WO2015018052A1 - Procédé et dispositif de présentation d'informations - Google Patents

Procédé et dispositif de présentation d'informations Download PDF

Info

Publication number
WO2015018052A1
WO2015018052A1 PCT/CN2013/081144 CN2013081144W WO2015018052A1 WO 2015018052 A1 WO2015018052 A1 WO 2015018052A1 CN 2013081144 W CN2013081144 W CN 2013081144W WO 2015018052 A1 WO2015018052 A1 WO 2015018052A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
information
watermark
user
secure
Prior art date
Application number
PCT/CN2013/081144
Other languages
English (en)
Chinese (zh)
Inventor
叶思海
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to PCT/CN2013/081144 priority Critical patent/WO2015018052A1/fr
Priority to CN201380001146.1A priority patent/CN103650459A/zh
Publication of WO2015018052A1 publication Critical patent/WO2015018052A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Definitions

  • the present invention relates to the field of electronic information, and in particular, to an information presentation method and device. Background technique
  • the information stored in the cloud computing system is acquired and presented, and the information is easily photographed or screenshotd after being presented, thereby causing Information disclosure.
  • the prior art proposes an information presentation method for inserting a digital watermark, specifically: embedding the watermark into the target information, and when opening the target information, presenting the target information including the watermark .
  • the watermark will be included in the result of the theft, which constitutes direct evidence of theft, thereby reducing the risk of information leakage.
  • the inventors have found that at least the following problems exist in the prior art: Since the watermark is always present in the information after the watermark is embedded in the target information, the target information is displayed at any time or place. The target information of the watermark is included, and the existence of the watermark has a certain influence on the visual effect, and thus causes great interference to the viewing and use of the target information itself. Summary of the invention
  • Embodiments of the present invention provide an information presentation method and device, which can determine whether to present a watermark according to actual conditions to avoid visual interference caused by a watermark.
  • a first aspect of the present invention provides an information presentation method, including:
  • the target information is presented in a manner that does not include a watermark
  • the target information is presented in a manner including a watermark.
  • the access information includes at least one of: access location information, user identifier information, and device identifier information
  • the access information determines that the access mode of the user includes:
  • the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
  • the access information includes at least one of: access location information, user identifier information, and device identifier information
  • the access information determines that the access mode of the user includes:
  • the access information does not belong to the security access blacklist, determine that the access mode of the user is a secure access mode
  • the access information belongs to the secure access blacklist, it is determined that the access mode of the user is a non-secure access mode.
  • the determining, by the access information, the access manner of the user includes:
  • the access authentication information indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode
  • the access mode of the user is determined to be a non-secure access mode.
  • the The way to present the target information includes:
  • the target is presented in a manner including a watermark Before the information, it also includes:
  • the factor affecting the watermark type includes at least one of the following: a watermark location, a watermark size, a watermark color, and a watermark content.
  • the method further includes:
  • the target information cannot be presented in a manner including a watermark, an alarm is issued or the service is stopped to be provided to the user.
  • a second aspect of the present invention provides an information presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, and includes: an acquiring unit, configured to acquire User access information;
  • a determining unit configured to determine, according to the access information acquired by the acquiring unit, an access mode of the user
  • a first presentation unit configured to: when the determining unit determines that the access mode is a secure access mode, present the target information in a manner that does not include a watermark;
  • a second rendering unit configured to: when the determining unit determines that the access mode is a non-secure access mode, present the target information in a manner including a watermark.
  • the access information acquired by the acquiring unit includes at least one of: access location information, user identifier information, and device identifier information, where the determining The unit includes: Querying a sub-unit, configured to query a pre-configured secure access white list according to the access information obtained by the obtaining unit;
  • Determining a sub-unit wherein when the query result obtained by the query sub-unit indicates that the access information belongs to the secure access white list, determining that the access mode of the user is a secure access mode; The query result obtained by the subunit indicates that the access information does not belong to the secure access whitelist, and determines that the access mode of the user is a non-secure access mode.
  • the access information acquired by the acquiring unit includes at least one of the following: when accessing location information, user identifier information, and device identifier information,
  • the determining unit includes:
  • Querying a sub-unit configured to query a pre-configured blacklist of security access according to the access information obtained by the acquiring unit;
  • the query result obtained by the query subunit indicates that the access information belongs to the secure access blacklist, and determines that the access mode of the user is a non-secure access mode.
  • the access information acquired by the acquiring unit includes access authentication information
  • the determining unit is further configured to:
  • the access authentication information obtained by the acquiring unit indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode;
  • the authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, and the access mode of the user is determined to be a non-secure access mode.
  • the second presentation unit is used :
  • the method further includes: a watermark determining unit, configured to acquire a security level of the target information, and determine a watermark type according to the security level, before the second rendering unit presents the target information in a manner including a watermark;
  • the second rendering unit is further configured to: present the target information in a manner that includes a watermark corresponding to the watermark type determined by the watermark determining unit.
  • the factor affecting the watermark type determined by the watermark determining unit includes at least one of the following: a watermark location, a watermark size , watermark color and watermark content.
  • the method further includes:
  • a monitoring unit configured to: in the non-secure access mode, when detecting that the second rendering unit cannot present the target information in a manner including a watermark, performing an alarm or stopping providing the service to the user.
  • a third aspect of the present invention provides a novel presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, and includes: a receiver, configured to acquire User access information;
  • a processor configured to determine, according to the access information acquired by the receiver, an access mode of the user; if the access mode is a secure access mode, control the display to present the target information in a manner that does not include a watermark;
  • the access mode is a non-secure access mode, and the control display device presents the target information in a manner including a watermark;
  • a display for presenting target information in a manner with or without a watermark under the control of the processor.
  • the access information includes at least one of the following: access location information, user identifier information, and device identifier information, where the device further includes:
  • a memory for storing a pre-configured secure access whitelist
  • the processor is further configured to: query, according to the access information acquired by the receiver, a secure access white list stored in the memory;
  • the user access mode is a secure access mode.
  • the query result indicates that the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
  • the access information includes at least one of the following: access location information, user identification information, and device identification information, where the device further includes:
  • a memory for storing a pre-configured secure access blacklist
  • the processor is further configured to: query the secure access blacklist stored in the memory according to the access information acquired by the receiver;
  • the access mode of the user is a secure access mode
  • the query result indicates that the access information does not belong to the secure access blacklist, it is determined that the access mode of the user is a non-secure access mode.
  • the access information includes access authentication information
  • the processor is further configured to:
  • the access authentication information indicates that the access mode of the user is authenticated by the access authentication system, determining that the access mode of the user is a secure access mode
  • the access mode of the user is determined to be a non-secure access mode.
  • the processor is further configured to:
  • the receiver is further configured to: Obtaining a security level of the target information before the processor controls the display to present target information in a manner including a watermark;
  • the processor is further configured to: determine a watermark type according to a security level acquired by the receiver; and present target information in a manner of including a watermark corresponding to the watermark type.
  • a factor that affects a watermark type determined by the processor includes at least one of: a watermark location, a watermark size, Watermark color and watermark content.
  • the processor is further configured to: In the non-secure access mode, if the target information cannot be presented in a manner including a watermark, an alarm is issued or the service is stopped to be provided to the user.
  • the information presentation method and device provided by the embodiment of the present invention determine whether the user is securely connected by obtaining access information of the user accessing the cloud computing system.
  • the target information can be presented in a watermark-free manner when the user accesses the security, so as to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information.
  • FIG. 1 is a flowchart of an information presentation method according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for presenting information according to another embodiment of the present invention.
  • FIG. 3 is a diagram showing an example of a system architecture in another embodiment of the present invention.
  • FIG. 4 is a diagram showing another example of a system architecture in another embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention
  • FIG. 6 is a schematic diagram of a composition of a determining unit according to another embodiment of the present invention.
  • FIG. 7 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention
  • FIG. 8 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention
  • FIG. 9 is a schematic diagram of a composition of an information presentation device according to another embodiment of the present invention.
  • An embodiment of the present invention provides an information presentation method, as shown in FIG. 1 , including:
  • the method provided by the present invention can be applied to a process in which a user accesses a target letter, I., wherein the target information is stored in a cloud computing system.
  • the access mode of the user is determined according to the access information, where the access mode includes a secure access mode and a non-secure access mode.
  • the access information includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
  • the target information is presented in a manner that does not include a watermark.
  • the target information is presented in a manner including a watermark.
  • the method for presenting the target information in a manner including a watermark includes: simultaneously presenting the target information and the independent watermark; or, inserting the watermark into the display graphic frame of the target information, and presenting the target information of the inserted watermark.
  • the information presentation method provided in this embodiment is compared with the method in the prior art in which the watermark is always present in the target information, and the access information of the user accessing the cloud computing system is obtained. Whether the user is a secure access, the target information can be presented in a watermark-free manner when the user accesses the security, to avoid visual interference caused by the watermark in the secure access mode, and is beneficial to the viewing and use of the target information.
  • Another embodiment of the present invention provides an information presentation method, as shown in FIG. 2, including:
  • the access information may include at least one of the following: the access location information, the user identifier information, and the device identifier information.
  • the access information may be Includes access authentication information.
  • the following step 202 is performed by using a scenario in which the secure access whitelist is pre-configured as an example to determine the access mode of the user:
  • Step 202 Query, according to the access information, a pre-configured secure access whitelist. If the query result indicates that the access information belongs to the secure access whitelist, determine that the access mode of the user is a secure access mode. Step 203: If the query result indicates that the access information does not belong to the secure access whitelist, determine that the access mode of the user is a non-secure access mode, and perform step 204.
  • the secure access whitelist may be queried according to the user's access location information, the user identification information, or the device identification information, or the secure access in the whitelist; or, according to the user's
  • the blacklist is queried for access location information, user identification information, or device identification information, and is not securely accessed in the blacklist.
  • the access IP address in the office area is in the whitelist, which is a secure access mode.
  • the access IP address of the hotel is not in the whitelist, and is regarded as a non-secure access mode.
  • the access location identification module is used to identify the access mode of the user. Further, the information security level identification module can identify the security level of the target information.
  • the security policy control module determines whether to present the watermark, the style, type or size of the watermark according to the user access mode and the security level, and sends the policy information to the digital watermark processing module, and the digital watermark processing module generates and presents the watermark.
  • the following step 202' is performed by using a scenario in which the security access blacklist is pre-configured. Determine the user's access method:
  • step 204 determining, according to the access information, a pre-configured secure access blacklist; if the query result indicates that the access information does not belong to the secure access blacklist, determining that the user access mode is securely connected If the query result indicates that the access information belongs to the security access blacklist, the access mode of the user is determined to be a non-secure access mode, and step 204 is performed.
  • the user access method may be determined by the following step 202:
  • step 202 determining, according to the access authentication information of the access authentication system, the access mode of the user; if the access authentication information indicates that the access mode of the user passes the authentication of the access authentication system, determining the user
  • the access mode is a secure access mode, and step 203 is performed. If the access authentication information indicates that the access mode of the user does not pass the authentication of the access authentication system, it is determined that the access mode of the user is not secure. In the access mode, step 204 is performed.
  • the user's access may also be authenticated by the access authentication system.
  • the access authentication system may access the user's access location information, user identification information, or device identifier. The information is authenticated, and the authentication may be performed by using an account password or the like. This embodiment of the present invention does not limit this.
  • the steps 202, 202 ′ and 202 ⁇ are three specific implementation manners for determining the access mode of the user, and may be selected in the above three specific implementation manners in practical applications.
  • the functions and the connection modes of the internal units of the user virtual machine in FIG. 3 and FIG. 4 are described in the embodiment of the information presentation device corresponding to FIG. 5-7, which is not described in detail in this embodiment.
  • the target information is presented in a manner that does not contain a watermark, that is, the target information is presented, and there is no watermark interference in the target information, which is convenient for the user to view, thereby not affecting the visual effect of the information itself.
  • the watermark insertion operation is performed on the present presentation, instead of generating the file in the cloud computing system. That is, insert an intrinsic watermark in each file to ensure target information. Can have a flexible presentation. The watermark and the target information are mixed and presented, and the digital watermark information is inserted into the graphic frame displayed when the target information is presented. This way of presentation, the processing is complex, but the visual effect is good. The adjustment can be made according to the surrounding graphic information of the position to be inserted. If the periphery is red, a graphic close to red can be inserted to smooth the transition.
  • step 205 may present the target information in a manner including a watermark.
  • step 204 may be replaced by: simultaneously presenting the target information and the independent watermark.
  • This display mode can be called a screen watermark, that is, the watermark has nothing to do with the content of the target information, but is displayed on the display screen, so that the file content is not changed, and at the same time, the image is prevented from being taken out and leakproof.
  • a separate digital watermark rendering process presents a corresponding type of digital watermark on the user's screen. In this way, the watermark and the target information are presented independently, and the processing is simple, but the effect of the two displays may not be very smooth.
  • the target information may be presented in a manner that includes a watermark in other manners, which is not described in this embodiment.
  • the method of the embodiment of the present invention may further include: prior to step 204, identifying a security level of the target information used by the user, and generating a watermark according to the security level information.
  • the identification method of the security level of the target information is the existing technology in the industry, and this article does not expand. Therefore, the specific implementation method of step 224 may be: forming a security policy according to the access location of the user and the security level of the document information used by the user, and performing watermark processing according to the security policy.
  • a specific security policy control method may be: when a user accesses from a non-secure area, using a top secret document, the digital watermark type is 1; when the user accesses from a non-secure area, using a confidential document, The digital watermark type presented is 2; when the user accesses from the non-secure area and uses the secret level document, the digital watermark type presented is 3.
  • the watermark type may be pre-edited, and the factors affecting the watermark type include at least one of the following: presentation at different positions of the screen, occupying the screen size, watermark color, and watermark content, and the like.
  • the watermark content may include: user-related information such as name, job number, IP address, time, and the like.
  • the embodiment may further include:
  • the target information cannot be presented in a manner including a watermark, perform an alarm or stop providing the service to the user.
  • the information presentation method provided in this embodiment is compared with the method in which the watermark is always present in the target information in the prior art, and the access information of the user accessing the cloud computing system is obtained, thereby determining whether the user is securely accessing.
  • the target information can be presented in a watermark-free manner when the user accesses the security to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information.
  • Another embodiment of the present invention provides an information presentation device, which is applied to a user accessing a cloud computing system and accessing target information stored in the cloud computing system, as shown in FIG. 5, including:
  • the obtaining unit 5 1 is configured to acquire access information of the user
  • a determining unit 52 configured to determine, according to the access information acquired by the acquiring unit 51, an access mode of the user
  • the first presentation unit 5 3 is configured to: when the determining unit 52 determines that the access mode is a secure access mode, present the target information in a manner that does not include a watermark;
  • the second rendering unit 54 is configured to: when the determining unit 52 determines that the access mode is a non-secure access mode, present the target information in a manner including a watermark.
  • the access information acquired by the obtaining unit 51 includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
  • the access information acquired by the acquiring unit 51 includes at least one of the following: the access location information, the user identifier information, and the device identifier information.
  • the determining unit 52 includes:
  • the query sub-unit 521 is configured to query the pre-configured secure access white list according to the access information obtained by the obtaining unit 51;
  • a determining sub-unit 522 configured to determine, when the query result obtained by the query sub-unit 52 1 indicates that the access information belongs to the secure access white list, determine that the access mode of the user is secure
  • the access mode is determined when the query result obtained by the query sub-unit 52 1 indicates that the access information does not belong to the secure access whitelist, and the access mode of the user is determined to be a non-secure access mode.
  • the determining unit 52 includes:
  • the query sub-unit 521 is configured to query the pre-configured secure access blacklist according to the access information obtained by the obtaining unit 51;
  • a determining sub-unit 522 configured to determine, when the query result obtained by the query sub-unit 52 1 indicates that the access information does not belong to the security access blacklist, determine that the access mode of the user is a secure access mode; When the query result obtained by the query sub-unit 521 indicates that the access information belongs to the secure access blacklist, the access mode of the user is determined to be a non-secure access mode.
  • the access information acquired by the acquiring unit 51 includes the access authentication information
  • the determining unit 52 is further configured to:
  • the second presentation unit 54 is configured to: simultaneously present the target information and the independent watermark; or insert the watermark into the display graphic frame of the target information to present the target information of the inserted watermark.
  • a watermark determining unit 55 is further configured to acquire a security level of the target information before the second rendering unit 54 presents the target information in a manner including a watermark, according to the security level. Determine the type of watermark;
  • the second rendering unit 54 is further configured to present the target information in a manner including a watermark corresponding to the watermark type determined by the watermark determining unit 55.
  • Factors affecting the type of watermark include at least one of: watermark location, watermark size, watermark color, and watermark content.
  • the information presentation device further includes: The monitoring unit 56 is configured to: in the non-secure access mode, when detecting that the second rendering unit 54 cannot present the target information in a manner including a watermark, perform an alarm or stop providing the service to the user.
  • an embodiment of the present invention further provides an information presentation device, which is applied to a process in which a user accesses a cloud computing system and accesses target information stored in the cloud computing system, as shown in FIG. , including:
  • the receiver 81 is configured to acquire access information of the user.
  • the processor 82 is configured to determine, according to the access information acquired by the receiver 81, the access mode of the user, where the access mode includes a secure access mode and a non-secure access mode;
  • the secure access mode is used to control the display to present the target information in a manner that does not include a watermark; if the access mode is a non-secure access mode, the control display presents the target information in a manner including a watermark;
  • a display 83 is configured to present the target information in a manner with or without a watermark under the control of the processor 82.
  • the access information received by the receiver 81 includes at least one of the following: access location information, access authentication information, user identification information, and device identification information.
  • the device further includes:
  • the memory 84 is configured to store a pre-configured secure access white list.
  • the processor 82 is further configured to: query, according to the access information acquired by the receiver 81, the secure access white list stored in the memory;
  • the access mode of the user is determined to be a secure access mode.
  • the query result indicates that the access information does not belong to the secure access whitelist, it is determined that the access mode of the user is a non-secure access mode.
  • the device when the access information includes at least one of the following: access location information, user identification information, and device identification information, the device further includes:
  • the memory 84 is configured to store a pre-configured secure access blacklist.
  • the processor 82 is further configured to: query, according to the access information acquired by the receiver 81, a secure access blacklist stored in the memory;
  • the access mode of the user is a secure access mode.
  • the access mode of the user is determined to be a non-secure access mode.
  • the processor 82 is further configured to: determine, according to the access authentication information received by the receiver 81, the access mode of the user; if the access authentication information indicates If the access mode of the user is authenticated by the access authentication system, the access mode of the user is determined to be a secure access mode; and the access authentication information indicates that the access mode of the user does not pass the access authentication.
  • the authentication of the system determines that the access mode of the user is a non-secure access mode.
  • processor 82 is further configured to control the display to simultaneously present target information and a separate watermark
  • the receiver 81 is further configured to: acquire a security level of the target information before the processor 82 controls the display 83 to present target information in a manner including a watermark;
  • the processor 82 is further configured to determine a watermark type according to a security level received by the receiver 81; and present the target information in a manner of including a watermark corresponding to the watermark type.
  • Factors affecting the type of watermark determined by the processor 82 include at least one of: watermark location, watermark size, watermark color, and watermark content.
  • the processor is further configured to: in the non-secure access mode, if the target information cannot be presented in a manner including a watermark, perform an alarm or stop providing the service to the user.
  • the information presentation device determines whether the user is securely accessing by obtaining the access information of the user accessing the cloud computing system, compared with the method in the prior art that the watermark is always present in the target information.
  • the target information can be presented in a watermark-free manner when the user accesses the security to avoid visual interference caused by the watermark in the secure access mode, which is beneficial to the viewing and use of the target information.
  • the invention can be implemented by means of software plus the necessary general hardware, and of course also by hardware, but in many cases the former is a better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a readable storage medium, such as a floppy disk of a computer.
  • a hard disk or optical disk or the like includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

L'invention concerne un procédé et un dispositif de présentation d'informations, qui se rapportent au domaine des informations électroniques, et peuvent déterminer s'il faut ou non présenter un tatouage numérique selon une situation pratique, de façon à éviter un brouillage visuel provoqué par le tatouage numérique. La présente invention est appliquée au processus pour qu'un utilisateur accédant à un système informatique en nuage accède à des informations cibles stockées dans le système informatique en nuage. Le procédé consiste principalement à : acquérir des informations d'accès concernant un utilisateur; déterminer une manière d'accès de l'utilisateur selon les informations d'accès; si la manière d'accès est une manière d'accès sécurisée, présenter les informations cibles d'une manière qui ne contient pas de tatouage numérique; et si la manière d'accès est une manière d'accès non sécurisée, présenter les informations cibles d'une manière qui contient le tatouage numérique.
PCT/CN2013/081144 2013-08-09 2013-08-09 Procédé et dispositif de présentation d'informations WO2015018052A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2013/081144 WO2015018052A1 (fr) 2013-08-09 2013-08-09 Procédé et dispositif de présentation d'informations
CN201380001146.1A CN103650459A (zh) 2013-08-09 2013-08-09 一种信息呈现方法及设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2013/081144 WO2015018052A1 (fr) 2013-08-09 2013-08-09 Procédé et dispositif de présentation d'informations

Publications (1)

Publication Number Publication Date
WO2015018052A1 true WO2015018052A1 (fr) 2015-02-12

Family

ID=50253432

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/081144 WO2015018052A1 (fr) 2013-08-09 2013-08-09 Procédé et dispositif de présentation d'informations

Country Status (2)

Country Link
CN (1) CN103650459A (fr)
WO (1) WO2015018052A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292180B (zh) * 2017-05-27 2019-07-05 北京北信源软件股份有限公司 一种屏幕水印处理方法及装置
CN111263025A (zh) * 2018-11-30 2020-06-09 北京京东尚科信息技术有限公司 一种图片处理方法及其装置、设备、存储介质
CN111488559B (zh) * 2020-04-10 2023-03-10 腾讯科技(深圳)有限公司 网页水印生成方法、装置、计算机设备和存储介质
CN114708138B (zh) * 2022-06-06 2022-10-04 天津联想协同科技有限公司 网盘图像水印添加方法、装置、网盘及存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177201A (zh) * 2011-10-08 2013-06-26 美国博通公司 社交网络中的内容安全
CN103189872A (zh) * 2010-09-16 2013-07-03 凡瑞斯公司 联网环境中的安全和有效内容筛选

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6400826B1 (en) * 1998-05-21 2002-06-04 Massachusetts Institute Of Technology System, method, and product for distortion-compensated information embedding using an ensemble of non-intersecting embedding generators
US8300877B2 (en) * 2007-02-20 2012-10-30 Sony Mobile Communications Ab Copy protected information distribution

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103189872A (zh) * 2010-09-16 2013-07-03 凡瑞斯公司 联网环境中的安全和有效内容筛选
CN103177201A (zh) * 2011-10-08 2013-06-26 美国博通公司 社交网络中的内容安全

Also Published As

Publication number Publication date
CN103650459A (zh) 2014-03-19

Similar Documents

Publication Publication Date Title
US9712565B2 (en) System and method to provide server control for access to mobile client data
WO2015074517A1 (fr) Procédé, dispositif et système de visionnage d'informations, et support de stockage
JP5517267B2 (ja) ウェブページ改竄防止設備、ウェブページ改竄防止方法及びそのシステム
WO2019095563A1 (fr) Procédé et appareil d'affichage de filigrane d'écran, dispositif informatique et support de stockage
US20130283061A1 (en) Image processing method and apparatus for privacy protection of captured image
WO2013159725A1 (fr) Procédé et appareil d'accès à une application
WO2014201830A1 (fr) Procédé et dispositif de détection de la modification d'un logiciel
WO2016115888A1 (fr) Procédé de capture de photographie, procédé de visualisation d'image, système et terminal
US10264000B2 (en) Malicious website access method and apparatus
US10348783B2 (en) Controlling visibility and distribution of shared conferencing data
WO2016169267A1 (fr) Procédé et dispositif de partage d'images
CN105530261B (zh) 隐私信息的保护方法及装置
WO2015018052A1 (fr) Procédé et dispositif de présentation d'informations
US9479678B1 (en) Method and device for image processing, and storage medium
WO2017092291A1 (fr) Procédé et appareil d'acquisition de pièces de certification
CN105306479A (zh) 一种计算机数据嵌入方法、显示方法及其装置
JP2011141806A (ja) ネットワークへの情報流出防止装置
WO2023202214A1 (fr) Procédé, appareil et système de communication, terminal et serveur
JP5535056B2 (ja) 機密管理装置、機密管理方法、及びプログラム
JP2008217675A (ja) 情報閲覧システム、端末、その制御方法、その制御プログラム、及び記録媒体
WO2023046104A1 (fr) Procédé et dispositif de déplacement d'objet
US20130014214A1 (en) System Security Process Method and Properties of Human Authorization Mechanism
CN108696355B (zh) 一种防止用户头像盗用的方法及系统
CN110532792B (zh) 一种隐私信息的查看方法及系统
JP2020140735A (ja) コンテンツアクセスに対するカメラベースのユーザ認証のための装置および方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13891127

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13891127

Country of ref document: EP

Kind code of ref document: A1