CN110363020B - Screen capturing monitoring method, device, computer equipment and storage medium - Google Patents

Screen capturing monitoring method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110363020B
CN110363020B CN201910506134.3A CN201910506134A CN110363020B CN 110363020 B CN110363020 B CN 110363020B CN 201910506134 A CN201910506134 A CN 201910506134A CN 110363020 B CN110363020 B CN 110363020B
Authority
CN
China
Prior art keywords
screen capturing
capturing image
information
client
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910506134.3A
Other languages
Chinese (zh)
Other versions
CN110363020A (en
Inventor
陈琳琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910506134.3A priority Critical patent/CN110363020B/en
Publication of CN110363020A publication Critical patent/CN110363020A/en
Application granted granted Critical
Publication of CN110363020B publication Critical patent/CN110363020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a screen capturing monitoring method, a screen capturing monitoring device, computer equipment and a storage medium; monitoring an operation instruction of a client in real time; if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction; detecting information of the screen capturing image, and judging whether the screen capturing image contains sensitive information or not; if the screen capturing image contains sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time; judging whether the operation behavior of the client side on the screen capturing image is illegal or not, if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side, and if the withdrawal instruction of the client side on the illegal behavior is not received within the preset time, executing locking operation; whether the screen capturing image contains sensitive information or not is detected in real time, and if the screen capturing image contains the sensitive information, a user is reminded to cancel, so that leakage of the sensitive information in the screen capturing image is avoided, and accuracy of monitoring the screen capturing image is guaranteed.

Description

Screen capturing monitoring method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of cloud monitoring, and in particular, to a screen capturing monitoring method, a device, a computer device, and a storage medium.
Background
With the rapid development of the internet, ensuring the security of information plays an increasingly important role in information transmission. In daily work and social processes of people, people often save or share web pages or document contents by using a screen capturing tool, so that information leakage through screen capturing images is caused to be more and more. Therefore, effectively managing or monitoring the screen capturing image has a non-negligible effect. At present, most of methods for managing or monitoring screen capturing images in the market are relatively simple, and if a user is found to have a screen capturing action, locking operation is directly executed, so that great inconvenience is brought to the use of the user.
Disclosure of Invention
The embodiment of the invention provides a screen capturing monitoring method, a screen capturing monitoring device, computer equipment and a storage medium, which are used for solving the problem of inaccurate monitoring of screen capturing behaviors.
A screen capture monitoring method, comprising:
monitoring an operation instruction of a client in real time;
if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction;
detecting information of the screen capturing image and judging whether the screen capturing image contains sensitive information or not;
If the screen capturing image contains the sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time;
judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side;
and if the revocation instruction of the client to the illegal action is not received within the preset time, executing locking operation.
A screen capture monitoring device, comprising:
the operation instruction monitoring module is used for monitoring the operation instruction of the client in real time;
the screen capturing image acquisition module is used for acquiring a screen capturing image corresponding to the screen capturing instruction when the operation instruction is the screen capturing instruction;
the information detection module is used for carrying out information detection on the screen capturing image and judging whether the screen capturing image contains sensitive information or not;
the operation behavior monitoring module is used for monitoring the operation behavior of the client on the screen capturing image in real time when the screen capturing image contains the sensitive information;
the first judging module is used for judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side;
And the locking operation module is used for executing locking operation when the revocation instruction of the client to the illegal action is not received within preset time.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the screen capture monitoring method described above when executing the computer program.
A computer readable storage medium storing a computer program which when executed by a processor implements the screen capture monitoring method described above.
The screen capturing monitoring method, the screen capturing monitoring device, the computer equipment and the storage medium monitor the operation instruction of the client in real time; if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction; detecting information of the screen capturing image, and judging whether the screen capturing image contains sensitive information or not; if the screen capturing image contains sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time; judging whether the operation behavior of the client side on the screen capturing image is illegal or not, if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side, and if the withdrawal instruction of the client side on the illegal behavior is not received within the preset time, executing locking operation; whether the screen capturing image contains sensitive information or not is detected in real time, and if the screen capturing image contains the sensitive information, a user is reminded to cancel, so that leakage of the sensitive information in the screen capturing image is avoided, and accuracy of monitoring the screen capturing behavior is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments of the present invention will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic view of an application environment of a screen capturing monitoring method according to an embodiment of the present invention;
FIG. 2 is an exemplary diagram of screen shot monitoring in accordance with one embodiment of the present invention;
FIG. 3 is another exemplary diagram of screen shot monitoring in an embodiment of the present invention;
FIG. 4 is another exemplary diagram of screen shot monitoring in an embodiment of the invention;
FIG. 5 is another exemplary diagram of screen shot monitoring in an embodiment of the invention;
FIG. 6 is another exemplary diagram of screen shot monitoring in an embodiment of the invention;
FIG. 7 is a schematic block diagram of a screen capture monitoring apparatus in accordance with an embodiment of the present invention;
FIG. 8 is another functional block diagram of a screen capture monitoring apparatus in an embodiment of the invention;
FIG. 9 is another functional block diagram of a screen capture monitoring apparatus in an embodiment of the invention;
FIG. 10 is a schematic diagram of a computer device in accordance with an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The screen capturing monitoring method provided by the embodiment of the invention can be applied to an application environment shown in figure 1. Specifically, the screen capturing monitoring method is applied to a screen capturing monitoring system, the screen capturing monitoring system comprises a client and a server as shown in fig. 1, and the client and the server communicate through a network to solve the problem of inaccurate monitoring of screen capturing images. The client is also called a user end, and refers to a program corresponding to the server end for providing local service for the client. The client may be installed on, but is not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices. The server may be implemented by a stand-alone server or a server cluster formed by a plurality of servers.
In an embodiment, as shown in fig. 2, a screen capturing monitoring method is provided, and the method is applied to the server in fig. 1 for illustration, and includes the following steps:
s10: and monitoring the operation instruction of the client in real time.
The operation instruction of the client refers to an instruction generated by operation behaviors executed by a user on the client. For example, after the user performs an operation behavior such as touching, clicking, sliding, framing, or screen capturing, the client forms a corresponding operation instruction. The client may be a computer terminal or a mobile terminal, etc. Optionally, the operation instruction of the real-time monitoring client can monitor the operation behavior of the user on the client page in real time by inserting a monitoring script plug-in on the client page. When the monitoring script plug-in monitors the operation behavior of the user on the client page, a corresponding operation instruction is generated in real time, and the operation instruction is sent to the server in real time. In addition, the operation behaviors of the user at the client can be monitored in real time through the computer behavior supervision system or the monitoring platform, corresponding operation instructions are generated, and the operation instructions are sent to the server in real time.
S20: and if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction.
The screen capturing instruction refers to an instruction generated after a user executes screen capturing action on a client. The screen capturing image refers to an image generated by a user after the client performs a screen capturing action. Specifically, the user may take a screen shot of the entire screen at the client, or take a screen shot of a portion of the screen at the client. Alternatively, the screen capture image may be one or more. Specifically, if the operation instruction sent by the client is a screen capturing instruction, the server acquires a screen capturing image corresponding to the screen capturing instruction.
S30: and detecting information of the screen capturing image and judging whether the screen capturing image contains sensitive information or not.
The sensitive information refers to preset information inconvenient to leak or disclose. For example: the sensitive information may be personal information, financial data, or information related to confidential documents, etc. In a specific embodiment, the server is preset with a custom sensitive information base specially used for storing sensitive information. Specifically, performing information detection on the screen capturing image includes: and carrying out information identification on the screen capturing image by adopting a character identification tool, acquiring corresponding information to be verified from the screen capturing image, and then judging whether the acquired information to be verified contains sensitive information or not. Optionally, judging whether the information to be verified contains sensitive information or not, and matching the information to be verified with sensitive information pre-stored in a user-defined sensitive information base one by adopting a character string matching algorithm; or adopting a regular matching method to match the information to be verified with the pre-stored sensitive information in the user-defined sensitive information base one by one. If the information to be verified is successfully matched with the sensitive information pre-stored in the custom sensitive information base, the screen capturing image is indicated to contain the sensitive information, and if the information to be verified is failed to be matched with the sensitive information pre-stored in the custom sensitive information base, the screen capturing image is indicated to not contain the sensitive information.
S40: and if the screen capturing image contains sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time.
Specifically, if it is determined in step S30 that the screen capturing image includes sensitive information, the operation behavior of the user on the screen capturing image at the client is monitored in real time. In the step, the leakage of the screen capturing image containing sensitive information can be prevented by monitoring the operation behavior of the client on the screen capturing image in real time.
In a specific embodiment, if it is determined in step S30 that the screen capturing image does not include sensitive information, the operation of the monitoring client on the screen capturing image is canceled. On the premise of ensuring the information security of the screen capturing image, background service resources can be saved.
S50: judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side.
Where an illegal action refers to an action of performing an illegal operation on a screen shot image containing sensitive information. For example: the illegal action may be to send/share the screen shot image containing the sensitive information to a non-permitted person or to save the screen shot image containing the sensitive information to a non-designated file; or printing a screen capturing image containing sensitive information; or posting a screen shot image containing sensitive information to a bulletin web site, etc.
Judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side. The early warning information is information for prompting a user to operate the screen capturing image as illegal actions. Specifically, the early warning information includes sensitive information contained in the screen capturing image to be highlighted, and option information for prompting a user whether to cancel the operation of the screen capturing image.
Specifically, whether the operation behavior of the client on the screen capturing image is illegal or not is judged, and whether the operation behavior of the client on the screen capturing image is illegal or not can be judged by acquiring instruction information generated by the operation behavior of the client on the screen capturing image. It can be understood that after the client performs any operation on the screen capturing image, the user generates corresponding instruction information, and the server acquires the instruction information sent by the client, then performs information identification on the instruction information, and judges whether the instruction information is illegal instruction information; if the instruction information is identified as illegal instruction information, judging the corresponding operation behavior as illegal behavior. Otherwise, the legal action is performed. The illegal instruction information refers to preset information for detecting whether the operation behavior of the client on the screen capturing image is illegal or not.
In a specific embodiment, if the operation behavior of the client on the screen capturing image is judged to be legal, the early warning information is not sent to the client, and the subsequent operation behavior of the client on the screen capturing image is continuously monitored, so that sensitive information leakage can be further prevented.
S60: and if the revocation instruction of the client to the illegal action is not received within the preset time, executing the locking operation.
Specifically, if the client return revocation instruction is not received within the preset time, the locking operation is executed. Wherein the preset time refers to a time period for canceling the operation behavior on the screen capturing image to the user. Alternatively, the preset time may be set to 5s, 10s, 30s, 45s, 60s, or the like. It will be appreciated that the user may undo the action of manipulating the screen capture image within a preset period of time. And if the user does not cancel the operation behavior of the screen capturing image within the preset time period, namely, the server side does not receive the cancel instruction returned by the client side, executing the locking operation. Optionally, because the client in the solution may be a computer terminal/mobile terminal, performing the locking operation may be locking the computer terminal/mobile terminal, locking some functions of the computer terminal/mobile terminal, or locking some specific application programs on the computer terminal/mobile terminal. For example: the network connection of the computer terminal/mobile terminal can be automatically disconnected, or a mailbox on the computer terminal/mobile terminal is locked, so that the screen capturing image carrying the sensitive information cannot be leaked outwards.
In a specific embodiment, if the revocation instruction returned by the client is received within a preset time, the locking operation is not executed, so that the user can normally execute other operations on the page of the client.
In this embodiment, the operation instruction of the client is monitored in real time; if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction; detecting information of the screen capturing image, and judging whether the screen capturing image contains sensitive information or not; if the screen capturing image contains sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time; judging whether the operation behavior of the client side on the screen capturing image is illegal or not, if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side, and if the withdrawal instruction of the client side on the illegal behavior is not received within the preset time, executing locking operation; whether the screen capturing image contains sensitive information or not is detected in real time, and if the screen capturing image contains the sensitive information, a user is reminded to cancel, so that leakage of the sensitive information in the screen capturing image is avoided, and accuracy of monitoring the screen capturing behavior is guaranteed.
In one embodiment, as shown in fig. 3, the information detection is performed on the screen capturing image to determine whether the screen capturing image contains sensitive information, which specifically includes the following steps:
S301: and carrying out information identification on the screen capturing image to obtain information to be verified in the screen capturing image.
The information to be verified refers to information contained in the screen capturing image. Specifically, a character recognition tool (such as OCR character recognition software) preset by the server may be used to perform information recognition on the acquired screen capturing image, so as to acquire the information to be verified included in the screen capturing image. The character recognition tool is used for recognizing characters in the picture. The character recognition tool in the embodiment can adopt OCR character recognition software, and the OCR character recognition software has the advantage of high recognition accuracy.
S302: and matching the information to be verified with preset sensitive information in the sensitive information database to obtain a matching result.
The sensitive information database is a preset database containing a plurality of preset sensitive information. The user can preset a preset quantity of preset sensitive information in the client according to preset requirements, and then the preset sensitive information is stored in a sensitive information database of the server.
Specifically, after the information to be verified in the screen capturing image is obtained, matching the information to be verified with preset sensitive information in a sensitive information database to judge whether the sensitive information exists in the information to be verified; and if the sensitive information exists in the information to be verified, obtaining a matching result as successful matching. Otherwise, if the sensitive information does not exist in the information to be verified, the matching result is obtained as the matching failure.
In a specific implementation method, whether sensitive information exists in the information to be verified or not is judged, and the sensitive information can be set according to a preset standard or mode. Specifically, the preset sensitive information may be set to include specific sensitive information and general sensitive information. Firstly, after the information to be verified in the screen capturing image is obtained, inquiring the information to be verified by adopting a specific character string or a preset field according to the characteristics of special sensitive information, and recognizing that the sensitive information exists in the information to be verified as long as the specific character string or the preset field appears in the information to be verified. For example: the mobile phone number, the bank card number and the identity card number can be regarded as special sensitive information; specific fields may also be identified as particularly sensitive information such as a user name, user address, or amount. Then, matching the information to be verified with the common sensitive information in the sensitive information database one by adopting a character string matching method, and if the information which is the same as the common sensitive information is not matched in the information to be verified, indicating that the common sensitive information is not contained in the information to be verified; if the information which is matched with the common sensitive information in the information to be verified is the same as the common sensitive information, the information to be verified contains the common sensitive information.
Preferably, in order to improve accuracy of the matching result, a matching threshold value may be preset, and if the number of the information matched with the common sensitive information in the information to be verified is greater than the matching threshold value, the information to be verified contains the common sensitive information; if the number of the information which is matched with the common sensitive information in the information to be verified is equal to or smaller than the matching threshold value, the information to be verified does not contain the common sensitive information. Wherein, the matching threshold refers to a critical value for judging whether the information to be verified contains common sensitive information. The matching threshold value can be 20%, 30% or 50%, etc., and the user can customize the setting according to the actual situation.
S303: if the matching result is that the matching is successful, judging that the screen capturing image contains sensitive information.
Specifically, if the matching result obtained in step S302 is that the matching is successful, it is determined that the screen capturing image includes sensitive information.
S304: if the matching result is that the matching fails, judging that the screen capturing image does not contain sensitive information.
Specifically, if the matching result obtained in step S302 is that the matching fails, it is determined that the screen capturing image does not include sensitive information.
In the embodiment, information to be verified in the screen capturing image is obtained by carrying out information identification on the screen capturing image; matching the information to be verified with preset sensitive information in a sensitive information database to obtain a matching result; if the matching result is that the matching is successful, judging that the screen capturing image contains sensitive information; if the matching result is that the matching fails, judging that the screen capturing image does not contain sensitive information; the efficiency and the accuracy of detecting the screen capturing image are guaranteed.
In an embodiment, as shown in fig. 4, after acquiring the screen capturing image corresponding to the screen capturing instruction if the operation instruction is the screen capturing instruction and before detecting the information of the screen capturing image, the screen capturing monitoring method further includes the following steps:
s21: and determining the screen capturing page where the screen capturing image is located.
The screen capturing page refers to a page where a user executes screen capturing operation behaviors. For example: when a user logs in a certain application program, screen capturing operation is carried out on a login page in the application program to generate a screen capturing image, and the login page is the screen capturing page where the screen capturing image is located.
S22: and judging whether the screen capturing page belongs to the sensitive page according to the application program to which the screen capturing page belongs.
Where a sensitive page refers to a page that may contain sensitive information. The sensitive page may be a page where a strong application within the company is located. For example: pages where applications related to corporate operation reports are located, pages where applications related to corporate internal information are located, etc. In this embodiment, the application includes, but is not limited to, app software.
Optionally, the application program to which the determined screen capturing page belongs may perform page detection on the screen capturing page through a page detection tool, so as to determine whether the screen capturing page has a display identifier specific to a certain application program. Alternatively, the application-specific display identifier may be a logo identifier of the application. Or by detecting which applications running in the foreground when performing the screen capture operation are included. For example: and if the application program corresponding to the Foxmail runs in the foreground when the screen capturing operation is detected, judging that the application program to which the screen capturing page belongs is the Foxmail.
After determining the application program to which the screen capturing page belongs, a state management policy of one application program can be preset, wherein the state management policy comprises each application program and a corresponding state identifier. Wherein the status identifications include sensitive identifications and non-sensitive identifications. In a particular embodiment, each application is pre-associated with a corresponding state identification. For example: applications within the company that are strong in confidentiality are associated with sensitive identities, and some applications that are not critical are associated with non-sensitive identities. Specifically, after the screen capturing page is acquired, an application program to which the screen capturing page belongs is determined, then a corresponding state identifier is acquired according to the application program, if the acquired state identifier is a sensitive identifier, the screen capturing page is judged to belong to the sensitive page, and if the acquired state identifier is a non-sensitive identifier, the screen capturing page is judged to belong to the non-sensitive page. It can be appreciated that if the acquired screen capture page is not in any application program, the screen capture page is directly judged to belong to a non-sensitive page.
S23: and if the screen capturing page belongs to the sensitive page, executing information detection on the screen capturing image.
Specifically, if it is determined in step S22 that the screen capturing page belongs to the sensitive page, the step of detecting information of the screen capturing image is triggered.
In a specific embodiment, if it is determined in step S202 that the screen capturing page does not belong to the sensitive page, the step of detecting information of the screen capturing image is not performed, but a preset general monitoring module is started to monitor the operation behavior of the client, and in the general monitoring mode, if the behavior of the client is monitored to be an abnormal legal behavior, early warning information is sent to the client, and the alert user is revoked. If the monitored behavior of the client is the normal legal behavior, no early warning information is sent to the client, and the subsequent operation behavior of the client on the screen capturing image is monitored in the normal monitoring mode. Where the normal legal action may be to place the screenshot image in a designated folder or to send the screenshot image to a specific user. The non-common legal action may be copying and pasting the screenshot image into a non-designated file or sending the screenshot image to an outside person.
In the embodiment, the screen capturing page where the screen capturing image is determined; judging whether the screen capturing page belongs to a sensitive page according to an application program to which the screen capturing page belongs; if the screen capturing page belongs to the sensitive page, executing information detection on the screen capturing image; before information detection is carried out on the screen capturing images, the page where the screen capturing images are located is judged to belong to a sensitive page, and information detection is carried out on the screen capturing images corresponding to the sensitive page, so that the burden of a background system is reduced, and the accuracy of monitoring the screen capturing behaviors is improved. In an embodiment, as shown in fig. 5, the method for determining whether the operation line of the client on the screen capturing image is illegal specifically includes the following steps:
S501: and if the operation behavior of the client to the screen capturing image is the interaction behavior, acquiring the client identifier.
The client identifier refers to an identity information identifier of a user performing operation behaviors at the client. Alternatively, the client identifier may be a mobile phone number, a job number, or an identification card number of the user, which represents unique identity information of the user. In a specific embodiment, the user performing the operation behavior at the client may be a user corresponding to the login of the operating system, or may be a user corresponding to the login of the specified application program. If the user performing the operation on the client is a user corresponding to the user logging in the designated application, the client label may correspond to login information of the user logging in the application. Specifically, if the operation behavior of the client on the screen capturing image is monitored to be the interaction behavior, the client identification is directly obtained.
S502: and acquiring the interactive authority level of the user according to the client identification.
The interaction permission level refers to the permission level of the user to interact with the screen capturing image. For example: permission level for transmitting the screen shot image. Specifically, different users have different interaction authority levels, for example, a common staff only has viewing authority on a screen shot image and cannot perform sending operation, a middle-layer manager only has sending authority on a designated receiving end, and a high-layer manager has sending authority on any receiving end. In one embodiment, different client identifications have been previously associated with corresponding interaction rights levels and stored in a database. After the client identifier is obtained, the corresponding user interaction permission level can be directly obtained from the database according to the client identifier. In this embodiment, the interactive authority level of the user is determined through the client identifier, different authorities of different users are divided, and the use requirements of different users can be met while the security of the screen capturing image is ensured.
S503: and if the interaction permission level meets the preset permission level, acquiring a receiving end identifier corresponding to the interaction behavior.
The preset permission level refers to a standard for judging whether a user has specific interaction permission on the screen capturing image. Alternatively, the preset authority level may be set such that the middle-level manager and the high-level manager have interactive authority on the screen shot image. Specifically, if the interaction permission level of the acquired user is the middle-layer manager according to the client identifier, that is, the preset permission level is met, the receiving end identifier corresponding to the interaction behavior is acquired. The receiving end identification refers to an identification corresponding to another terminal for receiving the screen capturing image. In a specific embodiment, before the user performs the interaction on the screen capturing image, the receiving terminal performing the interaction needs to be determined or selected, so if the interaction permission level of the user is determined to meet the preset permission level, the receiving terminal identifier corresponding to the interaction behavior can be directly obtained from the client. Alternatively, the receiving end identifier may be a terminal name, an IP address, or a network card number of the receiving terminal.
S504: judging whether the receiving end identifier is in a preset authority identifier or not, and if the receiving end identifier is not in the preset authority identifier, determining that the operation behavior of the client on the screen capturing image is illegal.
The preset permission identification refers to a preset terminal identification number capable of receiving the screen capturing image. For example: the preset permission identification can be a terminal identification number corresponding to personnel in the company or a preset specific terminal identification number. In a specific embodiment, the database of the server side stores a plurality of preset authority identifiers in advance. Specifically, whether the receiving end identifier is in the preset authority identifier is judged, the obtained receiving end identifier can be matched with the preset authority identifier stored in the database one by one, and if the obtained receiving end identifier is not matched with all the preset authority identifiers stored in the database, the receiving end identifier is not in the preset authority identifier. Otherwise, if the obtained receiving end identifier is matched with any preset authority identifier stored in the database in advance, the receiving end identifier is indicated to be in the preset authority identifier.
In a specific embodiment, if the receiving end identifier is not within the preset authority identifier, the operation behavior of the client on the screen capturing image is determined to be illegal.
In this embodiment, if the operation behavior of the client to the screen capturing image is an interaction behavior, the client identifier is obtained; acquiring the interactive authority level of the user according to the client identifier; if the interaction permission level meets the preset permission level, acquiring a receiving end identifier corresponding to the interaction behavior; judging whether the receiving end identifier is in a preset authority identifier or not, and if the receiving end identifier is not in the preset authority identifier, determining that the operation behavior of the client on the screen capturing image is illegal; the interactive authority level of the user is determined through the client identification, and aiming at the interactive authority level of different users, the security of the screen capturing image is ensured, meanwhile, the use requirements of different users are met, and the user experience is improved.
In one embodiment, as shown in fig. 6, after determining whether the receiving end identifier is within the preset authority identifier, the screen capturing monitoring method further includes the following steps:
s505: if the receiving end identifier is in the preset authority identifier, judging that the operation behavior of the client on the screen capturing image is legal.
Specifically, if the receiving end identifier is judged to be in the preset authority identifier, judging that the operation behavior of the client on the screen capturing image is legal.
S506: and determining the position of the region where the sensitive information is located in the screen capturing image.
Where the location of the region refers to the specific location where the sensitive information is located in the screen capture image. In a specific embodiment, the location of the region of the sensitive information may be represented by a coordinate location in the screen capture image where the sensitive information is located. Alternatively, the position of the area in this embodiment is preferably represented by the center coordinate of the rectangular area in which the sensitive information is located. Specifically, determining the location of the region in the screen capture image where the sensitive information is located can be achieved by using an openCV method.
S507: and blurring the sensitive information of the corresponding region position to obtain a target screen capturing image.
The target screen capturing image refers to an image obtained by blurring sensitive information in the screen capturing image. Specifically, the blurring processing of the sensitive information corresponding to the region position refers to the process of hiding the region position where the sensitive information is located in the screen capturing image in a certain way. Optionally, blurring processing of the sensitive information of the corresponding region position can be automatically realized by means of an image processing tool, or blurring processing of the sensitive information region in the screen capturing image is realized by using java language, so that the target screen capturing image is obtained.
S508: and sending the target screen capturing image to a corresponding receiving terminal.
Specifically, the target screen capturing image after the blurring processing is sent to the corresponding receiving terminal, for example, the user sends the target screen capturing image to the corresponding receiving terminal through WeChat. In this embodiment, the blurring process of the blurring process is sent to the corresponding receiving terminal; under the condition that the whole screen capturing image is not influenced, the leakage of sensitive information is avoided, and the user experience is improved.
In this embodiment, if the receiving end identifier is within the preset authority identifier, the operation behavior of the client on the screen capturing image is judged to be legal; determining the position of an area where sensitive information in the screen capturing image is located; blurring processing is carried out on the sensitive information of the corresponding region position, and a target screen capturing image is obtained; transmitting the target screen capturing image to a corresponding receiving terminal; the blurring processing is carried out on the sensitive information by determining the position of the region where the sensitive information in the screen capturing image is located, so that the security of the screen capturing image is further improved under the condition that the sending of the screen capturing image is not affected.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
In an embodiment, a screen capturing monitoring device is provided, where the screen capturing monitoring device corresponds to the screen capturing monitoring method in the above embodiment one by one. As shown in fig. 7, the screen capturing monitoring apparatus includes an operation instruction monitoring module 10, a screen capturing image acquisition module 20, an information detection module 30, an operation behavior monitoring module 40, a first judgment module 50, and a lock operation module 60. The functional modules are described in detail as follows:
the operation instruction monitoring module 10 is used for monitoring the operation instruction of the client in real time;
the screen capturing image obtaining module 20 is configured to obtain a screen capturing image corresponding to the screen capturing instruction when the operation instruction is the screen capturing instruction;
the information detection module 30 is configured to perform information detection on the screen capturing image, and determine whether the screen capturing image includes sensitive information;
an operation behavior monitoring module 40, configured to monitor, in real time, an operation behavior of the client on the screen capturing image when the screen capturing image contains sensitive information;
the first judging module 50 is configured to judge whether an operation behavior of the client on the screen capturing image is an illegal behavior, and if the operation behavior of the client on the screen capturing image is the illegal behavior, send early warning information to the client;
The locking operation module 60 is configured to perform a locking operation when a revocation instruction of an illegal action by the client is not received within a preset time.
Preferably, as shown in fig. 8, the information detection module 30 includes:
an information identifying unit 301, configured to identify information of the screen capturing image, and obtain information to be verified in the screen capturing image;
the matching unit 302 is configured to match the information to be verified with preset sensitive information in the sensitive information database, so as to obtain a matching result;
a first judging unit 303, configured to judge that the screen capturing image contains sensitive information when the matching result is that the matching is successful;
and a second judging unit 304, configured to judge that the screen capturing image does not contain sensitive information when the matching result is that the matching fails.
Preferably, as shown in fig. 9, the screen capturing monitor apparatus further includes:
a screen capturing page determining module 21, configured to determine a screen capturing page where the screen capturing image is located;
the second judging module 22 is configured to judge whether the screen capturing page belongs to a sensitive page according to an application program to which the screen capturing page belongs;
the triggering module 23 is configured to trigger to perform a step of detecting information of the screen capturing image when the screen capturing page belongs to the sensitive page.
Preferably, the first judging module 50 includes:
The client identifier acquisition unit is used for acquiring the client identifier when the operation behavior of the client on the screen capturing image is interactive behavior;
the interactive authority level unit is used for acquiring the interactive authority level of the user according to the client identifier;
the receiving end identifier obtaining unit is used for obtaining the receiving end identifier corresponding to the interaction behavior when the interaction permission level meets the preset permission level;
and the third judging unit is used for judging whether the receiving end identifier is in the preset authority identifier or not, and if the receiving end identifier is not in the preset authority identifier, determining that the operation behavior of the client on the screen capturing image is illegal.
Preferably, the screen capturing monitor apparatus further comprises:
the third judging module is used for judging that the operation behavior of the client on the screen capturing image is legal when the receiving end identifier is within the preset authority identifier;
the regional position determining module is used for determining the regional position of the sensitive information in the screen capturing image;
the blurring processing module is used for blurring the sensitive information of the corresponding region position to obtain a target screen capturing image;
and the sending module is used for sending the target screen capturing image to the corresponding receiving terminal.
For specific limitations of the screen capturing monitoring apparatus, reference may be made to the above limitation of the screen capturing monitoring method, and no further description is given here. The various modules in the screen capture monitoring apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing the data used in the screen capturing monitoring method of the above embodiment. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a screen capture monitoring method.
In one embodiment, a computer device is provided that includes a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the screen capture monitoring method of the above embodiments when executing the computer program.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the screen capture monitoring method of the above embodiments.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (9)

1. A screen capturing monitoring method, comprising:
monitoring an operation instruction of a client in real time;
if the operation instruction is a screen capturing instruction, acquiring a screen capturing image corresponding to the screen capturing instruction;
Detecting information of the screen capturing image and judging whether the screen capturing image contains sensitive information or not;
if the screen capturing image contains the sensitive information, monitoring the operation behavior of the client on the screen capturing image in real time;
judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side; wherein, the illegal action refers to the action of executing illegal operation on the screen capturing image containing sensitive information; the illegal actions include: transmitting/sharing the screen capturing image containing the sensitive information to a non-permitted person, saving the screen capturing image containing the sensitive information to a non-designated file, printing the screen capturing image containing the sensitive information, or publishing the screen capturing image containing the sensitive information to a bulletin website;
if the revocation instruction of the client to the illegal action is not received within the preset time, executing locking operation;
the judging whether the operation line of the client side on the screen capturing image is illegal or not comprises the following steps:
if the operation behavior of the client to the screen capturing image is interactive behavior, acquiring the client identifier;
Acquiring the interactive authority level of the user according to the client identifier;
if the interaction permission level meets a preset permission level, acquiring a receiving end identifier corresponding to the interaction behavior;
judging whether the receiving end identifier is in a preset authority identifier or not, and if the receiving end identifier is not in the preset authority identifier, determining that the operation behavior of the client on the screen capturing image is illegal.
2. The screen capturing monitoring method as claimed in claim 1, wherein said performing information detection on the screen capturing image to determine whether the screen capturing image contains sensitive information comprises:
information identification is carried out on the screen capturing image, and information to be verified in the screen capturing image is obtained;
matching the information to be verified with preset sensitive information in a sensitive information database to obtain a matching result;
if the matching result is that the matching is successful, judging that the screen capturing image contains sensitive information;
and if the matching result is that the matching fails, judging that the screen capturing image does not contain sensitive information.
3. The screen capturing monitoring method according to claim 1, wherein after the screen capturing image corresponding to the screen capturing instruction is obtained if the operation instruction is the screen capturing instruction, and before the information detection is performed on the screen capturing image, the screen capturing monitoring method further comprises:
Determining a screen capturing page where the screen capturing image is located;
judging whether the screen capturing page belongs to a sensitive page or not according to an application program to which the screen capturing page belongs;
and if the screen capturing page belongs to the sensitive page, triggering and executing the step of information detection on the screen capturing image.
4. The screen capturing monitoring method as claimed in claim 1, wherein after said determining whether the receiving end identifier is within a preset authority identifier, the screen capturing monitoring method further comprises:
if the receiving end identifier is in the preset authority identifier, judging that the operation behavior of the client on the screen capturing image is legal;
determining the position of an area where the sensitive information is located in the screen capturing image;
blurring processing is carried out on the sensitive information of the corresponding region position, and a target screen capturing image is obtained;
and sending the target screen capturing image to a corresponding receiving terminal.
5. A screen capture monitoring device, comprising:
the operation instruction monitoring module is used for monitoring the operation instruction of the client in real time;
the screen capturing image acquisition module is used for acquiring a screen capturing image corresponding to the screen capturing instruction when the operation instruction is the screen capturing instruction;
The information detection module is used for carrying out information detection on the screen capturing image and judging whether the screen capturing image contains sensitive information or not;
the operation behavior monitoring module is used for monitoring the operation behavior of the client on the screen capturing image in real time when the screen capturing image contains the sensitive information;
the first judging module is used for judging whether the operation behavior of the client side on the screen capturing image is illegal or not, and if the operation behavior of the client side on the screen capturing image is illegal, sending early warning information to the client side;
the locking operation module is used for executing locking operation when the revocation instruction of the client to the illegal action is not received within preset time;
the first judging module includes:
the client identifier acquisition unit is used for acquiring the client identifier when the operation behavior of the client on the screen capturing image is interactive behavior;
the interactive authority level unit is used for acquiring the interactive authority level of the user according to the client identifier;
the receiving end identifier obtaining unit is used for obtaining the receiving end identifier corresponding to the interaction behavior when the interaction permission level meets the preset permission level;
And the third judging unit is used for judging whether the receiving end identifier is in the preset authority identifier or not, and if the receiving end identifier is not in the preset authority identifier, determining that the operation behavior of the client on the screen capturing image is illegal.
6. The screen capture monitoring apparatus of claim 5, wherein the information detection module comprises:
the information identification unit is used for carrying out information identification on the screen capturing image and acquiring information to be verified in the screen capturing image;
the matching unit is used for matching the information to be verified with preset sensitive information in the sensitive information database to obtain a matching result;
the first judging unit is used for judging that the screen capturing image contains sensitive information when the matching result is that the matching is successful;
and the second judging unit is used for judging that the screen capturing image does not contain sensitive information when the matching result is that the matching fails.
7. The screenshot monitoring device of claim 5 further comprising:
the screen capturing page determining module is used for determining a screen capturing page where the screen capturing image is located;
the second judging module is used for judging whether the screen capturing page belongs to a sensitive page according to an application program to which the screen capturing page belongs;
And the triggering module is used for triggering and executing the step of information detection on the screen capturing image when the screen capturing page belongs to the sensitive page.
8. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the screen capture monitoring method of any of claims 1 to 4 when the computer program is executed by the processor.
9. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the screen capture monitoring method according to any one of claims 1 to 4.
CN201910506134.3A 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium Active CN110363020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910506134.3A CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910506134.3A CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110363020A CN110363020A (en) 2019-10-22
CN110363020B true CN110363020B (en) 2023-07-04

Family

ID=68217221

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910506134.3A Active CN110363020B (en) 2019-06-12 2019-06-12 Screen capturing monitoring method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110363020B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111199046A (en) * 2019-11-29 2020-05-26 云深互联(北京)科技有限公司 Content protection method and device based on enterprise browser
CN112491835A (en) * 2020-11-16 2021-03-12 平安信托有限责任公司 Screenshot sending method and device, computer equipment and storage medium
CN114547632B (en) * 2020-11-19 2023-10-13 成都鼎桥通信技术有限公司 Information protection method, device, equipment and storage medium
CN113221890A (en) * 2021-05-25 2021-08-06 深圳市瑞驰信息技术有限公司 OCR-based cloud mobile phone text content supervision method, system and system
CN113569861B (en) * 2021-08-03 2022-12-06 天翼爱音乐文化科技有限公司 Mobile application illegal content scanning method, system, equipment and medium
CN114268480A (en) * 2021-12-15 2022-04-01 奇安信科技集团股份有限公司 Picture transmission monitoring method and device, storage medium and terminal
CN116361847B (en) * 2023-02-20 2024-03-12 海道(深圳)教育科技有限责任公司 Mobile device-based screen capturing prevention method and system
CN115984971A (en) * 2023-03-17 2023-04-18 宁德时代新能源科技股份有限公司 User behavior monitoring method and device and electronic equipment
CN116738485B (en) * 2023-06-21 2023-12-05 江苏克胜集团股份有限公司 Security management system based on digital information transmission

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
KR20140022354A (en) * 2013-10-15 2014-02-24 주식회사 안랩 Apparatus and method for preventing screen capture
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108170844A (en) * 2018-01-17 2018-06-15 广东欧珀移动通信有限公司 Storage method, device, terminal and the storage medium of record screen file
CN108509533A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 Control method, device, equipment and the computer storage media of screenshotss sharing files
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication
CN109756539A (en) * 2017-11-06 2019-05-14 腾讯科技(深圳)有限公司 A kind of screenshotss control method and relevant device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
KR20140022354A (en) * 2013-10-15 2014-02-24 주식회사 안랩 Apparatus and method for preventing screen capture
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN109756539A (en) * 2017-11-06 2019-05-14 腾讯科技(深圳)有限公司 A kind of screenshotss control method and relevant device
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108170844A (en) * 2018-01-17 2018-06-15 广东欧珀移动通信有限公司 Storage method, device, terminal and the storage medium of record screen file
CN108509533A (en) * 2018-03-15 2018-09-07 平安科技(深圳)有限公司 Control method, device, equipment and the computer storage media of screenshotss sharing files
CN109085975A (en) * 2018-08-06 2018-12-25 Oppo广东移动通信有限公司 Screenshotss method, apparatus, storage medium and electronic device
CN109190390A (en) * 2018-08-06 2019-01-11 北京北信源软件股份有限公司 The screenshotss evidence collecting method and device of website sensitive information behavior are pasted in a kind of pair of duplication

Also Published As

Publication number Publication date
CN110363020A (en) 2019-10-22

Similar Documents

Publication Publication Date Title
CN110363020B (en) Screen capturing monitoring method, device, computer equipment and storage medium
CN108304704B (en) Authority control method and device, computer equipment and storage medium
US10659482B2 (en) Robotic process automation resource insulation system
TWI787159B (en) Devices, methods and systems to secure protected content by providing notification of data security breach
CN111241565B (en) File control method and device, electronic equipment and storage medium
US20150026813A1 (en) Method and system for detecting network link
EP3792792A1 (en) Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium
US20190222587A1 (en) System and method for detection of attacks in a computer network using deception elements
JP2018085765A (en) Information processing device, information processing system, control method, and program
CN113489713A (en) Network attack detection method, device, equipment and storage medium
CN111914262A (en) Test method, device, system, electronic equipment and storage medium
CN111382399A (en) Method and device for adding watermark
CN111083093B (en) Method and device for calling terminal capability, electronic equipment and storage medium
CN109684863B (en) Data leakage prevention method, device, equipment and storage medium
CN112565226A (en) Request processing method, device, equipment and system and user portrait generation method
CN113472803A (en) Vulnerability attack state detection method and device, computer equipment and storage medium
CN102169534A (en) Method and device for displaying watermark
CN109040284B (en) Information display and information push method, device, equipment and storage medium
CN108494749B (en) Method, device and equipment for disabling IP address and computer readable storage medium
CN111030997A (en) Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN111177726A (en) System vulnerability detection method, device, equipment and medium
CN111199046A (en) Content protection method and device based on enterprise browser
CN107277014A (en) A kind of identifying device for detecting invalid access to computer network
CN115426481B (en) 5G and artificial intelligence based gridding big data city monitoring method and system
CN112800463B (en) Information processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant