CN112800396B - Page watermark generation method, device, equipment, storage medium and program product - Google Patents

Page watermark generation method, device, equipment, storage medium and program product Download PDF

Info

Publication number
CN112800396B
CN112800396B CN202110172297.XA CN202110172297A CN112800396B CN 112800396 B CN112800396 B CN 112800396B CN 202110172297 A CN202110172297 A CN 202110172297A CN 112800396 B CN112800396 B CN 112800396B
Authority
CN
China
Prior art keywords
information
watermark pattern
page
watermark
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110172297.XA
Other languages
Chinese (zh)
Other versions
CN112800396A (en
Inventor
余文诗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202110172297.XA priority Critical patent/CN112800396B/en
Publication of CN112800396A publication Critical patent/CN112800396A/en
Application granted granted Critical
Publication of CN112800396B publication Critical patent/CN112800396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0062Embedding of the watermark in text images, e.g. watermarking text documents using letter skew, letter distance or row distance

Abstract

The disclosure discloses a page watermark generation method, a device, equipment, a storage medium and a program product, which relate to the technical field of cloud computing and further relate to the technical field of platform application. The specific implementation scheme is as follows: obtaining a watermark pattern; and adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed. The method and the device can improve the page protection effect of the watermark pattern.

Description

Page watermark generation method, device, equipment, storage medium and program product
Technical Field
The disclosure relates to the technical field of cloud computing, and further relates to the technical field of platform application.
Background
Watermarking is a currently popular information security management technique, for example: evidence of malicious forgery by others can be prevented by watermarking, or information leakage and the like can be prevented. At present, watermarking mainly directly covers watermark patterns on a page so as to generate watermarks on the page.
Disclosure of Invention
The present disclosure provides a page watermark generation method, apparatus, device, storage medium, and program product.
According to an aspect of the present disclosure, there is provided a page watermark generation method, including:
obtaining a watermark pattern;
and adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed.
According to another aspect of the present disclosure, there is provided a page watermark generation apparatus, including:
the acquisition module acquires the watermark pattern;
a first adding module, configured to add the watermark pattern to a page, where target information of the watermark pattern in the page changes dynamically
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the page watermark generation method provided by the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the page watermark generation method provided by the present disclosure.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the page watermark generation method provided by the present disclosure.
In the method, the watermark pattern is added in the page, and the target information of the watermark pattern in the page is dynamically changed, so that the protection effect of the watermark pattern on the page can be improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a flowchart of a page watermark generation method provided in the present disclosure;
FIG. 2 is a flow chart of another page watermark generation method provided by the present disclosure;
FIG. 3 is an exemplary schematic diagram of page watermark generation provided by the present disclosure;
FIG. 4 is another exemplary schematic diagram of page watermark generation provided by the present disclosure;
fig. 5 is a block diagram of a page watermark generating apparatus provided in the present disclosure;
fig. 6 is a block diagram of another page watermark generation apparatus provided by the present disclosure;
fig. 7 is a block diagram of another page watermark generation apparatus provided by the present disclosure;
fig. 8 is a block diagram of an electronic device for implementing a resume matching method of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Referring to fig. 1, fig. 1 is a flowchart of a page watermark generation method provided in the present disclosure, as shown in fig. 1, including the following steps:
step S101, obtaining a watermark pattern.
The watermark pattern may be preconfigured or generated based on a watermark template.
Step S102, adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed.
The page may be a chat window page of chat software, or the page may be a page of office software, or the page may be a web page, or the like. For example: the page may be an h5 page.
The adding of the watermark pattern to the page may be adding a background image to the page, the background image including one or more of the watermark patterns.
The target information may be hidden or displayable information carried by the watermark pattern, or the target information may be position information or layer information of the watermark pattern in the page.
In the method, the watermark pattern can be added into the page through the steps, and the target information of the watermark pattern in the page is dynamically changed, so that the protection effect of the watermark pattern on the page can be improved.
It should be noted that, the above page watermark generation method may be executed by an electronic device, for example: is executed by electronic equipment such as a server, a computer, a mobile phone and the like.
Referring to fig. 2, fig. 2 is a flowchart of another page watermark generation method provided in the present disclosure, as shown in fig. 2, including the following steps:
step 201, watermark template information is obtained, wherein the watermark template information comprises: layer information and layer relationship information.
The watermark template information may be obtained from a database. The layer information may include coordinate information of each layer, width and height of the layer, and image of the layer. The layer relation information may be layer relation information between layers. A set of reusable templates can be formed through the layer information and the layer relation information, and customization requirements of different enterprises can be met.
Furthermore, the watermark template information can be provided by a corresponding enterprise, so that the watermark can be customized and generated for the enterprise to meet the customization requirement of the enterprise. For example: the method can provide a visual interface for enterprises, the corresponding enterprises can freely drag the provided patterns on the interface, and the blank text boxes can be used for representing the dynamically changed text information, so that the dynamically changed information and the statically unchanged patterns can be obtained to form the watermark template information together. Further, the water stamp template information in the present disclosure may be stored to the database in json format.
Step S202, generating watermark patterns according to the layer information and the layer relation information.
The generating the watermark pattern according to the layer information and the layer relation information may be drawing according to the layer information and the layer relation information, so as to obtain the watermark pattern. For example: drawing the layer information and the layer relation information by using a drawing tool (such as headlesschrome+canvas) to obtain the watermark pattern.
Further, the watermark template information provided in the present disclosure may include dynamically populated fields that may be used to generate different watermark patterns from different accounts, such as: a business includes a plurality of accounts, so that different watermark patterns can be generated for different accounts, for example, the watermark image includes corresponding account information, and the account information can include information such as names or data of the accounts. In addition, this information is always displayed in the watermark pattern, i.e. the plaintext information of the watermark. The watermark pattern may also include date information.
In the method, the watermark pattern is generated according to the layer information and the layer relation information, so that the customization of the watermark image can be realized.
Step S203, adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page changes dynamically.
As an alternative embodiment, the target information includes at least one of:
encrypting information;
the position of the document object model (Document Object Model, DOM) tree at the page.
The encryption information may be a cryptographic stamp encrypted by an online encryption algorithm, for example: and (5) using the encrypted password stamp of md 5.
In the embodiment, the encryption information of the watermark pattern in the page can be dynamically changed, so that the protection effect of the watermark image can be further improved.
Optionally, the encryption information includes: encrypting the dynamically changed hash (hash) value and the account information to obtain encryption information.
The dynamically changing hash value may be a periodically changing hash value, for example: hash value dynamically changed daily. The dynamic change may be a dynamic change of the encrypted information by a server, for example: the server dynamically updates the hash value strings corresponding to the watermark patterns every day.
The account information may be account information corresponding to the page.
In this embodiment, since the encryption information includes encryption information for encrypting the dynamically changing hash value and account information, the anti-counterfeit function of the watermark pattern can be further improved. For example: if target content suspected to be counterfeit (for example, a screenshot record of the counterfeit content) appears later, whether the target content is the encrypted information of the time corresponding to the counterfeit content or not can be judged through the encrypted information corresponding to the target content, so as to determine whether the target content is counterfeit or not. Because the above-mentioned secret information is dynamically changed, the counterfeiter does not know the dynamically changed hash value corresponding to each time. For example: in the case that the watermark pattern includes date information, the hash value corresponding to the date can be determined directly according to the date on the watermark pattern on the target content suspected to be counterfeit, and then the encrypted information obtained by encrypting the date hash value and the account information is compared with the watermark pattern bottom password stamp of the target content, so that whether the target content is counterfeit can be accurately determined.
The position of the DOM tree in the page can be that the watermark pattern is added in the page by adopting a dynamic DOM rendering mode when the watermark pattern is added, and the position of the watermark pattern in the DOM tree is dynamically changed. For example: binding the background image comprising the watermark pattern to div with dynamically changed position on the DOM tree of the page, wherein div is a page element in the page.
In this embodiment, since the position of the watermark pattern in the DOM tree of the page is dynamically changed, the position of the watermark pattern in the DOM tree cannot be tracked, and thus the watermark pattern cannot be deleted, so as to further improve the protection effect and tracking effect of the watermark image on the page.
Optionally, before the watermark pattern is added to the page, the method further includes:
and adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
The encryption information may be added to the bottom or bottom layer of the watermark pattern when the watermark pattern is in a hidden state.
In this embodiment, the above encryption information may be added to the watermark pattern before the watermark pattern is added to the page, and since the encryption information is in a hidden state in the watermark pattern, the protection effect of the watermark pattern on the page is further improved.
In this embodiment, after the watermark pattern is added to the page, the encryption information in the watermark pattern in the page may be dynamically updated.
The present disclosure is not limited to adding encryption information in the watermark pattern before adding the watermark pattern in the page, for example: it is also possible to add dynamically changing encryption information to the watermark pattern after adding the watermark pattern to the page.
Optionally, the encryption information of the watermark pattern at the first time includes: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
The first time and the second time may be two adjacent time intervals, for example: two adjacent days, two adjacent hours, two adjacent weeks, etc.
The association of the first hash value with the first time may be a hash value determined for the first time, such as a hash value determined for the first time in advance or temporarily. Further, in some embodiments, the first hash value may be randomly generated for the first time, or may be a hash value having a predetermined relationship with the first time, such as a hash value having a predetermined functional relationship with the first time, generated according to the first time.
The second hash value is a hash value that is different from the first hash value and that is associated with the second time. The second hash value may be a hash value determined in advance or temporarily for the second time. Further, in some embodiments, the second hash value may be randomly generated for the second time, or may be a hash value that has a predetermined relationship with the second time, such as a hash value that has a predetermined functional relationship with the second time, according to the second time.
Further, the first hash value and the second hash value may be two different hash values selected from a pre-configured set of hash values.
In this embodiment, since the first hash value is associated with the first time and the second hash value is associated with the second time, it is possible to dynamically change the encryption information of the watermark pattern according to time, thereby further improving the protection effect of the watermark pattern.
It should be noted that, the first time and the second time may represent any two different times in practical applications. In addition, the present disclosure is not limited to, and the target information is changed according to time, for example: the target information can be dynamically changed according to the geographic position of the electronic equipment applying the page, so that the protection effect of the watermark pattern can be further improved.
Optionally, the adding the watermark pattern in the page includes:
the watermark pattern is added to a DOM tree of the page, and the position of the watermark pattern in a target level of the DOM tree dynamically changes.
For example: the adding of the watermark pattern to the DOM tree of the page may be by rendering the DOM. For example: binding the background image comprising the watermark pattern on div with dynamically changing position on the DOM tree of the page. The div may be a div of a next-level rendering of a body layer of the page, the div being an element of watermark pattern binding, the div insertion location being random. The body layer is the main body of the page.
The target level may be a predefined level, which is not limited in particular, for example: different levels may be defined according to actual requirements. The dynamic change of the position of the watermark pattern in the target level of the DOM tree may be to destroy the watermark pattern at regular time, and then reconstruct the watermark pattern at other positions of the target level of the DOM tree, so as to ensure the untraceability of the watermark pattern, so that the developer cannot trace the position of the watermark pattern in the DOM tree in the debugger, and thus cannot delete the watermark pattern.
In the embodiment, the position of the watermark pattern in the target level of the DOM tree is dynamically changed, so that the protection effect of the watermark pattern on the page is improved.
Optionally, at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
The third time and the fourth time may be two adjacent time intervals, for example: two adjacent days, two adjacent hours, two adjacent weeks, or the like, and the third time may be the same time as the first time or the second time, and the fourth time may be the same time as the second time or the first time. That is, the positions of the above-described cryptographic information and watermark patterns on the DOM tree may vary simultaneously, and in some embodiments may also vary at different times.
The association of the first position with the third time may be a position in the DOM tree determined for the third time, such as a position in the DOM tree determined in advance or temporarily for the third time. Further, in some embodiments, the first location may be determined randomly for the third time, or may be a location that has a preset relationship with the third time, such as a location that has a preset functional relationship with the third time, generated according to the third time.
The second position is a position different from the first position and associated with the fourth time. The second position may be a position in the DOM tree determined in advance or temporarily for the fourth time. Further, in some embodiments, the second position may be determined randomly for the fourth time, or may be a position having a predetermined relationship with the fourth time, such as a position having a predetermined functional relationship with the fourth time, generated according to the fourth time.
Further, the first position and the second position value may be two different positions selected from a preconfigured set of positions.
In this embodiment, since the first position is associated with the third time and the second position is associated with the fourth time, it is possible to achieve that the position of the watermark pattern on the DOM tree is dynamically changed according to time, thereby further improving the protection effect of the watermark pattern.
It should be noted that, in the present disclosure, the dynamic change of the position of the watermark pattern in the target level of the DOM tree is not limited, for example: in some application scenarios, the watermark pattern may also be dynamically changed between different levels of the DOM tree.
The page watermark generation method provided by the present disclosure is illustrated by two alternative embodiments:
as an alternative embodiment, as shown in fig. 3, the method comprises the following steps:
step S301, generating a first layer according to a watermark base map;
step S302, judging whether the dynamic change information needs to be added;
step S303, under the condition that dynamic change information needs to be added, a dynamic text is newly built to generate a second layer;
step S304, the hash (hash) value generated randomly by the second layer binding is used as the key value of the layer.
Step S305, pattern arrangement is carried out on the generated layers.
Wherein, in the case of generating the second layer, the second layer is patterned according to the key value.
Step S306, judging whether to generate encryption information.
In step S307, when it is determined that the encryption information is generated, the encryption information is created.
And the arrangement of the encryption information may be performed in step S305 described above. The encrypted information is displayed hidden in the watermark template.
Step S308, generating a watermark pattern.
As an alternative embodiment, as shown in fig. 4, the watermark generation process involves a template layer, a generation layer and a rendering layer, and specifically includes the following steps:
step S401, watermark template information is obtained from a template library.
And step S402, drawing watermark patterns according to the watermark template information.
Step S403, judging whether the watermark pattern is successfully generated.
Step S404, the current watermark pattern is cached in a database.
Step S405, generating a DOM tree with watermark image position dynamically changed.
Step S406, page rendering is performed to generate a page with the watermark pattern added.
It should be noted that the various implementations provided in this embodiment may be applied to the embodiment shown in fig. 1.
Referring to fig. 5, fig. 5 is a page watermark generating apparatus provided in the present disclosure, and as shown in fig. 5, a page watermark generating apparatus 500 includes:
an acquisition module 501, which acquires a watermark pattern;
a first adding module 502, configured to add the watermark pattern to a page, where target information of the watermark pattern in the page changes dynamically.
Optionally, the target information includes at least one of:
encrypting information;
the position of the document object model DOM tree at the page.
Optionally, as shown in fig. 6, the apparatus further includes:
a second adding module 503, configured to add the encrypted information to the watermark pattern, where the encrypted information is in a hidden state in the watermark pattern.
Optionally, the encryption information of the watermark pattern at the first time includes: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
Optionally, the encryption information includes: encrypting the dynamically changed hash (hash) value and the account information to obtain encryption information.
Optionally, the first adding module is configured to add the watermark pattern to a DOM tree of the page, and a position of the watermark pattern in a target level of the DOM tree dynamically changes.
Optionally, at a third time, a first position of the watermark pattern in a target level of the DOM tree;
a second position of the watermark pattern in the target hierarchy of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
Optionally, as shown in fig. 7, the obtaining module 501 includes:
an obtaining unit 5011, configured to obtain watermark template information, where the watermark template information includes: layer information and layer relationship information;
a generating unit 5012, configured to generate a watermark pattern according to the layer information and the layer relationship information.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 8 illustrates a schematic block diagram of an example electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the apparatus 800 includes a computing unit 801 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 802 or a computer program loaded from a storage unit 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data required for the operation of the device 800 can also be stored. The computing unit 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to the bus 804.
Various components in device 800 are connected to I/O interface 805, including: an input unit 806 such as a keyboard, mouse, etc.; an output unit 807 such as various types of displays, speakers, and the like; a storage unit 808, such as a magnetic disk, optical disk, etc.; and a communication unit 809, such as a network card, modem, wireless communication transceiver, or the like. The communication unit 809 allows the device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 801 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 801 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 801 performs the respective methods and processes described above, for example, a page watermark generation method. For example, in some embodiments, the page watermark generation method may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 808. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 800 via ROM 802 and/or communication unit 809. When a computer program is loaded into RAM 803 and executed by computing unit 801, one or more steps of the page watermark generation method described above may be performed. Alternatively, in other embodiments, the computing unit 801 may be configured to perform the page watermark generation method in any other suitable way (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (12)

1. A method of generating a page watermark, comprising:
obtaining a watermark pattern;
adding the watermark pattern in a page, wherein target information of the watermark pattern in the page changes dynamically; the target information includes at least one of: encrypting information; the position of a Document Object Model (DOM) tree of the page;
the encryption information includes: encrypting the hash value and account information which are dynamically changed to obtain encryption information;
wherein the adding the watermark pattern in the page comprises:
the watermark pattern is added to a DOM tree of the page, and the position of the watermark pattern in a target level of the DOM tree dynamically changes.
2. The method of claim 1, the method further comprising, prior to adding the watermark pattern in a page:
and adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
3. The method of claim 1, wherein the encrypted information of the watermark pattern at a first time comprises: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
4. The method of claim 1, wherein at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
5. The method of claim 1, wherein the obtaining a watermark pattern comprises:
obtaining watermark template information, wherein the watermark template information comprises: layer information and layer relationship information;
and generating a watermark pattern according to the layer information and the layer relation information.
6. A page watermark generation apparatus comprising:
the acquisition module acquires the watermark pattern;
the first adding module is used for adding the watermark pattern in a page, wherein the target information of the watermark pattern in the page is dynamically changed; the target information includes at least one of: encrypting information; the position of a Document Object Model (DOM) tree of the page;
the encryption information includes: encrypting the hash value and account information which are dynamically changed to obtain encryption information;
the first adding module is used for adding the watermark pattern to the DOM tree of the page, and the position of the watermark pattern in the target level of the DOM tree is dynamically changed.
7. The apparatus of claim 6, the apparatus further comprising:
and the second adding module is used for adding the encryption information into the watermark pattern, wherein the encryption information is in a hidden state in the watermark pattern.
8. The apparatus of claim 6, wherein the encryption information of the watermark pattern at a first time comprises: encrypting the first hash value and the account information to obtain encryption information;
the encryption information of the watermark pattern at a second time includes: encrypting the second hash value and the account information to obtain encryption information;
wherein the first hash value is associated with the first time and the second hash value is associated with the second time.
9. The apparatus of claim 6, wherein at a third time the watermark pattern is at a first position in the target level of the DOM tree;
a second position of the watermark pattern in the target level of the DOM tree at a fourth time;
wherein the first location is associated with the third time and the second location is associated with the fourth time.
10. The apparatus of claim 6, wherein the acquisition module comprises:
the acquisition unit is used for acquiring watermark template information, and the watermark template information comprises: layer information and layer relationship information;
and the generating unit is used for generating the watermark pattern according to the layer information and the layer relation information.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-5.
CN202110172297.XA 2021-02-08 2021-02-08 Page watermark generation method, device, equipment, storage medium and program product Active CN112800396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110172297.XA CN112800396B (en) 2021-02-08 2021-02-08 Page watermark generation method, device, equipment, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110172297.XA CN112800396B (en) 2021-02-08 2021-02-08 Page watermark generation method, device, equipment, storage medium and program product

Publications (2)

Publication Number Publication Date
CN112800396A CN112800396A (en) 2021-05-14
CN112800396B true CN112800396B (en) 2023-10-27

Family

ID=75814915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110172297.XA Active CN112800396B (en) 2021-02-08 2021-02-08 Page watermark generation method, device, equipment, storage medium and program product

Country Status (1)

Country Link
CN (1) CN112800396B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
KR101303961B1 (en) * 2013-03-27 2013-09-05 주식회사 시큐에프엔 Method for providing digital signature on the basis of biometrics and method for verifying the digitally signed electronic document, and terminal, server, and computer-readable recording medium using the same
CN105117900A (en) * 2015-09-30 2015-12-02 北京恒华伟业科技股份有限公司 Progress information acquisition method and device, and terminal equipment
CN107508685A (en) * 2017-10-13 2017-12-22 吉林工程技术师范学院 The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment
WO2019037623A1 (en) * 2017-08-22 2019-02-28 阿里巴巴集团控股有限公司 Data processing method and device
CN110032839A (en) * 2019-04-04 2019-07-19 深圳大通实业股份有限公司 The digital media content infringement detection system of high security digital watermarking
CN110245469A (en) * 2019-06-24 2019-09-17 苏州睿威博科技有限公司 Watermark generation method, watermark analytic method, device and the storage medium of webpage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
KR101303961B1 (en) * 2013-03-27 2013-09-05 주식회사 시큐에프엔 Method for providing digital signature on the basis of biometrics and method for verifying the digitally signed electronic document, and terminal, server, and computer-readable recording medium using the same
CN105117900A (en) * 2015-09-30 2015-12-02 北京恒华伟业科技股份有限公司 Progress information acquisition method and device, and terminal equipment
WO2019037623A1 (en) * 2017-08-22 2019-02-28 阿里巴巴集团控股有限公司 Data processing method and device
CN107508685A (en) * 2017-10-13 2017-12-22 吉林工程技术师范学院 The implementation method of applying electronic Digital signature service system in a kind of cloud computing environment
CN110032839A (en) * 2019-04-04 2019-07-19 深圳大通实业股份有限公司 The digital media content infringement detection system of high security digital watermarking
CN110245469A (en) * 2019-06-24 2019-09-17 苏州睿威博科技有限公司 Watermark generation method, watermark analytic method, device and the storage medium of webpage

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于多态性时间戳水印的网络取证研究;温何雨;尹毅峰;樊鲲鹏;刘扬;;计算机与网络(第06期);全文 *
基于局部变化性的网页篡改识别模型及方法;魏文晗;邓一贵;;计算机应用(第02期);全文 *

Also Published As

Publication number Publication date
CN112800396A (en) 2021-05-14

Similar Documents

Publication Publication Date Title
CN109474662B (en) Product data publishing method and device, computer equipment and storage medium
CN111327607B (en) Security threat information management method, system, storage medium and terminal based on big data
CN105654355A (en) Invoice generation method and equipment
CN112508200B (en) Method, apparatus, device, medium, and program for processing machine learning model file
CN109447599A (en) Digital asset distributing method and system based on block chain
CN110706093A (en) Accounting processing method and device
CN115686499A (en) Method, device, storage medium and electronic equipment for generating request message
CN108733374A (en) Application program homepage development approach and terminal device
CN112800396B (en) Page watermark generation method, device, equipment, storage medium and program product
NO20023653D0 (en) Method, system and computer program for producing a description of an unregulated network and an encapsulated geometric description in a computer graphics system
CN113239256A (en) Method for generating website signature and method and device for identifying website
CN112541240A (en) Part drawing method, computer device and storage medium
JP2010096787A (en) Secret information dispersion device, secret information dispersion program, secret information dispersion method, secret information restoration device, secret information restoration program, secret information restoration method, and secret information dispersion/restoration system
CN115659935A (en) File generation method and device, storage medium and electronic equipment
US20190158697A1 (en) Enhancing graph visualization with supplemental data
CN115442164A (en) Multi-user log encryption and decryption method, device, equipment and storage medium
CN115471582A (en) Map generation method and device, computer equipment and storage medium
CN115563942A (en) Contract generation method and device, electronic equipment and computer readable medium
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN113569289A (en) Data desensitization method and device
CN113761576A (en) Privacy protection method and device, storage medium and electronic equipment
CN113268949A (en) Form display method and device based on dynamic field, computer equipment and medium
CN111444535A (en) Method, apparatus, and computer storage medium for generating aggregated data tags
CN116089363B (en) Data processing method, device, electronic equipment and storage medium
CN113590219B (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant