CN111400768A - Face and behavior recognition-based encryption sharing platform and encryption sharing method - Google Patents

Face and behavior recognition-based encryption sharing platform and encryption sharing method Download PDF

Info

Publication number
CN111400768A
CN111400768A CN202010313360.2A CN202010313360A CN111400768A CN 111400768 A CN111400768 A CN 111400768A CN 202010313360 A CN202010313360 A CN 202010313360A CN 111400768 A CN111400768 A CN 111400768A
Authority
CN
China
Prior art keywords
reading
client
file
face
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010313360.2A
Other languages
Chinese (zh)
Inventor
席斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Kemengji Information Technology Co ltd
Original Assignee
Chengdu Kemengji Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Kemengji Information Technology Co ltd filed Critical Chengdu Kemengji Information Technology Co ltd
Priority to CN202010313360.2A priority Critical patent/CN111400768A/en
Publication of CN111400768A publication Critical patent/CN111400768A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention provides an encryption sharing platform and an encryption sharing method based on face and behavior recognition, which comprise a server, a publishing client and a reading client; the server is used for receiving the file transmitted by the issuing client and sending the file to the reading client which obtains the reading authority; the publishing client is used for transmitting the file to the server and setting a user with viewing authority; the reading client is used for realizing that a user logs in and reads files through avatar recognition, recognizing user behaviors and closing the files under the condition that the user does illegal behaviors. The image pickup module, the face recognition module and the behavior recognition module are arranged at the reading client, so that the authority can be obtained through a face recognition method during reading, the document can be closed when unauthorized face information is detected, and the document can be closed when screen capture, screen recording, photographing and video recording behaviors are detected, so that the document is prevented from being copied by screen capture and the like, and a better confidentiality effect is achieved.

Description

Face and behavior recognition-based encryption sharing platform and encryption sharing method
Technical Field
The invention particularly relates to an encryption sharing platform and an encryption sharing method based on face and behavior recognition.
Background
With the popularization of paperless office and online office information interaction, people often need to share or transmit part of files to other people, and the files need to be shared among different devices and also need to be prevented from being leaked; the most widely used method for the above situation is to encrypt the file system, that is, the publisher encrypts the document, and other devices that need to use the document need to install a decryption program, while the devices that do not install the decryption program cannot open the document, and the above method is usually implemented by adopting a file driving mode; when the method still has a risk of disclosure, that is, it cannot be guaranteed that the device is not subjected to screen capture, photographing or video recording under the condition of actual document encryption, therefore, the file encryption method is similar to a dummy and cannot well play a role in file confidentiality, and therefore, an encryption sharing platform and an encryption sharing method based on face and behavior recognition are urgently needed to solve the problems.
Disclosure of Invention
The invention aims to provide an encryption sharing platform and an encryption sharing method based on face and behavior recognition, aiming at the defects of the prior art.
In order to meet the requirements, the technical scheme adopted by the invention is as follows: the encryption sharing platform based on the face and behavior recognition comprises a server, at least one publishing client and at least one reading client (the client can simultaneously comprise the two functions); the server is used for receiving the file transmitted by the issuing client and sending the file to the reading client which obtains the reading authority; the publishing client is used for transmitting the file to be shared to the server and setting a user with viewing authority; and the reading client is used for logging in by a user through avatar recognition, reading the file transmitted to the server by the publishing client, recognizing user behaviors and closing the file under the condition that the user does illegal behaviors.
The encryption sharing method based on face and behavior recognition comprises the following steps:
s1: the publishing client transmits the file to be shared to the server, and the server encrypts the file;
s2: the issuing client sets the reading authority, the reading time length, the reading times and the authority deadline of the file;
s3: the reading client acquires the reading authority of the file through face recognition;
s4: the reading client downloads the encrypted file with the reading permission to the local for reading, and the user sees the file which is temporarily decrypted in the running memory;
s5: the reading client-side takes a photo of the current reading user for a background;
s6: the method comprises the steps that when a reading client detects that a user has illegal behaviors of shooting, taking pictures, recording screens, capturing screens, leaving, changing people and watching designated people and other people at the same time, the reading client is automatically closed;
s7: and when the reading client detects that the reading time length, the reading times or the authority deadline has been reached, the reading client automatically closes.
The encryption sharing platform and the encryption sharing method based on the face and behavior recognition have the advantages that:
the image pickup module, the face recognition module and the behavior recognition module are arranged at the reading client, so that the authority can be obtained through a face recognition method during reading, the document can be closed when unauthorized face information is detected, and the document can be closed when screen capture, screen recording, photographing and video recording behaviors are detected, so that the document is prevented from being copied by screen capture and the like, and a better confidentiality effect is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 schematically illustrates a system block diagram of an encryption sharing platform based on face and behavior recognition according to an embodiment of the present application.
Fig. 2 schematically shows a flowchart of an encryption sharing method based on face and behavior recognition according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described in further detail with reference to the accompanying drawings and specific embodiments.
In the following description, references to "one embodiment," "an embodiment," "one example," "an example," etc., indicate that the embodiment or example so described may include a particular feature, structure, characteristic, property, element, or limitation, but every embodiment or example does not necessarily include the particular feature, structure, characteristic, property, element, or limitation. Moreover, repeated use of the phrase "in accordance with an embodiment of the present application" although it may possibly refer to the same embodiment, does not necessarily refer to the same embodiment.
Certain features that are well known to those skilled in the art have been omitted from the following description for the sake of simplicity.
According to an embodiment of the present application, an encryption sharing platform based on face and behavior recognition is provided, as shown in fig. 1, and includes a server, at least one publishing client, and at least one reading client.
According to an embodiment of the application, the server of the encryption sharing platform based on face and behavior recognition is used for receiving the file transmitted by the publishing client and sending the file to the reading client obtaining the reading authority.
According to one embodiment of the application, the publishing client of the encryption sharing platform based on face and behavior recognition is used for transmitting files needing to be shared to the server and setting users with viewing permissions.
According to one embodiment of the application, the reading client of the encryption sharing platform based on the face and behavior recognition is used for enabling a user to log in and read a file transmitted to the server by the publishing client through head portrait recognition, recognizing user behavior and closing the file under the condition that the user does illegal behavior.
According to one embodiment of the application, the illegal behaviors of the encryption sharing platform based on the face and behavior recognition comprise shooting, photographing, screen recording, screen capturing, leaving and changing.
According to one embodiment of the application, the reading client of the encryption sharing platform based on the face and behavior recognition downloads the file sent by the server to the device memory.
According to one embodiment of the application, the reading client of the encryption sharing platform based on the face and behavior recognition downloads the file sent by the server to a temporary path of a storage device, and hides and encrypts the downloaded file.
According to one embodiment of the application, the publishing client of the face and behavior recognition-based encryption sharing platform is used for setting the time length, the times and the permission deadline which can be checked by a specific reading client corresponding to a specific file.
According to one embodiment of the application, the reading client of the encryption sharing platform based on the face and behavior recognition is used for photographing a user in a reading state and leaving the end, and displaying the information of the current user as a watermark on the reading client.
According to an embodiment of the application, the current user information of the encryption sharing platform based on face and behavior recognition comprises a head portrait and a user name of a current user.
According to one embodiment of the application, the encryption sharing method based on face and behavior recognition comprises the following steps:
s1: the publishing client transmits the file to be shared to the server, and the server encrypts the file;
s2: the issuing client sets the reading authority, the reading time length, the reading times and the authority deadline of the file;
s3: the reading client acquires the reading authority of the file through face recognition;
s4: the reading client downloads the encrypted file with the reading permission to the local for reading, and the user sees the file which is temporarily decrypted in the running memory;
s5: the reading client-side takes a photo of the current reading user for a background;
s6: the method comprises the steps that when a reading client detects that a user has illegal behaviors of shooting, taking pictures, recording screens, capturing screens, leaving, changing people and watching designated people and other people at the same time, the reading client is automatically closed;
s7: and when the reading client detects that the reading time length, the reading times or the authority deadline has been reached, the reading client automatically closes.
According to an embodiment of the present application, the encryption sharing method based on face and behavior recognition further includes the following steps:
when the reading client detects that the user has illegal behaviors of shooting, photographing, screen recording, screen capturing, leaving and changing, the reading client and the reverse line are photographed and screen captured, and photographing and screen capturing information is sent to the server.
According to an embodiment of the application, the reading client and the publishing client of the face and behavior recognition-based encryption sharing platform can be mobile devices such as mobile phones, tablet computers and the like or PCs; when the reading client detects the head portrait information and the behavior information of the user, the detection can be realized through a front-facing camera of a mobile phone, a tablet computer or a notebook computer or an external camera of a desktop computer.
According to an embodiment of the application, the encryption sharing platform based on face and behavior recognition can continuously expand a user behavior database of the platform, such as adding image information of mobile phone photographing and camera photographing, and judges that illegal operation is carried out when a reading client detects the information.
According to one embodiment of the application, a program for preventing screen capture and screen recording is built in a reading client of the encryption sharing platform based on human face and behavior recognition, and the reading client is automatically closed when the reading client uses screen recording or screen capture operation.
According to one embodiment of the application, the server of the encryption sharing platform based on the face and behavior recognition can receive different behavior information, and can realize continuous improvement of big data analysis and expansion of the standard of illegal behaviors, so that the use safety is continuously improved.
According to one embodiment of the application, the encryption sharing platform and the encryption sharing method based on the face and behavior recognition can acquire the authority through the face recognition method when a reading client side is provided with the camera module, the face recognition module and the behavior recognition module, can close the document when unauthorized face information is detected, and can close the document when actions of screen capture, screen recording, picture taking and picture recording are detected, so that the document is prevented from being copied by the modes of screen capture and the like, and a better confidentiality effect is achieved.
The above-mentioned embodiments only show some embodiments of the present invention, and the description thereof is more specific and detailed, but should not be construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the claims.

Claims (9)

1. The utility model provides an encryption sharing platform based on people's face and action discernment which characterized in that: the system comprises a server, at least one publishing client and at least one reading client;
the server is used for receiving the file transmitted by the issuing client and sending the file to the reading client which obtains the reading authority;
the publishing client is used for transmitting the file to be shared to the server and setting a user with viewing authority;
the reading client is used for logging in by a user through avatar recognition, reading the file transmitted to the server by the publishing client, recognizing user behaviors and closing the file under the condition that the user does illegal behaviors.
2. The encryption sharing platform based on face and behavior recognition according to claim 1, characterized in that: the illegal behaviors comprise shooting, photographing, recording, screen capturing, leaving and changing people.
3. The encryption sharing platform based on face and behavior recognition according to claim 1, characterized in that: and the reading client downloads the file sent by the server to the equipment memory.
4. The encryption sharing platform based on face and behavior recognition according to claim 1, characterized in that: and the reading client downloads the file sent by the server to a temporary path of a storage device, and hides and encrypts the downloaded file.
5. The encryption sharing platform based on face and behavior recognition according to claim 1, characterized in that: the publishing client is used for setting the time length, the times and the permission deadline which can be checked by the specific reading client corresponding to the specific file.
6. The encryption sharing platform based on face and behavior recognition according to claim 1, characterized in that: the reading client is used for photographing the user in the reading state for background and displaying the current user information as a watermark on the reading client.
7. The encrypted sharing platform based on face and behavior recognition according to claim 6, wherein: the current user information comprises the head portrait and the user name of the current user.
8. An encryption sharing method based on face and behavior recognition is characterized by comprising the following steps:
s1: the publishing client transmits the file to be shared to the server;
s2: the issuing client sets the reading authority, the reading time length, the reading times and the authority deadline of the file;
s3: the reading client acquires the reading authority of the file through face recognition;
s4: the reading client downloads the file with the reading authority to the local for reading;
s5: the reading client-side takes a photo of the current reading user for a background;
s6: when the reading client detects that the user has illegal behaviors of shooting, photographing, screen recording, screen capturing, leaving and changing people, the reading client is automatically closed;
s7: and when the reading client detects that the reading time length, the reading times or the authority deadline has been reached, the reading client automatically closes.
9. The encryption sharing method based on face and behavior recognition according to claim 8, further comprising the steps of:
when the reading client detects that the user has illegal behaviors of shooting, photographing, screen recording, screen capturing, leaving and changing, the reading client and the reverse line are photographed and screen captured, and photographing and screen capturing information is sent to the server.
CN202010313360.2A 2020-04-20 2020-04-20 Face and behavior recognition-based encryption sharing platform and encryption sharing method Pending CN111400768A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010313360.2A CN111400768A (en) 2020-04-20 2020-04-20 Face and behavior recognition-based encryption sharing platform and encryption sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010313360.2A CN111400768A (en) 2020-04-20 2020-04-20 Face and behavior recognition-based encryption sharing platform and encryption sharing method

Publications (1)

Publication Number Publication Date
CN111400768A true CN111400768A (en) 2020-07-10

Family

ID=71437117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010313360.2A Pending CN111400768A (en) 2020-04-20 2020-04-20 Face and behavior recognition-based encryption sharing platform and encryption sharing method

Country Status (1)

Country Link
CN (1) CN111400768A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000624A (en) * 2020-08-26 2020-11-27 闪联信息技术工程中心有限公司 Method and system for burning network file after being uploaded and read safely
CN113609414A (en) * 2021-08-03 2021-11-05 深圳市闪联信息技术有限公司 Video sharing method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989988A (en) * 2010-11-05 2011-03-23 上海传知信息科技发展有限公司 Copyright protection system and method of ebook online reading
CN106529310A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Method and device for inhibiting screen capture
CN108595990A (en) * 2018-03-30 2018-09-28 武志学 Show equipment protection method, device, electronic equipment and readable storage medium storing program for executing
CN108763975A (en) * 2018-03-30 2018-11-06 武志学 Show that equipment shows content protecting method, device and equipment
CN109885985A (en) * 2018-12-12 2019-06-14 南京硕瑞信息科技有限公司 A kind of method and its realization system of the anti-anti- screenshotss of downloading of online reading PDF
WO2020000912A1 (en) * 2018-06-28 2020-01-02 杭州海康威视数字技术股份有限公司 Behavior detection method and apparatus, and electronic device and storage medium
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989988A (en) * 2010-11-05 2011-03-23 上海传知信息科技发展有限公司 Copyright protection system and method of ebook online reading
CN106529310A (en) * 2016-10-31 2017-03-22 珠海市魅族科技有限公司 Method and device for inhibiting screen capture
CN108595990A (en) * 2018-03-30 2018-09-28 武志学 Show equipment protection method, device, electronic equipment and readable storage medium storing program for executing
CN108763975A (en) * 2018-03-30 2018-11-06 武志学 Show that equipment shows content protecting method, device and equipment
WO2020000912A1 (en) * 2018-06-28 2020-01-02 杭州海康威视数字技术股份有限公司 Behavior detection method and apparatus, and electronic device and storage medium
CN109885985A (en) * 2018-12-12 2019-06-14 南京硕瑞信息科技有限公司 A kind of method and its realization system of the anti-anti- screenshotss of downloading of online reading PDF
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112000624A (en) * 2020-08-26 2020-11-27 闪联信息技术工程中心有限公司 Method and system for burning network file after being uploaded and read safely
CN113609414A (en) * 2021-08-03 2021-11-05 深圳市闪联信息技术有限公司 Video sharing method and system
CN113609414B (en) * 2021-08-03 2024-02-02 深圳市闪联信息技术有限公司 Video sharing method and system

Similar Documents

Publication Publication Date Title
US11734456B2 (en) Systems and methods for authenticating photographic image data
US11611553B2 (en) Online identity verification platform and process
US8233677B2 (en) Image sensing apparatus and image file data structure
US8978120B2 (en) Communication control system and method, and communication device and method
US10075618B2 (en) Security feature for digital imaging
US10339283B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
US10607035B2 (en) Method of displaying content on a screen of an electronic processing device
US7774023B2 (en) System and method for associating device information with digital images
CN109274582B (en) Instant communication message display method, device, equipment and storage medium
WO2018225642A1 (en) Face authentication system, face authentication method, biometric authentication system, biometric authentication method, and recording medium
CN104732158A (en) Encryption photographing method, system and device
CN111400768A (en) Face and behavior recognition-based encryption sharing platform and encryption sharing method
AU2013396016A1 (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
CN112149177B (en) Bidirectional protection method and system for network information security
KR101559915B1 (en) A system of managing shared data in the smart phone by using couple finger-prints
KR102168806B1 (en) Apparatus and method for playing and providing image contents
KR102337779B1 (en) Method of preventing the leakage of the information based on behavior and system performing the same
WO2022202955A1 (en) Meeting recording processing device and security assurance method for meeting recording
GB2566043A (en) A method of displaying content on a screen of an electronic processing device
CN111787271A (en) Video conference control method, device, equipment and computer readable storage medium
WO2016195060A1 (en) Image processing system, server device, method for controlling server device, and program
KR101107149B1 (en) Image apparatus, security memory card and authentication method therof
KR20210070608A (en) Method for security recording of image and soung and apparatus therefor
JP2010118960A (en) Surveillance system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200710

RJ01 Rejection of invention patent application after publication