CN111639313B - File transmission method, device, terminal and computer readable storage medium - Google Patents

File transmission method, device, terminal and computer readable storage medium Download PDF

Info

Publication number
CN111639313B
CN111639313B CN202010405175.6A CN202010405175A CN111639313B CN 111639313 B CN111639313 B CN 111639313B CN 202010405175 A CN202010405175 A CN 202010405175A CN 111639313 B CN111639313 B CN 111639313B
Authority
CN
China
Prior art keywords
information
target
file
target terminal
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010405175.6A
Other languages
Chinese (zh)
Other versions
CN111639313A (en
Inventor
彭辉
陈昊亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Speakin Intelligent Technology Co ltd
Original Assignee
Guangzhou Speakin Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Speakin Intelligent Technology Co ltd filed Critical Guangzhou Speakin Intelligent Technology Co ltd
Priority to CN202010405175.6A priority Critical patent/CN111639313B/en
Publication of CN111639313A publication Critical patent/CN111639313A/en
Application granted granted Critical
Publication of CN111639313B publication Critical patent/CN111639313B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a file transmission method, which comprises the following steps: if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. The invention also discloses a file transmission device, equipment and a computer readable storage medium. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.

Description

File transmission method, device, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a file transmission method, a file transmission device, a terminal, and a computer readable storage medium.
Background
With the rapid development of information digitization, the digitization of information media provides great convenience for information access, and meanwhile, the efficiency and accuracy of information expression are also remarkably improved. More and more enterprises use electronic files instead of paper files, but the consequent side effect is that the security of the digital electronic files in the circulation process is not guaranteed, the electronic files are easily divulged by internal staff, and after divulging, the users are difficult to follow.
Disclosure of Invention
The invention mainly aims to provide a file transmission method, a file transmission device, a file transmission terminal and a computer readable storage medium, and aims to realize traceability of target files.
In order to achieve the above object, the present invention provides a file transfer method, including the steps of:
if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the first watermark information includes a hidden watermark, and the step of acquiring target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if a transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Preferably, the first watermark information includes an explicit watermark, and after the step of determining the page type of the target file if the target terminal detects a transmission instruction triggered based on the target file, the file transmission method further includes:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Preferably, the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if the transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Preferably, if yes, the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information includes:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Preferably, after the step of determining whether the target file is the original created file if the transmission instruction triggered by the target terminal based on the target file is detected, the file transmission method further includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, if not, the step of obtaining the target terminal information of the target terminal and the second watermark information carried by the target file, and generating the third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
In addition, in order to achieve the above object, the present invention also provides a file transfer device including:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
and the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the first watermark information includes a hidden watermark, and the generating module is further configured to:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Preferably, the first watermark information includes an explicit watermark, and the generating module is further configured to:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Preferably, the generating module is further configured to:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Preferably, the generating module is further configured to:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Preferably, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to:
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
In addition, to achieve the above object, the present invention also provides a terminal including: the file transfer device comprises a memory, a processor and a file transfer program stored on the memory and capable of running on the processor, wherein the file transfer program realizes the steps of the file transfer method when being executed by the processor.
In addition, in order to achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method as described above.
According to the file transmission method, if a transmission instruction triggered by a target terminal based on a target file is detected, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.
Drawings
FIG. 1 is a schematic diagram of a terminal structure of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart of a first embodiment of a file transfer method according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, fig. 1 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
The terminal in the embodiment of the invention can be a mobile terminal or a fixed terminal.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 1 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating device, a network communication module, a user interface module, and a file transfer program may be included in the memory 1005 as one type of computer storage medium.
The operation device is a program for managing and controlling the terminal and the software resource, and supports the operation of a network communication module, a user interface module, a file transmission program and other programs or software; the network communication module is used to manage and control the network interface 1002; the user interface module is used to manage and control the user interface 1003.
In the terminal shown in fig. 1, the terminal calls a file transfer program stored in a memory 1005 through a processor 1001 and performs operations in the respective embodiments of the file transfer method described below.
Based on the hardware structure, the embodiment of the file transmission method is provided.
Referring to fig. 2, fig. 2 is a flowchart of a first embodiment of a file transfer method according to the present invention, where the method includes:
step S10, if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
and step S20, the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction.
The file transmission method is applied to file transmission equipment, the file transmission equipment can be mobile terminals such as mobile phones and tablet computers, and can also be fixed terminals such as computers, and for convenience in description, the file transmission equipment is briefly described by the terminals. In the implementation, the enterprise only needs to install a program for executing the file transmission method on an internal terminal, such as a computer, so that the internal terminal of the enterprise can realize the file transmission method, if staff sends out the target file of the enterprise through the terminal, the terminal can acquire terminal information and generate watermark information indicating that the target file is sent out from the current terminal, and then the target file carrying the watermark information is sent out, so that the target file received by the receiving terminal also contains the watermark information, and if the target file is leaked, a leaked person can be found according to the watermark information.
The following will explain each step in detail:
