CN111327947B - Screen capture management method and device and mobile terminal - Google Patents

Screen capture management method and device and mobile terminal Download PDF

Info

Publication number
CN111327947B
CN111327947B CN202010087141.7A CN202010087141A CN111327947B CN 111327947 B CN111327947 B CN 111327947B CN 202010087141 A CN202010087141 A CN 202010087141A CN 111327947 B CN111327947 B CN 111327947B
Authority
CN
China
Prior art keywords
video stream
picture
control
encryption
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010087141.7A
Other languages
Chinese (zh)
Other versions
CN111327947A (en
Inventor
李宏锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202010087141.7A priority Critical patent/CN111327947B/en
Priority to PCT/CN2020/093596 priority patent/WO2021159644A1/en
Publication of CN111327947A publication Critical patent/CN111327947A/en
Application granted granted Critical
Publication of CN111327947B publication Critical patent/CN111327947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/431Generation of visual interfaces for content selection or interaction; Content or additional data rendering
    • H04N21/4312Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44012Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving rendering scenes according to scene graphs, e.g. MPEG-4 scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • H04N21/4438Window management, e.g. event handling following interaction with the user interface

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application provides a screen capture management method, a screen capture management device and a mobile terminal, which are applicable to the technical field of data processing, wherein the method comprises the following steps: detecting whether a currently called control carries a first identifier; if the control is provided with the first identifier, acquiring the display pages of the control and the display size of each display page at a first frequency; creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page; rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes, and playing the encrypted video stream; and if a screen capture instruction for the encrypted video stream is detected, acquiring a background picture corresponding to the first identifier, and storing the background picture as a screen capture corresponding to the screen capture instruction. According to the embodiment of the application, the user cannot capture the screen of the identified control in the application program, and therefore the information safety degree of the mobile terminal is improved.

Description

Screen capture management method and device and mobile terminal
Technical Field
The application belongs to the technical field of information security, and particularly relates to a screen capture management method and a mobile terminal.
Background
In the mobile terminal of the iOS system, the screen capture function is very convenient to use, a user can conveniently capture and store some required information by using the screen capture function, but the information security in the mobile terminal is greatly reduced while the information security is convenient, for example, payment codes of some payment programs and important mail records in some mail programs are extremely easy to be captured and spread illegally, thereby the information security in the mobile terminal is greatly reduced.
Disclosure of Invention
In view of this, embodiments of the present application provide a screen capture management method and a mobile terminal, which can solve the problem of low information security of the mobile terminal due to a screen capture function.
A first aspect of an embodiment of the present application provides a screen capture management method, including:
detecting whether a currently called control carries a first identifier;
if the control is provided with the first identifier, acquiring display pages of the control and the display size of each display page at a first frequency;
creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page;
rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes, and playing the encrypted video stream;
and if a screen capture instruction for the encrypted video stream is detected, acquiring a background picture corresponding to the first identifier, and storing the background picture as a screenshot corresponding to the screen capture instruction.
In a first possible implementation manner of the first aspect, the rendering the display pages to the corresponding canvas and generating a rendered control picture corresponding to each display page include:
and importing the display page into the corresponding canvas, and obtaining a rendered control picture from the canvas through a UIGraphicGetImageFromCurrentImageContext function.
In a second possible implementation manner of the first aspect, the rendering all the obtained control pictures to an encrypted video stream according to the corresponding display sizes includes:
rendering the obtained control picture into an unencrypted video stream according to the corresponding display size;
acquiring a first character string which is n in length and only comprises numbers, sequentially taking the numbers at each position of the first character string as encryption interval numbers, and generating an encryption interval sequence comprising n encryption interval numbers, wherein n is a positive integer;
sequentially selecting frame pictures to be encrypted in the unencrypted video stream at intervals according to the n encryption intervals in the encryption interval sequence;
and encrypting the selected frame picture to obtain the encrypted video stream.
On the basis of the second possible implementation manner, in a third possible implementation manner of the first aspect, the obtaining a first character string including only numbers includes:
randomly generating a length n, and randomly generating a first character string which has the length n and only contains numbers.
On the basis of the second possible implementation manner, in a fourth possible implementation manner of the first aspect, before the acquiring the display page of the control at the first frequency, the method further includes:
randomly generating the first frequency greater than or equal to 20 frames/second and less than 40 frames/second;
the method for acquiring the first character string which is n in length and only comprises numbers comprises the following steps:
a first string of length n and containing only the number 1 is obtained.
On the basis of the second to fourth possible implementation manners, in a fifth possible implementation manner of the first aspect, the sequence numbers of n encryption intervals in the encryption interval sequence are sequentially 1, 2, …, n, and sequentially selecting frame pictures to be encrypted in the unencrypted video stream at intervals according to the n encryption intervals in the encryption interval sequence includes:
sequentially selecting the encryption interval number according to the sequence of the sequence number from small to large, and selecting frame pictures to be encrypted in the unencrypted video stream at intervals based on the encryption interval number selected each time;
and if the selected sequence number of the encryption interval numbers is n, setting the sequence number of the encryption interval numbers selected next time as 1, and returning to execute the operation of sequentially selecting the encryption interval numbers according to the sequence of the sequence numbers from small to large.
A second aspect of an embodiment of the present application provides a screen capture management apparatus, including:
the identification detection module is used for detecting whether the currently called control carries a first identification;
the page acquisition module is used for acquiring the display pages of the control and the display size of each display page at a first frequency if the control is provided with the first identifier;
the picture rendering module is used for creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page;
the video stream conversion module is used for rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes and playing the encrypted video stream;
and the screen capture processing module is used for acquiring a background picture corresponding to the first identifier if a screen capture instruction for the encrypted video stream is detected, and storing the background picture as a screen capture corresponding to the screen capture instruction.
A third aspect of embodiments of the present application provides a mobile terminal, where the mobile terminal includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the steps of the screen capture management method according to any one of the first aspect when executing the computer program.
A fourth aspect of an embodiment of the present application provides a computer-readable storage medium, including: stored computer program, characterized in that it implements the steps of the screen shot management method according to any one of the above first aspects when executed by a processor.
A fifth aspect of embodiments of the present application provides a computer program product, which, when run on a mobile terminal, causes the mobile terminal to execute the screen capture management method of any one of the first aspects.
Compared with the prior art, the embodiment of the application has the advantages that: the iOS system supports digital copyright management, namely when an encrypted video stream which is being played is subjected to screen capture, a video control can display a blank, a picture which is captured after the encrypted content is subjected to screen capture is displayed as a blank picture, on the basis, the application program control which needs to prevent screen capture is identified in advance, video stream conversion is carried out on a control page with the identification, the video stream is subjected to encrypted playing, when a screen capture instruction of a user is detected, the video stream content is prevented from being captured by the digital copyright management, and a preset background picture is set as a corresponding screenshot, so that the user cannot capture the control identified in the application program, and the information safety degree of the mobile terminal is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an implementation of a screen capture management method according to an embodiment of the present application;
fig. 2 is a schematic flow chart illustrating an implementation of a screen capture management method according to a second embodiment of the present application;
fig. 3 is a schematic flow chart of an implementation of a screen capture management method provided in the third embodiment of the present application;
fig. 4 is a schematic structural diagram of a screen capture management device according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of a mobile terminal according to a fifth embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
In order to facilitate understanding of the present application, the embodiments of the present application are briefly described here, and it is considered that the screen capturing function of the mobile terminal of the iOS system is very convenient to use, so that the information of the mobile terminal is very easy to be illegally intercepted and spread, and the information security is greatly reduced.
In order to improve the information security, an optional method is to directly install a configuration file in the mobile terminal to disable a screen capture function in the mobile terminal, so that a user cannot capture any display content of the mobile terminal, and thus, although the security of the information of the mobile terminal can be improved, the user cannot normally use an application program of the mobile terminal.
In order to effectively improve the information security of the mobile terminal, in the embodiment of the application, a digital copyright management function supported by an iOS system is utilized, firstly, an identifier is added to an application program control needing to be prevented from being subjected to screen capture in advance, a video stream of a control page with the identifier is converted, the video stream is encrypted and played, when a screen capture instruction is detected, the video stream content is prevented from being captured by utilizing the digital copyright management, and a preset background picture is set to be a corresponding screenshot at the same time, so that a user cannot screen capture the identified control in the application program, therefore, the embodiment of the application can realize the control-level function management of the screen capture function, and control screen capture management customization can be performed in a targeted manner according to different security requirements, for example, only some controls containing sensitive information in the application program can be identified, such as only payment code display controls in a payment program and the like, so that the interference on the normal use of the application program by the user can be reduced to the greatest extent while the information security of the mobile terminal is improved, and the normal use of the application program by the user can be ensured.
The specific identifier-added control is not limited in the embodiment of the application, and a technician can select and add an identifier according to the requirements of actual application, for example, only some of the controls containing sensitive information in each application program can be added with an identifier as in the above example, or the control of each application program can be selected in a targeted manner according to the difference of the requirements of the security levels of different application programs, for example, if the requirements of the security levels of video playing programs are low, only the identifiers of the controls related to user privacy information, such as the controls corresponding to playing records, can be added to all the controls of a payment program at this time, and thus, screen capture management of high security level can be achieved.
Meanwhile, as can be seen from the above description, the main execution body of the screenshot management method in the embodiment of the present application is the mobile terminal using the iOS system, wherein the specific type of the mobile terminal is not limited herein and needs to be determined by the scene requirements of the specific practical application, and the mobile terminals that can be selected according to different scene requirements include, but are not limited to, for example: cell-phone, panel computer and intelligent wrist-watch etc..
The embodiments of the present application are detailed as follows:
fig. 1 shows a flowchart of an implementation of a screenshot management method according to an embodiment of the present application, which is detailed as follows:
s101, detecting whether the currently called control carries a first identifier.
As can be seen from the above description, in the embodiment of the present application, the identifier of the application control that needs to be subjected to screen capture management is added in advance, so that the embodiment of the present application only needs to perform the first identifier detection on the application control currently used by the user. The specific first identifier type is not limited in the embodiment of the application, and can be set by a technician according to the self, for example, a group of specific character strings can be set as the first identifier, such as character string 0000, and at this time, it is only necessary to detect whether the current control has an identifier of 0000.
And S102, if the control is provided with the first identifier, acquiring the display pages of the control and the display size of each display page at a first frequency.
When the control has the first identifier, it is described that the control needs to perform screen capture management, and at this time, the embodiment of the present application may acquire the content of the display page output by the control and convert the content into an encrypted video stream for playing, specifically:
according to the method and the device for acquiring the display page of the control, the display page of the control can be acquired at a first frequency interval, so that raw materials required by a video stream frame picture can be obtained, meanwhile, the display page of the control can be accurately restored in order to ensure that the output encrypted video stream can be output, and the influence on the normal application program use of a user is reduced. The specific value of the first frequency is not limited herein, and can be set by a technician according to actual requirements, for example, the specific value can be set to 20 to 90 pieces/second.
It should be particularly noted that, in the embodiment of the present application, the control display page is finally displayed on the display screen of the mobile terminal in a form of playing the encrypted video stream instead of the control display page, that is, for the user, what the user sees is not the content of the real control display page but the content of the encrypted video stream that is played after the video stream is converted, so that the display page of the control in the embodiment of the present application is not necessarily displayed on the display screen finally, that is, the display page of the control does not refer to the page content that the control actually displays in the display screen, but refers to the page content that the control actually needs to display in the display screen.
As an embodiment of the present application, on one hand, in practical applications, on one hand, the lower the first frequency is, the smaller the workload of the video stream transcoding and encryption is, but the refresh frequency of the content of the display page of the control is lower, so that the synchronization real-time performance of the content of the video stream and the content of the display page of the actual control is poor, the response speed to the user operation is slow, and meanwhile, the too low frequency may cause the frame rate of the video stream to be too low, so that the user cannot normally view the video stream, and further the user cannot normally use the application program. In this embodiment, in order to balance the workload of video stream conversion, the response speed to the user operation, and the display effect of the video stream, the value range of the first frequency is set to 20 to 60 pieces/second.
S103, creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page.
After the required display page and display size are acquired, the embodiment of the present application performs picture rendering on the acquired display page to obtain a frame picture required for converting a video stream, where operation steps of each display page are the same in the embodiment of the present application, so that the description of step S103 is performed only by taking an operation on a single display page as an example, and the detailed description is as follows:
in order to ensure that the generated control picture has the same size as the corresponding display page, the embodiment of the application firstly creates the picture context according to the display size of the display page, then lays the canvas based on the created picture context, and finally renders the whole display page into the canvas, thereby obtaining the rendered control picture. Wherein, CGContextRef can be selected for creating the picture context and laying the canvas.
As a specific implementation manner of rendering a control picture in the embodiment, a process of rendering a control picture includes:
and importing the display page into a corresponding canvas, and obtaining a rendered control picture from the canvas through a UIGraphic GetImageFromCurrentImageContext function.
And S104, rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes, and playing the encrypted video stream.
In the embodiment of the present application, rendering a video stream substantially means that a control picture is taken as a frame picture, a corresponding display size is taken as a real-time size of the frame picture of the video stream according to a time sequence of generation of the control picture, and a first frequency is taken as a video stream frame rate to generate the video stream. The embodiment of the present application does not limit the specific video stream encryption method, and the method can be selected or set by a technician according to actual requirements, and reference may also be made to the related descriptions of the second to fifth embodiments of the present application.
As an embodiment of the present application, an encryption KEY of a video stream may be described by EXT-X-KEY, which identifies that a current video stream has been subjected to digital rights encryption, determines whether the current video stream content supports playback by a proxy method of walking an AVFoundation framework during playback, and plays the encrypted video stream when playback is supported.
As an optional embodiment of the present application, in order to accurately restore a control display page in an encrypted video stream, in the embodiment, a playing position of the display page in a display screen is also accurately restored, specifically, on the basis of the first embodiment of the present application, the present embodiment further obtains a specific position area of each display page in the display screen, and outputs a frame picture to the position area of a corresponding display page when the encrypted video stream is played, for example, assuming that the display page a is displayed in a full screen, that is, the position area is a full screen, at this time, a corresponding frame picture in the encrypted video stream is also output in a full screen in the display screen, and assuming that the display page B is displayed in a floating window in an area in the middle of the display screen, at this time, a corresponding frame picture in the encrypted video stream is also output in a floating window in a corresponding area in the middle of the display screen.
It should be understood that the conversion from the display page to the video stream in the embodiment of the present application is a real-time and continuous operation, that is, when the video stream conversion is performed on the display page of the control, after a single display page is obtained each time, the operations of image rendering and video stream conversion are performed, and meanwhile, since the embodiment of the present application continuously obtains the display page at the first frequency, in combination with S102, S103, and S104, the embodiment of the present application can achieve the obtaining of the real-time display page of the control and the real-time video stream conversion of the display page, and further achieve the real-time playing of the content of the display page of the control in the format of the encrypted video stream, thereby ensuring the normal use of the control by the user.
And S105, if a screen capture instruction for the encrypted video stream is detected, acquiring a background picture corresponding to the first identifier, and storing the background picture as a screen capture corresponding to the screen capture instruction.
On the basis of completing the real-time conversion and output of the encrypted video stream, if a user manually triggers a screen capture function or an illegal copy triggers the screen capture function through a plug-in and other ways, so that the mobile terminal generates or receives a screen capture instruction for the playing encrypted video stream, the digital copyright management function is synchronously triggered, namely the video control is directly displayed blank, the obtained screen capture is also a blank picture, and the effective protection of the display information of the control is further realized.
In view of the fact that if the blank picture is directly saved as the screenshot, on one hand, a part of users may not accept the result which cannot be expected, so that the user experience is poor, and on the other hand, the effect of warning the user about information security cannot be achieved, therefore, in the embodiment of the present application, a background picture is preset to replace the blank picture directly generated by digital rights management, where the content contained in the background picture is not limited and can be set by a technician according to an actual requirement, and the background picture may be still the blank picture or a picture containing some warning words, for example, on the basis of the blank picture, a "screen capture cannot be performed here in order to protect privacy of the user" may be added, so as to warn the user about information security.
In order to effectively improve the information security of the mobile terminal, in the embodiment of the application, the digital copyright management function supported by the iOS system is fully utilized, firstly, the application control needing to prevent screen capture is added in advance, the video stream of the identified control page is converted, and the video stream is encrypted and played, when a screen capture instruction of a user is detected, the video stream content is prevented from being captured by utilizing the digital copyright management, and meanwhile, a preset background picture is set as a corresponding screenshot, so that the user cannot capture the identified control in the application, therefore, the embodiment of the application can realize the function management of controlling the screen capture function, control screen capture control customization can be performed specifically according to different security requirements, for example, only some controls containing sensitive information in the application can be identified, for example, only payment code display controls in a payment program and the like can be identified, and further, the interference on the normal use of the application by the user can be reduced to the greatest extent while the information security of the mobile terminal is improved, and the normal use of the application program is guaranteed by the user.
As a specific implementation manner of performing encrypted video stream conversion on a control picture in the first embodiment of the present application, it is considered that the first embodiment of the present application performs real-time video stream conversion on a control display page, which needs to show the content of the real-time display page to a user, and also needs to ensure that the control can respond to the operation of the user in real time, so that the time consumption requirement on the whole encrypted video stream conversion is very high, and meanwhile, since the encrypted video stream needs to be decrypted when being played, in the encrypted video stream conversion process, if the video stream encryption takes a long time, the time consumption of the whole encrypted video stream conversion and playing is inevitably long, the time delay influence on the display of the control display page and the response of the user operation is large, and further the normal use of the application program by the user is influenced.
Therefore, in order to shorten the time consumption of encrypted video stream conversion and reduce the influence on the normal use of the application program by the user, as shown in fig. 2, in the second embodiment of the present application, the specific step of performing encrypted video stream conversion on the control picture includes:
s201, rendering the obtained control picture into an unencrypted video stream according to the corresponding display size.
Reference may be made to the description of the operation of rendering the video stream in S104, which is not repeated herein.
S202, a first character string which is n in length and only comprises numbers is obtained, the numbers at all positions of the first character string are sequentially used as encryption interval numbers, and an encryption interval sequence comprising n encryption interval numbers is generated, wherein n is a positive integer.
The real-time unencrypted video stream is encrypted starting after the unencrypted video stream is obtained. Considering that the time consumption requirement for video stream encryption in practical application is very high, in order to reduce the encryption time, the embodiment of the present application selects to perform encryption operation only on a part of frame pictures in the unencrypted video stream, and since it is not necessary to perform operation on all frame pictures, the workload of the encryption operation is greatly reduced, and the encryption time consumption is reduced, specifically:
in the embodiment of the present invention, a first character string with a length of n and including only numbers is first obtained, where the first character string may be preset by a technician or generated according to a certain generation rule, and is not limited herein. After the first character string is acquired, each number in the first character string is used as an encryption interval number, and the encryption interval number is used to determine a next frame picture to be selected after a frame picture to be encrypted is selected each time, for example, assuming that the encryption interval number corresponding to the frame picture a to be selected is 1, after the frame picture a is extracted, the embodiment of the present application extracts the frame picture after the frame picture a is separated by one picture. The corresponding encryption interval sequence can be obtained by sequentially ordering the numbers as the number of encryption intervals, and for example, assuming that the first character string is 135, the corresponding encryption interval sequence {1,3,5} can be obtained.
S203, according to the n encryption intervals in the encryption interval sequence, sequentially selecting frame pictures to be encrypted in the unencrypted video stream at intervals.
After the encryption interval sequence is obtained, the embodiment of the present application may start to perform frame picture selection on an unencrypted video stream, specifically, a first frame picture of the unencrypted video stream is used as a first extracted frame picture, a next extracted frame picture is determined according to a first encryption interval number in the encryption interval sequence and is extracted, after the extraction is completed, the next frame picture is extracted according to the next encryption interval number, and the operation of extracting the frame picture according to the encryption interval number is repeated, so that the real-time extraction of the frame picture required to be encrypted in the embodiment of the present application may be achieved. Examples are as follows:
assuming that the encryption interval sequence is {1,3,5}, at this time, after the extraction of the first frame picture of the unencrypted video stream is completed, frame picture extraction is performed at intervals of 1 frame picture, namely, the 3 rd frame picture of the unencrypted video stream is extracted, after the extraction is completed, frame picture extraction is performed at intervals of 3 frames, namely, the 7 th frame picture of the unencrypted video stream is extracted, and after the extraction is completed, frame picture extraction is performed at intervals of 5 frames, namely, the 13 th frame picture of the unencrypted video stream is extracted, so that the extraction of the frame picture to be encrypted is realized.
It should be noted that, in the embodiment of the present application, the condition for terminating the extraction of the frame picture is not limited, and may be set by a technician according to actual requirements, including but not limited to, for example, setting to stop the extraction when the number of encryption intervals in the sequence is completely used up, setting to stop when the extracted frame picture reaches a certain number threshold, or setting to repeatedly use the number of encryption intervals in the sequence until the output of the unencrypted video stream is completed.
As a specific implementation manner for obtaining the first character string in the second embodiment of the present application, considering that the security of encryption is also reduced along with the reduction of the number of encrypted frame pictures, therefore, in order to reduce the encryption workload (that is, the number of encrypted frame pictures is less relative to the total number of frame pictures of the video stream) and ensure the security of encryption, in the second embodiment of the present application, a method for randomly generating the first character string is adopted, so that the specific encrypted frame pictures cannot be known in advance, and the security of encryption is further improved, where the random encryption manner includes:
randomly generating a length n, and randomly generating a first character string which has the length n and only contains numbers.
In the embodiment of the application, the length and the content of the first character string are completely randomly generated, so that the encrypted frame picture can not be predicted at each time, the difficulty of searching the encrypted frame picture in cracking is greatly increased, and the encryption safety is improved.
And S204, encrypting the selected frame picture to obtain an encrypted video stream.
After the frame pictures to be encrypted are extracted, the embodiments of the present application encrypt the frame pictures to implement encryption protection on the unencrypted video stream, where a specific encryption method is not limited herein and can be selected or set by a skilled person according to actual needs, including but not limited to, for example, blurring the frame pictures by using some reversible algorithms, and segmenting and disorganizing and recombining the content regions of the frame pictures.
According to the embodiment of the application, the encryption interval sequence is converted by using the first character string, the unencrypted video stream is extracted at intervals according to the encryption interval number in the encryption interval sequence, and finally the extracted frame picture is encrypted, so that the frame picture of the video stream part is only required to be processed in the encryption process of the video stream, the encryption workload is reduced, the encryption speed is higher, and the real-time high efficiency of encrypted video stream conversion is guaranteed.
As a specific implementation manner of frame picture extraction in the second embodiment of the present application, it is considered that the operation duration of the control by the user cannot be predicted in practical application, that is, the duration of the unencrypted video stream cannot be predicted, so that the number of encryption intervals generated in a single time does not necessarily meet the requirement of encryption.
In order to meet the encryption requirements of unencrypted video streams for different durations, in the embodiment of the present application, encryption interval numbers in an encryption interval sequence are cyclically used, so that each encryption interval number can be repeatedly and cyclically used, sequence numbers of n encryption interval numbers in the encryption interval sequence are 1, 2, …, n in sequence, as shown in fig. 3, in the embodiment of the present application, the step of extracting a frame picture specifically includes:
s301, sequentially selecting the number of the encryption intervals according to the sequence of the sequence numbers from small to large, and selecting the frame pictures to be encrypted in the unencrypted video stream at intervals based on the number of the encryption intervals selected each time.
The frame picture selecting operation herein can refer to the description in the second embodiment of the present application, and is not described herein again.
S302, if the sequence number of the selected encryption interval number is n, setting the sequence number of the next selected encryption interval number as 1, and returning to execute the operation of sequentially selecting the encryption interval numbers according to the sequence of the sequence numbers from small to large.
In the embodiment of the application, after the encryption interval number in the encryption interval sequence is completely used up, the encryption interval sequence is recycled to perform subsequent frame picture selection operation, so that repeated recycling of each encryption interval number is realized, and at this time, regardless of the duration of an unencrypted video stream, the embodiment of the application can continuously perform frame picture selection operation, thereby meeting the requirement of actual encryption.
As an embodiment of the present application, considering that only a part of the frame pictures of the unencrypted video stream are encrypted in both the second and third embodiments of the present application, as for the finally generated encrypted video stream, only a part of the frame pictures are encrypted, and if the number of the encrypted frame pictures is very small, even if the encrypted video stream is directly played, the encrypted video stream can be normally viewed, so that the encryption effect is very poor, and the reliability of encryption and the security of information cannot be guaranteed.
In order to ensure the reliability of encryption and the security of information, in the embodiment of the present application, the frame rate of the video stream and the encryption interval are set, so that if the encrypted video stream is directly played without decryption, the encrypted video stream cannot be normally viewed, in the embodiment of the present application, first, the operation of acquiring the first frequency specifically includes:
a first frequency greater than or equal to 20 and less than 40 beats/second is randomly generated.
On the basis that the first frequency is greater than or equal to 20 sheets/second and less than 40 sheets/second, the operation of acquiring the first character string in the embodiment of the application comprises the following steps:
a first string of length n and containing only the number 1 is obtained.
Because a human body cannot normally watch video content when the video frame rate is lower than 20 pieces/second, in the embodiment of the present application, the lower limit value of the first frequency is set to 20 pieces/second to ensure that a decrypted video stream can be normally watched, and meanwhile, the limit of the interval sampling is collected every other piece, that is, 50% of frame pictures of an unencrypted video stream can be encrypted at most, so in the embodiment of the present application, the upper limit value of the first frequency is set to be less than 40 pieces/second, and simultaneously, the number of the first character string is set to be 1, so that the number of output unencrypted frame pictures per second in the encrypted video stream cannot exceed 20 pieces, even if the encrypted video stream is directly played without decryption, a user cannot normally watch the video stream content, that is, the user must normally watch the encrypted video stream after decryption, thereby greatly improving the reliability of encryption, and ensuring the security of information of the mobile terminal.
Fig. 4 shows a block diagram of a screen capture management device provided in an embodiment of the present application, which corresponds to the method in the above embodiment, and only shows a part related to the embodiment of the present application for convenience of description. The screen capture management apparatus illustrated in fig. 4 may be an execution subject of the screen capture management method provided in the first embodiment.
Referring to fig. 4, the screen shot management apparatus includes:
and the identifier detecting module 41 is configured to detect whether the currently invoked control carries the first identifier.
And a page obtaining module 42, configured to obtain, if the control has the first identifier, display pages of the control and a display size of each display page at a first frequency.
And the picture rendering module 43 is configured to create a picture context based on the display size of each display page, lay a canvas according to the picture context, render the display page to the corresponding canvas, and generate a rendered control picture corresponding to each display page.
And the video stream conversion module 44 is configured to render all the obtained control pictures into an encrypted video stream according to the corresponding display size, and play the encrypted video stream.
And a screen capture processing module 45, configured to, if a screen capture instruction for the encrypted video stream is detected, obtain a background picture corresponding to the first identifier, and store the background picture as a screen capture corresponding to the screen capture instruction.
Further, the picture rendering module 43 includes:
and importing the display page into the corresponding canvas, and obtaining a rendered control picture from the canvas through a UIGraphic GetImageFromCurrentImageContext function.
Further, the video stream conversion module 44 includes:
and the video rendering module is used for rendering the obtained control picture into an unencrypted video stream according to the corresponding display size.
The interval acquisition module is used for acquiring a first character string which is n in length and only comprises numbers, sequentially taking the numbers at all positions of the first character string as encryption interval numbers, and generating an encryption interval sequence comprising n encryption interval numbers, wherein n is a positive integer.
And the picture selecting module is used for sequentially selecting the frame pictures to be encrypted in the unencrypted video stream at intervals according to the n encryption intervals in the encryption interval sequence.
And the encryption module is used for encrypting the selected frame picture to obtain the encrypted video stream.
Further, the interval acquisition module includes:
randomly generating a length n, and randomly generating a first character string which has the length n and only contains numbers.
Further, the screen shot management device further comprises:
and the frequency acquisition module is used for randomly generating the first frequency which is greater than or equal to 20 pieces/second and less than 40 pieces/second.
The interval acquisition module includes:
a first string of length n and containing only the number 1 is obtained.
Further, n serial numbers of the encryption intervals in the encryption interval sequence are 1, 2, …, n in sequence, and the picture selecting module includes:
and sequentially selecting the encryption interval numbers according to the sequence of the sequence numbers from small to large, and selecting the frame pictures to be encrypted in the unencrypted video stream at intervals based on the encryption interval numbers selected each time.
And if the selected sequence number of the encryption interval numbers is n, setting the sequence number of the encryption interval numbers selected next time as 1, and returning to execute the operation of sequentially selecting the encryption interval numbers according to the sequence of the sequence numbers from small to large.
The process of implementing each function by each module in the screen capture management device provided in the embodiment of the present application may specifically refer to the description of the first embodiment shown in fig. 1, and is not described herein again.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing a relative importance or importance. It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements in some embodiments of the application, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first table may be named a second table, and similarly, a second table may be named a first table, without departing from the scope of various described embodiments. The first table and the second table are both tables, but they are not the same table.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless otherwise specifically stated.
By way of example and not limitation, when the terminal device is a wearable device, the wearable device may also be a generic term for intelligently designing daily wearing by applying wearable technology and developing wearable devices. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The general sense wearing-type smart machine is complete including the function, the size is big, can not rely on the smart mobile phone to realize complete or partial function, like intelligent wrist-watch or intelligent glasses etc to and only be absorbed in a certain kind of application function, need use with other equipment like the cooperation of smart mobile phone, like all kinds of intelligent bracelets that carry out the sign monitoring etc..
Fig. 5 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application. As shown in fig. 5, the mobile terminal 5 of this embodiment includes: at least one processor 50 (only one shown in fig. 5), a memory 51, said memory 51 having stored therein a computer program 52 executable on said processor 50. The processor 50, when executing the computer program 52, implements the steps in the various embodiments of the screen capture management method described above, such as the steps 101 to 105 shown in fig. 1. Alternatively, the processor 50, when executing the computer program 52, implements the functions of the modules/units in the above-mentioned device embodiments, such as the functions of the modules 41 to 65 shown in fig. 4.
The mobile terminal 5 may be a tablet computer, a mobile phone, or other mobile computing device. The mobile terminal may include, but is not limited to, a processor 50, a memory 51. It will be appreciated by those skilled in the art that fig. 5 is merely an example of a mobile terminal 5 and does not constitute a limitation of the mobile terminal 5 and may include more or less components than those shown, or some components may be combined, or different components, for example the mobile terminal may also include an input transmitting device, a network access device, a bus, etc.
The Processor 50 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 51 may in some embodiments be an internal storage unit of the mobile terminal 5, such as a hard disk or a memory of the mobile terminal 5. The memory 51 may also be an external storage device of the mobile terminal 5, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the mobile terminal 5. Further, the memory 51 may also include both an internal storage unit and an external storage device of the mobile terminal 5. The memory 51 is used for storing an operating system, an application program, a BootLoader (BootLoader), data, and other programs, such as program codes of the computer program. The memory 51 may also be used to temporarily store data that has been transmitted or is to be transmitted.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the foregoing method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, read-Only Memory (ROM), random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application, and are intended to be included within the scope of the present application.

Claims (8)

1. A screen shot management method, comprising:
detecting whether a currently called control carries a first identifier;
if the control is provided with the first identifier, acquiring display pages of the control and the display size of each display page at a first frequency;
creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page;
rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes, and playing the encrypted video stream;
if a screen capture instruction for the encrypted video stream is detected, acquiring a background picture corresponding to the first identifier, and storing the background picture as a screenshot corresponding to the screen capture instruction;
rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes, wherein the rendering comprises:
rendering the obtained control picture into an unencrypted video stream according to the corresponding display size;
acquiring a first character string which is n in length and only comprises numbers, sequentially taking the numbers at each position of the first character string as encryption interval numbers, and generating an encryption interval sequence comprising n encryption interval numbers, wherein n is a positive integer;
sequentially selecting frame pictures to be encrypted in the unencrypted video stream at intervals according to the n encryption intervals in the encryption interval sequence;
and encrypting the selected frame picture to obtain the encrypted video stream.
2. The screen shot management method of claim 1, wherein the rendering the display pages to the corresponding canvas to generate the rendered control picture corresponding to each display page comprises:
and importing the display page into the corresponding canvas, and obtaining a rendered control picture from the canvas through a UIGraphicGetImageFromCurrentImageContext function.
3. The screen shot management method as claimed in claim 1, wherein said obtaining a first string containing only numbers comprises:
randomly generating a length n, and randomly generating a first character string which has the length n and only contains numbers.
4. The screen shot management method of claim 1, wherein prior to said obtaining the display page of the control at the first frequency, further comprising:
randomly generating the first frequency greater than or equal to 20 frames/second and less than 40 frames/second;
the method for acquiring the first character string which is n in length and only comprises numbers comprises the following steps:
a first string of length n and containing only the number 1 is obtained.
5. The screen capture management method according to any one of claims 1,3 and 4, wherein the n serial numbers of the encryption interval numbers in the encryption interval sequence are 1, 2, …, n in sequence, and the selecting of the frame pictures to be encrypted in the unencrypted video stream at intervals in sequence according to the n encryption interval numbers in the encryption interval sequence comprises:
sequentially selecting the encryption interval number according to the sequence of the sequence number from small to large, and selecting frame pictures to be encrypted in the unencrypted video stream at intervals based on the encryption interval number selected each time;
and if the selected sequence number of the encryption interval numbers is n, setting the sequence number of the encryption interval numbers selected next time as 1, and returning to execute the operation of sequentially selecting the encryption interval numbers according to the sequence of the sequence numbers from small to large.
6. A screen shot management apparatus, comprising:
the identification detection module is used for detecting whether the currently called control carries a first identification;
the page acquisition module is used for acquiring the display pages of the control and the display size of each display page at a first frequency if the control is provided with the first identifier;
the picture rendering module is used for creating a picture context based on the display size of each display page, laying a canvas according to the picture context, rendering the display pages to the corresponding canvas, and generating a rendered control picture corresponding to each display page;
the video stream conversion module is used for rendering all the obtained control pictures into an encrypted video stream according to the corresponding display sizes and playing the encrypted video stream;
the screen capture processing module is used for acquiring a background picture corresponding to the first identifier if a screen capture instruction for the encrypted video stream is detected, and storing the background picture as a screen capture corresponding to the screen capture instruction;
wherein, the video stream conversion module comprises:
the video rendering module is used for rendering the obtained control picture into an unencrypted video stream according to the corresponding display size;
the device comprises an interval acquisition module, a data processing module and a data processing module, wherein the interval acquisition module is used for acquiring a first character string which is n in length and only comprises numbers, and sequentially taking the numbers at each position of the first character string as encryption interval numbers to generate an encryption interval sequence comprising n encryption interval numbers, wherein n is a positive integer;
the picture selection module is used for sequentially selecting frame pictures to be encrypted in the unencrypted video stream at intervals according to the n encryption intervals in the encryption interval sequence;
and the encryption module is used for encrypting the selected frame picture to obtain the encrypted video stream.
7. A mobile terminal, characterized in that the mobile terminal comprises a memory, a processor, the memory having stored thereon a computer program being executable on the processor, the processor realizing the steps of the method according to any of the claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of a method according to any one of claims 1 to 5.
CN202010087141.7A 2020-02-11 2020-02-11 Screen capture management method and device and mobile terminal Active CN111327947B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010087141.7A CN111327947B (en) 2020-02-11 2020-02-11 Screen capture management method and device and mobile terminal
PCT/CN2020/093596 WO2021159644A1 (en) 2020-02-11 2020-05-30 Screen capture management method and apparatus, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010087141.7A CN111327947B (en) 2020-02-11 2020-02-11 Screen capture management method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN111327947A CN111327947A (en) 2020-06-23
CN111327947B true CN111327947B (en) 2022-10-28

Family

ID=71170938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010087141.7A Active CN111327947B (en) 2020-02-11 2020-02-11 Screen capture management method and device and mobile terminal

Country Status (2)

Country Link
CN (1) CN111327947B (en)
WO (1) WO2021159644A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181556B (en) * 2020-09-21 2024-04-19 北京字跳网络技术有限公司 Terminal control processing method and device, electronic equipment and storage medium
CN113051592A (en) * 2021-03-31 2021-06-29 深圳市声扬科技有限公司 File encryption method and device, electronic equipment and storage medium
CN113535293B (en) * 2021-06-01 2023-10-03 浪潮金融信息技术有限公司 Android device screen capturing method, system and medium
CN114302230A (en) * 2021-12-30 2022-04-08 苏州万店掌网络科技有限公司 Front-end playing component optimization method, system and storage medium
CN116540984B (en) * 2023-07-06 2023-09-29 易方信息科技股份有限公司 IOS (input/output) system-based screen recording prevention method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685735B (en) * 2013-11-22 2015-06-10 毛秀允 Method for preventing mobile terminal from illegal screen capture
CN104408686A (en) * 2014-10-31 2015-03-11 宇龙计算机通信科技(深圳)有限公司 Method, system and terminal for screen capturing
US10028021B2 (en) * 2014-12-22 2018-07-17 Hisense Electric Co., Ltd. Method and device for encoding a captured screenshot and controlling program content switching based on the captured screenshot
US20160301641A1 (en) * 2015-04-13 2016-10-13 Smoke Messaging, LLC Secure messaging system utilizing a limited viewing window
CN108038396A (en) * 2017-12-05 2018-05-15 广东欧珀移动通信有限公司 Record screen method, apparatus and terminal
US10779041B2 (en) * 2017-12-08 2020-09-15 Confide, Inc. System and method for displaying screenshot-proof content
CN108563382A (en) * 2018-02-26 2018-09-21 挖财网络技术有限公司 Screenshotss method and device based on android system
CN110377202A (en) * 2019-06-05 2019-10-25 平安科技(深圳)有限公司 Image processing method, device, electronic equipment and storage medium
CN110308860B (en) * 2019-07-11 2022-01-25 Oppo广东移动通信有限公司 Screen capturing method and related device

Also Published As

Publication number Publication date
WO2021159644A1 (en) 2021-08-19
CN111327947A (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN111327947B (en) Screen capture management method and device and mobile terminal
EP3557864A1 (en) Method and apparatus for image display using privacy masking
CN104869305B (en) Method and apparatus for processing image data
WO2015131713A1 (en) Image processing and access method and apparatus
CN113806806B (en) Desensitization and restoration method and system for webpage screenshot
WO2020151491A1 (en) Image deformation control method and device and hardware device
CN110177295B (en) Subtitle out-of-range processing method and device and electronic equipment
CN108921266B (en) Static two-dimensional code encryption display method and device based on image segmentation
CN105791893B (en) Video file encryption and decryption method and device
US20220094944A1 (en) Systems and methods for video decoding
CN110113677A (en) The generation method and device of video subject
KR20130114037A (en) Masking and recovering method of privacy region
WO2021031847A1 (en) Image processing method and apparatus, electronic device and computer-readable storage medium
CN110582010A (en) Video/picture encryption transmission method and device, electronic equipment and storage medium
CN107873125A (en) Active/standby devices scramble is shown
CN108052828B (en) Method and device for generating screen recording file, terminal and storage medium
Wang et al. {CamShield}: Securing Smart Cameras through Physical Replication and Isolation
WO2017201999A1 (en) File encryption method, device, terminal and storage medium
CN106529316A (en) Image data encryption method and device, and internet protocol camera
CN116756750A (en) Medical sensitive data acquisition desensitization method
US9449179B2 (en) Information processor
CN115701017A (en) Image processing method and device
CN114004726A (en) Watermark display method, watermark display device, computer equipment and storage medium
CN113672954A (en) Feature extraction method and device and electronic equipment
KR101837963B1 (en) System, method and program for protecting copying webtoon

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant