CN114637971A - Information leakage tracking method and device for mobile terminal office chat software - Google Patents

Information leakage tracking method and device for mobile terminal office chat software Download PDF

Info

Publication number
CN114637971A
CN114637971A CN202210311378.8A CN202210311378A CN114637971A CN 114637971 A CN114637971 A CN 114637971A CN 202210311378 A CN202210311378 A CN 202210311378A CN 114637971 A CN114637971 A CN 114637971A
Authority
CN
China
Prior art keywords
image
user
watermark
screenshot
chat software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210311378.8A
Other languages
Chinese (zh)
Inventor
郭雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210311378.8A priority Critical patent/CN114637971A/en
Publication of CN114637971A publication Critical patent/CN114637971A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/556Detecting local intrusion or implementing counter-measures involving covert channels, i.e. data leakage between processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses an information divulgence tracking method and device of mobile terminal office chat software, relating to the technical field of network security, wherein the method comprises the following steps: intercepting a screenshot action when monitoring that a user captures a screenshot of an interface of mobile terminal office chat software, and acquiring a first image captured by the screenshot action; performing content identification on the first image, and determining a content area in the first image, wherein the content area comprises an area where chat characters are located and an area where chat pictures are located; adding invisible watermarks in each content area of the first image to obtain a second image; and outputting the second image as the image intercepted by the user at this time. The invention can solve the problems that the watermark is easy to cut and tamper and is difficult to divulge, trace and trace in the prior art.

Description

Information leakage tracking method and device for mobile terminal office chat software
Technical Field
The invention relates to the technical field of network security, in particular to an information divulgence tracking method and device for mobile terminal office chat software.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
The office chat software is instant communication software used in a plurality of enterprises for work communication, and has higher requirements on confidentiality compared with common chat software. The office chat software of the mobile terminal is convenient to use, but can be used on an external network frequently, so that information is easy to leak.
In order to track a divulgence source and recover enterprise loss after information is leaked, a visible watermark is embedded in a page by the existing mobile terminal office chat software. However, the watermark in this way is easy to cut and tamper, and is difficult to perform divulgence tracing.
Disclosure of Invention
The embodiment of the invention provides an information divulgence tracing method of mobile terminal office chat software, which is used for solving the problems that watermarks are easy to cut and tamper and divulgence tracing is difficult to perform in the prior art, and comprises the following steps:
intercepting a screenshot action when monitoring that a user performs screenshot on an interface of mobile terminal office chat software, and acquiring a first image intercepted by the screenshot action;
performing content identification on the first image, and determining a content area in the first image, wherein the content area comprises an area where chat characters are located and an area where chat pictures are located;
adding invisible watermarks in each content area of the first image to obtain a second image;
and outputting the second image as the image intercepted by the user at this time.
The embodiment of the invention also provides an information divulgence tracking device of the mobile terminal office chat software, which is used for solving the problems that the watermark is easy to cut and tamper and the divulgence tracking tracing is difficult to perform in the prior art, and comprises the following components:
the screenshot intercepting module is used for intercepting a screenshot action when a user is monitored to screenshot an interface of the mobile terminal office chat software, and acquiring a first image intercepted by the screenshot action;
the content identification module is used for identifying the content of the first image and determining a content area in the first image, wherein the content area comprises an area where the chat characters are located and an area where the chat pictures are located;
the watermark adding module is used for adding invisible watermarks in each content area of the first image to obtain a second image;
and the output module is used for outputting the second image as the image intercepted by the user at this time.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can be run on the processor, wherein the processor executes the computer program to realize the information divulgence tracking method of the mobile terminal office chat software.
The embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and when the computer program is executed by a processor, the information divulgence tracking method of the mobile terminal office chat software is realized.
The embodiment of the invention also provides a computer program product, which comprises a computer program, and when the computer program is executed by a processor, the information divulgence tracking method of the mobile terminal office chat software is realized.
In the embodiment of the invention, when the screenshot action of a user in the mobile terminal office chat software is monitored, the screenshot action is intercepted to obtain the first image, the content of the first image is identified to obtain the content area in the first image, the content area is the area where key information such as chat characters or chat pictures is located, invisible watermarks are added to the content area of the first image, so that the invisible watermarks can be ensured to be added to the key information, and compared with the prior art in which watermarks are added to a complete image, the invisible watermarks added to the key information cannot be removed or modified into other watermark contents which cannot be divulged and tracked in a cutting or tampering mode, so that the divulging and tracking can be effectively carried out; meanwhile, for the image which needs to be intercepted for work, the invisible watermark can not influence the normal reading of the chat characters or the chat pictures in the image. In addition, invisible watermarks are not added in the areas without the chat characters or pictures, so that processing resources consumed when the invisible watermarks are added are saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
fig. 1 is a flowchart of an information disclosure tracking method for office chat software of a mobile terminal according to an embodiment of the present invention;
fig. 2 is another flowchart of an information disclosure tracking method of office chat software of a mobile terminal according to an embodiment of the present invention;
fig. 3 is another flowchart of an information disclosure tracking method of office chat software of a mobile terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an information disclosure tracking apparatus of office chat software of a mobile terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
The embodiment of the invention provides an information leakage tracking method for mobile terminal office chat software, which comprises the following steps of 101 to 104:
step 101, intercepting a screenshot action when it is monitored that a user captures a screenshot of an interface of office chat software of the mobile terminal, and acquiring a first image captured by the screenshot action.
When the screenshot action of the user is monitored, for example, a screenshot gesture is scribed or a screenshot shortcut key is pressed on a screen of the mobile terminal, the screenshot action is intercepted, so that the action of subsequently storing the intercepted image is interrupted, the operation step of adding the invisible watermark is carried out, when the adding of the invisible watermark is completed, the screenshot action is continuously stored after a second image is obtained, and the second image is used as the image of the screenshot of the user for storing.
In the embodiment of the invention, when the user captures the image, the watermark is added in the image capture, so that the slow running of the mobile phone software caused by embedding the watermark in all pages can be prevented.
Considering that a part of users need to add a screenshot without a watermark due to normal work needs, in order to meet the needs of the part of users, in the embodiment of the present invention, after the step 101 is performed to obtain the first image captured by the screenshot action, as shown in fig. 2, the following steps 201 to 203 may also be performed:
step 201, determining a user of office chat software according to a login account of the office chat software;
step 202, determining whether a user has the authority of not adding the watermark according to a preset white list;
and 203, if the user has the authority not to add the watermark, outputting the first image as the image intercepted by the user at this time.
The login account in the office chat software is bound with the personal information of the user, so that the user using the office chat software can be determined through the login account.
The white list records the employee list with the authority of not adding the watermark, and if the user has the authority of not adding the watermark, the first image can be directly output as the image intercepted at this time, so that the requirement that the user acquires a screenshot without the watermark in the white list is met.
Certainly, the employee list in the white list needs to be determined by the responsible person of the enterprise to which the user belongs, so as to reduce the risk that the divulgence tracing cannot be performed as much as possible.
Step 102, identifying the content of the first image, and determining a content area in the first image, wherein the content area comprises an area where the chat characters are located and an area where the chat pictures are located.
The chat texts and the chat pictures are generally main communication contents in the mobile terminal office chat software, and key information for avoiding disclosure is included in the main communication contents. In the invention, the content of the first image is identified, the content area in the first image is determined, the content area is the area where the chat characters and the chat pictures are located, invisible watermarks are added into the content area, and the invisible watermarks can be arranged on the information which is possibly leaked. Meanwhile, the invisible watermark can not be added in the non-content area due to the low risk of disclosure, so that the processing resource consumed in the process of adding the watermark is saved.
It should be noted that the chat characters and chat pictures referred in the embodiments of the present invention refer not only to the characters or pictures sent by the user during communication, but also to the characters, images, and image thumbnails in the file when the user opens the file or image thumbnail sent by the office chat software. For example, an attendance record Excel document is sent to a B by office chat software, the attendance record Excel document is opened in the office chat software for viewing by the B, and a screenshot action is made in the viewing process, so that an invisible watermark can be added in a screenshot content area.
Step 103, adding invisible watermarks in each content area of the first image to obtain a second image.
Compared with the traditional watermark, the invisible watermark cannot be perceived by a viewer and does not influence the picture effect. The watermark can not be perceived by a user and can not be removed by a common watermark removing method, but the watermark can be analyzed by a special watermark analyzing device to obtain the information recorded in the watermark.
And 104, outputting the second image as the image intercepted by the user at this time.
In the embodiment of the invention, if the user is not recorded in the white list, the user is determined not to have the authority of not adding the watermark, and at the moment, the employee identification of the user of the office chat software is determined according to the login account of the office chat software; and then adding invisible watermarks comprising employee identifications and screenshot operation time into each content area of the first image to obtain a second image.
The employee identification is used for uniquely identifying the user, the employee identification can be an employee name, an employee number or other identification information set for the employee, the identification information can be characters, numbers, letters and the like, and the specific expression form is set by the enterprise to which the user belongs.
The employee identification and the screenshot operation time are added in the content area, so that the source of the divulgence information can be conveniently determined, and the divulgence person directly responsible and the divulgence time can be found, thereby realizing rapid and effective tracing and greatly increasing the success rate of tracing.
As described above, after the step 104 is executed to output the second image as the image captured this time by the user, as shown in fig. 3, the following steps 301 and 302 may be executed:
step 301, extracting a divulged watermark from a content area of the divulged image;
step 302, extracting the employee identification and the screen-capturing operation time from the secret-divulging watermark, and determining a person responsible for secret divulging and the secret divulging time according to the employee identification and the screen-capturing operation time.
The second image obtained by processing the invisible watermark technology is invisible, and is not easy to be perceived by a divulging person, so that the probability of extracting the complete recognizable divulging watermark from the content area of the divulging image is greatly increased, and the tracing becomes simple and easy to operate.
In the embodiment of the invention, when the screenshot action of a user in the mobile terminal office chat software is monitored, the screenshot action is intercepted to obtain the first image, the content of the first image is identified to obtain the content area in the first image, the content area is the area where key information such as chat characters or chat pictures is located, invisible watermarks are added to the content area of the first image, so that the invisible watermarks can be ensured to be added to the key information, and compared with the prior art in which watermarks are added to a complete image, the invisible watermarks added to the key information cannot be removed or modified into other watermark contents which cannot be divulged and tracked in a cutting or tampering mode, so that the divulging and tracking can be effectively carried out; meanwhile, for the image which needs to be intercepted for work, the invisible watermark can not influence the normal reading of the chat characters or the chat pictures in the image. In addition, invisible watermarks are not added in the areas without the chatting characters or pictures, so that processing resources consumed when the invisible watermarks are added are saved.
The embodiment of the invention also provides an information divulgence tracking device of the mobile terminal office chat software, which is described in the following embodiment. The principle of the device for solving the problems is similar to the information leakage tracking method of the mobile terminal office chat software, so the implementation of the device can refer to the implementation of the information leakage tracking method of the mobile terminal office chat software, and repeated parts are not described again.
As shown in fig. 4, the apparatus includes a screenshot intercepting module 401, a content identifying module 402, a watermarking module 403, and an output module 404.
The screenshot intercepting module 401 is configured to intercept a screenshot action when it is monitored that a user captures an interface of the mobile terminal office chat software, and obtain a first image intercepted by the screenshot action;
a content identification module 402, configured to perform content identification on the first image, and determine a content area in the first image, where the content area includes an area where chat characters are located and an area where chat pictures are located;
a watermark adding module 403, configured to add an invisible watermark to each content area of the first image to obtain a second image;
and an output module 404, configured to output the second image as an image captured by the user this time.
In an implementation manner of the embodiment of the present invention, the apparatus further includes:
the determining module is used for determining a user of the office chat software according to the login account of the office chat software;
the determining module is further used for determining whether the user has the authority of not adding the watermark according to a preset white list;
and the output module is used for outputting the first image as the image intercepted by the user at this time when the user has the authority of not adding the watermark.
In one implementation of an embodiment of the present invention,
the determining module is also used for determining the employee identification of the user using the office chat software according to the login account of the office chat software when the user does not have the authority of not adding the watermark;
a watermarking module to:
adding invisible watermarks including employee identifications and screenshot operation time into each content area of the first image to obtain a second image.
In an implementation manner of the embodiment of the present invention, the apparatus further includes a divulgence tracking module, configured to:
extracting a leaked watermark from a content area of the leaked image;
and extracting the employee identification and the screenshot operation time from the secret divulging watermark, and determining a secret divulging responsible person and the secret divulging time according to the employee identification and the screenshot operation time.
In the embodiment of the invention, when the screenshot action of a user in the mobile terminal office chat software is monitored, the screenshot action is intercepted to obtain the first image, the content of the first image is identified to obtain the content area in the first image, the content area is the area where key information such as chat characters or chat pictures is located, invisible watermarks are added to the content area of the first image, so that the invisible watermarks can be ensured to be added to the key information, and compared with the prior art in which watermarks are added to a complete image, the invisible watermarks added to the key information cannot be removed or modified into other watermark contents which cannot be divulged and tracked in a cutting or tampering mode, so that the divulging and tracking can be effectively carried out; meanwhile, for the image which needs to be intercepted for work, the invisible watermark can not influence the normal reading of the chat characters or the chat pictures in the image. In addition, invisible watermarks are not added in the areas without the chat characters or pictures, so that processing resources consumed when the invisible watermarks are added are saved.
An embodiment of the present invention further provides a computer device, and fig. 5 is a schematic diagram of the computer device in the embodiment of the present invention, where the computer device is capable of implementing all steps in the information divulgence tracking method for mobile terminal office chat software in the embodiment of the present invention, and the computer device specifically includes the following contents:
a processor (processor)501, a memory (memory)502, a communication Interface (Communications Interface)503, and a communication bus 504;
the processor 501, the memory 502 and the communication interface 503 complete mutual communication through the communication bus 504; the communication interface 503 is used for implementing information transmission between related devices;
the processor 501 is configured to call a computer program in the memory 502, and when the processor executes the computer program, the processor implements the information leakage tracking method of the mobile terminal office chat software in the above embodiments.
The embodiment of the invention also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and when the computer program is executed by a processor, the information divulgence tracking method of the mobile terminal office chat software is realized.
The embodiment of the invention also provides a computer program product, which comprises a computer program, and when the computer program is executed by a processor, the information divulgence tracking method of the mobile terminal office chat software is realized.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. An information leakage tracking method for mobile terminal office chat software is characterized by comprising the following steps:
intercepting a screenshot action when monitoring that a user captures a screenshot of an interface of mobile terminal office chat software, and acquiring a first image captured by the screenshot action;
performing content identification on the first image, and determining a content area in the first image, wherein the content area comprises an area where chat characters are located and an area where chat pictures are located;
adding invisible watermarks in each content area of the first image to obtain a second image;
and outputting the second image as the image intercepted by the user at this time.
2. The method of claim 1, wherein after acquiring the first image captured by the screenshot action, the method further comprises:
determining a user of the office chat software according to the login account of the office chat software;
determining whether the user has the authority of not adding the watermark according to a preset white list;
and if the user has the authority of not adding the watermark, outputting the first image as the image intercepted by the user at this time.
3. The method of claim 2, wherein after determining whether the user has the right to not add the watermark according to a preset white list, the method further comprises:
if the user does not have the authority of not adding the watermark, determining the employee identification of the user of the office chat software according to the login account of the office chat software;
adding an invisible watermark in each content area of the first image to obtain a second image, comprising:
adding invisible watermarks including employee identifications and screenshot operation time into each content area of the first image to obtain a second image.
4. The method according to claim 3, wherein after outputting the second image as the image captured this time by the user, the method further comprises:
extracting a divulgence watermark from a content area of the divulgence image;
and extracting the employee identification and the screenshot operation time from the secret divulging watermark, and determining a secret divulging responsible person and the secret divulging time according to the employee identification and the screenshot operation time.
5. An information leakage tracking device of mobile terminal office chat software is characterized in that the device comprises:
the screenshot intercepting module is used for intercepting a screenshot action when a user is monitored to screenshot an interface of the mobile terminal office chat software, and acquiring a first image intercepted by the screenshot action;
the content identification module is used for identifying the content of the first image and determining a content area in the first image, wherein the content area comprises an area where the chat characters are located and an area where the chat pictures are located;
the watermark adding module is used for adding invisible watermarks in each content area of the first image to obtain a second image;
and the output module is used for outputting the second image as the image intercepted by the user at this time.
6. The apparatus of claim 5, further comprising:
the determining module is used for determining a user of the office chat software according to the login account of the office chat software;
the determining module is further used for determining whether the user has the authority of not adding the watermark according to a preset white list;
and the output module is used for outputting the first image as the image intercepted by the user at this time when the user has the authority of not adding the watermark.
7. The apparatus of claim 6,
the determining module is further used for determining the employee identification of the user using the office chat software according to the login account of the office chat software when the user does not have the authority of not adding the watermark;
a watermarking module to:
adding invisible watermarks comprising employee identifications and screenshot operation time into each content area of the first image to obtain a second image.
8. The apparatus of claim 7, further comprising a divulgence tracking module to:
extracting a divulgence watermark from a content area of the divulgence image;
and extracting the employee identification and the screenshot operation time from the secret divulging watermark, and determining a secret divulging responsible person and the secret divulging time according to the employee identification and the screenshot operation time.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 4.
11. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 4.
CN202210311378.8A 2022-03-28 2022-03-28 Information leakage tracking method and device for mobile terminal office chat software Pending CN114637971A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210311378.8A CN114637971A (en) 2022-03-28 2022-03-28 Information leakage tracking method and device for mobile terminal office chat software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210311378.8A CN114637971A (en) 2022-03-28 2022-03-28 Information leakage tracking method and device for mobile terminal office chat software

Publications (1)

Publication Number Publication Date
CN114637971A true CN114637971A (en) 2022-06-17

Family

ID=81950683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210311378.8A Pending CN114637971A (en) 2022-03-28 2022-03-28 Information leakage tracking method and device for mobile terminal office chat software

Country Status (1)

Country Link
CN (1) CN114637971A (en)

Similar Documents

Publication Publication Date Title
CN107423629B (en) Method and system for file information output anti-disclosure and tracing
Thing et al. Live memory forensics of mobile phones
KR101743191B1 (en) Application program management method and apparatus, server, terminal device, program, and recording medium
CN111402120B (en) Labeling image processing method and device
CN113806806B (en) Desensitization and restoration method and system for webpage screenshot
CN106407820B (en) Method and system for preventing file from being tampered and leaked through watermark encryption
WO2020233014A1 (en) Message sending method and apparatus, and computer device and storage medium
CN115344835A (en) Picture processing method, storage medium and computer terminal
CN115114598A (en) Watermark generation method, and method and device for file tracing by using watermark
CN111698237A (en) Method and system for adding watermark to WEB page
Khan et al. Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN107659842B (en) Method and system for reporting in video friend making
CN113552989A (en) Screen recording method and device and electronic equipment
CN114637971A (en) Information leakage tracking method and device for mobile terminal office chat software
CN108229180B (en) Screenshot data processing method and device and electronic equipment
CN114554131A (en) High-security smart screen conference content sharing method, system and medium
CN114245058A (en) Computer camera privacy protection method
CN114265759A (en) Tracing method and system after data information leakage and electronic equipment
CN114357524A (en) Electronic document processing method and device
CN111221803B (en) Feature library management method and coprocessor
CN112035205A (en) Data processing method, device, equipment and storage medium
CN104899118A (en) Method and system for recovering deleted privacy data
CN112565311A (en) Rapid evidence obtaining method for telecommunication fraud case victim
CN113904879A (en) Mobile terminal file tracking method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination