US20230026954A1 - Method for embedding user information in webpages and electronic device implementing method - Google Patents
Method for embedding user information in webpages and electronic device implementing method Download PDFInfo
- Publication number
- US20230026954A1 US20230026954A1 US17/552,906 US202117552906A US2023026954A1 US 20230026954 A1 US20230026954 A1 US 20230026954A1 US 202117552906 A US202117552906 A US 202117552906A US 2023026954 A1 US2023026954 A1 US 2023026954A1
- Authority
- US
- United States
- Prior art keywords
- value
- user information
- rgb
- converting
- transparency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000006243 chemical reaction Methods 0.000 claims description 22
- 230000006870 function Effects 0.000 description 6
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000004590 computer program Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/126—Character encoding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
- G06T11/001—Texturing; Colouring; Generation of texture or colour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/14—Tree-structured documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Definitions
- the subject matter herein generally relates to data security, specifically a method for embedding user information in webpages based on color coding and an electronic device implementing the method.
- FIG. 1 is a block diagram of an electronic device implementing a method for embedding user information in webpages in one embodiment of the present disclosure.
- FIG. 2 is a flowchart of a method for embedding user information in webpages provided in one embodiment of the present disclosure.
- FIG. 1 is a block diagram of an electronic device implementing a method for embedding user information in webpages in one embodiment of the present disclosure.
- an electronic device 1 includes, but is not limited to, a storage device 11 and at least one processor 12 .
- the above-mentioned components may be connected through a communication bus 13 or directly connected.
- the electronic device 1 may be a computer, a mobile phone, a tablet computer, a personal digital assistant (PDA), and other devices with application programs installed.
- PDA personal digital assistant
- FIG. 1 is only an example of the electronic device 1 and does not constitute a limitation on the electronic device 1 .
- the electronic device 1 may also include input and output devices, network access devices, buses, and so on.
- the electronic device 1 can embed user information in a webpage. When the webpage is leaked, a user who leaks the webpage can be traced.
- FIG. 2 is a flowchart of a method for embedding user information in webpages in one embodiment.
- the method may be applied in an electronic device (such as the electronic device 1 of FIG. 1 ).
- the order of the steps in the flowchart may be changed, and some steps may be omitted.
- the electronic device obtains user information of a user who logs into a target website.
- the target website can be an enterprise website.
- the user information may include a user name and/or a user ID.
- the user information may include Chinese character, alphabetic character, and numeric string. For example, the user information is “ A1234567”.
- the electronic device when the user logs into the target website, the electronic device obtains the user information input by the user.
- the electronic device can encrypt the user information to obtain encrypted information.
- a method of encrypting the user information to obtain the encrypted information may include: randomly generating a character string; and encrypting the user information using the character string.
- the character string may be used as an encryption key, and a preset encryption algorithm may be used to encrypt the user information.
- the preset encryption algorithm can be selected according to user requirements.
- the preset encryption algorithm may be Advanced Encryption Standard (AES) encryption algorithm or exclusive or (XOR) encryption algorithm.
- the user information may be left unencrypted.
- the electronic device converts the encrypted information into color values.
- the electronic device may convert the user information into color values.
- a method of converting the user information or the encrypted information into color values may include (1) to (5) described below.
- the electronic device determines a Chinese character, an alphabetic character, and a numeric string in the user information or the encrypted information.
- the electronic device converts the Chinese character (such as “ ”) into a first RGB value according to a first conversion rule.
- the first RGB value includes a first red (R) value, a first green (G) value, and a first blue (B) value.
- a method of converting the Chinese character into a first RGB value according to a first conversion rule may include: converting the Chinese character into a decimal ASCII code; dividing the decimal ASCII code into three portions denoted as A1, B1, and C1 according to a first ratio; calculating the first R value, the first G value, and the first B value according to the three portions of A1, B1, and C1; and combining the first R value, the first G value, and the first B value to the first RGB value.
- the first R value can be 255/A1
- the first G value can be 255/B1
- the first B value can be 255/C1.
- a RGB value is a color value of red (R), green (G), and blue (B) channels. It should be noted that when A1 is equal to 0, the first R value is 0, when B1 is equal to 0, the first G value is 0, and when C1 is equal to 0, the first B value is 0.
- the electronic device converts the alphabetic character (such as “A”) into a transparency value according to a second conversion rule.
- a method of converting the alphabetic character into a transparency value according to a second conversion rule may include: obtaining an ordinal number of the alphabetic character in an alphabet; calculating a ratio value according to the ordinal number and a preset scale factor; and setting the ratio value as the transparency value.
- the preset scale factor is equal to or more than 26. The smaller the transparency value, the more transparent a color, and the larger the transparency value, the more opaque the color.
- the electronic device converts the numeric string (such as “1234567”) into a second RGB value according to a third conversion rule.
- the second RGB value includes a second R value, a second G value, and a second B value.
- a method of converting the numeric string into a second RGB value according to a third conversion rule may include: dividing the numeric string into three portions denoted as A2, B2, and C2 according to a second ratio; calculating the second R value, the second G value, and the second B value according to the three portions of A2, B2, and C2; and combining the second R value, the second G value, and the second B value to the second RGB value.
- the second R value can be 255/A2, the second G value can be 255/B2, and the second B value can be 255/C2. It should be noted that when A2 is equal to 0, the second R value is 0, when B2 is equal to 0, the second G value is 0, and when C2 is equal to 0, the second B value is 0.
- the electronic device obtains the color values according to the first RGB value, the transparency value, and the second RGB value.
- the user information is “ A1234567”.
- a first character in the user information is a Chinese character “ ”, and a decimal ASCII code obtained for “ ” is “54992”.
- “54992” can be divided into three portions of 54, 99, and 2 according to the first ratio.
- the first RGB value is (4.722, 2.576, 127.5).
- the first RGB value (4.722, 2.576, 127.5) denotes a color.
- the remaining characters in the user information are numeric string “1234567”, and “1234567” is divided into three groups of 123, 45, and 67 according to the second ratio.
- the second RGB value is (2.073, 5.667, 3.806).
- the second RGB value (2.073, 5.667, 3.806) also denotes a color.
- the method of converting the user information into color values according to conversion rules between color values and characters ensures that the R value, the G value, and the B value are all within the range of (0, 255).
- the electronic device embeds the color values in a target webpage of the target website.
- the target webpage can be any webpage of the target website.
- the user information can be retrieved and obtained according to the color values embedded in the target webpage.
- a method of embedding the color values in the target webpage may include: generating a graphic according to the color values; and embedding the graphic in the target webpage.
- the graphic can be generated according to user requirements.
- the graphic can be a bar code.
- a location where the graphic is embedded can be set according to user requirements.
- the graphic can be embedded at a lower right corner of the target webpage.
- the electronic device may further obtain the first RGB value, the transparency value, and the second RGB value according to the graphic.
- the electronic device obtains the Chinese character according to the first RGB value; obtains the alphabetic character according to the transparency value, and obtains the numeric string according to the second RGB value.
- the electronic device obtains the user information according to the Chinese character, the alphabetic character, and the numeric string. According to the user information, the user can be identified.
- the graphic may include the color values.
- the electronic device may identify the color values according to the graphic, and obtain the first RGB value, the transparency value, and the second RGB value from the color values.
- the electronic device may calculate the decimal ASCII code (the decimal ASCII code may be 255/the first RGB value), and obtain the Chinese character according to the decimal ASCII code.
- the electronic device may calculate the ordinal number (the ordinal number may be 26*the transparency value), and obtain the alphabetic character according to the ordinal number.
- the electronic device may calculate the numeric string (the numeric string may be 255/the second RGB value).
- the electronic device can retrieve the user information according to the Chinese character, the alphabetic character, and the numeric string.
- a user information database may be searched to determine whether the data input by a user matches the retrieved user information.
- the first RGB value, the transparency value, and the second RGB value are respectively (4.722, 2.576, 127.5), 0.038, and (2.073, 5.667, 3.806).
- (255/4.722, 255/2.576, 255/127.5) i.e., (54, 99, 2)
- the decimal ASCII code is 54992
- the Chinese character “ ” is obtained according to the decimal ASCII code of “54992”.
- the ordinal number is calculated as 26*0.038 (i.e., 1), and the alphabetic character “A” is obtained according to the ordinal number.
- the numeric string is 1234567.
- the user information “ A1234567” is obtained.
- user information is converted into color values, the color values are embedded in the target webpage. If the target webpage or information in the target webpage is leaked, the user information can be obtained from the target webpage. Therefore, the source of the leakage can be traced, the security of the target webpage is improved.
- the storage device 11 may be an internal memory of the electronic device 1 , that is, a memory built in the electronic device 1 . In other embodiments, the storage device 11 may also be a connected external memory of the electronic device 1 .
- the storage device 11 may be used to store computer program, and the processor 12 implements various functions of the electronic device 1 by running or executing the computer program or module stored in the storage device 11 and calling up data stored in the storage device 11 .
- the storage device 11 may mainly include a storage program area and a storage data area.
- the storage program area may store an operating system, an application program required by at least one function, etc.; the storage data area may store data created according to the use of the electronic device 1 .
- the storage device 11 may include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card (SMC), a secure digital (SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- non-volatile memory such as a hard disk, a memory, a plug-in hard disk, a smart memory card (SMC), a secure digital (SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- the processor 12 may be a central processing unit (CPU) or other general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic device, a discrete gate, or a transistor logic device, or a discrete hardware component, etc.
- the processor 12 may be a microprocessor or any conventional processor.
- the processor 12 may be a control center of the electronic device 1 , and connect various parts of the entire electronic device 1 by using various interfaces and lines.
- the computer program may be divided into one or more modules, and the one or more modules are stored in the storage device 11 and executed by the processor 12 to complete the method for embedding user information in webpages of the present disclosure.
- the one or more modules can be a series of computer-readable instruction segments capable of performing specific functions, and the instruction segments are used to describe execution processes of the computer program in the electronic device 1 .
- modules integrated in the electronic device 1 When the modules integrated in the electronic device 1 are implemented in the form of software functional units and used as independent units, they can be stored in a non-transitory readable storage medium. Based on this understanding, all or part of the processes in the methods of the above embodiments implemented by the present disclosure can also be completed by related hardware instructed by computer-readable instructions.
- the computer-readable instructions may be stored in a non-transitory readable storage medium.
- the computer-readable instructions when executed by the processor, may implement the steps of the foregoing method embodiments.
- the computer-readable instructions include computer-readable instruction codes, and the computer-readable instruction codes can be source code, object code, an executable file, or in some intermediate form.
- the non-transitory readable storage medium may include any entity or device capable of carrying the computer-readable instruction code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM).
- a recording medium a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM).
- ROM read-only memory
- the disclosed electronic device and method may be implemented in other ways.
- the embodiment of the electronic device described above is merely illustrative.
- the units are only obtained by logical function divisions, and there may be other manners of division in actual implementation.
- modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, may be located in one place, or may be distributed on multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the method of this embodiment.
- each functional unit in each embodiment of the present disclosure can be integrated into one processing unit, or can be physically present separately in each unit, or two or more units can be integrated into one unit.
- the above integrated unit can be implemented in a form of hardware or in a form of a software functional unit.
- the above integrated modules implemented in the form of function modules may be stored in a storage medium.
- the above function modules may be stored in a storage medium, and include several instructions to enable an electronic device (which may be a personal computer, server, or network device, etc.) or processor to execute the method described in the embodiment of the present disclosure.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Document Processing Apparatus (AREA)
- Editing Of Facsimile Originals (AREA)
- Storage Device Security (AREA)
- Image Processing (AREA)
Abstract
Description
- The subject matter herein generally relates to data security, specifically a method for embedding user information in webpages based on color coding and an electronic device implementing the method.
- With the development of enterprise informatization, information security of enterprise website has become more and more important. If a webpage is leaked, it is difficult to trace the source of the leakage, and a means of tracing the leaker would be additional security against the leaking.
-
FIG. 1 is a block diagram of an electronic device implementing a method for embedding user information in webpages in one embodiment of the present disclosure. -
FIG. 2 is a flowchart of a method for embedding user information in webpages provided in one embodiment of the present disclosure. - For clarity, of illustration of objectives, features and advantages of the present disclosure, the drawings combined with the detailed description illustrate the embodiments of the present disclosure hereinafter. It is noted that embodiments of the present disclosure and features of the embodiments can be combined, when there is no conflict.
-
FIG. 1 is a block diagram of an electronic device implementing a method for embedding user information in webpages in one embodiment of the present disclosure. Referring toFIG. 1 , an electronic device 1 includes, but is not limited to, astorage device 11 and at least oneprocessor 12. The above-mentioned components may be connected through acommunication bus 13 or directly connected. - The electronic device 1 may be a computer, a mobile phone, a tablet computer, a personal digital assistant (PDA), and other devices with application programs installed. Those skilled in the art can understand that
FIG. 1 is only an example of the electronic device 1 and does not constitute a limitation on the electronic device 1. For example, the electronic device 1 may also include input and output devices, network access devices, buses, and so on. - Security of information in relation to an enterprise website is more and more necessary. The electronic device 1 can embed user information in a webpage. When the webpage is leaked, a user who leaks the webpage can be traced.
-
FIG. 2 is a flowchart of a method for embedding user information in webpages in one embodiment. The method may be applied in an electronic device (such as the electronic device 1 ofFIG. 1 ). According to different requirements, the order of the steps in the flowchart may be changed, and some steps may be omitted. - In block S21, the electronic device obtains user information of a user who logs into a target website.
- The target website can be an enterprise website.
-
- In one embodiment, when the user logs into the target website, the electronic device obtains the user information input by the user.
- In block S22, for additional security, the electronic device can encrypt the user information to obtain encrypted information.
- A method of encrypting the user information to obtain the encrypted information may include: randomly generating a character string; and encrypting the user information using the character string.
- In the process of encrypting the user information, the character string may be used as an encryption key, and a preset encryption algorithm may be used to encrypt the user information. The preset encryption algorithm can be selected according to user requirements. For example, the preset encryption algorithm may be Advanced Encryption Standard (AES) encryption algorithm or exclusive or (XOR) encryption algorithm.
- In another embodiment, the user information may be left unencrypted.
- In block S23, the electronic device converts the encrypted information into color values.
- In another embodiment, the electronic device may convert the user information into color values.
- In one embodiment, a method of converting the user information or the encrypted information into color values may include (1) to (5) described below.
- (1) The electronic device determines a Chinese character, an alphabetic character, and a numeric string in the user information or the encrypted information.
- (2) The electronic device converts the Chinese character (such as “”) into a first RGB value according to a first conversion rule. The first RGB value includes a first red (R) value, a first green (G) value, and a first blue (B) value. A method of converting the Chinese character into a first RGB value according to a first conversion rule may include: converting the Chinese character into a decimal ASCII code; dividing the decimal ASCII code into three portions denoted as A1, B1, and C1 according to a first ratio; calculating the first R value, the first G value, and the first B value according to the three portions of A1, B1, and C1; and combining the first R value, the first G value, and the first B value to the first RGB value. The first R value can be 255/A1, the first G value can be 255/B1, and the first B value can be 255/C1. A RGB value is a color value of red (R), green (G), and blue (B) channels. It should be noted that when A1 is equal to 0, the first R value is 0, when B1 is equal to 0, the first G value is 0, and when C1 is equal to 0, the first B value is 0.
- (3) The electronic device converts the alphabetic character (such as “A”) into a transparency value according to a second conversion rule. A method of converting the alphabetic character into a transparency value according to a second conversion rule may include: obtaining an ordinal number of the alphabetic character in an alphabet; calculating a ratio value according to the ordinal number and a preset scale factor; and setting the ratio value as the transparency value. It should be noted that the preset scale factor is equal to or more than 26. The smaller the transparency value, the more transparent a color, and the larger the transparency value, the more opaque the color.
- (4) The electronic device converts the numeric string (such as “1234567”) into a second RGB value according to a third conversion rule. The second RGB value includes a second R value, a second G value, and a second B value. A method of converting the numeric string into a second RGB value according to a third conversion rule may include: dividing the numeric string into three portions denoted as A2, B2, and C2 according to a second ratio; calculating the second R value, the second G value, and the second B value according to the three portions of A2, B2, and C2; and combining the second R value, the second G value, and the second B value to the second RGB value. The second R value can be 255/A2, the second G value can be 255/B2, and the second B value can be 255/C2. It should be noted that when A2 is equal to 0, the second R value is 0, when B2 is equal to 0, the second G value is 0, and when C2 is equal to 0, the second B value is 0.
- (5) The electronic device obtains the color values according to the first RGB value, the transparency value, and the second RGB value.
- For example, the user information is “ A1234567”. A first character in the user information is a Chinese character “”, and a decimal ASCII code obtained for “” is “54992”. “54992” can be divided into three portions of 54, 99, and 2 according to the first ratio. The first R value is calculated to be 255/54=4.722. The first G value is calculated to be 255/99=2.576. The first B value is calculated to be 255/2=127.5. The first RGB value is (4.722, 2.576, 127.5). The first RGB value (4.722, 2.576, 127.5) denotes a color. A second character in the user information is an alphabetic character “A”, an ordinal number of “A” in the alphabet is 1, the preset scale factor is 26, and the transparency value is 1/26=0.038. The remaining characters in the user information are numeric string “1234567”, and “1234567” is divided into three groups of 123, 45, and 67 according to the second ratio. The second R value is calculated to be 255/123=2.073. The second G value is calculated to be 255/45=5.667. The second B value is calculated to be 255/67=3.806. The second RGB value is (2.073, 5.667, 3.806). The second RGB value (2.073, 5.667, 3.806) also denotes a color.
- The method of converting the user information into color values according to conversion rules between color values and characters ensures that the R value, the G value, and the B value are all within the range of (0, 255).
- In block S24, the electronic device embeds the color values in a target webpage of the target website.
- The target webpage can be any webpage of the target website.
- The user information can be retrieved and obtained according to the color values embedded in the target webpage.
- In one embodiment, a method of embedding the color values in the target webpage may include: generating a graphic according to the color values; and embedding the graphic in the target webpage. The graphic can be generated according to user requirements. For example, the graphic can be a bar code. A location where the graphic is embedded can be set according to user requirements. For example, the graphic can be embedded at a lower right corner of the target webpage.
- After embedding the graphic in the target webpage, the electronic device may further obtain the first RGB value, the transparency value, and the second RGB value according to the graphic. The electronic device obtains the Chinese character according to the first RGB value; obtains the alphabetic character according to the transparency value, and obtains the numeric string according to the second RGB value. The electronic device obtains the user information according to the Chinese character, the alphabetic character, and the numeric string. According to the user information, the user can be identified.
- The graphic may include the color values. The electronic device may identify the color values according to the graphic, and obtain the first RGB value, the transparency value, and the second RGB value from the color values. The electronic device may calculate the decimal ASCII code (the decimal ASCII code may be 255/the first RGB value), and obtain the Chinese character according to the decimal ASCII code. The electronic device may calculate the ordinal number (the ordinal number may be 26*the transparency value), and obtain the alphabetic character according to the ordinal number. The electronic device may calculate the numeric string (the numeric string may be 255/the second RGB value). The electronic device can retrieve the user information according to the Chinese character, the alphabetic character, and the numeric string. A user information database may be searched to determine whether the data input by a user matches the retrieved user information.
- In one example, the first RGB value, the transparency value, and the second RGB value are respectively (4.722, 2.576, 127.5), 0.038, and (2.073, 5.667, 3.806). (255/4.722, 255/2.576, 255/127.5) (i.e., (54, 99, 2)) is output as a calculation. Therefore, the decimal ASCII code is 54992, and the Chinese character “” is obtained according to the decimal ASCII code of “54992”. The ordinal number is calculated as 26*0.038 (i.e., 1), and the alphabetic character “A” is obtained according to the ordinal number. (255/2.073, 255/5.667, 255/3.806) (i.e., (123, 45, 67)) is output, therefore, the numeric string is 1234567. According to the Chinese character, the alphabetic character, and the numeric string, the user information “ A1234567” is obtained.
- In the present disclosure, user information is converted into color values, the color values are embedded in the target webpage. If the target webpage or information in the target webpage is leaked, the user information can be obtained from the target webpage. Therefore, the source of the leakage can be traced, the security of the target webpage is improved.
- Referring to
FIG. 1 , in one embodiment, thestorage device 11 may be an internal memory of the electronic device 1, that is, a memory built in the electronic device 1. In other embodiments, thestorage device 11 may also be a connected external memory of the electronic device 1. - The
storage device 11 may be used to store computer program, and theprocessor 12 implements various functions of the electronic device 1 by running or executing the computer program or module stored in thestorage device 11 and calling up data stored in thestorage device 11. Thestorage device 11 may mainly include a storage program area and a storage data area. The storage program area may store an operating system, an application program required by at least one function, etc.; the storage data area may store data created according to the use of the electronic device 1. In addition, thestorage device 11 may include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a smart memory card (SMC), a secure digital (SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. - The
processor 12 may be a central processing unit (CPU) or other general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field-programmable gate array (FPGA) or other programmable logic device, a discrete gate, or a transistor logic device, or a discrete hardware component, etc. Theprocessor 12 may be a microprocessor or any conventional processor. Theprocessor 12 may be a control center of the electronic device 1, and connect various parts of the entire electronic device 1 by using various interfaces and lines. - In an exemplary embodiment, the computer program may be divided into one or more modules, and the one or more modules are stored in the
storage device 11 and executed by theprocessor 12 to complete the method for embedding user information in webpages of the present disclosure. The one or more modules can be a series of computer-readable instruction segments capable of performing specific functions, and the instruction segments are used to describe execution processes of the computer program in the electronic device 1. - When the modules integrated in the electronic device 1 are implemented in the form of software functional units and used as independent units, they can be stored in a non-transitory readable storage medium. Based on this understanding, all or part of the processes in the methods of the above embodiments implemented by the present disclosure can also be completed by related hardware instructed by computer-readable instructions. The computer-readable instructions may be stored in a non-transitory readable storage medium. The computer-readable instructions, when executed by the processor, may implement the steps of the foregoing method embodiments. The computer-readable instructions include computer-readable instruction codes, and the computer-readable instruction codes can be source code, object code, an executable file, or in some intermediate form. The non-transitory readable storage medium may include any entity or device capable of carrying the computer-readable instruction code, a recording medium, a U disk, a mobile hard disk, a magnetic disk, an optical disk, a computer memory, and a read-only memory (ROM).
- It should be understood that the disclosed electronic device and method may be implemented in other ways. For example, the embodiment of the electronic device described above is merely illustrative. For example, the units are only obtained by logical function divisions, and there may be other manners of division in actual implementation.
- The modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules, that is, may be located in one place, or may be distributed on multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the method of this embodiment.
- In addition, each functional unit in each embodiment of the present disclosure can be integrated into one processing unit, or can be physically present separately in each unit, or two or more units can be integrated into one unit. The above integrated unit can be implemented in a form of hardware or in a form of a software functional unit.
- The above integrated modules implemented in the form of function modules may be stored in a storage medium. The above function modules may be stored in a storage medium, and include several instructions to enable an electronic device (which may be a personal computer, server, or network device, etc.) or processor to execute the method described in the embodiment of the present disclosure.
- The present disclosure is not limited to the details of the above-described exemplary embodiments, and the present disclosure can be embodied in other specific forms without departing from the spirit or essential characteristics of the present disclosure. Therefore, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present disclosure is defined by the appended claims. All changes and variations in the meaning and scope of equivalent elements are included in the present disclosure. Any reference sign in the claims should not be construed as limiting the claim. Furthermore, the word “comprising” does not exclude other units nor does the singular exclude the plural. A plurality of units or devices stated in the system claims may also be implemented by one unit or device through software or hardware. Words such as “first” and “second” are used to indicate names but do not signify any particular order.
- Finally, the above embodiments are only used to illustrate technical solutions of the present disclosure, and are not to be taken as restrictions on the technical solutions. Although the present disclosure has been described in detail with reference to the above embodiments, those skilled in the art should understand that the technical solutions described in one embodiments can be modified, or some of technical features can be equivalently substituted, and that these modifications or substitutions are not to detract from the essence of the technical solutions or from the scope of the technical solutions of the embodiments of the present disclosure.
Claims (20)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110806627.6 | 2021-07-16 | ||
CN202110806627.6A CN115618812A (en) | 2021-07-16 | 2021-07-16 | User information embedding method based on color coding, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
US20230026954A1 true US20230026954A1 (en) | 2023-01-26 |
US11580676B1 US11580676B1 (en) | 2023-02-14 |
Family
ID=84855434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/552,906 Active US11580676B1 (en) | 2021-07-16 | 2021-12-16 | Method for embedding user information in webpages and electronic device implementing method |
Country Status (3)
Country | Link |
---|---|
US (1) | US11580676B1 (en) |
CN (1) | CN115618812A (en) |
TW (1) | TW202305631A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020129252A1 (en) * | 2001-01-23 | 2002-09-12 | Masayoshi Nishitani | Digital watermarking apparatus and its method and digital watermark reproducing apparatus and its method |
US20030097568A1 (en) * | 2000-11-02 | 2003-05-22 | Jong-Uk Choi | Watermaking system and method for protecting a digital image from forgery or alteration |
US20080080009A1 (en) * | 2006-09-28 | 2008-04-03 | Fujitsu Limited | Electronic watermark embedding apparatus and electronic watermark detection apparatus |
US8009862B2 (en) * | 2007-11-27 | 2011-08-30 | Seiko Epson Corporation | Embedding data in images |
US20110314550A1 (en) * | 2010-06-22 | 2011-12-22 | Microsoft Corporation | Watermark to identify leak source |
US8891862B1 (en) * | 2013-07-09 | 2014-11-18 | 3M Innovative Properties Company | Note recognition and management using color classification |
US20170329943A1 (en) * | 2016-05-12 | 2017-11-16 | Markany Inc. | Method and apparatus for embedding and extracting text watermark |
US20180292951A1 (en) * | 2015-12-25 | 2018-10-11 | Ricoh Company, Ltd. | Image processing apparatus, image display method, and non-transitory recording medium |
US20220269487A1 (en) * | 2021-02-22 | 2022-08-25 | Mellanox Technologies, Ltd. | Efficient Montgomery Multiplier |
-
2021
- 2021-07-16 CN CN202110806627.6A patent/CN115618812A/en active Pending
- 2021-07-29 TW TW110127980A patent/TW202305631A/en unknown
- 2021-12-16 US US17/552,906 patent/US11580676B1/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030097568A1 (en) * | 2000-11-02 | 2003-05-22 | Jong-Uk Choi | Watermaking system and method for protecting a digital image from forgery or alteration |
US20020129252A1 (en) * | 2001-01-23 | 2002-09-12 | Masayoshi Nishitani | Digital watermarking apparatus and its method and digital watermark reproducing apparatus and its method |
US20080080009A1 (en) * | 2006-09-28 | 2008-04-03 | Fujitsu Limited | Electronic watermark embedding apparatus and electronic watermark detection apparatus |
US8009862B2 (en) * | 2007-11-27 | 2011-08-30 | Seiko Epson Corporation | Embedding data in images |
US20110314550A1 (en) * | 2010-06-22 | 2011-12-22 | Microsoft Corporation | Watermark to identify leak source |
US8891862B1 (en) * | 2013-07-09 | 2014-11-18 | 3M Innovative Properties Company | Note recognition and management using color classification |
US20180292951A1 (en) * | 2015-12-25 | 2018-10-11 | Ricoh Company, Ltd. | Image processing apparatus, image display method, and non-transitory recording medium |
US20170329943A1 (en) * | 2016-05-12 | 2017-11-16 | Markany Inc. | Method and apparatus for embedding and extracting text watermark |
US20220269487A1 (en) * | 2021-02-22 | 2022-08-25 | Mellanox Technologies, Ltd. | Efficient Montgomery Multiplier |
Also Published As
Publication number | Publication date |
---|---|
US11580676B1 (en) | 2023-02-14 |
CN115618812A (en) | 2023-01-17 |
TW202305631A (en) | 2023-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040341B (en) | Intelligent contract address generation method and device, computer equipment and readable storage medium | |
CN110245469B (en) | Webpage watermark generation method, watermark analysis method, device and storage medium | |
CN107408135B (en) | Database server and client for query processing of encrypted data | |
US10242203B2 (en) | Format preservation based masking system and method | |
CN110597511B (en) | Page automatic generation method, system, terminal equipment and storage medium | |
CN110597814B (en) | Structured data serialization and deserialization method and device | |
DE102018125530A1 (en) | Procedures and arrangements for implicit integrity | |
CN105205359A (en) | Method and device for protecting JavaScript codes | |
CN110489466B (en) | Method and device for generating invitation code, terminal equipment and storage medium | |
CN113364753B (en) | Anti-crawler method and device, electronic equipment and computer readable storage medium | |
CN112035857B (en) | Data protection method, device, equipment and medium | |
CN112487253B (en) | User invitation code generation method, verification method, device, equipment and storage medium | |
CN110968847A (en) | File watermark hiding and analyzing method, device, equipment and storage medium | |
CN112001376B (en) | Fingerprint identification method, device, equipment and storage medium based on open source component | |
CN113127915A (en) | Data encryption desensitization method and device, electronic equipment and storage medium | |
CN112395630A (en) | Data encryption method and device based on information security, terminal equipment and medium | |
CN110210211A (en) | A kind of method of data protection and calculate equipment | |
CN110677245B (en) | Coordinate transformation parameter encryption and decryption method based on dongle | |
CN117725062A (en) | Database table processing method and device, storage medium and computer equipment | |
CN117725333A (en) | Text steganography method and device for browser webpage and electronic equipment | |
US11580676B1 (en) | Method for embedding user information in webpages and electronic device implementing method | |
CN116702103A (en) | Database watermark processing method, database watermark tracing method and device | |
CN111291084A (en) | Sample ID alignment method, device, equipment and storage medium | |
CN115758432A (en) | Omnibearing data encryption method and system based on machine learning algorithm | |
CN116127419A (en) | Data processing method, data identification method, font file generation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HON HAI PRECISION INDUSTRY CO., LTD., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LU, XIN;LIU, HUI-FENG;ZHANG, YU-YONG;AND OTHERS;REEL/FRAME:058408/0418 Effective date: 20211213 Owner name: FU TAI HUA INDUSTRY (SHENZHEN) CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LU, XIN;LIU, HUI-FENG;ZHANG, YU-YONG;AND OTHERS;REEL/FRAME:058408/0418 Effective date: 20211213 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |