CN112491835A - Screenshot sending method and device, computer equipment and storage medium - Google Patents

Screenshot sending method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112491835A
CN112491835A CN202011279576.8A CN202011279576A CN112491835A CN 112491835 A CN112491835 A CN 112491835A CN 202011279576 A CN202011279576 A CN 202011279576A CN 112491835 A CN112491835 A CN 112491835A
Authority
CN
China
Prior art keywords
screenshot
target
secret
information
identification result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011279576.8A
Other languages
Chinese (zh)
Inventor
叶兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202011279576.8A priority Critical patent/CN112491835A/en
Publication of CN112491835A publication Critical patent/CN112491835A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/148Segmentation of character regions
    • G06V30/153Segmentation of character regions using recognition of characters or words
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition

Abstract

The invention discloses a screenshot sending method, a screenshot sending device, computer equipment and a storage medium, wherein the screenshot sending method comprises the steps of obtaining a target screenshot and a receiving object, wherein the target screenshot corresponds to a screenshot object and a screenshot object; determining whether authority control is needed or not according to the screenshot object and the receiving object, and acquiring an authority control result; carrying out secret identification processing on the target screenshot to obtain a secret identification result; if the secret identification result contains secret information and the authority control result is required to be controlled, the screenshot object is forbidden to send the target screenshot to the receiving object; if the confidential identification result does not contain confidential information or the permission control result does not need to be controlled, the screenshot object is allowed to send the target screenshot to the receiving object so as to ensure that normal communication can be carried out, and when the confidential information is related, the target screenshot is intelligently forbidden, so that the security of the confidential information is effectively ensured.

Description

Screenshot sending method and device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a screenshot sending method, a screenshot sending device, computer equipment and a storage medium.
Background
Nowadays, information technology is highly developed, and network transmission speed is greatly improved, so that great convenience is brought to work and life of users. During operation, both need carry out work assistance through object program and colleague, also need communicate with external personnel through non-object program to compromise office efficiency and humanized management, but when this kind of object program and non-object program used simultaneously, the existence communicates with external personnel, can't carry out effectual information security management and control, the condition of sending out the object program screenshot may appear, there may be secret information etc. in the screenshot, then can't guarantee secret information's safety, probably lead to secret information to reveal even.
Disclosure of Invention
The embodiment of the invention provides a screenshot sending method, a screenshot sending device, computer equipment and a storage medium, and aims to solve the problem that effective information security control cannot be performed in the existing communication process.
Acquiring a target screenshot and a receiving object, wherein the target screenshot corresponds to a screenshot object and a screenshot object;
determining whether authority control is needed or not according to the screenshot object and the receiving object, and acquiring an authority control result;
carrying out secret identification processing on the target screenshot to obtain a secret identification result;
if the secret identification result contains secret information and the authority control result is required to be controlled, the screenshot object is forbidden to send the target screenshot to the receiving object;
and if the secret identification result does not contain secret information or the authority control result does not need to be controlled, allowing the screenshot object to send the target screenshot to the receiving object.
A screenshot sending apparatus comprising:
the target screenshot obtaining module is used for obtaining a target screenshot and a receiving object, and the target screenshot corresponds to the screenshot object and the screenshot object;
the permission control result acquisition module is used for determining whether permission control is required or not according to the screenshot object and the receiving object and acquiring a permission control result;
the secret identification result acquisition module is used for carrying out secret identification processing on the target screenshot to acquire a secret identification result;
the target screenshot control module is used for forbidding the screenshot object to send the target screenshot to the receiving object if the confidential identification result contains confidential information and the authority control result is required to be controlled;
and the target screenshot sending module is used for allowing the screenshot object to send the target screenshot to the receiving object if the confidential identification result does not contain confidential information or the permission control result does not need to be controlled.
Computer equipment comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the screenshot sending method when executing the computer program.
A computer-readable storage medium, which stores a computer program, which, when executed by a processor, implements the steps of the screenshot sending method described above.
The screenshot sending method, the screenshot sending device, the computer equipment and the storage medium acquire a screenshot sending request, wherein the screenshot sending request comprises a target screenshot and a receiving object, and the target screenshot corresponds to the screenshot object and the screenshot object, so that technical support is provided for realizing intelligent prohibition subsequently. And determining whether authority control is required or not according to the captured object and the received object, and acquiring an authority control result so as to ensure that the target screenshot which does not relate to the confidential information is normally sent, and the target screenshot which relates to the confidential information is intelligently forbidden, thereby effectively ensuring the security of the confidential information. And carrying out secret identification processing on the target screenshot to obtain a secret identification result, and providing basic support for subsequently controlling the target screenshot sent by the screenshot object to the receiving object. And if the confidential identification result contains confidential information and the authority control result is required to be controlled, the screenshot object is prohibited from sending the target screenshot to the receiving object, so that the security of the confidential information is ensured. If the confidential identification result does not contain confidential information or the authority control result does not need to be controlled, the screenshot object is allowed to send the target screenshot to the receiving object, normal information communication of the user can be ensured, and intelligent management is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic diagram of an application environment of a screenshot sending method in an embodiment of the present invention;
FIG. 2 is a flow chart of a screenshot sending method in an embodiment of the present invention;
FIG. 3 is another flowchart of a screenshot sending method in an embodiment of the present invention;
FIG. 4 is another flowchart of a screenshot sending method in an embodiment of the present invention;
FIG. 5 is another flowchart of a screenshot sending method in an embodiment of the present invention;
FIG. 6 is another flowchart of a screenshot sending method in an embodiment of the present invention;
FIG. 7 is a schematic diagram of a screenshot delivery apparatus in an embodiment of the present invention;
FIG. 8 is a schematic diagram of a computer device according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The screenshot sending method provided by the embodiment of the invention can be applied to an application environment shown in fig. 1. Specifically, the screenshot sending method is applied to a screenshot sending system, the screenshot sending system comprises a client shown in fig. 1 and is used for ensuring normal communication, and when secret information is involved, the secret information is intelligently prohibited, so that the security of the secret information is effectively ensured. The client is also called a user side and provides a local service program for the client. The client may be installed on, but is not limited to, various personal computers, laptops, smartphones, tablets, and portable wearable devices.
In an embodiment, as shown in fig. 2, a screenshot sending method is provided, which is described by taking the client in fig. 1 as an example, and includes the following steps:
s201: and acquiring a target screenshot and a receiving object, wherein the target screenshot corresponds to the screenshot object and the screenshot object.
The target screenshot refers to a screenshot intercepted by the screenshot object. The receiving object is the object that receives the target screenshot. The target screenshot may be a confidential screenshot or not, wherein the confidential screenshot refers to a screenshot related to confidential information, for example, the target screenshot refers to a product formula, and is a confidential screenshot. In this embodiment, the target screenshot corresponds to the screenshot object and the screenshot-captured object, and provides technical support for subsequent intelligent prohibition.
The screenshot object is an object that uniquely identifies the execution screenshot, and in this embodiment, the execution subject of the execution screenshot may be a target program and a non-target program.
The captured object is an object that uniquely identifies the captured screen. The objects of the intercepted screen may be target programs and non-target programs. The target program is a program which may relate to secret information, and the screen content of the target program may relate to secret information such as secret information. The non-target program is a program or an operating system other than the target program.
Thus, the target screenshot may be: the target program intercepts the screenshot of the target program, the target program intercepts the screenshot of the non-target program, the non-target program intercepts the screenshot of the target program or the non-target program intercepts the screenshot of the non-target program. When the non-target program intercepts the target program, the control authority of the screenshot object needs to be acquired to prevent the disclosure of secret information.
Specifically, a user triggers a screenshot operation instruction on an operation interface of a screenshot object, the screenshot is performed on the screenshot object according to the screenshot operation instruction, a target screenshot is obtained, the user determines the screenshot object on the operation interface of the screenshot object, the target screenshot is associated with the screenshot object and the screenshot object, technical support is provided for follow-up intelligent prohibition, and then a receiving object of the target screenshot is determined so that the target screenshot can be sent to the receiving object.
S202: and determining whether the authority control is needed or not according to the captured object and the receiving object, and acquiring an authority control result.
And the authority control result is a result of the authority control of the screenshot object. In this embodiment, when the screenshot object is a target program and the receiving object is a non-target program, since the target screenshot may involve confidential information, at this time, the permission control needs to be performed on the screenshot object to ensure that the target screenshot not involving the confidential information is normally sent, and the target screenshot involving the confidential information is intelligently prohibited, thereby effectively ensuring the security of the confidential information. Specifically, when the screenshot object is the target program and the receiving object is the target program, the target screenshot is not sent out, and even if the target screenshot relates to confidential information, the divulgence situation does not occur, and at this time, the permission control on the screenshot object is not needed, so that the permission control result is not controlled as required. Similarly, when the screenshot object is a non-target program and the receiving object is a target program, or when the screenshot object is a non-target program and the receiving object is a non-target program, because the target screenshot does not have confidential information, the divulgence situation does not occur, and at this time, the permission control on the screenshot object is not needed, so that the permission control result is not controlled as required.
Further, when the right regulation result indicates that regulation is required, the embodiment further includes the following process of acquiring the regulation right: obtaining request voice data and/or request text data; generating an authority request interface based on the request voice data and/or the request text data; and acquiring the control authority based on the authority request interface.
The request character data is character data pre-stored in a database. The request voice data is voice data stored in advance in a database. It is to be understood that the requested voice data is a voice corresponding to the requested text data. For example, the request text data is "whether to allow a regulation of sending a target screenshot to the screenshot object".
The permission request interface is an interface displayed for the user to watch so that the user can listen and/or view the requested voice data and/or the requested text data, and the user can visually view the requested text data or listen to the requested voice data. The permission selection item and the non-permission selection item are included in the permission request interface, so that a user can select whether to allow the screenshot object to be controlled or not.
Specifically, when the screenshot object is a target program and the receiving object is a non-target program, the database is queried to obtain request voice data and/or request text data to generate an authority request interface, the authority request interface is sent to the client so that a user can click an permission option or a non-permission option according to own will after listening to and/or viewing the request voice data and/or the request text data, and when the user clicks the permission option on the authority request interface, the user indicates that the user allows the screenshot object to be controlled to send the target screenshot, and the control authority of the screenshot object is generated so that intelligent prohibition can be realized later.
S203: and carrying out secret identification processing on the target screenshot to obtain a secret identification result.
Specifically, the target screenshot is preprocessed to improve the accuracy of model identification, single-line characters in the target screenshot are obtained after preprocessing, the single-line characters are cut, the cut characters are input into a character identification model to be identified, character information in the target screenshot is obtained, the character information is analyzed and compared to determine whether the character information in the target screenshot contains confidential information, and basic support is provided for subsequently controlling the screenshot object to send the target screenshot to a receiving object. It can be understood that if the text information in the target screenshot includes the security information, the security identification result is the security information. And if the text information of the target screenshot does not contain the confidential information, the confidential identification result does not contain the confidential information. The confidential information is information that needs to be confidential.
S204: and if the secret identification result is that the secret information is contained and the authority control result is that the control is required, forbidding the screenshot object to send the target screenshot to the receiving object.
Specifically, the confidential identification result is that confidential information is contained, and the permission control result is that control is needed, that is, the screenshot object is a target program, when the receiving object is a non-target program, the confidential information is protected, leakage of the confidential information is avoided, and the screenshot object is automatically prohibited from sending the target screenshot to the receiving object according to the control permission, so that the security of the confidential information is ensured.
The method comprises the steps of obtaining a target screenshot, acquiring a security identification result, and controlling the security identification result to be a target screenshot, wherein the security identification result comprises security information, the authority control result is required to be controlled, the security information in the security identification result is marked to obtain a marking result, the marking result is sent to a user, and a screenshot modification tool is provided, so that the user can cut the security information of the target screenshot by using the screenshot modification tool or perform mosaic processing and the like on the security information of the target screenshot to form a new target screenshot which does not comprise the security information, and the communication of the user is ensured.
S205: and if the secret identification result is that secret information is not contained or the authority control result is not required to be controlled, allowing the screenshot object to send the target screenshot to the receiving object.
In the embodiment, the target screenshot does not contain confidential information or the authority control result is not required to be controlled, so that the screenshot object is allowed to send the target screenshot to the receiving object, normal information communication of a user can be ensured, and intelligent management is realized.
The screenshot sending method provided by the embodiment obtains a screenshot sending request, wherein the screenshot sending request comprises a target screenshot and a receiving object, and the target screenshot corresponds to the screenshot object and the screenshot object, so that technical support is provided for realizing intelligent prohibition subsequently. And determining whether authority control is required or not according to the captured object and the received object, and acquiring an authority control result so as to ensure that the target screenshot which does not relate to the confidential information is normally sent, and the target screenshot which relates to the confidential information is intelligently forbidden, thereby effectively ensuring the security of the confidential information. And carrying out secret identification processing on the target screenshot to obtain a secret identification result, and providing basic support for subsequently controlling the target screenshot sent by the screenshot object to the receiving object. And if the confidential identification result contains confidential information and the authority control result is required to be controlled, the screenshot object is prohibited from sending the target screenshot to the receiving object, so that the security of the confidential information is ensured. If the confidential identification result does not contain confidential information or the authority control result does not need to be controlled, the screenshot object is allowed to send the target screenshot to the receiving object, normal information communication of the user can be ensured, and intelligent management is achieved.
In an embodiment, as shown in fig. 3, step S201, namely acquiring a target screenshot, includes:
s301: and acquiring a screenshot operation instruction.
The screenshot operation instruction is an instruction for intercepting a target screenshot.
S302: and calling a screenshot function to perform screenshot on the screenshot object based on the screenshot operation instruction to obtain a target screenshot.
Specifically, a user clicks a screenshot tool of a screenshot object to generate a screenshot operation instruction and sends the screenshot operation instruction to a server, the server receives the screenshot operation instruction, the screenshot object in the screenshot operation instruction keeps a static picture, the screenshot object calls a screenshot function to screenshot the screenshot object, the user selects a screenshot area according to the user and quickly obtains a target screenshot, the target screenshot corresponds to the screenshot object and the screenshot object, and when the screenshot object is a target program and the receiving object is a non-target program, technical support is provided for controlling the screenshot object to send a target screenshot.
The screenshot sending method provided by the embodiment obtains a screenshot operation instruction, wherein the screenshot operation instruction comprises a screenshot object identifier and a screenshot object identifier, obtains a target screenshot obtained by the screenshot object for screenshot on the screenshot object based on the screenshot operation instruction, quickly obtains the target screenshot, and provides technical support for control of sending the target screenshot to the screenshot object when the screenshot object is a target program and the receiving object is a non-target program.
In an embodiment, as shown in fig. 4, step 302, that is, invoking a screenshot function to perform screenshot on the screenshot object, so as to obtain a target screenshot, includes:
s401: judging whether the screenshot function is in a running state;
s402: and if the screenshot function is in the running state, calling the screenshot function to obtain the target screenshot.
In the embodiment, whether the screenshot function is in the running state or not is judged, so that corresponding operation is performed according to the judgment result, threads are reasonably distributed, and the thread utilization rate is improved. When the screenshot function is in the running state, the screenshot function is called to obtain the target screenshot, so that the target screenshot obtaining mode is timely and accurate, and long-time waiting for obtaining the target screenshot is avoided.
The screenshot sending method provided by the embodiment judges whether the screenshot function is in the running state, and if the screenshot function is in the running state, the screenshot function is called to obtain the target screenshot, so that threads are reasonably distributed, and the thread utilization rate is improved. And if the screenshot function corresponding to the screenshot operation instruction is in the running state, acquiring the target screenshot, wherein the target screenshot is acquired more timely and accurately, and the target screenshot is prevented from being acquired after long-time waiting.
In an embodiment, as shown in fig. 5, step S203, performing secure identification processing on the target screenshot to obtain a secure identification result, includes:
s501: and carrying out image-text conversion on the target screenshot to obtain screenshot text information.
And the screenshot text information is character information corresponding to the target screenshot.
Specifically, the image-text conversion of the target screenshot comprises graying processing, color clustering, image layer dividing processing, pooling operation, image layer superposition and communication operation so as to improve the accuracy of character recognition of the character recognition model, obtain a single line of characters, cutting the single line of characters, and inputting the single character obtained by cutting into the character recognition model to obtain screenshot text information. The character recognition model is a model for recognizing characters, for example, the character recognition model may be a convolutional neural network model or the like, and the convolutional neural network model constructs a character recognition model of a single character through a multilayer convolutional neural network. In the embodiment, the image-text conversion is carried out on the target screenshot so as to automatically obtain screenshot text information, so that the recognition efficiency and the recognition accuracy are improved, and the normal communication is ensured.
S502: and detecting the screenshot text information by adopting a secret detection algorithm to obtain a secret identification result.
The secret detection algorithm is used for detecting the screenshot text information so as to determine whether the screenshot text information contains secret information or not, so that a secret identification result can be quickly obtained, and technical support is provided for subsequent automatic prohibition of target screenshot. For example, the privacy detection algorithm may determine whether XX or YY is included, etc.
In this embodiment, a secret detection algorithm is adopted to detect the screenshot text information, which specifically includes: storing security words or security text segments in advance, traversing the screenshot text information according to a preset traversal sequence to judge whether the screenshot text information comprises the security words or the security text segments, and if the screenshot text information comprises the security words or the security text segments, determining that the security identification result is the security information; if the screenshot text information does not comprise the confidential characters or confidential text segments, the confidential identification result is that the confidential information is not contained, the confidential identification result is quickly obtained, and technical support is provided for subsequent automatic prohibition of the target screenshot. The traversal order may be from the beginning to the end of the screenshot text information or from the end to the beginning of the screenshot text information, which is not limited herein.
The screenshot sending method provided by the embodiment performs image-text conversion on the target screenshot to obtain the screenshot text information, so that the screenshot text information can be automatically obtained, the recognition efficiency and the recognition accuracy are improved, and the normal communication is ensured. And detecting the screenshot text information by adopting a secret detection algorithm to obtain a secret identification result, and providing technical support for subsequent automatic prohibition of the target screenshot.
In an embodiment, as shown in fig. 6, step S501, performing image-text conversion on the target screenshot, and acquiring screenshot text information includes:
s601: carrying out graying processing on the target screenshot to obtain a grayed image;
s602: clustering and layering the colors of the gray images to obtain at least one gray image layer;
s603: superposing the gray layer to obtain an initial characteristic map;
s604: communicating the characters in the transverse direction of the initial characteristic diagram to obtain a single row of characters;
s605: and identifying the single-line characters to obtain screenshot text information.
Specifically, the target screenshot is subjected to graying processing to obtain a grayed image corresponding to the target screenshot, and since the grayscale image has a grayscale range of [0,255], binary processing is often performed on the grayed image in a traditional algorithm, which easily causes information loss of the grayed image and is not beneficial to subsequent character recognition; determining at least one color distribution maximum value according to the color clustering result, performing image-layer division processing on the gray-scale image according to the number of the color distribution maximum values to obtain a gray-scale image layer, for example, if the number of the color distribution maximum values is 2, dividing the gray-scale image into 2 gray-scale image layers, performing pooling operation on each gray-scale image layer to obtain a character feature layer corresponding to each feature image, and removing noise of each gray-scale image layer; superposing all character feature layers to obtain an initial feature map so as to ensure that the character pattern can be better identified by a computer; selecting a component or a character of an initial characteristic diagram as a connected region, connecting the connected region with another connected region which is closest to the connected region in the transverse direction to form a new connected region, repeatedly communicating two adjacent connected regions in the transverse direction to obtain a character region on a single line of characters, connecting the two adjacent connected regions in the transverse direction to accurately determine the region of the single line of characters, providing technical support for subsequent character cutting, cutting the single line of characters to obtain a single character, then identifying the character by adopting a character identification model, and taking the character of a target screenshot as an identification result.
The screenshot sending method provided by the embodiment performs graying processing on the target screenshot to obtain a grayed image. And clustering and layering the colors of the gray images to obtain at least one gray image layer, thereby reducing color distribution, effectively reducing noise and ensuring better subsequent identification effect. And performing superposition processing on the gray layer to obtain an initial feature map so as to ensure that the font can be better recognized by a computer. And communicating the characters in the transverse direction of the initial characteristic diagram to obtain a single line of characters so as to accurately determine a character area and provide technical support for subsequent character cutting. And identifying the single-line characters to obtain a confidential identification result so as to correspondingly process the target screenshot sent by the execution main body corresponding to the screenshot object according to the screenshot text information, thereby realizing the consideration of office efficiency and flexible communication and protecting confidential information.
In an embodiment, after step S204, that is, after the screenshot object is prohibited from sending the target screenshot to the receiving object if the security identification result is that the security information is included and the permission control result is that the control is required, the screenshot sending method further includes: and when the screenshot object is detected to execute the log-out instruction, clearing the target screenshot intercepted by the screenshot object.
In the embodiment, the execution main body corresponding to the screenshot object is monitored by the monitor so as to know the operation condition of the execution main body corresponding to the screenshot object, corresponding measures are taken in real time so as to protect the confidential information to the maximum extent, and when the screenshot object is detected to execute the log-out instruction, the target screenshot intercepted by the screenshot object is cleared, so that the confidential information can be protected, the occupied space can be released, and the storage load can be effectively reduced.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
In an embodiment, a screenshot sending device is provided, and the screenshot sending device corresponds to the screenshot sending method in the embodiment one to one. As shown in fig. 7, the screenshot sending apparatus includes a target screenshot obtaining module 701, a permission control result obtaining module 702, a confidential identification result obtaining module 703, a target screenshot controlling module 704, and a target screenshot sending module 705. The functional modules are explained in detail as follows:
a target screenshot obtaining module 701, configured to obtain a target screenshot and a receiving object, where the target screenshot corresponds to a screenshot object and a screenshot object;
an authority control result obtaining module 702, configured to determine whether authority control needs to be performed according to the captured object and the received object, and obtain an authority control result;
a secret identification result obtaining module 703, configured to perform secret identification processing on the target screenshot to obtain a secret identification result;
a target screenshot control module 704, configured to prohibit the screenshot object from sending the target screenshot to the receiving object if the security identification result is that the target screenshot contains the security information and the permission control result is that the target screenshot needs to be controlled;
and a target screenshot sending module 705, configured to allow the screenshot object to send the target screenshot to the receiving object if the security identification result does not include the security information or the permission control result does not need to be controlled.
In an embodiment, the target screenshot obtaining module 701 includes: screenshot operation instruction acquisition unit and target screenshot acquisition unit
The screenshot operation instruction acquisition unit is used for acquiring a screenshot operation instruction;
and the target screenshot obtaining unit is used for calling a screenshot function to perform screenshot on the screenshot object based on the screenshot operation instruction to obtain the target screenshot.
In one embodiment, the target screenshot obtaining unit includes: the device comprises a judging unit and a target screenshot obtaining unit.
The judging unit is used for judging whether the screenshot function is in a running state;
and the screenshot function calling unit is used for calling the screenshot function to obtain the target screenshot if the screenshot function is in the running state.
In one embodiment, the secret identification result obtaining module 703 includes: the device comprises a screenshot text information acquisition unit and an identification unit.
The screenshot text information acquisition unit is used for carrying out image-text conversion on the target screenshot to acquire screenshot text information;
and the identification unit is used for identifying the screenshot text information by adopting a secret detection algorithm to obtain a secret identification result.
In one embodiment, the screenshot text information obtaining unit includes: the device comprises a graying processing subunit, a clustering and layering processing subunit, an overlapping processing subunit, a communicating subunit and an identification processing subunit.
The graying processing subunit is used for performing graying processing on the target screenshot to obtain a grayed image;
the clustering and layering processing subunit is used for clustering and layering the colors of the grayed images to obtain at least one grayscale layer;
the superposition processing subunit is used for carrying out superposition processing on the gray layer to obtain an initial characteristic map;
the communication subunit is used for communicating the characters in the transverse direction of the initial characteristic diagram to obtain a single row of characters;
and the identification processing subunit is used for identifying the single-line characters and acquiring a secret identification result.
In an embodiment, after the target screenshot controlling module 704, the screenshot sending apparatus further includes: and a clearing module.
And the clearing module is used for clearing the target screenshot intercepted by the execution main body corresponding to the screenshot object when the screenshot object executes the log-out instruction.
For specific limitations of the screenshot sending device, reference may be made to the above limitations on the screenshot sending method, which is not described herein again. All or part of the modules in the screenshot sending device can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a client, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the target screenshot. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a screenshot delivery method.
In an embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and when the processor executes the computer program, the steps of the screenshot sending method in the foregoing embodiment are implemented, for example, steps S201 to S206 shown in fig. 2 or steps shown in fig. 3 to fig. 6, which are not described again to avoid repetition. Alternatively, when the processor executes the computer program, the functions of each module/unit in the screenshot sending apparatus embodiment, for example, the functions of the target screenshot obtaining module 701, the permission control result obtaining module 702, the security identification result obtaining module 703, the target screenshot controlling module 704, and the target screenshot sending module 705 shown in fig. 7, are not described herein again to avoid repetition.
In an embodiment, a computer-readable storage medium is provided, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the screenshot sending method in the foregoing embodiment, for example, steps S201 to S206 shown in fig. 2 or steps shown in fig. 3 to fig. 6, which are not described herein again to avoid repetition. Alternatively, when the processor executes the computer program, the functions of each module/unit in the screenshot sending apparatus embodiment, for example, the functions of the target screenshot obtaining module 701, the permission control result obtaining module 702, the security identification result obtaining module 703, the target screenshot controlling module 704, and the target screenshot sending module 705 shown in fig. 7, are not described herein again to avoid repetition.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A screenshot sending method is characterized by comprising the following steps:
acquiring a target screenshot and a receiving object, wherein the target screenshot corresponds to a screenshot object and a screenshot object;
determining whether authority control is needed or not according to the screenshot object and the receiving object, and acquiring an authority control result;
carrying out secret identification processing on the target screenshot to obtain a secret identification result;
if the secret identification result contains secret information and the authority control result is required to be controlled, the screenshot object is forbidden to send the target screenshot to the receiving object;
and if the secret identification result does not contain secret information or the authority control result does not need to be controlled, allowing the screenshot object to send the target screenshot to the receiving object.
2. The screenshot sending method of claim 1, wherein said obtaining a target screenshot comprises:
acquiring a screenshot operation instruction;
and calling a screenshot function to screenshot the screenshot object based on the screenshot operation instruction to obtain a target screenshot.
3. The screenshot sending method of claim 2, wherein the calling a screenshot function to screenshot the screenshot object to obtain a target screenshot comprises:
judging whether the screenshot function is in a running state or not;
and if the screenshot function is in the running state, calling the screenshot function to obtain the target screenshot.
4. The screenshot sending method of claim 1, wherein performing secret recognition processing on the target screenshot to obtain a secret recognition result comprises:
performing image-text conversion on the target screenshot to obtain screenshot text information;
and detecting the screenshot text information by adopting a secret detection algorithm to obtain a secret identification result.
5. The screenshot sending method of claim 4, wherein said converting the target screenshot to obtain screenshot text information comprises:
carrying out graying processing on the target screenshot to obtain a grayed image;
clustering and layering the colors of the grayed images to obtain at least one grayscale layer;
performing superposition processing on the gray layer to obtain an initial characteristic map;
communicating the characters in the transverse direction of the initial characteristic diagram to obtain a single row of characters;
and identifying the single-line characters to obtain screenshot text information.
6. The screenshot sending method of claim 1, wherein after the screenshot object is prohibited from sending the target screenshot to the receiving object if the security identification result is that the security identification result contains security information and the permission control result is that the control is required, the screenshot sending method further comprises: and when the screenshot object is detected to execute a log-out instruction, clearing the target screenshot intercepted by the screenshot object.
7. A screen shot transmitting apparatus, comprising:
the target screenshot obtaining module is used for obtaining a target screenshot and a receiving object, and the target screenshot corresponds to the screenshot object and the screenshot object;
the permission control result acquisition module is used for determining whether permission control is required or not according to the screenshot object and the receiving object and acquiring a permission control result;
the secret identification result acquisition module is used for carrying out secret identification processing on the target screenshot to acquire a secret identification result;
the target screenshot control module is used for forbidding the screenshot object to send the target screenshot to the receiving object if the confidential identification result contains confidential information and the authority control result is required to be controlled;
and the target screenshot sending module is used for allowing the screenshot object to send the target screenshot to the receiving object if the confidential identification result does not contain confidential information or the permission control result does not need to be controlled.
8. The screenshot sending apparatus of claim 7, wherein the target screenshot capture module comprises:
the screenshot operation instruction acquisition unit is used for acquiring a screenshot operation instruction;
and the target screenshot obtaining unit is used for calling a screenshot function to perform screenshot on the screenshot object based on the screenshot operation instruction to obtain the target screenshot.
9. Computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the screenshot sending method according to any of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the steps of the screenshot sending method according to any one of claims 1 to 6.
CN202011279576.8A 2020-11-16 2020-11-16 Screenshot sending method and device, computer equipment and storage medium Pending CN112491835A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011279576.8A CN112491835A (en) 2020-11-16 2020-11-16 Screenshot sending method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011279576.8A CN112491835A (en) 2020-11-16 2020-11-16 Screenshot sending method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112491835A true CN112491835A (en) 2021-03-12

Family

ID=74931157

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011279576.8A Pending CN112491835A (en) 2020-11-16 2020-11-16 Screenshot sending method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112491835A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115033918A (en) * 2022-06-09 2022-09-09 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
US20180176251A1 (en) * 2016-12-15 2018-06-21 Interwise Ltd. Deception using screen capture
CN109739610A (en) * 2019-01-04 2019-05-10 浪潮商用机器有限公司 Screenshotss control method, device, electronic equipment and computer readable storage medium
CN110363020A (en) * 2019-06-12 2019-10-22 平安科技(深圳)有限公司 Screenshotss monitoring method, device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429745B1 (en) * 2011-09-23 2013-04-23 Symantec Corporation Systems and methods for data loss prevention on mobile computing systems
US20180176251A1 (en) * 2016-12-15 2018-06-21 Interwise Ltd. Deception using screen capture
CN109739610A (en) * 2019-01-04 2019-05-10 浪潮商用机器有限公司 Screenshotss control method, device, electronic equipment and computer readable storage medium
CN110363020A (en) * 2019-06-12 2019-10-22 平安科技(深圳)有限公司 Screenshotss monitoring method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
萨姆大叔: "OCR技术浅探", pages 1 - 3, Retrieved from the Internet <URL:https://www.cnblogs.com/sumuncle/p/6369281.html> *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115033918A (en) * 2022-06-09 2022-09-09 易顺云(深圳)科技有限公司 Enterprise integrated information management method and system

Similar Documents

Publication Publication Date Title
CN110363020B (en) Screen capturing monitoring method, device, computer equipment and storage medium
CN109067780B (en) Crawler user detection method and device, computer equipment and storage medium
CN110650142B (en) Access request processing method, device, system, storage medium and computer equipment
CN108449237B (en) Network performance monitoring method and device, computer equipment and storage medium
CN110868500B (en) Call communication method, device, computer equipment and storage medium
CN110837956A (en) Underground cable inspection task distribution method and device
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN112491835A (en) Screenshot sending method and device, computer equipment and storage medium
US20220232004A1 (en) Virtual session access management
CN110334702B (en) Data transmission method and device based on configuration platform and computer equipment
WO2021003916A1 (en) Dynamic verification method and apparatus, and computer device and storage medium
CN110895844A (en) Interaction method and device of intelligent door equipment, computer equipment and storage medium
CN107911388B (en) Method and system for supervising mobile terminal application
CN112966094A (en) Transaction data processing method, device and system
CN112333263A (en) Screen capture processing method and device based on hypertext transfer protocol and storage medium
CN106506650A (en) Interface adaptation method, interface adaptive device and server
CN112348462A (en) Process processing method, apparatus, computer device, and storage medium
CN111008377A (en) Account monitoring method and device, computer equipment and storage medium
CN106332011B (en) Short message encryption communication method and terminal
CN115798146A (en) Drowning prevention early warning method and device, computer equipment and storage medium
CN106022105B (en) A kind of command processing method and device
CN114244566A (en) Illegal external connection detection method and device based on IP address and computer equipment
CN114268542A (en) Network card information modification method and device, storage medium and computer equipment
CN106022122B (en) Information processing method and device
CN111294336B (en) Login behavior detection method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination