CN114363474A - Image transmission method and system - Google Patents

Image transmission method and system Download PDF

Info

Publication number
CN114363474A
CN114363474A CN202210262034.2A CN202210262034A CN114363474A CN 114363474 A CN114363474 A CN 114363474A CN 202210262034 A CN202210262034 A CN 202210262034A CN 114363474 A CN114363474 A CN 114363474A
Authority
CN
China
Prior art keywords
image
source data
image file
file
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210262034.2A
Other languages
Chinese (zh)
Inventor
曹端
陶巍
丁剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Linuowei Technology Co ltd
Original Assignee
Shenzhen Linuowei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Linuowei Technology Co ltd filed Critical Shenzhen Linuowei Technology Co ltd
Priority to CN202210262034.2A priority Critical patent/CN114363474A/en
Publication of CN114363474A publication Critical patent/CN114363474A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the related field of image file processing technology, and discloses an image transmission method and system, can realize the identification, identification and marking of image and character contents related to privacy security in the image file, therefore, the region tracing module and the information encryption module can trace the source of the source data code segment of the corresponding image character in the image file and extract, encrypt and replace the source data code segment independently, thereby playing the role of protecting the privacy of users in the image, having higher processing efficiency, compared with the privacy protection mode of manual examination and smearing in the prior art, the mode of tracing, encrypting and replacing and storing the key through the key output module has the characteristic of recovering the original image file, the encrypted and replaced image file can be restored when needed, the probability of losing the original image file can be greatly reduced, and the situation that the original image file needs to be used can be more conveniently coped with.

Description

Image transmission method and system
Technical Field
The invention relates to the field of image file processing technology, in particular to an image transmission method and an image transmission system.
Background
The video file is one of the electronic file types nowadays, and due to the special information carrying way in the image way, the video file often contains a great amount of other irrelevant information contents besides the information to be saved by the user, and the information contents which are ignored by the information sender and relate to the privacy of the user or others are inevitably existed in the information, and the information contents are not intended to be recorded by the information sender.
The image transmission mode in the prior art is only the establishment of a communication channel, namely, information content is received and sent, and the image transmission mode does not have an information auditing function, so that privacy information which is unintentionally stored in an image file by a user cannot be effectively protected and processed; in addition, in the prior art, the privacy processing mode of the image file is also performed in a manual auditing mode, most processing modes also have the characteristics of non-reversibility and the like, and if the privacy processing mode is used as the auditing mode in the image transmission process, the problems of wrong judgment and incapability of restoration exist.
Disclosure of Invention
The present invention is directed to a method and system for transmitting an image, so as to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an image transmission system comprises the following steps:
the image analysis module is used for acquiring the image file, performing content identification detection on the image file according to a preset safety detection library, and generating a safety mark for the image content conforming to the safety detection library;
the region tracing module is used for performing data tracing on the image file according to the security marker to generate marker source data information, wherein the marker source data information comprises source data and a source data position, and is respectively used for representing the content and the storage position of the image file corresponding to the security marker;
the information encryption module is used for generating a random key through a preset random encryption program, encrypting the source data according to the random key and generating a desensitized image file;
and the key output module is used for generating and storing file recovery data according to the source data position of the marked source data information and the corresponding random key, wherein the file recovery data is used for restoring the desensitized image file.
As a further scheme of the invention: the image analysis module includes:
the image acquisition unit is used for acquiring the image file;
the characteristic extraction unit is used for detecting and extracting image characteristics of the image file and generating an image characteristic log of the image file, the detection and extraction of the image characteristics are used for representing the characteristic analysis and extraction of image contents, and the image characteristic log is used for recording the image content characteristic analysis and extraction result;
the content scanning unit is used for carrying out content identification detection on the image characteristic log according to a preset safety detection library to generate a safety detection result;
and the content marking unit is used for judging the safety detection result, and if the safety detection result is in accordance with the safety detection result, generating a safety mark for the corresponding image feature.
As a further scheme of the invention: the region tracing module comprises:
the mark response unit is used for responding to the safety mark and acquiring the image characteristics corresponding to the safety mark through the image characteristic log;
the data tracing unit is used for acquiring the source data position of the image feature corresponding to the image file through the safety mark;
and the source tracing output unit is used for acquiring the source data according to the source data position and generating the marked source data information.
As a further scheme of the invention: the information encryption module includes:
a key generation unit for generating a random key by a random encryption program;
the data encryption unit is used for acquiring the source data in the marked source data information, encrypting the source data by using the random key and generating an encrypted data segment;
a data replacement unit, configured to obtain the source data position in the marked source data information, replace the source data at the source data position in the image file with the encrypted data segment, and generate a desensitized image file;
and the encryption log unit is used for generating a file encryption log according to the marking source data information and the random key.
As a further scheme of the invention: the random key output module includes:
the log response unit is used for responding to the file encryption log, generating file recovery data according to the file encryption log and storing the file recovery data;
and the restoration output unit is used for correspondingly outputting the desensitized image file and the file restoration data.
The embodiment of the invention aims to provide an image transmission method, which comprises the following steps:
acquiring the image file, performing content identification detection on the image file according to a preset safety detection library, and generating a safety mark for the image content conforming to the safety detection library;
performing data tracing on the image file according to the security marker to obtain marker source data information, wherein the marker source data information comprises source data and source data positions, and is respectively used for representing the content and the storage position of the image file corresponding to the security marker;
generating a random key through a preset random encryption program, and encrypting the source data according to the random key to generate a desensitized image file;
and generating and storing file recovery data according to the source data position of the marked source data information and the corresponding random key, wherein the file recovery data is used for restoring the desensitized image file.
As a further scheme of the invention: the steps of acquiring the image file, performing content identification detection on the image file according to a preset security detection library, and generating a security mark for the image content conforming to the security detection library specifically include:
acquiring the image file;
detecting and extracting image features of the image file to generate an image feature log of the image file, wherein the image feature detection and extraction is used for characterizing feature analysis and extraction of image contents, and the image feature log is used for recording image content feature analysis and extraction results;
performing content identification detection on the image characteristic log according to a preset safety detection library to generate a safety detection result;
and judging the safety detection result, and if the safety detection result is in accordance, generating a safety mark for the corresponding image feature.
As a further scheme of the invention: the step of tracing the data of the image file according to the security mark and acquiring the mark source data information specifically comprises:
responding to the safety mark, and acquiring the image characteristics corresponding to the safety mark through the image characteristic log;
acquiring the source data position of the image feature corresponding to the image file through the safety mark;
and acquiring source data according to the source data position and generating mark source data information.
Compared with the prior art, the invention has the beneficial effects that: through the setting of image analysis module, can realize to relate to the image literal content etc. of privacy security in the image file and discern and mark, thereby regional module of tracing to the source and the information encryption module can trace to the source and draw the encryption replacement alone to the source data code segment of corresponding image literal in the image file, play the effect of protecting user's privacy in the image, the treatment effeciency is higher, compare with the privacy protection mode that adopts artifical audit to scribble among the prior art, the mode of tracing to the source encryption replacement and carrying out the key preservation through key output module has the recoverable characteristic of former image file, can carry out the recovery to the image file after the encryption replacement when needs, can greatly reduced the probability that former image file loses, the condition that needs to use former image file of reply that can be more convenient.
Drawings
Fig. 1 is a block diagram of the components of an image transmission system.
Fig. 2 is a block diagram of the components of an image analysis module in an image transmission system.
Fig. 3 is a block diagram of the components of a region tracing module in an image transmission system.
Fig. 4 is a block diagram of the components of a region tracing module in an image transmission system.
Fig. 5 is a flowchart of an image transmission method.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The following detailed description of specific embodiments of the present invention is provided in connection with specific embodiments.
As shown in fig. 1, an image transmission system according to an embodiment of the present invention includes:
the image analysis module 100 is configured to acquire the image file, perform content identification detection on the image file according to a preset security detection library, and generate a security label for the image content conforming to the security detection library.
In this embodiment, when the image file is acquired during use, content identification and detection are performed on the image file, for example, when the image content of the image file has contents that personal information may be leaked, such as license plates of vehicles and identity documents, the contents are detected and screened through the security detection library, and security marking is performed on the contents to indicate that the contents need to be processed, so that leakage of personal information is avoided, and privacy and safety of related personnel are protected.
The region tracing module 300 is configured to perform data tracing on the image file according to the security tag, and generate tag source data information, where the tag source data information includes source data and a source data position, and is respectively used to represent content and a storage location of the image file corresponding to the security tag.
In this embodiment, when the area tracing module 300 is used, the function of the area tracing module is to trace the source data in the image file based on the security label of the image analysis module 100, and it can be interpreted that, after the image analysis module 100 identifies and labels a certain area of a certain image as the private information, the area tracing module 300 traces and acquires the source data of the image file constituting the area, that is, the part of data corresponds to the position and the data content in the image file, thereby facilitating the subsequent security operation.
The information encryption module 500 is configured to generate a random key through a preset random encryption program, and encrypt the source data according to the random key to generate a desensitized image file.
In this embodiment, when the device is used, the key is randomly generated, and the source data content traced by the area tracing module 300 is encrypted and covered by the key (the random key is randomly generated within a certain range with certain limitations, and the range and the limitations are used to ensure that the random key does not have too great influence on the appearance of the image file after encrypting the source data, for example, the image content corresponding to the image file and the surrounding image content are relatively large due to too large randomness), so as to achieve the purpose of protecting the private information in the image file.
And the key output module 700 is configured to generate and store file recovery data according to the source data position of the marked source data information and the corresponding random key, where the file recovery data is used to restore the desensitized image file.
In this embodiment, when in use, the function of the method is to record and store the position of the encrypted source data, the encryption mode, and the like, and output the recorded and stored data together with the source video, so as to protect the original content of the movie file well and avoid the loss of the source data.
As shown in fig. 2, as another preferred embodiment of the present invention, the image analysis module 100 includes:
an image obtaining unit 101, configured to obtain the image file.
The feature extraction unit 102 is configured to perform detection and extraction of image features on the image file, and generate an image feature log of the image file, where the detection and extraction of the image features are used to characterize and analyze and extract features of image content, and the image feature log is used to record an image content feature analysis and extraction result.
And the content scanning unit 103 is configured to perform content identification detection on the image feature log according to the preset security detection library, and generate a security detection result.
And a content marking unit 104, configured to determine the security detection result, and if the security detection result is a match, generate a security mark for the corresponding image feature.
In this embodiment, the image analysis module 100 is functionally divided and supplemented, and when in use, the feature extraction unit 102 performs analysis and detection on image features, detects and divides feature information content therein, and then the content scanning unit 103 identifies the content and determines whether the content is content that needs security processing, and if so, the content marking unit 104 performs security marking on the content for guiding a relevant program to perform security processing (i.e., random encryption replacement).
As shown in fig. 3, as another preferred embodiment of the present invention, the region tracing module 300 includes:
a tag response unit 301, configured to, in response to the security tag, obtain the image feature corresponding to the security tag through the image feature log.
A data tracing unit 302, configured to obtain, through the security mark, a source data position in the image file corresponding to the image feature.
And a source tracing output unit 303, configured to obtain source data according to the source data position, and generate marked source data information.
In this embodiment, the functional division of the area tracing module 300 is described, and when in use, the data tracing unit 302 locates a position in the image file corresponding to the image feature, that is, a position of the source data, by using the security marker, and generates marker source data information for locating data corresponding to the marker content.
As shown in fig. 4, as another preferred embodiment of the present invention, the information encryption module 500 includes:
a key generating unit 501, configured to generate a random key through a random encryption program.
A data encryption unit 502, configured to obtain the source data in the marked source data information, encrypt the source data using the random key, and generate an encrypted data segment.
A data replacing unit 503, configured to obtain the source data position in the marked source data information, and replace the source data at the source data position in the image file with the encrypted data segment, so as to generate a desensitized image file.
An encryption log unit 504, configured to generate a file encryption log according to the marking source data information and the random key.
Further, the random key output module 700 includes:
and the log response unit is used for responding to the file encryption log, generating file recovery data according to the file encryption log and storing the file recovery data.
And the restoration output unit is used for correspondingly outputting the desensitized image file and the file restoration data.
In this embodiment, when in use, the key generation unit 501 generates a random key within a certain range, the random key encrypts a source data segment of an image feature through the data encryption unit 502, and an encrypted data segment generated by encryption is a replacement data segment, and is used for replacing corresponding source data in an image file through the data replacement unit 503 (here, the replacement of the encrypted generated data segment is performed in a manner of avoiding a situation of damaging an image file body in a process of directly processing the image file), so as to achieve an object of protecting private content, compared with a manner of manually verifying and smearing encryption in the prior art, the arrangement of the encryption log unit 504 and the key output module 700 makes the process reversible, and the efficiency is high, and at the same time, the recoverability of the original image file can be protected, the loss of the original image file is avoided.
As shown in fig. 5, the present invention further provides an image transmission method, including the steps of:
s200, acquiring the image file, performing content identification detection on the image file according to a preset security detection library, and generating a security mark for the image content conforming to the security detection library.
And S400, performing data tracing on the image file according to the safety mark to obtain mark source data information, wherein the mark source data information comprises source data and a source data position, and is respectively used for representing the content and the storage position of the image file corresponding to the safety mark.
S600, generating a random key through a preset random encryption program, and encrypting the source data according to the random key to generate a desensitized image file.
And S800, generating and storing file recovery data according to the source data position of the marked source data information and the corresponding random key, wherein the file recovery data is used for restoring the desensitized image file.
As another preferred embodiment of the present invention, the step of acquiring the image file, performing content identification detection on the image file according to a preset security detection library, and generating a security label for the image content conforming to the security detection library specifically includes:
and acquiring the image file.
And detecting and extracting image features of the image file to generate an image feature log of the image file, wherein the image feature detection and extraction is used for analyzing and extracting features of image contents, and the image feature log is used for recording image content feature analysis and extraction results.
And performing content identification detection on the image characteristic log according to a preset safety detection library to generate a safety detection result.
And judging the safety detection result, and if the safety detection result is in accordance, generating a safety mark for the corresponding image feature.
As another preferred embodiment of the present invention, the step of performing data tracing on the image file according to the security mark and acquiring mark source data information specifically includes:
and responding to the safety mark, and acquiring the image characteristics corresponding to the safety mark through the image characteristic log.
And acquiring the source data position of the image feature corresponding to the image file through the safety mark.
And acquiring source data according to the source data position and generating mark source data information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (8)

1. An image transmission system, comprising the steps of:
the image analysis module is used for acquiring the image file, performing content identification detection on the image file according to a preset safety detection library, and generating a safety mark for the image content conforming to the safety detection library;
the region tracing module is used for performing data tracing on the image file according to the security marker to generate marker source data information, wherein the marker source data information comprises source data and a source data position, and is respectively used for representing the content and the storage position of the image file corresponding to the security marker;
the information encryption module is used for generating a random key through a preset random encryption program, encrypting the source data according to the random key and generating a desensitized image file;
and the key output module is used for generating and storing file recovery data according to the source data position of the marked source data information and the corresponding random key, wherein the file recovery data is used for restoring the desensitized image file.
2. The image transmission system according to claim 1, wherein the image analysis module comprises:
the image acquisition unit is used for acquiring the image file;
the characteristic extraction unit is used for detecting and extracting image characteristics of the image file and generating an image characteristic log of the image file, the detection and extraction of the image characteristics are used for representing the characteristic analysis and extraction of image contents, and the image characteristic log is used for recording the image content characteristic analysis and extraction result;
the content scanning unit is used for carrying out content identification detection on the image characteristic log according to a preset safety detection library to generate a safety detection result;
and the content marking unit is used for judging the safety detection result, and if the safety detection result is in accordance with the safety detection result, generating a safety mark for the corresponding image feature.
3. The image transmission system of claim 2, wherein the region tracing module comprises:
the mark response unit is used for responding to the safety mark and acquiring the image characteristics corresponding to the safety mark through the image characteristic log;
the data tracing unit is used for acquiring the source data position of the image feature corresponding to the image file through the safety mark;
and the source tracing output unit is used for acquiring the source data according to the source data position and generating the marked source data information.
4. The image transmission system according to claim 3, wherein the information encryption module comprises:
a key generation unit for generating a random key by a random encryption program;
the data encryption unit is used for acquiring the source data in the marked source data information, encrypting the source data by using the random key and generating an encrypted data segment;
a data replacement unit, configured to obtain the source data position in the marked source data information, replace the source data at the source data position in the image file with the encrypted data segment, and generate a desensitized image file;
and the encryption log unit is used for generating a file encryption log according to the marking source data information and the random key.
5. The image transmission system according to claim 4, wherein the random key output module comprises:
the log response unit is used for responding to the file encryption log, generating file recovery data according to the file encryption log and storing the file recovery data;
and the restoration output unit is used for correspondingly outputting the desensitized image file and the file restoration data.
6. An image transmission method, comprising:
acquiring the image file, performing content identification detection on the image file according to a preset safety detection library, and generating a safety mark for the image content conforming to the safety detection library;
performing data tracing on the image file according to the security marker to obtain marker source data information, wherein the marker source data information comprises source data and source data positions, and is respectively used for representing the content and the storage position of the image file corresponding to the security marker;
generating a random key through a preset random encryption program, and encrypting the source data according to the random key to generate a desensitized image file;
and generating and storing file recovery data according to the source data position of the marked source data information and the corresponding random key, wherein the file recovery data is used for restoring the desensitized image file.
7. The image transmission method according to claim 6, wherein the steps of acquiring the image file, performing content identification detection on the image file according to a preset security detection library, and generating a security label for the image content conforming to the security detection library specifically include:
acquiring the image file;
detecting and extracting image features of the image file to generate an image feature log of the image file, wherein the image feature detection and extraction is used for characterizing feature analysis and extraction of image contents, and the image feature log is used for recording image content feature analysis and extraction results;
performing content identification detection on the image characteristic log according to a preset safety detection library to generate a safety detection result;
and judging the safety detection result, and if the safety detection result is in accordance, generating a safety mark for the corresponding image feature.
8. The image transmission method according to claim 7, wherein the step of performing data tracing on the image file according to the security tag and acquiring tag source data information specifically includes:
responding to the safety mark, and acquiring the image characteristics corresponding to the safety mark through the image characteristic log;
acquiring the source data position of the image feature corresponding to the image file through the safety mark;
and acquiring source data according to the source data position and generating mark source data information.
CN202210262034.2A 2022-03-17 2022-03-17 Image transmission method and system Pending CN114363474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210262034.2A CN114363474A (en) 2022-03-17 2022-03-17 Image transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210262034.2A CN114363474A (en) 2022-03-17 2022-03-17 Image transmission method and system

Publications (1)

Publication Number Publication Date
CN114363474A true CN114363474A (en) 2022-04-15

Family

ID=81095054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210262034.2A Pending CN114363474A (en) 2022-03-17 2022-03-17 Image transmission method and system

Country Status (1)

Country Link
CN (1) CN114363474A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272393A (en) * 2023-11-21 2023-12-22 福建智康云医疗科技有限公司 Method for checking medical images across hospitals by scanning codes in regional intranet

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370069A (en) * 2007-05-30 2009-02-18 富士通株式会社 Image encryption/decryption system
TW200926758A (en) * 2007-12-13 2009-06-16 Altek Corp Image processing system with image encryption function and method thereof
KR20130114037A (en) * 2013-09-04 2013-10-16 엠엠피씨 주식회사 Masking and recovering method of privacy region
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN112788195A (en) * 2019-11-11 2021-05-11 阿里巴巴集团控股有限公司 Image processing method, device and equipment
CN113806806A (en) * 2021-09-18 2021-12-17 罗普特科技集团股份有限公司 Desensitization and restoration method and system for webpage screenshot

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370069A (en) * 2007-05-30 2009-02-18 富士通株式会社 Image encryption/decryption system
TW200926758A (en) * 2007-12-13 2009-06-16 Altek Corp Image processing system with image encryption function and method thereof
KR20130114037A (en) * 2013-09-04 2013-10-16 엠엠피씨 주식회사 Masking and recovering method of privacy region
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal
CN112788195A (en) * 2019-11-11 2021-05-11 阿里巴巴集团控股有限公司 Image processing method, device and equipment
CN113806806A (en) * 2021-09-18 2021-12-17 罗普特科技集团股份有限公司 Desensitization and restoration method and system for webpage screenshot

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117272393A (en) * 2023-11-21 2023-12-22 福建智康云医疗科技有限公司 Method for checking medical images across hospitals by scanning codes in regional intranet
CN117272393B (en) * 2023-11-21 2024-02-02 福建智康云医疗科技有限公司 Method for checking medical images across hospitals by scanning codes in regional intranet

Similar Documents

Publication Publication Date Title
CN106960156B (en) Data encryption and access method and device based on application program
KR101033511B1 (en) Method for protecting private information and computer readable recording medium therefor
CN114491609A (en) Data security management method and system
CN114363474A (en) Image transmission method and system
CN101674583A (en) Method for hiding or recovering personal information when changing SIM card and system thereof
CN116561809B (en) Destroying method for identifying security medium based on point cloud
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
CN110610456A (en) Imaging system and video processing method
CN110647659A (en) Imaging system and video processing method
CN104361293A (en) Methods and devices for generating and distinguishing anti-counterfeiting paper document
CN108064382B (en) Ukey-based software decryption method and terminal
CN105930728A (en) Application examining method and device
CN113987581A (en) Method for data security protection and traceability check of intelligent security community platform
WO2017207998A1 (en) Method of associating a person with a digital object
CN115861020A (en) Image processing method and device
CN107862210A (en) Cipher processing method, system and computer equipment
CN115208666A (en) Safety data security encryption method and system
CN113434827A (en) Information tracing method, device and system, electronic equipment and storage medium
CN113343186A (en) Method and device for embedding invisible watermark of DOCX document, electronic equipment and storage medium
CN107180188B (en) System for extracting plaintext applied to encryption based on dynamic taint analysis
CN117972741A (en) Method and system for safely managing cloud service through OFD format file
CN116662075B (en) Data protection method, system, equipment and storage medium
CN116186748B (en) Anti-disclosure management system and method for digital printer
CN110659509B (en) Memory snapshot file generation method and device, electronic equipment and medium
CN116935479B (en) Face recognition method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220415

RJ01 Rejection of invention patent application after publication