step S10, if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In this embodiment, if the detection target terminal is based on a transmission instruction triggered by the target file, that is, when an employee wants to transmit the target file on the target terminal, target terminal information of the target terminal is acquired, where the target terminal information includes work number information of the employee corresponding to the target terminal and id information of the target terminal, and then, based on the target terminal information, first watermark information of the target file is generated, and since the watermark generation method is mature, it is necessary to describe that the finally generated first watermark information includes the work number information and the id information, so that secret leakage tracing can be performed according to the work number information and the id information.
Further, in another embodiment, the first watermark information comprises a hidden watermark, and thus, in another embodiment, step S10 comprises:
step a1, if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
in another embodiment, if the transmission instruction triggered by the target terminal based on the target file is detected, the page type of the target file is determined first, and it should be noted that in another embodiment, the page of the target file is divided into a content area and a blank area, where the content area may be text or a picture, and thus the page type includes content and blank.
Step a2, if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
in another embodiment, if the page type of the target file is determined to be content, target terminal information of the target terminal is obtained, and an implicit watermark corresponding to the target terminal information is generated. It will be appreciated that, since the content, such as a text or a picture, is displayed in the content area, if the explicit watermark is generated, the reading effect of the target file will be affected, and thus, in another embodiment, the implicit watermark is generated for the content area.
It should be noted that, the hidden watermark refers to a watermark which cannot be observed by a normal naked eye or a normal angle, and the watermark can be seen only by a special observation tool or a special angle, and the principle is visual spoofing, such as a watermark which can be seen only by being close to a screen on the left side of the screen of the terminal. In another embodiment, the hidden watermark may be a hidden code, and a corresponding decoding procedure is required to display the hidden watermark, which is not limited herein.
And a3, adding the hidden watermark in a content area corresponding to the content.
Finally, a hidden watermark is added to the content area corresponding to the content, and the specific adding mode is not limited herein because the hidden watermark is a hidden watermark.
When the hidden watermark is added, the hidden watermark and the content of the target file, such as a text, a picture and the like, are positioned on the same display layer, so that leakage personnel can be prevented from removing the hidden watermark by removing the display layer.
Further, in another embodiment, the first watermark information includes an explicit watermark, and after step a1, the file transfer method further includes:
step a4, if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
in another embodiment, if the page type of the target file is determined to be blank, that is, a blank area of the page in the target file, target terminal information of the target terminal is obtained, and an explicit watermark corresponding to the target terminal information is generated, wherein the difference between the explicit watermark and the implicit watermark is one normally visible one normally invisible one.
And a step a5, adding the dominant watermark in a blank area corresponding to the blank.
Finally, the explicit watermark is added to the blank area corresponding to the blank, and the specific adding mode can be an embedding mode, the explicit watermark is embedded into the blank area of the target file, and the explicit watermark and the content of the target file, such as characters, pictures and the like, can be located on the same display layer or different display layers, and in this embodiment, the explicit watermark and the content of the target file are preferably located on the same display layer.
In another embodiment, the hidden watermark and the dominant watermark can be added at the same time, that is, in the page of the target file, the hidden watermark is added to the content area with the content, and the dominant watermark is added to the blank area, so that the dominant watermark mainly plays a confusing role, and the leakage personnel concentrate on the removal of the dominant watermark and ignore the hidden watermark.
And step S20, the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction.
In this embodiment, finally, the target file carrying the first watermark information is sent to the receiving terminal corresponding to the transmission instruction, where the receiving terminal may be a terminal of the same enterprise as the target terminal, or may be a terminal of a different enterprise from the target terminal. If the receiving terminal is a terminal of the same enterprise to which the target terminal belongs, the current transmission is internal transmission, if the receiving terminal is a terminal of a different enterprise to which the target terminal belongs, the current transmission is indicated that the leakage risk of the target file of the enterprise is present by the staff, if the leakage situation of the target file exists, the target file can be obtained, and the user can know the leakage by looking at the watermark information of the target file.
If the leakage file exists currently, the watermark information of the leakage file can be checked to determine who is leaked, if A sends the target file to B, B sends the target file to C, C possibly sends the target file to other people, the watermark information of the leakage file indicates B, the leakage file is determined to be originally leaked by B, and C and B possibly belong to different enterprises.
In this embodiment, if a transmission instruction triggered by a target terminal based on a target file is detected, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.
Further, based on the first embodiment of the file transfer method of the present invention, a second embodiment of the file transfer method of the present invention is provided.
The second embodiment of the file transfer method differs from the first embodiment of the file transfer method in that step S10 includes:
step b1, if a transmission instruction triggered by a target terminal based on a target file is detected, determining whether the target file is an original created file;
and b2, if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In the process of generating the watermark, the embodiment needs to determine whether the target file is the original created file, so that different parameters are selected to generate the watermark information, and the generated watermark information is reliable and traceable.
The following will explain each step in detail:
and b1, if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file.
In this embodiment, if a transmission instruction triggered by the target terminal based on the target file is detected, it is first determined whether the target file is an original created file, where the original created file refers to a file edited and created by the current employee at the target terminal, that is, the target terminal is the creator of the target file, so that it can be determined whether the target file is an original created file by determining the creator of the current target file. Specifically, if the creator of the target file is the target terminal, that is, the target file is created by an employee on the target terminal, determining that the target file is an original created file; if the creator of the target file is not the target terminal, that is, the target file is sent or transferred by other terminals received by the target terminal, it is determined that the target file is not the original created file.
And b2, if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In this embodiment, if it is determined that the target file is an original creation file, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated according to the target terminal information, that is, after it is determined that the target file is the original creation file, the target terminal information of the target terminal is selected as a generation parameter of the watermark information; if the target file is not the original created file, other information is selected as the generation parameter of the watermark information.
Further, in another embodiment, step b2 includes:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
in this step, if it is determined that the target file is the original creation file, target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction are acquired, where in this embodiment, the receiving terminal includes id information of the receiving terminal.
And generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
In this step, the first watermark information of the target file is generated according to the target terminal information and the receiving terminal information, that is, the generating parameters of the first watermark information include the target terminal information and the receiving terminal information, so that it is possible to know who the first secret leakage object is, that is, to whom the secret leakage is, in addition to follow up who the secret leakage is according to the watermark information.
Further, in another embodiment, after step b1, the file transfer method further includes:
step b3, if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
in another embodiment, if it is determined that the target file is not the original created file, it is indicated that the target file is sent or transferred by another terminal, where the target file in principle has watermark information, that is, when the other terminal sends the target file to the target terminal, the second watermark information is generated, so that the target terminal information of the target terminal and the second watermark information carried by the target terminal need to be acquired, and thus, according to the target terminal information, the receiving terminal information and the second watermark information, third watermark information indicating that the target terminal sends the third watermark information is generated.
If the target file does not carry the second watermark information, the third watermark information does not need to be generated, that is, if the target file is a file created at a terminal of an enterprise, the watermark information is generated in the transmission process in principle, if the target file is a file copied back from outside the enterprise, the target file does not belong to an enterprise confidential file in principle, so the target file does not have watermark information, and the watermark does not need to be generated in the transmission process.
And b4, sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
In another embodiment, the target file carrying the third watermark information is finally sent to the receiving terminal corresponding to the transmission instruction, which indicates that the target file is generated by the target terminal, and since the generation parameter of the third watermark information includes the second watermark information, it is possible to trace back where the target terminal is received.
Further, in another embodiment, step b3 includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
in another embodiment, if it is determined that the target file is not the original created file, it is indicated that the target file is sent or transferred by another terminal, and the target file at this time basically includes watermark information generated by another terminal, so as to obtain target terminal information of the target terminal and second watermark information carried by the target file, and determine whether the target terminal information satisfies the second watermark information.
It should be noted that, the second watermark information in this embodiment is generated by the previous terminal according to the terminal information of the previous terminal and the target terminal information of the target terminal (the previous terminal is the creator of the target file), that is, the target terminal is the receiving terminal in the last transmission.
Therefore, it may be determined whether the target terminal information satisfies the second watermark information, that is, when the a terminal sends the target file to the B terminal, the second watermark information is generated according to the terminal information of the a terminal and the B terminal, and when the B terminal sends the target file to the C terminal, it is required to determine whether the terminal information of the B terminal satisfies the second watermark information, where if the second watermark information includes the target terminal information, it is determined that the target terminal information satisfies the second watermark information. The method is to avoid the false impression that when the A terminal sends the target file to the B terminal, staff corresponding to the B terminal copies the target file at the B terminal, and sends the target file to the C terminal at the D terminal, and the false impression is sent to the D terminal.
And if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
If yes, the fact that the last terminal is sent to the target terminal in a targeted mode is indicated, and the target terminal is authorized to send the targeted terminal to other receiving terminals is indicated, so that third watermark information of the target file is generated based on the targeted terminal information, the receiving terminal information and the second watermark information during transmission.
Further, if the file is not satisfied, it is indicated that the target file may be copied from another terminal, and the transmission of the target file is prohibited.
If the information is not satisfied, the camera of the target terminal is started to acquire the face information of the current operator, the work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
It can be understood that the terminal a sends the target file to the terminal B, the terminal B fails and cannot send the target file to the terminal C, and at this time, the staff of the terminal B is likely to send the target file by other devices, but needs to avoid the back-pot of other terminals, so that at this time, the face information of the staff can be obtained, and thus the work number information of the staff is determined in the enterprise information base, and the third watermark information is smoothly generated.
In the process of generating the watermark, the embodiment needs to determine whether the target file is the original created file, so that different parameters are selected to generate the watermark information, and the generated watermark information is reliable and traceable.
The invention also provides a file transmission device. The file transmission device of the present invention comprises:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
and the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Further, the first watermark information includes a hidden watermark, and the generating module is further configured to:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Further, the first watermark information includes an explicit watermark, and the generating module is further configured to:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Further, the generating module is further configured to:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Further, the generating module is further configured to:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Further, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to:
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Further, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
The invention also provides a computer readable storage medium.
The computer-readable storage medium of the present invention has stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method as described above.
The method implemented when the file transfer program running on the processor is executed may refer to various embodiments of the file transfer method of the present invention, which are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein, or any application, directly or indirectly, in the field of other related technology.

Claims (6)

1. A file transfer method, characterized in that the file transfer method comprises the steps of:
if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction;
the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if the target terminal is detected to be triggered based on the target file comprises the following steps:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
if yes, the step of obtaining the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information comprises the following steps:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
generating first watermark information of the target file based on the target terminal information and the receiving terminal information;
if the transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is the original created file, and after the step of determining whether the target file is the original created file, the file transmission method further comprises the following steps:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the target file carrying the third watermark information is sent to a receiving terminal corresponding to the transmission instruction;
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information, wherein the step of generating the third watermark information of the target file comprises the following steps:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
if yes, third watermark information of the target file is generated based on the target terminal information, the receiving terminal information and the second watermark information;
if the information is not satisfied, a camera of the target terminal is started, face information of a current operator is obtained, work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
2. The file transmission method as claimed in claim 1, wherein the first watermark information includes an implicit watermark, and the step of acquiring target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if a transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
3. The file transfer method according to claim 2, wherein the first watermark information includes an explicit watermark, and the file transfer method further includes, after the step of determining the page type of the target file if the target terminal is detected based on a transmission instruction triggered by the target file:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
4. A document transfer apparatus, characterized in that the document transfer apparatus comprises:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction;
the generation module is further used for determining whether the target file is an original created file or not if a transmission instruction triggered by the target terminal based on the target file is detected;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
the generating module is further configured to obtain target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction if the target terminal information is the same as the receiving terminal information;
generating first watermark information of the target file based on the target terminal information and the receiving terminal information;
the generating module is further configured to obtain target terminal information of the target terminal and second watermark information carried by the target file if not, and generate third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to send the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction;
the generating module is further configured to obtain target terminal information of the target terminal and second watermark information carried by the target file if not, and determine whether the target terminal information meets the second watermark information;
if yes, third watermark information of the target file is generated based on the target terminal information, the receiving terminal information and the second watermark information;
if the information is not satisfied, a camera of the target terminal is started, face information of a current operator is obtained, work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
5. A terminal, the terminal comprising: a memory, a processor and a file transfer program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the file transfer method according to any one of claims 1 to 3.
6. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method according to any one of claims 1 to 3.
CN202010405175.6A 2020-05-13 2020-05-13 File transmission method, device, terminal and computer readable storage medium Active CN111639313B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010405175.6A CN111639313B (en) 2020-05-13 2020-05-13 File transmission method, device, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010405175.6A CN111639313B (en) 2020-05-13 2020-05-13 File transmission method, device, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111639313A CN111639313A (en) 2020-09-08
CN111639313B true CN111639313B (en) 2023-08-11

Family

ID=72333216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010405175.6A Active CN111639313B (en) 2020-05-13 2020-05-13 File transmission method, device, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111639313B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987682A (en) * 2023-02-02 2023-04-18 浙江网商银行股份有限公司 Data processing method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379101A (en) * 2012-04-20 2013-10-30 腾讯科技(深圳)有限公司 Watermark generation method, client side and server
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof
CN104112201A (en) * 2013-04-22 2014-10-22 中国银联股份有限公司 Electronic bill data transmitting and receiving methods and apparatuses
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107743123A (en) * 2017-09-30 2018-02-27 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN108510426A (en) * 2018-04-13 2018-09-07 平安普惠企业管理有限公司 Information security processing method, device, equipment and computer storage media
CN109784011A (en) * 2018-12-24 2019-05-21 北京奇安信科技有限公司 Watermark generation method and device
CN111131654A (en) * 2018-10-30 2020-05-08 浙江宇视科技有限公司 Watermark embedding method and device and coder-decoder

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103379101A (en) * 2012-04-20 2013-10-30 腾讯科技(深圳)有限公司 Watermark generation method, client side and server
CN104112201A (en) * 2013-04-22 2014-10-22 中国银联股份有限公司 Electronic bill data transmitting and receiving methods and apparatuses
CN104023332A (en) * 2014-06-25 2014-09-03 上海斐讯数据通信技术有限公司 Electronic terminal and short message encrypting and decrypting method thereof
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107743123A (en) * 2017-09-30 2018-02-27 北京北信源软件股份有限公司 A kind of screen watermark handling method and device
CN108510426A (en) * 2018-04-13 2018-09-07 平安普惠企业管理有限公司 Information security processing method, device, equipment and computer storage media
CN111131654A (en) * 2018-10-30 2020-05-08 浙江宇视科技有限公司 Watermark embedding method and device and coder-decoder
CN109784011A (en) * 2018-12-24 2019-05-21 北京奇安信科技有限公司 Watermark generation method and device

Also Published As

Publication number Publication date
CN111639313A (en) 2020-09-08

Similar Documents

Publication Publication Date Title
US11640498B2 (en) Method and system for selective document redaction
US20160070812A1 (en) Secure Document Sharing
KR101832533B1 (en) Reputation checking obtained files
US20160267290A1 (en) Information viewing method, device, system and storage medium
CN111241565B (en) File control method and device, electronic equipment and storage medium
EP3792792A1 (en) Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium
EP3176719B1 (en) Methods and devices for acquiring certification document
WO2016025756A1 (en) Form filling method and related terminal
CN110471632B (en) File printing and viewing method and device, electronic equipment and readable storage medium
CN104933375A (en) Method and system for protecting electronic display document
CN102169534A (en) Method and device for displaying watermark
US20100275154A1 (en) System and Method For Securely Presenting Data
US20160062975A1 (en) Web page providing device, web page providing method, and web page providing program
CN111639313B (en) File transmission method, device, terminal and computer readable storage medium
CN111931135A (en) Method and device for adding watermark
CN114444131A (en) Document auditing method and computer storage medium
JP5355345B2 (en) Document browsing system and control method thereof
JP5157505B2 (en) Information processing apparatus, file editing method, file editing program, and recording medium
CN110851795B (en) File management method, device, equipment and readable storage medium
RU2699234C1 (en) Method of safe use of an electronic document
JP4946726B2 (en) Document operation system, management apparatus and program
JP2020115327A (en) Augmented reality document redaction
JP2008108113A (en) Information leak deterrence system, server, information leak deterrence method and program
JP2012203820A (en) Authentication system and authentication method
JP2019062303A (en) Information processing device, information processing program, and information processing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant