxmail is in front stage operation when executing screenshotss operation,
Then judge application program belonging to the screenshotss page for Foxmail.
After application program belonging to the screenshotss page has been determined, the condition managing of an application program can be preset
Strategy, the condition managing strategy include each application program and corresponding status indicator.Wherein, status indicator includes sensitive mark
Know and non-sensitive mark.In one embodiment, each application program is associated with corresponding status indicator in advance.Such as:
The application program of intra-company's strong security is associated with sensitive identification, some inessential application programs and non-sensitive mark
It is associated.Specifically, it after getting the screenshotss page, first determines application program belonging to the screenshotss page, is then answered according to this
Corresponding status indicator is obtained with program, if the status indicator obtained is sensitive identification, judges that the screenshotss page belongs to sensitivity
The page judges that the screenshotss page belongs to the non-sensitive page if the status indicator obtained is non-sensitive mark.It is to be appreciated that
If the screenshotss page obtained directly judges that the screenshotss page belongs to the non-sensitive page not in any one application program.
S23: it if the screenshotss page belongs to sensitive page, executes and infomation detection is carried out to screenshotss image.
Specifically, belong to sensitive page if judging to obtain the screenshotss page according to step S22, trigger execution to screenshotss image
The step of carrying out infomation detection.
In a specific embodiment, it is not belonging to sensitive page if judging to obtain the screenshotss page according to step S202,
The step of infomation detection is carried out to screenshotss image is not executed, but starts preset common monitoring module, the operation to client
Behavior is monitored, and under the common monitoring mode, if the behavior for monitoring client is non-generic lawful acts, is sent pre-
To client, watchful user cancels alert information.If the behavior for monitoring client is common lawful acts, do not send pre-
Alert information continues under the common monitoring mode monitor client to the subsequent operation behavior of screenshotss image to client.Its
In, common lawful acts can be to be placed on screenshotss image in specified file, or screenshotss image is sent to specifically
User.Non-generic lawful acts can paste in non-designated file to replicate screenshotss image, or screenshotss image is sent out
Give external staff.
In the present embodiment, pass through the screenshotss page where determining screenshotss image;According to application journey belonging to the screenshotss page
Sequence, judges whether the screenshotss page belongs to sensitive page;If the screenshotss page belongs to sensitive page, execution carries out letter to screenshotss image
Breath detection;Before carrying out infomation detection to screenshotss image, the page where first judging screenshotss image is to belong to sensitive page, to quick
Feel screenshotss image corresponding to the page and carry out infomation detection, not only alleviates background system burden, also improve to screenshotss behavior
The accuracy being monitored.In one embodiment, as shown in figure 5, judging whether client is non-to the operation row of screenshotss image
Lawful acts specifically comprise the following steps:
S501: if client is interbehavior to the operation behavior of screenshotss image, client identification is obtained.
Wherein, client identification refers to the identity information mark in the user of client executing operation behavior.Optionally, client
End mark can be the identification number that phone number, work number or ID card No. of user etc. represent user's unique identity information.
In a specific embodiment, it can be corresponding user when operating system logs in the user of client executing operation behavior,
It is also possible to log in corresponding user when specified application program.If the user of client executing operation behavior be log in it is specified
Application program when corresponding user, then client mark can be corresponding with the logon information of user's login application program.Specifically,
If monitoring client is interbehavior to the operation behavior of screenshotss image, client identification is directly acquired.
S502: according to client identification, the interaction Permission Levels of user are obtained.
Wherein, interaction Permission Levels refer to the Permission Levels that user interacts screenshotss image.Such as: to screenshotss image into
The Permission Levels that row is sent.Specifically, different users has different interaction Permission Levels, such as common employee to snapshot
Permission is checked as only having, and can not carry out transmission operation, middle administrative staff only has sending permission to specified receiving end, and
Senior management staff has and has sending permission to any receiving end.In a specific embodiment, different clients identify
It is associated in advance with corresponding interactive Permission Levels and stores in the database.It, can direct root after getting client identification
The interaction Permission Levels of corresponding user are obtained from database according to client identification.In the present embodiment, pass through client identification
The interaction Permission Levels for determining user, different delineations of power is carried out to different users, is guaranteeing the safety of screenshotss image
Simultaneously, moreover it is possible to meet the use demand of different user.
S503: if interaction Permission Levels meet default access grade, the corresponding receiving end mark of interbehavior is obtained.
Wherein, default access grade refer to seem to snapshot for judging user no specific interactive permission standard.It is optional
Ground, default access grade, which can be set as middle administrative staff and senior management staff, has interaction permission to screenshotss image.Tool
Body, if being middle administrative staff according to client identification to the interaction Permission Levels for obtaining user, that is, meet default access etc.
Grade then obtains the corresponding receiving end mark of the interbehavior.Receiving end mark refers to that another terminal institute for receiving the screenshotss image is right
The mark answered.In a specific embodiment, before user executes interbehavior to screenshotss image, it need to determine or choose and be handed over
Mutual reception terminal therefore, can be directly from visitor if the interaction Permission Levels that judgement obtains the user meet default access grade
Family end obtains the corresponding receiving end mark of the interbehavior.Optionally, receiving end mark can for receive terminal terminal name,
IP address or the network interface card number of terminal etc..
S504: judging that receiving end identifies whether in default access mark, if receiving end mark is not identified in default access
It is interior, it is determined that client is illegal behavior to the operation behavior of screenshotss image.
Wherein, default access mark refers to the terminal iidentification number of preset receivable screenshotss image.Such as: default access
Mark can be terminal iidentification number or preset particular terminal identification number corresponding to intra-company personnel.In a tool
In body embodiment, the database of server-side is previously stored with several default access marks.Specifically, judging receiving end mark is
The no receiving end mark that in default access mark, can be will acquire carries out one with default access mark pre-stored in database
One matching, if pre-stored all default access marks all mismatch in the receiving end mark and database that obtain, then it represents that
Receiving end mark is not in default access mark.Conversely, if pre-stored in the receiving end mark and database that obtain
A default access of anticipating mark matches, then it represents that receiving end mark is in default access mark.
In one embodiment, if judging to obtain receiving end mark not in default access mark through above-mentioned steps,
Then determine that client is illegal behavior to the operation behavior of screenshotss image.
In the present embodiment, if client is interbehavior to the operation behavior of screenshotss image, client identification is obtained;
According to client identification, the interaction Permission Levels of user are obtained;If interaction Permission Levels meet default access grade, friendship is obtained
The mutually corresponding receiving end mark of behavior;Judge that receiving end identifies whether in default access mark, if receiving end mark is not pre-
If in capability identification, it is determined that client is illegal behavior to the operation behavior of screenshotss image;It is true to first pass through client identification
The interaction Permission Levels for determining user, for the interaction Permission Levels that different users has, in the safety for guaranteeing screenshotss image
Meanwhile the use demand of different user is also met, improve user experience.
In one embodiment, as shown in fig. 6, after judging that receiving end identifies whether in default access identifies, this section
Shielding monitoring method further includes following steps:
S505: if receiving end mark judges that client is to the operation behavior of screenshotss image in default access mark
Lawful acts.
Specifically, if judgement obtains receiving end mark in default access mark, judge client to screenshotss image
Operation behavior is lawful acts.
S506: regional location locating for sensitive information in screenshotss image is determined.
Wherein, regional location refers to sensitive information specific location locating in screenshotss image.In one embodiment, quick
The regional location for feeling information can be indicated by the coordinate position in screenshotss image where sensitive information.It is alternatively possible to be quick
The top left co-ordinate for feeling the rectangular area where information, is also possible to bottom right angular coordinate, can also be centre coordinate, it is preferable that
Regional location in the present embodiment is indicated using the centre coordinate of the rectangular area where sense information.Specifically, it is determined that snapshot
Regional location locating for sensitive information can be realized by using openCV method as in.
S507: virtualization processing is carried out to the sensitive information of corresponding region position, obtains target screenshotss image.
Wherein, target screenshotss image, which refers to, carries out resulting image after virtualization processing to the sensitive information in screenshotss image.Tool
Body, the sensitive information of corresponding region position is subjected to virtualization processing and is referred to the position of region locating for sensitive information in screenshotss image
It sets, the process of Information hiding is carried out by certain mode.Optionally, the sensitive information of corresponding region position is subjected to virtualization processing
It can realize automatically by image processing tool, or be realized by using java language to the sensitive information region in screenshotss image
Virtualization processing is carried out, target screenshotss image is obtained.
S508: target screenshotss image is sent to corresponding reception terminal.
Specifically, will virtualization treated that target screenshotss image is sent to corresponding reception terminal, for example, user pass through it is micro-
Letter sends target screenshotss image to corresponding reception terminal.The virtualization processing of virtualization processing is sent to correspondence in the present embodiment
Reception terminal;In the case where guaranteeing that screenshotss image is integrally unaffected, the leakage of sensitive information is avoided, user is improved
Experience.
In the present embodiment, if receiving end mark judges client to the behaviour of screenshotss image in default access mark
Making behavior is lawful acts;Determine regional location locating for sensitive information in screenshotss image;To the sensitivity letter of corresponding region position
Breath carries out virtualization processing, obtains target screenshotss image;Target screenshotss image is sent to corresponding reception terminal;It is cut by determining
Regional location locating for sensitive information in screen image, to carrying out virtualization processing at sensitive information, guarantee to screenshotss image into
Row sends unaffected situation, further improves the safety of screenshotss image.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
In one embodiment, a kind of screenshotss monitoring device is provided, screenshotss are supervised in the screenshotss monitoring device and above-described embodiment
Prosecutor method corresponds.As shown in fig. 7, the screenshotss monitoring device includes operational order monitoring module 10, screenshotss image acquisition mould
Block 20, information detecting module 30, operation behavior monitoring module 40, first judgment module 50 and lock operation module 60.Each function
Detailed description are as follows for module:
Operational order monitoring module 10, for monitoring the operational order of client in real time;
Screenshotss image collection module 20, for obtaining screenshotss and instructing corresponding screenshotss when operational order is that screenshotss instruct
Image;
Information detecting module 30 judges that snapshot seems no comprising sensitive letter for carrying out infomation detection to screenshotss image
Breath;
Operation behavior monitoring module 40, for monitoring client in real time to screenshotss when screenshotss image includes sensitive information
The operation behavior of image;
Whether first judgment module 50 is illegal behavior to the operation behavior of screenshotss image for judging client, if
Client is illegal behavior to the operation behavior of screenshotss image, then sends warning information to client;
Lock operation module 60, for not receiving client within a preset time to the cancel an order of illegal behavior
When, execute lock operation.
Preferably, as shown in figure 8, information detecting module 30 includes:
Information identificating unit 301 obtains the letter to be verified in screenshotss image for carrying out information identification to screenshotss image
Breath;
Matching unit 302, for information to be verified to be matched with the default sensitive information in non-sensitive information database,
Obtain matching result;
First judging unit 303, for when matching result is successful match, judging that screenshotss image includes sensitive information;
Second judgment unit 304, for judging that screenshotss image does not include sensitive letter when matching result is that it fails to match
Breath.
Preferably, as shown in figure 9, screenshotss monitoring device further include:
Screenshotss page determining module 21, for determining the screenshotss page where screenshotss image;
It is quick to judge whether the screenshotss page belongs to for the application program according to belonging to the screenshotss page for second judgment module 22
Feel the page;
Trigger module 23, for when the screenshotss page belongs to sensitive page, triggering to be executed to the progress information inspection of screenshotss image
The step of survey.
Preferably, first judgment module 50 includes:
Client identification acquiring unit, for obtaining when operation behavior of the client to screenshotss image is interbehavior
Client identification;
Interaction Permission Levels unit, for obtaining the interaction Permission Levels of user according to client identification;
Receiving end mark acquiring unit, for obtaining interbehavior when interaction Permission Levels meet default access grade
Corresponding receiving end mark;
Third judging unit, for judging that receiving end identifies whether in default access mark, if receiving end mark does not exist
In default access mark, it is determined that client is illegal behavior to the operation behavior of screenshotss image.
Preferably, screenshotss monitoring device further include:
Third judgment module, for judging client to screenshotss image when receiving end mark is in default access mark
Operation behavior be lawful acts;
Regional location determining module, for determining regional location locating for sensitive information in screenshotss image;
Processing module is blurred, virtualization processing is carried out for the sensitive information to corresponding region position, obtains target snapshot
Picture;
Sending module, for target screenshotss image to be sent to corresponding reception terminal.
Specific about screenshotss monitoring device limits the restriction that may refer to above for screenshotss monitoring method, herein not
It repeats again.Modules in above-mentioned screenshotss monitoring device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be stored in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 10.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The data used in database storage above-described embodiment screenshotss monitoring method of machine equipment.The network of the computer equipment connects
Mouth with external terminal by network connection for being communicated.To realize a kind of screenshotss prison when the computer program is executed by processor
Prosecutor method.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor realize the screenshotss prison in above-described embodiment when executing computer program
Prosecutor method.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes the screenshotss monitoring method in above-described embodiment when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of screenshotss monitoring method characterized by comprising
Monitor the operational order of client in real time;
If the operational order is screenshotss instruction, obtains the screenshotss and instruct corresponding screenshotss image;
Infomation detection is carried out to the screenshotss image, judges that the snapshot seems no comprising sensitive information;
If the screenshotss image includes the sensitive information, the client is monitored in real time to the operation row of the screenshotss image
For;
Judge whether the client is illegal behavior to the operation behavior of the screenshotss image, if the client is to described
The operation behavior of screenshotss image is illegal behavior, then sends warning information to the client;
If not receiving the client within a preset time to the cancel an order of the illegal behavior, locking behaviour is executed
Make.
2. screenshotss monitoring method as described in claim 1, which is characterized in that described to carry out information inspection to the screenshotss image
It surveys, judges that the snapshot seems no comprising sensitive information, comprising:
Information identification is carried out to the screenshotss image, obtains the information to be verified in the screenshotss image;
The information to be verified is matched with the default sensitive information in non-sensitive information database, obtains matching result;
If the matching result is successful match, judge that the screenshotss image includes sensitive information;
If the matching result is that it fails to match, judge that the screenshotss image does not include sensitive information.
3. screenshotss monitoring method as described in claim 1, which is characterized in that if being screenshotss instruction in the operational order,
After obtaining the corresponding screenshotss image of the screenshotss instruction, and before carrying out infomation detection to the screenshotss image, described section
Shield monitoring method further include:
Determine the screenshotss page where the screenshotss image;
According to application program belonging to the screenshotss page, judge whether the screenshotss page belongs to sensitive page;
If the screenshotss page belongs to the sensitive page, trigger to execute described infomation detection is carried out to the screenshotss image
Step.
4. screenshotss monitoring method as described in claim 1, which is characterized in that the judgement client is to the snapshot
Whether the operation row of picture is illegal behavior, comprising:
If the client is interbehavior to the operation behavior of the screenshotss image, the client identification is obtained;
According to the client identification, the interaction Permission Levels of user are obtained;
If the interactive Permission Levels meet default access grade, the corresponding receiving end mark of the interbehavior is obtained;
Judge that the receiving end identifies whether in default access mark, if receiving end mark is not in the default access mark
In knowledge, it is determined that the client is illegal behavior to the operation behavior of the screenshotss image.
5. screenshotss monitoring method as claimed in claim 4, which is characterized in that identified whether in the judgement receiving end
After in default access mark, the screenshotss monitoring method further include:
If the receiving end mark judges operation of the client to the screenshotss image in default access mark
Behavior is lawful acts;
Determine regional location locating for sensitive information described in the screenshotss image;
Virtualization processing is carried out to the sensitive information of the corresponding region position, obtains target screenshotss image;
The target screenshotss image is sent to corresponding reception terminal.
6. a kind of screenshotss monitoring device characterized by comprising
Operational order monitoring module, for monitoring the operational order of client in real time;
Screenshotss image collection module, for obtaining the screenshotss and instructing corresponding section when the operational order is that screenshotss instruct
Screen image;
Information detecting module judges that the snapshot seems no comprising sensitivity for carrying out infomation detection to the screenshotss image
Information;
Operation behavior monitoring module, for monitoring the client in real time when the screenshotss image includes the sensitive information
To the operation behavior of the screenshotss image;
Whether first judgment module is illegal behavior to the operation behavior of the screenshotss image for judging the client,
If the client is illegal behavior to the operation behavior of the screenshotss image, warning information is sent to the client;
Lock operation module, for not receiving the client within a preset time to the cancel an order of the illegal behavior
When, execute lock operation.
7. screenshotss monitoring device as claimed in claim 6, which is characterized in that the information detecting module includes:
Information identificating unit obtains the letter to be verified in the screenshotss image for carrying out information identification to the screenshotss image
Breath;
Matching unit is obtained for matching the information to be verified with the default sensitive information in non-sensitive information database
To matching result;
First judging unit, for when the matching result is successful match, judging that the screenshotss image includes sensitive information;
Second judgment unit, for judging that the screenshotss image does not include sensitive letter when the matching result is that it fails to match
Breath.
8. screenshotss monitoring device as claimed in claim 6, which is characterized in that the screenshotss monitoring device further include:
Screenshotss page determining module, for determining the screenshotss page where the screenshotss image;
Second judgment module judges whether the screenshotss page belongs to for the application program according to belonging to the screenshotss page
Sensitive page;
Trigger module, for when the screenshotss page belongs to the sensitive page, triggering to execute described to the screenshotss image
The step of carrying out infomation detection.
9. a kind of computer equipment, including memory, processor and storage are in the memory and can be in the processor
The computer program of upper operation, which is characterized in that the processor realized when executing the computer program as claim 1 to
Any one of 5 screenshotss monitoring methods.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In realization screenshotss monitoring method as described in any one of claim 1 to 5 when the computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910506134.3A CN110363020B (en) | 2019-06-12 | 2019-06-12 | Screen capturing monitoring method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910506134.3A CN110363020B (en) | 2019-06-12 | 2019-06-12 | Screen capturing monitoring method, device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110363020A true CN110363020A (en) | 2019-10-22 |
CN110363020B CN110363020B (en) | 2023-07-04 |
Family
ID=68217221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910506134.3A Active CN110363020B (en) | 2019-06-12 | 2019-06-12 | Screen capturing monitoring method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110363020B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111199046A (en) * | 2019-11-29 | 2020-05-26 | 云深互联(北京)科技有限公司 | Content protection method and device based on enterprise browser |
CN112491835A (en) * | 2020-11-16 | 2021-03-12 | 平安信托有限责任公司 | Screenshot sending method and device, computer equipment and storage medium |
CN113221890A (en) * | 2021-05-25 | 2021-08-06 | 深圳市瑞驰信息技术有限公司 | OCR-based cloud mobile phone text content supervision method, system and system |
CN113569861A (en) * | 2021-08-03 | 2021-10-29 | 天翼爱音乐文化科技有限公司 | Mobile application illegal content scanning method, system, equipment and medium |
CN114268480A (en) * | 2021-12-15 | 2022-04-01 | 奇安信科技集团股份有限公司 | Picture transmission monitoring method and device, storage medium and terminal |
CN114547632A (en) * | 2020-11-19 | 2022-05-27 | 成都鼎桥通信技术有限公司 | Information protection method, device, equipment and storage medium |
CN115984971A (en) * | 2023-03-17 | 2023-04-18 | 宁德时代新能源科技股份有限公司 | User behavior monitoring method and device and electronic equipment |
CN116361847A (en) * | 2023-02-20 | 2023-06-30 | 海道(深圳)教育科技有限责任公司 | Mobile device-based screen capturing prevention method and system |
CN116738485A (en) * | 2023-06-21 | 2023-09-12 | 江苏克胜集团股份有限公司 | Safety management platform based on digital information transmission |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429745B1 (en) * | 2011-09-23 | 2013-04-23 | Symantec Corporation | Systems and methods for data loss prevention on mobile computing systems |
KR20140022354A (en) * | 2013-10-15 | 2014-02-24 | 주식회사 안랩 | Apparatus and method for preventing screen capture |
CN106372473A (en) * | 2016-09-02 | 2017-02-01 | 深圳中兴网信科技有限公司 | Screen capturing method, screen capturing device, terminal and server |
CN108093068A (en) * | 2017-12-27 | 2018-05-29 | 浪潮金融信息技术有限公司 | Terminal monitoring method and device, computer storage media, terminal |
CN108170844A (en) * | 2018-01-17 | 2018-06-15 | 广东欧珀移动通信有限公司 | Storage method, device, terminal and the storage medium of record screen file |
CN108509533A (en) * | 2018-03-15 | 2018-09-07 | 平安科技(深圳)有限公司 | Control method, device, equipment and the computer storage media of screenshotss sharing files |
CN109085975A (en) * | 2018-08-06 | 2018-12-25 | Oppo广东移动通信有限公司 | Screenshotss method, apparatus, storage medium and electronic device |
CN109190390A (en) * | 2018-08-06 | 2019-01-11 | 北京北信源软件股份有限公司 | The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication |
CN109756539A (en) * | 2017-11-06 | 2019-05-14 | 腾讯科技(深圳)有限公司 | A kind of screenshotss control method and relevant device |
-
2019
- 2019-06-12 CN CN201910506134.3A patent/CN110363020B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429745B1 (en) * | 2011-09-23 | 2013-04-23 | Symantec Corporation | Systems and methods for data loss prevention on mobile computing systems |
KR20140022354A (en) * | 2013-10-15 | 2014-02-24 | 주식회사 안랩 | Apparatus and method for preventing screen capture |
CN106372473A (en) * | 2016-09-02 | 2017-02-01 | 深圳中兴网信科技有限公司 | Screen capturing method, screen capturing device, terminal and server |
CN109756539A (en) * | 2017-11-06 | 2019-05-14 | 腾讯科技(深圳)有限公司 | A kind of screenshotss control method and relevant device |
CN108093068A (en) * | 2017-12-27 | 2018-05-29 | 浪潮金融信息技术有限公司 | Terminal monitoring method and device, computer storage media, terminal |
CN108170844A (en) * | 2018-01-17 | 2018-06-15 | 广东欧珀移动通信有限公司 | Storage method, device, terminal and the storage medium of record screen file |
CN108509533A (en) * | 2018-03-15 | 2018-09-07 | 平安科技(深圳)有限公司 | Control method, device, equipment and the computer storage media of screenshotss sharing files |
CN109085975A (en) * | 2018-08-06 | 2018-12-25 | Oppo广东移动通信有限公司 | Screenshotss method, apparatus, storage medium and electronic device |
CN109190390A (en) * | 2018-08-06 | 2019-01-11 | 北京北信源软件股份有限公司 | The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111199046A (en) * | 2019-11-29 | 2020-05-26 | 云深互联(北京)科技有限公司 | Content protection method and device based on enterprise browser |
CN112491835A (en) * | 2020-11-16 | 2021-03-12 | 平安信托有限责任公司 | Screenshot sending method and device, computer equipment and storage medium |
CN114547632A (en) * | 2020-11-19 | 2022-05-27 | 成都鼎桥通信技术有限公司 | Information protection method, device, equipment and storage medium |
CN114547632B (en) * | 2020-11-19 | 2023-10-13 | 成都鼎桥通信技术有限公司 | Information protection method, device, equipment and storage medium |
CN113221890A (en) * | 2021-05-25 | 2021-08-06 | 深圳市瑞驰信息技术有限公司 | OCR-based cloud mobile phone text content supervision method, system and system |
CN113569861B (en) * | 2021-08-03 | 2022-12-06 | 天翼爱音乐文化科技有限公司 | Mobile application illegal content scanning method, system, equipment and medium |
CN113569861A (en) * | 2021-08-03 | 2021-10-29 | 天翼爱音乐文化科技有限公司 | Mobile application illegal content scanning method, system, equipment and medium |
CN114268480A (en) * | 2021-12-15 | 2022-04-01 | 奇安信科技集团股份有限公司 | Picture transmission monitoring method and device, storage medium and terminal |
CN116361847A (en) * | 2023-02-20 | 2023-06-30 | 海道(深圳)教育科技有限责任公司 | Mobile device-based screen capturing prevention method and system |
CN116361847B (en) * | 2023-02-20 | 2024-03-12 | 海道(深圳)教育科技有限责任公司 | Mobile device-based screen capturing prevention method and system |
CN115984971A (en) * | 2023-03-17 | 2023-04-18 | 宁德时代新能源科技股份有限公司 | User behavior monitoring method and device and electronic equipment |
CN116738485A (en) * | 2023-06-21 | 2023-09-12 | 江苏克胜集团股份有限公司 | Safety management platform based on digital information transmission |
CN116738485B (en) * | 2023-06-21 | 2023-12-05 | 江苏克胜集团股份有限公司 | Security management system based on digital information transmission |
Also Published As
Publication number | Publication date |
---|---|
CN110363020B (en) | 2023-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110363020A (en) | Screenshotss monitoring method, device, computer equipment and storage medium | |
CN104091140B (en) | A kind of information processing method and electronic equipment | |
CN109145590A (en) | A kind of function hook detection method, detection device and computer-readable medium | |
CN106878108A (en) | Network flow playback method of testing and device | |
CN104811461B (en) | Data push method and device | |
CN110855652A (en) | Safety baseline configuration compliance detection method and device, computer equipment and medium | |
CN108920357A (en) | Operation system detection method, device, computer equipment and storage medium | |
CN108335191B (en) | Financial account opening method, financial service system terminal and computer storage medium | |
CN108062714B (en) | Annuity data sending method and device, computer equipment and storage medium | |
CN113569541A (en) | Message generation method, device, equipment and medium | |
CN110347565B (en) | Application program abnormity analysis method and device and electronic equipment | |
CN107168844B (en) | Performance monitoring method and device | |
CN107944841A (en) | Emolument computing system and method | |
CN109840403B (en) | Application login method and device, computer readable storage medium and computer equipment | |
CN116797345A (en) | Task processing method, device, computer equipment and storage medium | |
CN111274577A (en) | Information protection method, device, system and computer readable storage medium | |
CN108140128A (en) | Link association | |
CN112633619A (en) | Risk assessment method and device | |
CN113190200B (en) | Exhibition data security protection method and device | |
CN111786991B (en) | Block chain-based platform authentication login method and related device | |
KR20190071905A (en) | Data backup reporting method and system | |
CN108053510A (en) | Intelligent attendance system and method | |
CN113610535A (en) | Risk monitoring method and device suitable for consumption staging business process | |
CN113076369A (en) | Real-time fire-fighting supervision method and system | |
CN110827021A (en) | Digital asset extraction monitoring method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |