CN114884939A - Screen sharing method, device and system - Google Patents

Screen sharing method, device and system Download PDF

Info

Publication number
CN114884939A
CN114884939A CN202210492761.8A CN202210492761A CN114884939A CN 114884939 A CN114884939 A CN 114884939A CN 202210492761 A CN202210492761 A CN 202210492761A CN 114884939 A CN114884939 A CN 114884939A
Authority
CN
China
Prior art keywords
screen
encrypted
data
screen sharing
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210492761.8A
Other languages
Chinese (zh)
Inventor
孙乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210492761.8A priority Critical patent/CN114884939A/en
Publication of CN114884939A publication Critical patent/CN114884939A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention provides a screen sharing method, device and system, and relates to the technical field of network security. The screen sharing method comprises the following steps: sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data; receiving encrypted screen data from a sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information; generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data; and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data. The invention can carry out privacy data protection while sharing data to the maximum extent, and improves the communication efficiency and the customer experience.

Description

Screen sharing method, device and system
Technical Field
The invention relates to the technical field of network security, in particular to a screen sharing method, device and system.
Background
The use of bank products presents certain difficulties for the elderly and handicapped. The current bank end product design is comparatively complicated, and the page function is complicated, and the version upgrading change is fast when the interaction is many on a par, and the old person has certain problem in operation and understanding, and bank staff and customer's oral communication inefficiency simultaneously, both sides often are difficult to reach unanimous understanding.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a screen sharing method, device and system, which can protect private data while sharing data to the maximum extent, and improve communication efficiency and customer experience.
In order to achieve the above object, an embodiment of the present invention provides a screen sharing method, including:
sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
receiving encrypted screen data from a sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data;
and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data.
In one embodiment, the method further comprises the following steps:
transmitting the screen sharing request from the transmitting end to the receiving end so that the receiving end returns screen sharing return information based on the screen sharing request;
and generating a screen sharing instruction according to the received screen sharing return information.
In one embodiment, the method further comprises the following steps:
and encrypting the encryption key, and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to the private key of the key.
An embodiment of the present invention further provides a screen sharing apparatus, including:
the instruction sending module is used for sending a screen sharing instruction to the sending end so that the sending end encrypts screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data;
the sensitive information identification module is used for receiving the encrypted screen data from the sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
the shared data generating module is used for generating shared data according to the sensitive information and the screen data and encrypting the shared data to obtain encrypted shared data;
and the shared data sending module is used for sending the encrypted shared data to the receiving end so that the receiving end can decrypt and display the encrypted shared data according to the encryption key.
In one embodiment, the method further comprises the following steps:
the transmission module is used for transmitting the screen sharing request from the sending end to the receiving end so that the receiving end returns screen sharing return information based on the screen sharing request;
and the screen sharing instruction generating module is used for generating a screen sharing instruction according to the received screen sharing return information.
In one embodiment, the method further comprises the following steps:
and the key encryption module is used for encrypting the encryption key and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to the key private key.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor realizes the steps of the screen sharing method when executing the computer program.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, and the computer program realizes the steps of the screen sharing method when being executed by a processor.
Embodiments of the present invention further provide a computer program product, which includes a computer program/instruction, and the computer program/instruction implements the steps of the screen sharing method when being executed by a processor.
An embodiment of the present invention further provides a screen sharing system, including:
the screen sharing apparatus as described above;
the sending terminal is used for encrypting the screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data and sending the encrypted screen data to the screen sharing device;
and the receiving end is used for displaying the encrypted shared data after decrypting the encrypted shared data according to the encryption key.
The screen sharing method, the device and the system firstly send the screen sharing instruction to the sending end so that the sending end encrypts the screen data based on the screen sharing instruction and the encryption key to obtain the encrypted screen data, then decrypt the encrypted screen data from the sending end and identify the sensitive information to obtain the sensitive information, then generate the shared data according to the sensitive information and the screen data and encrypt the shared data to obtain the encrypted shared data, and send the encrypted shared data to the receiving end so that the receiving end decrypts the encrypted shared data according to the encryption key and then displays the encrypted shared data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a screen sharing method in an embodiment of the invention;
FIG. 2 is a block diagram showing the structure of a screen sharing apparatus according to an embodiment of the present invention;
FIG. 3 is a block diagram of a computer device in an embodiment of the invention;
FIG. 4 is a diagram of a screen sharing system in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
In view of the difficulty of the existing bank products on the old and barrier groups, the low oral communication efficiency between bank staff and customers, and the difficulty of both parties in consistent understanding, the embodiment of the invention provides a screen sharing method, which can encrypt data in the user transmission process (for example, perform fuzzy processing, and specifically can display a star or a mosaic), can also remove important private data (for example, short messages, WeChat, a system keyboard and the like) before network transmission, and can protect the private data while sharing the data to the maximum extent, thereby realizing the safety control of the technical side. The present invention will be described in detail below with reference to the accompanying drawings.
FIG. 1 is a flow chart of a screen sharing method in an embodiment of the present invention. As shown in fig. 1, the screen sharing method includes:
s101: and sending a screen sharing instruction to the sending end so that the sending end encrypts the screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data.
In specific implementation, the sending end deletes screen data (including privacy information and data to be protected customized by a client) corresponding to a screen display area based on privacy information such as money or an account in a machine learning identification screen, and then performs group encryption (for example, 1000k is a group) on the deleted screen data in a form of binary data stream by using an SM4 symmetric encryption key to obtain encrypted screen data.
Before executing S101, the method further includes:
long links based on TCP are respectively established with a sending end and a receiving end, the sending end receives and sends a screen sharing request through the long links, and the screen sharing request is transmitted to the receiving end, so that the receiving end returns screen sharing return information based on the screen sharing request; and generating a screen sharing instruction according to the received screen sharing return information.
In specific implementation, the receiving end initiates a prompt to the user through a program interface, and after the user clicks an agreement, the receiving end returns screen sharing return information.
After sending the screen sharing instruction to the sending end, the method further comprises the following steps: and encrypting the encryption key, and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to the private key of the key.
In specific implementation, the SM4 symmetric encryption key is encrypted by the asymmetric encryption public key, the encrypted encryption key is sent to the sending end and the receiving end, and the sending end and the receiving end decrypt the encrypted encryption key according to a preset private key of the key to obtain the symmetric encryption key.
S102: and receiving the encrypted screen data from the sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain the sensitive information.
In specific implementation, the sending end transmits the encrypted screen data to the server in a packet mode. The server decrypts the grouped encrypted screen data to obtain the screen data, and then performs further sensitive information identification on the screen data based on high calculation power. The large amount of data received by the server can be relied on for machine learning and model optimization to build a model for sensitive information identification.
S103: and generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data.
During specific implementation, the server deletes the sensitive information from the screen data to obtain shared data, and carries out grouping encryption on the shared data to obtain encrypted shared data.
S104: and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data.
In specific implementation, the server sends the encrypted shared data to the receiving end in a grouping manner, and the receiving end decrypts the encrypted shared data according to the encryption key and then displays the decrypted shared data to the client.
The execution subject of the screen sharing method shown in fig. 1 may be a server. As can be seen from the flow shown in fig. 1, the screen sharing method according to the embodiment of the present invention first sends a screen sharing instruction to a sending end, so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data, then decrypts the encrypted screen data from the sending end and identifies sensitive information to obtain sensitive information, then generates shared data according to the sensitive information and the screen data, encrypts the shared data to obtain encrypted shared data, and sends the encrypted shared data to a receiving end, so that the receiving end decrypts the encrypted shared data according to the encryption key and then displays the encrypted shared data.
Based on the same inventive concept, the embodiment of the invention also provides a screen sharing device, and as the principle of solving the problems of the device is similar to the screen sharing method, the implementation of the device can refer to the implementation of the method, and repeated parts are not described again.
Fig. 2 is a block diagram of a screen sharing apparatus according to an embodiment of the present invention. As shown in fig. 2, the screen sharing apparatus includes:
the instruction sending module is used for sending a screen sharing instruction to the sending end so that the sending end encrypts screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data;
the sensitive information identification module is used for receiving the encrypted screen data from the sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
the shared data generating module is used for generating shared data according to the sensitive information and the screen data and encrypting the shared data to obtain encrypted shared data;
and the shared data sending module is used for sending the encrypted shared data to the receiving end so that the receiving end can decrypt and display the encrypted shared data according to the encryption key.
In one embodiment, the method further comprises the following steps:
the transmission module is used for transmitting the screen sharing request from the sending end to the receiving end so that the receiving end returns screen sharing return information based on the screen sharing request;
and the screen sharing instruction generating module is used for generating a screen sharing instruction according to the received screen sharing return information.
In one embodiment, the method further comprises the following steps:
and the key encryption module is used for encrypting the encryption key and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to the key private key.
To sum up, the screen sharing device of the embodiment of the present invention first sends a screen sharing instruction to a sending end, so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data, then decrypts and identifies the encrypted screen data from the sending end to obtain sensitive information, then generates shared data according to the sensitive information and the screen data, encrypts the shared data to obtain encrypted shared data, and sends the encrypted shared data to a receiving end, so that the receiving end decrypts and displays the encrypted shared data according to the encryption key, thereby protecting private data while sharing the data to the maximum extent, and improving communication efficiency and customer experience.
The embodiment of the invention also provides a specific implementation mode of the computer equipment, which can realize all the steps in the screen sharing method in the embodiment. Fig. 3 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 3, the computer device specifically includes the following:
a processor (processor)301 and a memory (memory) 302.
The processor 301 is configured to call a computer program in the memory 302, and the processor implements all the steps of the screen sharing method in the above embodiment when executing the computer program, for example, the processor implements the following steps when executing the computer program:
sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
receiving encrypted screen data from a sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data;
and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data.
To sum up, the computer device of the embodiment of the present invention first sends a screen sharing instruction to a sending end, so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data, then decrypts and identifies the encrypted screen data from the sending end to obtain sensitive information, then generates shared data according to the sensitive information and the screen data, encrypts the shared data to obtain encrypted shared data, and sends the encrypted shared data to a receiving end, so that the receiving end decrypts and displays the encrypted shared data according to the encryption key, thereby protecting private data while sharing the data to the maximum extent, and improving communication efficiency and customer experience.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps in the screen sharing method in the foregoing embodiments, where the computer-readable storage medium stores a computer program, and the computer program implements all the steps of the screen sharing method in the foregoing embodiments when executed by a processor, for example, the processor implements the following steps when executing the computer program:
sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
receiving encrypted screen data from a sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data;
and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data.
To sum up, the computer-readable storage medium of the embodiment of the present invention first sends a screen sharing instruction to a sending end, so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data, then decrypts and identifies the encrypted screen data from the sending end to obtain sensitive information, then generates shared data according to the sensitive information and the screen data, encrypts the shared data to obtain encrypted shared data, and sends the encrypted shared data to a receiving end, so that the receiving end decrypts and displays the encrypted shared data according to the encryption key, thereby protecting private data while sharing the data to the maximum extent, and improving communication efficiency and customer experience.
An embodiment of the present invention further provides a computer program product capable of implementing all the steps in the screen sharing method in the foregoing embodiments, where the computer program product includes a computer program/instruction, and when the computer program/instruction is executed by a processor, all the steps in the screen sharing method in the foregoing embodiments are implemented, for example, when the processor executes the computer program, the following steps are implemented:
sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
receiving encrypted screen data from a sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data;
and sending the encrypted shared data to a receiving end so that the receiving end can decrypt the encrypted shared data according to the encryption key and then display the decrypted shared data.
To sum up, the computer program product of the embodiment of the present invention first sends a screen sharing instruction to a sending end, so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data, then decrypts and identifies the encrypted screen data from the sending end to obtain sensitive information, then generates shared data according to the sensitive information and the screen data, encrypts the shared data to obtain encrypted shared data, and sends the encrypted shared data to a receiving end, so that the receiving end decrypts and displays the encrypted shared data according to the encryption key, thereby protecting private data while sharing the data to the maximum extent, and improving communication efficiency and customer experience.
Based on the same inventive concept, the embodiment of the invention also provides a screen sharing system, and as the principle of the device for solving the problems is similar to the screen sharing method, the implementation of the system can refer to the implementation of the method, and repeated parts are not described again.
FIG. 4 is a diagram of a screen sharing system in an embodiment of the invention. As shown in fig. 4, the screen sharing system includes:
the screen sharing apparatus as described above, applied to a server;
the sending terminal is used for encrypting the screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data and sending the encrypted screen data to the screen sharing device;
and the receiving end is used for displaying the encrypted shared data after decrypting the encrypted shared data according to the encryption key.
The specific work flow of the screen sharing system of the embodiment of the invention is as follows:
1. the sending terminal and the receiving terminal respectively establish long links based on TCP with the server.
2. The sending end initiates a screen sharing request to the server through the long link.
3. The server transmits the screen sharing request to the receiving end.
4. And the receiving terminal returns screen sharing return information to the server based on the screen sharing request.
5. And the server generates a screen sharing instruction according to the screen sharing return information and sends the screen sharing instruction to the sending end.
6. The server encrypts the SM4 symmetric encryption key through the asymmetric encrypted public key and sends the encrypted encryption key to the sending end and the receiving end.
7. And the sending end and the receiving end decrypt the encrypted encryption key according to a preset key private key to obtain the encryption key.
8. After receiving the screen sharing instruction, the sending end deletes the screen data corresponding to the screen display area based on machine learning identification of private information such as money or account in the screen, carries out block encryption on the deleted screen data in a form of binary data stream through an SM4 symmetric encryption key to obtain encrypted screen data, and transmits the encrypted screen data to the server in a block mode.
9. The server decrypts the grouped encrypted screen data to obtain the screen data, and then performs further sensitive information identification on the screen data based on high calculation power to obtain sensitive information.
10. The server deletes the sensitive information from the screen data to obtain shared data, carries out grouping encryption on the shared data to obtain encrypted shared data, and sends the encrypted shared data to the receiving end in a grouping mode.
11. And the receiving end decrypts the encrypted shared data according to the encryption key and then displays the encrypted shared data to the client.
In conclusion, the screen sharing system of the embodiment of the invention is beneficial to solving the problems in real time and efficiently, can help the barrier group to operate, and simultaneously reduces the pressure of front-line personnel of the bank. The data to be protected customized by the client can also safely protect the transaction information of the client.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.

Claims (10)

1. A screen sharing method, comprising:
sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
receiving encrypted screen data from the sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
generating shared data according to the sensitive information and the screen data, and encrypting the shared data to obtain encrypted shared data;
and sending the encrypted shared data to a receiving end so that the receiving end can decrypt and display the encrypted shared data according to the encryption key.
2. The screen sharing method of claim 1, further comprising:
transmitting the screen sharing request from the transmitting end to the receiving end so that the receiving end returns screen sharing return information based on the screen sharing request;
and generating a screen sharing instruction according to the received screen sharing return information.
3. The screen sharing method of claim 2, further comprising:
and encrypting the encryption key, and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to a key private key.
4. A screen sharing apparatus, comprising:
the instruction sending module is used for sending a screen sharing instruction to a sending end so that the sending end encrypts screen data based on the screen sharing instruction and an encryption key to obtain encrypted screen data;
the sensitive information identification module is used for receiving the encrypted screen data from the sending end, decrypting the encrypted screen data to obtain screen data, and identifying sensitive information of the screen data to obtain sensitive information;
the shared data generating module is used for generating shared data according to the sensitive information and the screen data and encrypting the shared data to obtain encrypted shared data;
and the shared data sending module is used for sending the encrypted shared data to a receiving end so that the receiving end can decrypt and display the encrypted shared data according to the encryption key.
5. The screen sharing apparatus of claim 4, further comprising:
the transmission module is used for transmitting the screen sharing request from the sending end to the receiving end so that the receiving end returns screen sharing return information based on the screen sharing request;
and the screen sharing instruction generating module is used for generating a screen sharing instruction according to the received screen sharing return information.
6. The screen sharing apparatus of claim 5, further comprising:
and the key encryption module is used for encrypting the encryption key and sending the encrypted encryption key to the sending end and the receiving end so that the sending end and the receiving end decrypt the encrypted encryption key according to a key private key.
7. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, characterized in that the processor implements the steps of the screen sharing method of any one of claims 1 to 3 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the screen sharing method of any one of claims 1 to 3.
9. A computer program product comprising computer programs/instructions, characterized in that said computer programs/instructions, when executed by a processor, implement the steps of the screen sharing method of any of claims 1 to 3.
10. A screen sharing system, comprising:
the screen sharing apparatus of any one of claims 4 to 6;
the sending end is used for encrypting the screen data based on the screen sharing instruction and the encryption key to obtain encrypted screen data and sending the encrypted screen data to the screen sharing device;
and the receiving end is used for displaying the encrypted shared data after decrypting the encrypted shared data according to the encryption key.
CN202210492761.8A 2022-05-07 2022-05-07 Screen sharing method, device and system Pending CN114884939A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210492761.8A CN114884939A (en) 2022-05-07 2022-05-07 Screen sharing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210492761.8A CN114884939A (en) 2022-05-07 2022-05-07 Screen sharing method, device and system

Publications (1)

Publication Number Publication Date
CN114884939A true CN114884939A (en) 2022-08-09

Family

ID=82673869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210492761.8A Pending CN114884939A (en) 2022-05-07 2022-05-07 Screen sharing method, device and system

Country Status (1)

Country Link
CN (1) CN114884939A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115695052A (en) * 2023-01-03 2023-02-03 平安银行股份有限公司 Data protection method and device for shared interface

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010069102A1 (en) * 2008-12-16 2010-06-24 中兴通讯股份有限公司 Moblie terminal, cipher key transmission method, decrypt method and secrecy communication realizing method
CN102984235A (en) * 2012-11-20 2013-03-20 广东欧珀移动通信有限公司 Method and system for sharing screen data
CN111418181A (en) * 2018-03-28 2020-07-14 华为技术有限公司 Shared data processing method, communication device and communication equipment
CN112511892A (en) * 2020-11-12 2021-03-16 Oppo广东移动通信有限公司 Screen sharing method, device, server and storage medium
CN113704210A (en) * 2021-09-03 2021-11-26 维沃移动通信有限公司 Data sharing method and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010069102A1 (en) * 2008-12-16 2010-06-24 中兴通讯股份有限公司 Moblie terminal, cipher key transmission method, decrypt method and secrecy communication realizing method
CN102984235A (en) * 2012-11-20 2013-03-20 广东欧珀移动通信有限公司 Method and system for sharing screen data
CN111418181A (en) * 2018-03-28 2020-07-14 华为技术有限公司 Shared data processing method, communication device and communication equipment
CN112511892A (en) * 2020-11-12 2021-03-16 Oppo广东移动通信有限公司 Screen sharing method, device, server and storage medium
CN113704210A (en) * 2021-09-03 2021-11-26 维沃移动通信有限公司 Data sharing method and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115695052A (en) * 2023-01-03 2023-02-03 平安银行股份有限公司 Data protection method and device for shared interface

Similar Documents

Publication Publication Date Title
CN103714635B (en) A kind of POS terminal and terminal master key downloading mode collocation method thereof
CN103714642B (en) Key downloading method, management method, downloading management method and device and system
CN111934879B (en) Encryption method, device, equipment and medium for data transmission of internal and external network system
CN101593389A (en) A kind of key management method and system that is used for the POS terminal
CN103237004A (en) Key download method, key management method, method, device and system for download management
CN107800716B (en) Data processing method and device
CN113140079B (en) Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system
CN112400299B (en) Data interaction method and related equipment
CN114186264A (en) Data random encryption and decryption method, device and system
CN109660534A (en) Safety certifying method, device, electronic equipment and storage medium based on more trade companies
CN108882030A (en) A kind of monitor video classification encryption and decryption method and system based on time-domain information
CN109815659A (en) Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN114884939A (en) Screen sharing method, device and system
CN112865965B (en) Train service data processing method and system based on quantum key
CN108846671B (en) Online secure transaction method and system based on block chain
CN111181920A (en) Encryption and decryption method and device
CN101533504A (en) Electric medical affairs system and device
CN108023732A (en) A kind of data guard method, device, equipment and storage medium
CN112383504A (en) Electric power thing networking block chain data management system
CN112464270A (en) Bidding file encryption and decryption method, equipment and storage medium
CN115118751B (en) Blockchain-based supervision system, method, equipment and medium
CN116843349A (en) Mobile digital medicine marketing platform based on SAAS service
CN109726584A (en) Cloud database key management system
EP4283549A1 (en) Payment service implementation method and device
CN110266641A (en) Information-reading method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination