CN111639313B - File transmission method, device, terminal and computer readable storage medium - Google Patents
File transmission method, device, terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN111639313B CN111639313B CN202010405175.6A CN202010405175A CN111639313B CN 111639313 B CN111639313 B CN 111639313B CN 202010405175 A CN202010405175 A CN 202010405175A CN 111639313 B CN111639313 B CN 111639313B
- Authority
- CN
- China
- Prior art keywords
- information
- target
- file
- target terminal
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 90
- 238000000034 method Methods 0.000 title claims abstract description 51
- 230000001960 triggered effect Effects 0.000 claims abstract description 33
- 238000004891 communication Methods 0.000 description 6
- 210000004899 c-terminal region Anatomy 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000012141 concentrate Substances 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The invention discloses a file transmission method, which comprises the following steps: if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. The invention also discloses a file transmission device, equipment and a computer readable storage medium. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.
Description
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a file transmission method, a file transmission device, a terminal, and a computer readable storage medium.
Background
With the rapid development of information digitization, the digitization of information media provides great convenience for information access, and meanwhile, the efficiency and accuracy of information expression are also remarkably improved. More and more enterprises use electronic files instead of paper files, but the consequent side effect is that the security of the digital electronic files in the circulation process is not guaranteed, the electronic files are easily divulged by internal staff, and after divulging, the users are difficult to follow.
Disclosure of Invention
The invention mainly aims to provide a file transmission method, a file transmission device, a file transmission terminal and a computer readable storage medium, and aims to realize traceability of target files.
In order to achieve the above object, the present invention provides a file transfer method, including the steps of:
if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the first watermark information includes a hidden watermark, and the step of acquiring target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if a transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Preferably, the first watermark information includes an explicit watermark, and after the step of determining the page type of the target file if the target terminal detects a transmission instruction triggered based on the target file, the file transmission method further includes:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Preferably, the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if the transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Preferably, if yes, the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information includes:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Preferably, after the step of determining whether the target file is the original created file if the transmission instruction triggered by the target terminal based on the target file is detected, the file transmission method further includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, if not, the step of obtaining the target terminal information of the target terminal and the second watermark information carried by the target file, and generating the third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
In addition, in order to achieve the above object, the present invention also provides a file transfer device including:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
and the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the first watermark information includes a hidden watermark, and the generating module is further configured to:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Preferably, the first watermark information includes an explicit watermark, and the generating module is further configured to:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Preferably, the generating module is further configured to:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Preferably, the generating module is further configured to:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Preferably, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to:
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Preferably, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
In addition, to achieve the above object, the present invention also provides a terminal including: the file transfer device comprises a memory, a processor and a file transfer program stored on the memory and capable of running on the processor, wherein the file transfer program realizes the steps of the file transfer method when being executed by the processor.
In addition, in order to achieve the above object, the present invention also provides a computer-readable storage medium having stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method as described above.
According to the file transmission method, if a transmission instruction triggered by a target terminal based on a target file is detected, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.
Drawings
FIG. 1 is a schematic diagram of a terminal structure of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart of a first embodiment of a file transfer method according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, fig. 1 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
The terminal in the embodiment of the invention can be a mobile terminal or a fixed terminal.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a stable memory (non-volatile memory), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 1 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, an operating device, a network communication module, a user interface module, and a file transfer program may be included in the memory 1005 as one type of computer storage medium.
The operation device is a program for managing and controlling the terminal and the software resource, and supports the operation of a network communication module, a user interface module, a file transmission program and other programs or software; the network communication module is used to manage and control the network interface 1002; the user interface module is used to manage and control the user interface 1003.
In the terminal shown in fig. 1, the terminal calls a file transfer program stored in a memory 1005 through a processor 1001 and performs operations in the respective embodiments of the file transfer method described below.
Based on the hardware structure, the embodiment of the file transmission method is provided.
Referring to fig. 2, fig. 2 is a flowchart of a first embodiment of a file transfer method according to the present invention, where the method includes:
step S10, if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
and step S20, the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction.
The file transmission method is applied to file transmission equipment, the file transmission equipment can be mobile terminals such as mobile phones and tablet computers, and can also be fixed terminals such as computers, and for convenience in description, the file transmission equipment is briefly described by the terminals. In the implementation, the enterprise only needs to install a program for executing the file transmission method on an internal terminal, such as a computer, so that the internal terminal of the enterprise can realize the file transmission method, if staff sends out the target file of the enterprise through the terminal, the terminal can acquire terminal information and generate watermark information indicating that the target file is sent out from the current terminal, and then the target file carrying the watermark information is sent out, so that the target file received by the receiving terminal also contains the watermark information, and if the target file is leaked, a leaked person can be found according to the watermark information.
The following will explain each step in detail:
step S10, if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In this embodiment, if the detection target terminal is based on a transmission instruction triggered by the target file, that is, when an employee wants to transmit the target file on the target terminal, target terminal information of the target terminal is acquired, where the target terminal information includes work number information of the employee corresponding to the target terminal and id information of the target terminal, and then, based on the target terminal information, first watermark information of the target file is generated, and since the watermark generation method is mature, it is necessary to describe that the finally generated first watermark information includes the work number information and the id information, so that secret leakage tracing can be performed according to the work number information and the id information.
Further, in another embodiment, the first watermark information comprises a hidden watermark, and thus, in another embodiment, step S10 comprises:
step a1, if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
in another embodiment, if the transmission instruction triggered by the target terminal based on the target file is detected, the page type of the target file is determined first, and it should be noted that in another embodiment, the page of the target file is divided into a content area and a blank area, where the content area may be text or a picture, and thus the page type includes content and blank.
Step a2, if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
in another embodiment, if the page type of the target file is determined to be content, target terminal information of the target terminal is obtained, and an implicit watermark corresponding to the target terminal information is generated. It will be appreciated that, since the content, such as a text or a picture, is displayed in the content area, if the explicit watermark is generated, the reading effect of the target file will be affected, and thus, in another embodiment, the implicit watermark is generated for the content area.
It should be noted that, the hidden watermark refers to a watermark which cannot be observed by a normal naked eye or a normal angle, and the watermark can be seen only by a special observation tool or a special angle, and the principle is visual spoofing, such as a watermark which can be seen only by being close to a screen on the left side of the screen of the terminal. In another embodiment, the hidden watermark may be a hidden code, and a corresponding decoding procedure is required to display the hidden watermark, which is not limited herein.
And a3, adding the hidden watermark in a content area corresponding to the content.
Finally, a hidden watermark is added to the content area corresponding to the content, and the specific adding mode is not limited herein because the hidden watermark is a hidden watermark.
When the hidden watermark is added, the hidden watermark and the content of the target file, such as a text, a picture and the like, are positioned on the same display layer, so that leakage personnel can be prevented from removing the hidden watermark by removing the display layer.
Further, in another embodiment, the first watermark information includes an explicit watermark, and after step a1, the file transfer method further includes:
step a4, if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
in another embodiment, if the page type of the target file is determined to be blank, that is, a blank area of the page in the target file, target terminal information of the target terminal is obtained, and an explicit watermark corresponding to the target terminal information is generated, wherein the difference between the explicit watermark and the implicit watermark is one normally visible one normally invisible one.
And a step a5, adding the dominant watermark in a blank area corresponding to the blank.
Finally, the explicit watermark is added to the blank area corresponding to the blank, and the specific adding mode can be an embedding mode, the explicit watermark is embedded into the blank area of the target file, and the explicit watermark and the content of the target file, such as characters, pictures and the like, can be located on the same display layer or different display layers, and in this embodiment, the explicit watermark and the content of the target file are preferably located on the same display layer.
In another embodiment, the hidden watermark and the dominant watermark can be added at the same time, that is, in the page of the target file, the hidden watermark is added to the content area with the content, and the dominant watermark is added to the blank area, so that the dominant watermark mainly plays a confusing role, and the leakage personnel concentrate on the removal of the dominant watermark and ignore the hidden watermark.
And step S20, the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction.
In this embodiment, finally, the target file carrying the first watermark information is sent to the receiving terminal corresponding to the transmission instruction, where the receiving terminal may be a terminal of the same enterprise as the target terminal, or may be a terminal of a different enterprise from the target terminal. If the receiving terminal is a terminal of the same enterprise to which the target terminal belongs, the current transmission is internal transmission, if the receiving terminal is a terminal of a different enterprise to which the target terminal belongs, the current transmission is indicated that the leakage risk of the target file of the enterprise is present by the staff, if the leakage situation of the target file exists, the target file can be obtained, and the user can know the leakage by looking at the watermark information of the target file.
If the leakage file exists currently, the watermark information of the leakage file can be checked to determine who is leaked, if A sends the target file to B, B sends the target file to C, C possibly sends the target file to other people, the watermark information of the leakage file indicates B, the leakage file is determined to be originally leaked by B, and C and B possibly belong to different enterprises.
In this embodiment, if a transmission instruction triggered by a target terminal based on a target file is detected, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated based on the target terminal information; and sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction. When the target file is transmitted, the watermark information corresponding to the target terminal is generated, the target file carrying the watermark information is sent out, and if the target file is leaked, the position from which the target file is leaked can be known according to the watermark information, so that the traceability of the target file is realized.
Further, based on the first embodiment of the file transfer method of the present invention, a second embodiment of the file transfer method of the present invention is provided.
The second embodiment of the file transfer method differs from the first embodiment of the file transfer method in that step S10 includes:
step b1, if a transmission instruction triggered by a target terminal based on a target file is detected, determining whether the target file is an original created file;
and b2, if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In the process of generating the watermark, the embodiment needs to determine whether the target file is the original created file, so that different parameters are selected to generate the watermark information, and the generated watermark information is reliable and traceable.
The following will explain each step in detail:
and b1, if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file.
In this embodiment, if a transmission instruction triggered by the target terminal based on the target file is detected, it is first determined whether the target file is an original created file, where the original created file refers to a file edited and created by the current employee at the target terminal, that is, the target terminal is the creator of the target file, so that it can be determined whether the target file is an original created file by determining the creator of the current target file. Specifically, if the creator of the target file is the target terminal, that is, the target file is created by an employee on the target terminal, determining that the target file is an original created file; if the creator of the target file is not the target terminal, that is, the target file is sent or transferred by other terminals received by the target terminal, it is determined that the target file is not the original created file.
And b2, if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
In this embodiment, if it is determined that the target file is an original creation file, target terminal information of the target terminal is obtained, and first watermark information of the target file is generated according to the target terminal information, that is, after it is determined that the target file is the original creation file, the target terminal information of the target terminal is selected as a generation parameter of the watermark information; if the target file is not the original created file, other information is selected as the generation parameter of the watermark information.
Further, in another embodiment, step b2 includes:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
in this step, if it is determined that the target file is the original creation file, target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction are acquired, where in this embodiment, the receiving terminal includes id information of the receiving terminal.
And generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
In this step, the first watermark information of the target file is generated according to the target terminal information and the receiving terminal information, that is, the generating parameters of the first watermark information include the target terminal information and the receiving terminal information, so that it is possible to know who the first secret leakage object is, that is, to whom the secret leakage is, in addition to follow up who the secret leakage is according to the watermark information.
Further, in another embodiment, after step b1, the file transfer method further includes:
step b3, if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
in another embodiment, if it is determined that the target file is not the original created file, it is indicated that the target file is sent or transferred by another terminal, where the target file in principle has watermark information, that is, when the other terminal sends the target file to the target terminal, the second watermark information is generated, so that the target terminal information of the target terminal and the second watermark information carried by the target terminal need to be acquired, and thus, according to the target terminal information, the receiving terminal information and the second watermark information, third watermark information indicating that the target terminal sends the third watermark information is generated.
If the target file does not carry the second watermark information, the third watermark information does not need to be generated, that is, if the target file is a file created at a terminal of an enterprise, the watermark information is generated in the transmission process in principle, if the target file is a file copied back from outside the enterprise, the target file does not belong to an enterprise confidential file in principle, so the target file does not have watermark information, and the watermark does not need to be generated in the transmission process.
And b4, sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
In another embodiment, the target file carrying the third watermark information is finally sent to the receiving terminal corresponding to the transmission instruction, which indicates that the target file is generated by the target terminal, and since the generation parameter of the third watermark information includes the second watermark information, it is possible to trace back where the target terminal is received.
Further, in another embodiment, step b3 includes:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
in another embodiment, if it is determined that the target file is not the original created file, it is indicated that the target file is sent or transferred by another terminal, and the target file at this time basically includes watermark information generated by another terminal, so as to obtain target terminal information of the target terminal and second watermark information carried by the target file, and determine whether the target terminal information satisfies the second watermark information.
It should be noted that, the second watermark information in this embodiment is generated by the previous terminal according to the terminal information of the previous terminal and the target terminal information of the target terminal (the previous terminal is the creator of the target file), that is, the target terminal is the receiving terminal in the last transmission.
Therefore, it may be determined whether the target terminal information satisfies the second watermark information, that is, when the a terminal sends the target file to the B terminal, the second watermark information is generated according to the terminal information of the a terminal and the B terminal, and when the B terminal sends the target file to the C terminal, it is required to determine whether the terminal information of the B terminal satisfies the second watermark information, where if the second watermark information includes the target terminal information, it is determined that the target terminal information satisfies the second watermark information. The method is to avoid the false impression that when the A terminal sends the target file to the B terminal, staff corresponding to the B terminal copies the target file at the B terminal, and sends the target file to the C terminal at the D terminal, and the false impression is sent to the D terminal.
And if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
If yes, the fact that the last terminal is sent to the target terminal in a targeted mode is indicated, and the target terminal is authorized to send the targeted terminal to other receiving terminals is indicated, so that third watermark information of the target file is generated based on the targeted terminal information, the receiving terminal information and the second watermark information during transmission.
Further, if the file is not satisfied, it is indicated that the target file may be copied from another terminal, and the transmission of the target file is prohibited.
If the information is not satisfied, the camera of the target terminal is started to acquire the face information of the current operator, the work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
It can be understood that the terminal a sends the target file to the terminal B, the terminal B fails and cannot send the target file to the terminal C, and at this time, the staff of the terminal B is likely to send the target file by other devices, but needs to avoid the back-pot of other terminals, so that at this time, the face information of the staff can be obtained, and thus the work number information of the staff is determined in the enterprise information base, and the third watermark information is smoothly generated.
In the process of generating the watermark, the embodiment needs to determine whether the target file is the original created file, so that different parameters are selected to generate the watermark information, and the generated watermark information is reliable and traceable.
The invention also provides a file transmission device. The file transmission device of the present invention comprises:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
and the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction.
Further, the first watermark information includes a hidden watermark, and the generating module is further configured to:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
Further, the first watermark information includes an explicit watermark, and the generating module is further configured to:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
Further, the generating module is further configured to:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information.
Further, the generating module is further configured to:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
and generating first watermark information of the target file based on the target terminal information and the receiving terminal information.
Further, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to:
and sending the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction.
Further, the generating module is further configured to:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
and if so, generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information.
The invention also provides a computer readable storage medium.
The computer-readable storage medium of the present invention has stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method as described above.
The method implemented when the file transfer program running on the processor is executed may refer to various embodiments of the file transfer method of the present invention, which are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein, or any application, directly or indirectly, in the field of other related technology.
Claims (6)
1. A file transfer method, characterized in that the file transfer method comprises the steps of:
if a transmission instruction triggered by a target terminal based on a target file is detected, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
the target file carrying the first watermark information is sent to a receiving terminal corresponding to the transmission instruction;
the step of acquiring the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if the target terminal is detected to be triggered based on the target file comprises the following steps:
if a transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is an original created file or not;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
if yes, the step of obtaining the target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information comprises the following steps:
if yes, acquiring target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction;
generating first watermark information of the target file based on the target terminal information and the receiving terminal information;
if the transmission instruction triggered by the target terminal based on the target file is detected, determining whether the target file is the original created file, and after the step of determining whether the target file is the original created file, the file transmission method further comprises the following steps:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the target file carrying the third watermark information is sent to a receiving terminal corresponding to the transmission instruction;
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and generating third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information, wherein the step of generating the third watermark information of the target file comprises the following steps:
if not, acquiring target terminal information of the target terminal and second watermark information carried by the target file, and determining whether the target terminal information meets the second watermark information;
if yes, third watermark information of the target file is generated based on the target terminal information, the receiving terminal information and the second watermark information;
if the information is not satisfied, a camera of the target terminal is started, face information of a current operator is obtained, work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
2. The file transmission method as claimed in claim 1, wherein the first watermark information includes an implicit watermark, and the step of acquiring target terminal information of the target terminal and generating the first watermark information of the target file based on the target terminal information if a transmission instruction triggered by the target terminal based on the target file is detected includes:
if a transmission instruction triggered by a target terminal based on a target file is detected, determining the page type of the target file;
if the page type is content, acquiring target terminal information of the target terminal, and generating a hidden watermark corresponding to the target terminal information;
and adding the hidden watermark in a content area corresponding to the content.
3. The file transfer method according to claim 2, wherein the first watermark information includes an explicit watermark, and the file transfer method further includes, after the step of determining the page type of the target file if the target terminal is detected based on a transmission instruction triggered by the target file:
if the page type is blank, acquiring target terminal information of the target terminal, and generating an explicit watermark corresponding to the target terminal information;
and adding the dominant watermark in a blank area corresponding to the blank.
4. A document transfer apparatus, characterized in that the document transfer apparatus comprises:
the generating module is used for acquiring target terminal information of the target terminal if a transmission instruction triggered by the target terminal based on the target file is detected, and generating first watermark information of the target file based on the target terminal information;
the sending module is used for sending the target file carrying the first watermark information to a receiving terminal corresponding to the transmission instruction;
the generation module is further used for determining whether the target file is an original created file or not if a transmission instruction triggered by the target terminal based on the target file is detected;
if yes, acquiring target terminal information of the target terminal, and generating first watermark information of the target file based on the target terminal information;
the generating module is further configured to obtain target terminal information of the target terminal and receiving terminal information corresponding to the transmission instruction if the target terminal information is the same as the receiving terminal information;
generating first watermark information of the target file based on the target terminal information and the receiving terminal information;
the generating module is further configured to obtain target terminal information of the target terminal and second watermark information carried by the target file if not, and generate third watermark information of the target file based on the target terminal information, the receiving terminal information and the second watermark information;
the sending module is further configured to send the target file carrying the third watermark information to a receiving terminal corresponding to the transmission instruction;
the generating module is further configured to obtain target terminal information of the target terminal and second watermark information carried by the target file if not, and determine whether the target terminal information meets the second watermark information;
if yes, third watermark information of the target file is generated based on the target terminal information, the receiving terminal information and the second watermark information;
if the information is not satisfied, a camera of the target terminal is started, face information of a current operator is obtained, work number information of the current operator is determined based on the face information, and third watermark information is generated based on the work number information, the target terminal information and the receiving terminal information.
5. A terminal, the terminal comprising: a memory, a processor and a file transfer program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the file transfer method according to any one of claims 1 to 3.
6. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a file transfer program which, when executed by a processor, implements the steps of the file transfer method according to any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010405175.6A CN111639313B (en) | 2020-05-13 | 2020-05-13 | File transmission method, device, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010405175.6A CN111639313B (en) | 2020-05-13 | 2020-05-13 | File transmission method, device, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111639313A CN111639313A (en) | 2020-09-08 |
CN111639313B true CN111639313B (en) | 2023-08-11 |
Family
ID=72333216
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010405175.6A Active CN111639313B (en) | 2020-05-13 | 2020-05-13 | File transmission method, device, terminal and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111639313B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115987682A (en) * | 2023-02-02 | 2023-04-18 | 浙江网商银行股份有限公司 | Data processing method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103379101A (en) * | 2012-04-20 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Watermark generation method, client side and server |
CN104023332A (en) * | 2014-06-25 | 2014-09-03 | 上海斐讯数据通信技术有限公司 | Electronic terminal and short message encrypting and decrypting method thereof |
CN104112201A (en) * | 2013-04-22 | 2014-10-22 | 中国银联股份有限公司 | Electronic bill data transmitting and receiving methods and apparatuses |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
CN107743123A (en) * | 2017-09-30 | 2018-02-27 | 北京北信源软件股份有限公司 | A kind of screen watermark handling method and device |
CN108510426A (en) * | 2018-04-13 | 2018-09-07 | 平安普惠企业管理有限公司 | Information security processing method, device, equipment and computer storage media |
CN109784011A (en) * | 2018-12-24 | 2019-05-21 | 北京奇安信科技有限公司 | Watermark generation method and device |
CN111131654A (en) * | 2018-10-30 | 2020-05-08 | 浙江宇视科技有限公司 | Watermark embedding method and device and coder-decoder |
-
2020
- 2020-05-13 CN CN202010405175.6A patent/CN111639313B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103379101A (en) * | 2012-04-20 | 2013-10-30 | 腾讯科技(深圳)有限公司 | Watermark generation method, client side and server |
CN104112201A (en) * | 2013-04-22 | 2014-10-22 | 中国银联股份有限公司 | Electronic bill data transmitting and receiving methods and apparatuses |
CN104023332A (en) * | 2014-06-25 | 2014-09-03 | 上海斐讯数据通信技术有限公司 | Electronic terminal and short message encrypting and decrypting method thereof |
CN107423629A (en) * | 2017-04-12 | 2017-12-01 | 李晓妮 | A kind of anti-method and system divulged a secret with tracing of fileinfo output |
CN107743123A (en) * | 2017-09-30 | 2018-02-27 | 北京北信源软件股份有限公司 | A kind of screen watermark handling method and device |
CN108510426A (en) * | 2018-04-13 | 2018-09-07 | 平安普惠企业管理有限公司 | Information security processing method, device, equipment and computer storage media |
CN111131654A (en) * | 2018-10-30 | 2020-05-08 | 浙江宇视科技有限公司 | Watermark embedding method and device and coder-decoder |
CN109784011A (en) * | 2018-12-24 | 2019-05-21 | 北京奇安信科技有限公司 | Watermark generation method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111639313A (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11640498B2 (en) | Method and system for selective document redaction | |
US20160070812A1 (en) | Secure Document Sharing | |
KR101832533B1 (en) | Reputation checking obtained files | |
US20160267290A1 (en) | Information viewing method, device, system and storage medium | |
CN111241565B (en) | File control method and device, electronic equipment and storage medium | |
EP3792792A1 (en) | Tampering detection method for paper copy and apparatus and non-transitory computer-readable storage medium | |
EP3176719B1 (en) | Methods and devices for acquiring certification document | |
WO2016025756A1 (en) | Form filling method and related terminal | |
CN110471632B (en) | File printing and viewing method and device, electronic equipment and readable storage medium | |
CN104933375A (en) | Method and system for protecting electronic display document | |
CN102169534A (en) | Method and device for displaying watermark | |
US20100275154A1 (en) | System and Method For Securely Presenting Data | |
US20160062975A1 (en) | Web page providing device, web page providing method, and web page providing program | |
CN111639313B (en) | File transmission method, device, terminal and computer readable storage medium | |
CN111931135A (en) | Method and device for adding watermark | |
CN114444131A (en) | Document auditing method and computer storage medium | |
JP5355345B2 (en) | Document browsing system and control method thereof | |
JP5157505B2 (en) | Information processing apparatus, file editing method, file editing program, and recording medium | |
CN110851795B (en) | File management method, device, equipment and readable storage medium | |
RU2699234C1 (en) | Method of safe use of an electronic document | |
JP4946726B2 (en) | Document operation system, management apparatus and program | |
JP2020115327A (en) | Augmented reality document redaction | |
JP2008108113A (en) | Information leak deterrence system, server, information leak deterrence method and program | |
JP2012203820A (en) | Authentication system and authentication method | |
JP2019062303A (en) | Information processing device, information processing program, and information processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |