WO2019237941A1 - Secure implementation method and apparatus for screenshot of client data, and medium - Google Patents

Secure implementation method and apparatus for screenshot of client data, and medium Download PDF

Info

Publication number
WO2019237941A1
WO2019237941A1 PCT/CN2019/089341 CN2019089341W WO2019237941A1 WO 2019237941 A1 WO2019237941 A1 WO 2019237941A1 CN 2019089341 W CN2019089341 W CN 2019089341W WO 2019237941 A1 WO2019237941 A1 WO 2019237941A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
screenshot
watermark
album
user
Prior art date
Application number
PCT/CN2019/089341
Other languages
French (fr)
Chinese (zh)
Inventor
尚晋
胡小锋
秦亚洲
Original Assignee
京东数字科技控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东数字科技控股有限公司 filed Critical 京东数字科技控股有限公司
Publication of WO2019237941A1 publication Critical patent/WO2019237941A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to a method, a device, and a medium for securely implementing a screen capture of client data.
  • the rapid development of mobile Internet and the portability of mobile devices are increasing the number of people who use mobile devices for office work. Users can even use mobile clients to access company data on any occasion.
  • the data accessed by users is likely to involve sensitive data of the company. For example, if a user takes a screenshot of sensitive data and then sends it to the network, it will pose a great threat to the company.
  • the prior art adopts the following two methods to solve this kind of problem: the first is to completely prohibit screen capture. For example, users are completely prohibited from using the client to take screenshots in certain situations.
  • the second is to add a new watermarked screenshot to the user's album after the user takes a screenshot.
  • the present disclosure provides a method, a device, and a medium for safely implementing screen capture of client data, thereby at least partially solving one or more problems due to limitations and defects of related technologies.
  • An aspect of the present disclosure provides a method for securely capturing a screenshot of client data, comprising: monitoring the number of pictures of the client's album when an application of the client is running; and receiving a screenshot from the client Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
  • the method before monitoring the number of pictures of the client album, the method includes receiving a permission that the client agrees to monitor the client's album.
  • the method before acquiring the added screenshot picture, further includes: sending a selection prompt box to the client, the selection prompt box being used to ask the user whether to add a watermark to the screenshot picture; Receiving operation information of the selection prompt box by the user, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the method further includes recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the method further includes compressing the screenshot image, so as to reduce the screenshot image occupying a memory space of the client.
  • the method further includes generating a watermark with user information based on the user information.
  • Another aspect of the present disclosure provides a device for implementing security on screen capture of client data, including: a monitoring module for monitoring the number of pictures of the client's album when an application of the client is running; an acquisition module To receive a screenshot notification from the client.
  • a monitoring module for monitoring the number of pictures of the client's album when an application of the client is running
  • an acquisition module To receive a screenshot notification from the client.
  • the number of pictures of the album is monitored to increase, obtain the increased screenshot picture; add a watermark module to add a screenshot with the screenshot picture Watermark the user information, and replace the screenshots of the album with the screenshots after adding the watermark, so that the number of pictures in the album is increased by one compared to the number before the screenshots are generated.
  • the apparatus before monitoring the number of pictures of the client album, the apparatus further includes: a first receiving module, configured to receive a permission that the client agrees to monitor the client's album.
  • the device before acquiring the added screenshot picture, the device further includes: a sending module that sends a selection prompt box to the client, the selection prompt box is used to ask the user whether to take the screenshot picture Adding a watermark; a second receiving module, configured to receive the user's operation information on the selection prompt box, the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the device further includes a recording module for recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the device further includes a compression module for compressing the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
  • the device further includes a generating module that generates a watermark with user information based on the user information.
  • the device includes one or more processors, and a storage device.
  • the storage device is used to store one or more programs. Wherein, when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the security implementation method of the client data being captured as described above.
  • Another aspect of the present disclosure provides a computer-readable medium having executable instructions stored thereon that, when executed by a processor, cause the processor to perform a secure implementation method of the client-side data being captured as described above.
  • Another aspect of the present disclosure provides a computer program including computer-executable instructions that, when executed, are used to implement a secure implementation method of a client-side data screen capture.
  • the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • FIG. 1 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to an embodiment of the present disclosure
  • FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 3 schematically illustrates a flowchart of a method for implementing a security method in which client data is captured according to another embodiment of the present disclosure
  • FIG. 4 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to another embodiment of the present disclosure
  • FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to an embodiment of the present disclosure
  • FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure.
  • FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • An embodiment of the present disclosure provides a method for safely implementing screen capture of client data, including: monitoring the number of pictures of the client's photo album when an application of the client is running; and receiving a screen capture from the client. Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
  • the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • FIG. 1 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to an embodiment of the present disclosure.
  • the method for implementing security on which the client data is captured includes steps S101 to S103.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • the number of pictures in the client's album can be monitored. If a screen capture notification from the client is received during the monitoring process, and the number of pictures monitored in the album increases at this time, In this case, it is indicated that a screenshot image is generated in the client's photo album, which can effectively overcome the fact that in the prior art, when the client application is running, the user is completely prohibited from taking a screenshot of the application program. inconvenient.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • the above-mentioned client application is in a running state may refer to an application of the client running on an interface of the client, that is, the application is in a foreground running state.
  • an application can run on the client's interface as a window.
  • the above-mentioned application may be an application that is only allowed to be used by internal users of the company, and the user may access internal data of the company through an application running on the client, and the data may include confidential data within the company Or other data, where confidential data can also be called sensitive data.
  • sensitive data For example, if a user of a company uses an application running on the client to access company's internal data and accidentally take a screenshot of it, and then send the screenshot to the network, in this case, if the screenshot has been added by the above method If the user has a watermark with user information, then it is discovered that the user ’s screenshots published on the network contain sensitive data within the company. At this time, the company can identify the user ’s watermark with the user ’s watermark on the screenshot. Identity, which can prevent client data screenshots from being leaked and cannot be tracked, and to a certain extent also prevent client data screenshots from being leaked.
  • the client's photo album may be monitored through a server associated with an application running on the client. For example, if the application is an application developed by Company A, the client's photo album can be monitored through the server of Company A. As another example, if the application is an application developed by company B, the client's photo album can be monitored through the server of company B.
  • a screenshot notification from the client may be received through the above-mentioned server associated with the application. After receiving the screenshot notification or after a preset time period (for example, the preset time period can be set to 0.5s, 0.8s, 1s, etc.), if the server monitors that the number of pictures on the client album increases, it passes the server Get the screenshot added by the client album.
  • a preset time period for example, the preset time period can be set to 0.5s, 0.8s, 1s, etc.
  • the above method may further include generating a watermark with user information based on the user information.
  • the user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
  • the watermark with user information may be a clear watermark with user information or a dark watermark with user information.
  • the above server may add a watermark with user information to the screenshot image when receiving the permission granted by the client, and replace the screenshot generated by the screenshot operation in the client album with the screenshot with the watermark added image.
  • the server can also delete the screenshot pictures stored in the client album after obtaining the screenshot pictures, so that the watermarked screenshot pictures can be directly saved to the client album.
  • FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes step S201.
  • step S201 receiving the permission of the client to monitor the album of the client.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • the permission that the client agrees to monitor the client ’s photo album may refer to a permission that is always granted when a user runs the application for the first time using the client. Of course, it can also refer to the permissions granted each time the user runs the above application using the client.
  • FIG. 3 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes steps S301 and S302.
  • step S301 a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • step S302 the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • a user's opinion can be sought by sending a selection prompt box to the client.
  • This opinion can be used to ask the user whether to add a watermark to the generated screenshot image.
  • the user can add a watermark to the screenshot image under the conditions allowed by the user.
  • the method has humanized beneficial effects.
  • the above selection prompt box may be a prompt box displayed on an application program interface, where the prompt box may include two options, for example, one option may be an option that allows watermarking of screenshot images, Another option could be an option that does not allow watermarking of screenshots. This can be performed according to the user's choice whether to add a watermark to the screenshot.
  • FIG. 4 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes step S401.
  • step S301 a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • step S302 the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • step S401 when the user is not allowed to add a watermark to the screenshot picture, the user information and the screenshot picture are recorded.
  • the user information and the screenshot picture can be recorded.
  • the screenshot picture without the watermark is sent to the network
  • user information and screenshots that do not allow watermarking of screenshots may be saved in the database of the server described above.
  • the user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
  • FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure.
  • the method further includes step S501.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S501 the screenshot picture is compressed, so as to reduce the screenshot picture occupying the memory space of the client.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • This method can compress the screenshot image, so as to reduce the screenshot image occupying the client's memory space, thereby effectively preventing system failure caused by excessive client memory.
  • the compression process of the picture may also be performed after adding a watermark to the screenshot picture.
  • it can be compressing the screenshot after adding a watermark.
  • FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • the security implementation device 600 in which the client data is captured includes a monitoring module 610, an obtaining module 620, and a watermarking module 630.
  • the monitoring module 610 is configured to monitor the number of pictures in the client album when the client application is running.
  • the obtaining module 620 is configured to receive a screenshot notification from the client. In this case, if the number of pictures of the album is monitored to increase, obtain the increased screenshot picture.
  • a watermark adding module 630 is configured to add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that before the screenshot image is generated. The number is increased by one.
  • the number of pictures in the client's album can be monitored. If a screenshot notification is received from the client during the monitoring process, and When the number of pictures in the album is monitored, in this case, it indicates that screenshots are generated in the client's album, which can effectively overcome the prohibition of the user when the client application is running in the prior art. Screenshots of the application program, inconvenience to users.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • the security implementing device 600 in which the client data is captured may be used to implement the method described in the embodiment of FIG. 1.
  • FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 700 in which the client data is captured includes a first receiving module 710.
  • a first receiving module 710 is configured to receive a permission that the client agrees to monitor an album of the client.
  • the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 2.
  • FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 800 in which the client data is captured includes a sending module 810 and a second receiving module 820.
  • the sending module 810 sends a selection prompt box to the client, where the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • the second receiving module 820 is configured to receive the user's operation information on the selection prompt box, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the security implementation device 800 where the client data is captured can send a selection prompt box to the client to solicit the user's opinion. This opinion can be used to ask the user whether to add a watermark to the generated screenshot image. Adding a watermark to the screenshots makes the method humane and beneficial.
  • the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 3.
  • FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the acquisition module 620 As shown in FIG. 9, in addition to the monitoring module 610, the acquisition module 620, the watermarking module 630, the sending module 810, and the second receiving module 820 described in the embodiment of FIG. Recording module 910.
  • the recording module 910 is configured to record information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the security implementation device 900 where the client data is screenshotd
  • the user's information and the screenshot picture can be recorded.
  • the user when the user is using the client, When the screenshot without watermark is sent on the network, and the screenshot contains sensitive data, the user's identity can be analyzed based on the recorded user information and the screenshot, thereby preventing the client data screenshot from being leaked and cannot be tracked. , And to some extent prevent client data screenshots from being leaked.
  • the security implementing device 900 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 4.
  • FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 1000 in which the client data is screenshotd further includes a compression module 1010.
  • the compression module 1010 is configured to compress the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
  • the device 1000 for security-captured data of a client screen can compress the screen-captured pictures, so as to reduce the screen-captured pictures occupying the client's memory space, thereby effectively preventing system failures caused by excessive client memory.
  • the security implementing apparatus 1000 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 5.
  • FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the generating module 1110 generates a watermark with user information based on the user information.
  • the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 can be combined into one Implemented in modules, or any one of them can be split into multiple modules. Alternatively, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module.
  • the monitoring module 610, the obtaining module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 At least one may be implemented at least partially as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package, an application specific integrated circuit (ASIC), Or it can be implemented in hardware or firmware such as any other reasonable way to integrate or package the circuit, or in an appropriate combination of software, hardware and firmware.
  • FPGA field programmable gate array
  • PLA programmable logic array
  • ASIC application specific integrated circuit
  • At least one of the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generation module 1110 may be at least Partially implemented as a computer program module, when the program is run by a computer, the functions of the corresponding module can be performed.
  • FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • the computer system shown in FIG. 12 is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present disclosure.
  • the computer system 1200 of the security implementation device for which the client data is screenshotd according to the embodiment of the present disclosure includes a processor 1201, which may be based on a program stored in a read-only memory (ROM) 1202 or from a storage section 1208.
  • a program loaded into a random access memory (RAM) 1203 performs various appropriate actions and processes.
  • the processor 1201 may include, for example, a general-purpose microprocessor (for example, a CPU), an instruction set processor and / or an associated chipset and / or a special-purpose microprocessor (for example, an application-specific integrated circuit (ASIC)), and so on.
  • the processor 1201 may also include on-board memory for cache use.
  • the processor 1201 may include a single processing unit or multiple processing units for performing different actions of the method flow according to the embodiment of the present disclosure described with reference to FIG. 1 to FIG. 5.
  • the processors 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204.
  • the processor 1201 executes various steps of the security implementation method of the client-side data screen capture described above with reference to FIGS. 1 to 5 by executing programs in the ROM 1202 and / or the RAM 1203. Note that this program can also be stored in one or more memories other than ROM 1202 and RAM 1203.
  • the processor 1201 may also execute various steps of the method for implementing the security of the client data screen capture described above with reference to FIGS. 1-5 by executing a program stored in the one or more memories.
  • the system 1200 may further include an input / output (I / O) interface 1207, and the input / output (I / O) interface 1207 is also connected to the bus 1204.
  • the system 1200 may also include one or more of the following components connected to the I / O interface 1205: an input portion 1206 including a keyboard, a mouse, and the like; including, such as a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker Output section 1207, etc .; a storage section 1208 including a hard disk, etc .; and a communication section 1209, including a network interface card such as a LAN card, a modem, and the like.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • speaker Output section 1207 etc .
  • storage section 1208 including a hard disk, etc .
  • a communication section 1209 including a network interface card such as a LAN card, a modem, and the like.
  • the communication section 1209 performs communication processing via a network such as the Internet.
  • the driver 1210 is also connected to the I / O interface 1205 as needed.
  • a removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1210 as needed, so that a computer program read therefrom is installed into the storage section 1208 as needed.
  • the method described above with reference to the flowchart may be implemented as a computer software program.
  • embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing a method shown in a flowchart.
  • the computer program may be downloaded and installed from a network through the communication section 1209, and / or installed from a removable medium 1211.
  • the processor 1201 executes the above functions defined in the system of the embodiment of the present disclosure.
  • the systems, devices, devices, modules, units, and the like described above may be implemented by computer program modules.
  • the computer-readable medium shown in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium or any combination of the foregoing.
  • the computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programming read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal that is included in baseband or propagated as part of a carrier wave, and which carries computer-readable program code. Such a propagated data signal may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device. .
  • Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • the computer-readable medium may include one or more memories other than the ROM 1202 and / or the RAM 1203 and / or the ROM 1202 and the RAM 1203 described above.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of code, which contains one or more of the logic functions used to implement the specified logic. Executable instructions.
  • the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two blocks represented one after the other may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram or flowchart, and combinations of blocks in the block diagram or flowchart can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with A combination of dedicated hardware and computer instructions.
  • the present disclosure also provides a computer-readable medium, which may be included in the device described in the above embodiments; or may exist alone without being assembled into the device.
  • the computer-readable medium described above carries one or more programs, and when the one or more programs are executed by one of the devices, the device is caused to execute a security implementation method in which the client data according to the embodiment of the present disclosure is screenshotd.
  • the method includes: monitoring the number of pictures of the client's album when the client's application is running; receiving a screenshot notification from the client; in this case, if the number of pictures of the album is monitored If it is increased, then obtain an increased screenshot image; add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that in the generated screenshot The number before the picture is increased by one.

Abstract

The present disclosure provides a secure implementation method for a screenshot of client data. The method comprises: when an application program of a client is in a running state, monitoring the number of pictures in a photograph album of the client; receiving a screenshot notification from the client, and under this condition, if it is monitored that the number of pictures in the photograph album increases, acquiring the screenshot picture added; and adding a watermark with user information to the screenshot picture, and replacing the screenshot picture in the photograph album with the screenshot picture with added watermark, so that the number of pictures in the photograph album is one more than the number before the screenshot picture was generated. The present disclosure further provides a secure implementation apparatus for a screenshot of client data, and a medium.

Description

客户端数据被截屏的安全实现方法、装置及介质Method, device and medium for safely implementing screen capture of client data 技术领域Technical field
本公开涉及互联网技术领域,尤其涉及一种客户端数据被截屏的安全实现方法、装置及介质。The present disclosure relates to the field of Internet technologies, and in particular, to a method, a device, and a medium for securely implementing a screen capture of client data.
背景技术Background technique
目前,移动互联网的快速发展和移动设备的便携性,促进使用移动设备进行办公的人越来越多,用户甚至可以在任何场合使用移动客户端来访问公司数据。其中用户访问到的数据很可能涉及到公司的敏感数据。例如,如果用户对敏感数据进行了截屏,然后发送到网络上,对公司将会造成极大的威胁。针对这类问题,现有技术采用以下两种方式解决这类问题:第一种是完全禁止截屏。例如,完全禁止用户使用客户端在某些场合下进行截图。第二种是当用户使用客户端截屏之后向其相册中添加一张新的带水印的截屏图片。At present, the rapid development of mobile Internet and the portability of mobile devices are increasing the number of people who use mobile devices for office work. Users can even use mobile clients to access company data on any occasion. The data accessed by users is likely to involve sensitive data of the company. For example, if a user takes a screenshot of sensitive data and then sends it to the network, it will pose a great threat to the company. In view of this kind of problem, the prior art adopts the following two methods to solve this kind of problem: the first is to completely prohibit screen capture. For example, users are completely prohibited from using the client to take screenshots in certain situations. The second is to add a new watermarked screenshot to the user's album after the user takes a screenshot.
但是,在实现本发明构思的过程中,发明人发现现有技术中至少存在如下问题:在现有技术中,完全禁止截屏会给用户使用客户端造成一定的不便。在某些场合下可能需要进行截图操作,但是由于完全禁止了,所以会降低用户体验;向客户端相册中添加一张新的带水印的截屏图片,而相册中没有添加水印的截屏图片仍旧存在(此时,相册增加了2张图片),在这种情况下,用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,从而造成信息安全泄露的风险,并且一旦泄露也无法追踪到泄露数据用户的身份。However, in the process of implementing the concept of the present invention, the inventor found that at least the following problems exist in the prior art: In the prior art, completely prohibiting screen capture will cause a certain inconvenience to the user using the client. In some cases, screenshot operations may be required, but because it is completely disabled, it will reduce the user experience; add a new watermarked screenshot to the client album, and the screenshot without the watermark in the album still exists (At this time, 2 photos are added to the album). In this case, when using the client, the user may send screenshots without watermarks to the network, causing the risk of information security leaks, and once leaked, they cannot be tracked. To the identity of the user who leaked the data.
发明内容Summary of the Invention
有鉴于此,本公开提供一种客户端数据被截屏的安全实现方法、装置及介质,进而至少部分地解决了由于相关技术的限制和缺陷而导致的一个或者多个问题。In view of this, the present disclosure provides a method, a device, and a medium for safely implementing screen capture of client data, thereby at least partially solving one or more problems due to limitations and defects of related technologies.
本公开的一方面提供了一种客户端数据被截屏的安全实现方法,包括:在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。An aspect of the present disclosure provides a method for securely capturing a screenshot of client data, comprising: monitoring the number of pictures of the client's album when an application of the client is running; and receiving a screenshot from the client Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
根据本公开的实施例,在监控所述客户端相册的图片数目之前,该方法包括接收所述客户端同意对所述客户端的相册监控的权限。According to an embodiment of the present disclosure, before monitoring the number of pictures of the client album, the method includes receiving a permission that the client agrees to monitor the client's album.
根据本公开的实施例,在获取增加的截屏图片之前,该方法还包括:向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印;接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。According to an embodiment of the present disclosure, before acquiring the added screenshot picture, the method further includes: sending a selection prompt box to the client, the selection prompt box being used to ask the user whether to add a watermark to the screenshot picture; Receiving operation information of the selection prompt box by the user, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
根据本公开的实施例,该方法还包括当所述用户不允许对所述截屏图片添加水印时, 记录所述用户的信息和所述截屏图片。According to an embodiment of the present disclosure, the method further includes recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
根据本公开的实施例,该方法还包括对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。According to an embodiment of the present disclosure, the method further includes compressing the screenshot image, so as to reduce the screenshot image occupying a memory space of the client.
根据本公开的实施例,该方法还包括基于所述用户信息,生成带有用户信息的水印。According to an embodiment of the present disclosure, the method further includes generating a watermark with user information based on the user information.
本公开的另一方面提供一种客户端数据被截屏的安全实现装置,包括:监控模块,用于在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;获取模块,用于接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;添加水印模块,用于对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。Another aspect of the present disclosure provides a device for implementing security on screen capture of client data, including: a monitoring module for monitoring the number of pictures of the client's album when an application of the client is running; an acquisition module To receive a screenshot notification from the client. In this case, if the number of pictures of the album is monitored to increase, obtain the increased screenshot picture; add a watermark module to add a screenshot with the screenshot picture Watermark the user information, and replace the screenshots of the album with the screenshots after adding the watermark, so that the number of pictures in the album is increased by one compared to the number before the screenshots are generated.
根据本公开的实施例,在监控所述客户端相册的图片数目之前,该装置还包括:第一接收模块,用于接收所述客户端同意对所述客户端的相册监控的权限。According to an embodiment of the present disclosure, before monitoring the number of pictures of the client album, the apparatus further includes: a first receiving module, configured to receive a permission that the client agrees to monitor the client's album.
根据本公开的实施例,在获取增加的截屏图片之前,该装置还包括:发送模块,向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印;第二接收模块,用于接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。According to an embodiment of the present disclosure, before acquiring the added screenshot picture, the device further includes: a sending module that sends a selection prompt box to the client, the selection prompt box is used to ask the user whether to take the screenshot picture Adding a watermark; a second receiving module, configured to receive the user's operation information on the selection prompt box, the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
根据本公开的实施例,该装置还包括记录模块,用于当所述用户不允许对所述截屏图片添加水印时,记录所述用户的信息和所述截屏图片。According to an embodiment of the present disclosure, the device further includes a recording module for recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
根据本公开的实施例,该装置还包括压缩模块,用于对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。According to an embodiment of the present disclosure, the device further includes a compression module for compressing the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
根据本公开的实施例,该装置还包括生成模块,基于所述用户信息,生成带有用户信息的水印。According to an embodiment of the present disclosure, the device further includes a generating module that generates a watermark with user information based on the user information.
本公开的另一方面提供了一种客户端数据被截屏的安全实现装置。所述装置包括一个或多个处理器,以及存储装置。所述存储装置用于存储一个或多个程序。其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如上所述的客户端数据被截屏的安全实现方法。Another aspect of the present disclosure provides a security implementation device in which client data is screen shot. The device includes one or more processors, and a storage device. The storage device is used to store one or more programs. Wherein, when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the security implementation method of the client data being captured as described above.
本公开的另一方面提供了一种计算机可读介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行如上所述的客户端数据被截屏的安全实现方法。Another aspect of the present disclosure provides a computer-readable medium having executable instructions stored thereon that, when executed by a processor, cause the processor to perform a secure implementation method of the client-side data being captured as described above.
本公开的另一方面提供了一种计算机程序,所述计算机程序包括计算机可执行指令,所述指令在被执行时用于实现客户端数据被截屏的安全实现方法。Another aspect of the present disclosure provides a computer program including computer-executable instructions that, when executed, are used to implement a secure implementation method of a client-side data screen capture.
根据本公开的实施例,当客户端的应用程序处于运行状态时,可以监控客户端相册的图片数目,如果在监控的过程中接收来自所述客户端的截屏通知,且此时监控到相册的图片数目增加,在这种情况下,表明在客户端的相册中有截屏图片生成,这样能够有效地克服在现有技术中当客户端的应用程序处于运行状态时完全禁止用户对该应运程序截屏,给用户带来的不便。进一步地,对截屏图片添加带有用户信息的水印,然后利用添加水印后 的截屏图片替换相册的截屏图片,以使得相册的图片数目比在生成截屏图片之前的数目增加一张,从而有效地避免了现有技术向客户端相册中添加一张新的带水印的截屏图片,导致相册中没有添加水印的截屏图片仍旧存在(此时,相册增加了2张图片),这样当用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,造成信息安全泄露的风险。According to the embodiments of the present disclosure, when the client application is running, the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience. Further, a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding In the prior art, a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It should be understood that the above general description and the following detailed description are merely exemplary and explanatory, and should not limit the present disclosure.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1示意性示出了根据本公开实施例的客户端数据被截屏的安全实现方法的流程图;FIG. 1 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to an embodiment of the present disclosure; FIG.
图2示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图;FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图3示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图;FIG. 3 schematically illustrates a flowchart of a method for implementing a security method in which client data is captured according to another embodiment of the present disclosure; FIG.
图4示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图;FIG. 4 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to another embodiment of the present disclosure; FIG.
图5示意性示出了根据本公开另一实施例的客户端数据被截屏的安全实现方法的流程图;FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图6示意性示出了根据本公开实施例的客户端数据被截屏的安全实现装置的方框图;FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to an embodiment of the present disclosure; FIG.
图7示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图;FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图8示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图;FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图9示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图;FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图10示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图;FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure; FIG.
图11示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图;以及FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure; and
图12示意性示出了根据本公开实施例的客户端数据被截屏的安全实现装置的计算机系统的方框图。FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
具体实施方式detailed description
以下,将参照附图来描述本公开的实施例。但是应该理解,这些描述只是示例性的,而并非要限制本公开的范围。此外,在以下说明中,省略了对公知结构和技术的描述,以避免不必要地混淆本公开的概念。Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are merely exemplary and are not intended to limit the scope of the present disclosure. In addition, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present disclosure.
在此使用的术语仅仅是为了描述具体实施例,而并非意在限制本公开。在此使用的术语“包括”、“包含”等表明了所述特征、步骤、操作和/或部件的存在,但是并不排除存在或添加一个或多个其他特征、步骤、操作或部件。The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit the present disclosure. As used herein, the terms "including", "comprising", and the like indicate the presence of stated features, steps, operations, and / or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
在此使用的所有术语(包括技术和科学术语)具有本领域技术人员通常所理解的含义,除非另外定义。应注意,这里使用的术语应解释为具有与本说明书的上下文相一致的含义,而不应以理想化或过于刻板的方式来解释。All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be interpreted to have meanings consistent with the context of this specification, and should not be interpreted in an idealized or overly rigid manner.
在使用类似于“A、B和C等中至少一个”这样的表述的情况下,一般来说应该按照本领域技术人员通常理解该表述的含义来予以解释(例如,“具有A、B和C中至少一个的系统”应包括但不限于单独具有A、单独具有B、单独具有C、具有A和B、具有A和C、具有B和C、和/或具有A、B、C的系统等)。本领域技术人员还应理解,实质上任意表示两个或更多可选项目的转折连词和/或短语,无论是在说明书、权利要求书还是附图中,都应被理解为给出了包括这些项目之一、这些项目任一方、或两个项目的可能性。例如,短语“A或B”应当被理解为包括“A”或“B”、或“A和B”的可能性。Where expressions such as "at least one of A, B, C, etc." are used, they should generally be interpreted in accordance with the meaning commonly understood by those skilled in the art (for example, "having A, B, and C "A system of at least one of" shall include, but is not limited to, a system with A alone, B alone, C alone, A and B, A and C, B and C, and / or A, B, C, etc. ). Those skilled in the art should also understand that inflection conjunctions and / or phrases that essentially arbitrarily represent two or more optional items, whether in the description, claims, or drawings, should be understood as giving the inclusion of these The possibility of one of these projects, either of them, or both. For example, the phrase "A or B" should be understood to include the possibility of "A" or "B", or "A and B".
本公开的实施例提供了一种客户端数据被截屏的安全实现方法,包括:在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。An embodiment of the present disclosure provides a method for safely implementing screen capture of client data, including: monitoring the number of pictures of the client's photo album when an application of the client is running; and receiving a screen capture from the client. Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
根据本公开的实施例,当客户端的应用程序处于运行状态时,可以监控客户端相册的图片数目,如果在监控的过程中接收来自所述客户端的截屏通知,且此时监控到相册的图片数目增加,在这种情况下,表明在客户端的相册中有截屏图片生成,这样能够有效地克服在现有技术中当客户端的应用程序处于运行状态时完全禁止用户对该应运程序截屏,给用户带来的不便。进一步地,对截屏图片添加带有用户信息的水印,然后利用添加水印后的截屏图片替换相册的截屏图片,以使得相册的图片数目比在生成截屏图片之前的数目增加一张,从而有效地避免了现有技术向客户端相册中添加一张新的带水印的截屏图片,导致相册中没有添加水印的截屏图片仍旧存在(此时,相册增加了2张图片),这样当用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,造成信息安全泄露的风险。According to the embodiments of the present disclosure, when the client application is running, the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience. Further, a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding In the prior art, a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
图1示意性示出了根据本公开实施例的客户端数据被截屏的安全实现方法的流程图。FIG. 1 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to an embodiment of the present disclosure.
如图1所示,客户端数据被截屏的安全实现方法包括步骤S101~步骤S103。As shown in FIG. 1, the method for implementing security on which the client data is captured includes steps S101 to S103.
在步骤S101中,在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目。In step S101, when the application program of the client is in a running state, the number of pictures of the client album is monitored.
在步骤S102中,接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片。In step S102, a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
在步骤S103中,对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数 目增加一张。In step S103, a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
在该方法中,当客户端的应用程序处于运行状态时,可以监控客户端相册的图片数目,如果在监控的过程中接收来自所述客户端的截屏通知,且此时监控到相册的图片数目增加,在这种情况下,表明在客户端的相册中有截屏图片生成,这样能够有效地克服在现有技术中当客户端的应用程序处于运行状态时完全禁止用户对该应运程序截屏,给用户带来的不便。进一步地,对截屏图片添加带有用户信息的水印,然后利用添加水印后的截屏图片替换相册的截屏图片,以使得相册的图片数目比在生成截屏图片之前的数目增加一张,从而有效地避免了现有技术向客户端相册中添加一张新的带水印的截屏图片,导致相册中没有添加水印的截屏图片仍旧存在(此时,相册增加了2张图片),这样当用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,造成信息安全泄露的风险。In this method, when the client application is running, the number of pictures in the client's album can be monitored. If a screen capture notification from the client is received during the monitoring process, and the number of pictures monitored in the album increases at this time, In this case, it is indicated that a screenshot image is generated in the client's photo album, which can effectively overcome the fact that in the prior art, when the client application is running, the user is completely prohibited from taking a screenshot of the application program. inconvenient. Further, a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding In the prior art, a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
在本公开的一些实施例中,上述客户端的应用程序处于运行状态可以指客户端的应用程序运行在该客户端的界面,即该应用程序处于前台运行状态。例如,应用程序可以以窗口的方式运行在客户端的界面。In some embodiments of the present disclosure, the above-mentioned client application is in a running state may refer to an application of the client running on an interface of the client, that is, the application is in a foreground running state. For example, an application can run on the client's interface as a window.
在本公开的一些实施例中,上述应用程序可以是仅允许公司内部用户使用的应用程序,所述用户可以通过客户端运行的应用程序来访问公司内部数据,该数据可以包括公司内部的机密数据或其他数据,其中机密数据也可以称作敏感数据。例如,如果某公司的用户使用客户端运行的应用程序来访问公司内部数据时不一小心对其截屏,然后将截屏图片发送到网络上,在这种情况下如果该截屏图片已经通过上述方法添加了带有用户信息的水印,那么事后发现该用户公布在网络的截屏图片中包含有该公司内部的敏感数据,此时该公司可以通过截屏图片上的带有用户信息的水印辨别出该用户的身份,这样可以防止客户端数据截屏被泄露后而无法追踪,并且在一定程度上也防止客户端数据截屏被泄露。In some embodiments of the present disclosure, the above-mentioned application may be an application that is only allowed to be used by internal users of the company, and the user may access internal data of the company through an application running on the client, and the data may include confidential data within the company Or other data, where confidential data can also be called sensitive data. For example, if a user of a company uses an application running on the client to access company's internal data and accidentally take a screenshot of it, and then send the screenshot to the network, in this case, if the screenshot has been added by the above method If the user has a watermark with user information, then it is discovered that the user ’s screenshots published on the network contain sensitive data within the company. At this time, the company can identify the user ’s watermark with the user ’s watermark on the screenshot. Identity, which can prevent client data screenshots from being leaked and cannot be tracked, and to a certain extent also prevent client data screenshots from being leaked.
在本公开的一些实施例中,可以通过与客户端运行的应用程序相关联的服务器监控客户端的相册。例如,该应用程序为A公司开发的应用程序,那么可以通过A公司的服务器监控客户端的相册。再例如,该应用程序为B公司开发的应用程序,那么可以通过B公司的服务器监控客户端的相册。In some embodiments of the present disclosure, the client's photo album may be monitored through a server associated with an application running on the client. For example, if the application is an application developed by Company A, the client's photo album can be monitored through the server of Company A. As another example, if the application is an application developed by company B, the client's photo album can be monitored through the server of company B.
在本公开的一些实施例中,可以通过上述与应用程序相关联的服务器接收来自所述客户端的截屏通知。在接收到截屏通知的同时或者预设时间段(例如,预设时段可以设置为0.5s、0.8s、1s等等)之后,该服务器如果监控到客户端相册的图片数目增加,则通过该服务器获取客户端相册增加的截屏图片。In some embodiments of the present disclosure, a screenshot notification from the client may be received through the above-mentioned server associated with the application. After receiving the screenshot notification or after a preset time period (for example, the preset time period can be set to 0.5s, 0.8s, 1s, etc.), if the server monitors that the number of pictures on the client album increases, it passes the server Get the screenshot added by the client album.
根据本公开的实施例,上述方法还可以包括基于所述用户信息,生成带有用户信息的水印。所述用户信息可以包括以下任意一条或多条:用户的ID、用户的名字、用户的联系方式、用户在公司的职工号等等,但不限于此。According to an embodiment of the present disclosure, the above method may further include generating a watermark with user information based on the user information. The user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
在本公开的一些实施例中,带有用户信息的水印可以是带有用户信息的明水印或者带有用户信息的暗水印。In some embodiments of the present disclosure, the watermark with user information may be a clear watermark with user information or a dark watermark with user information.
在本公开的一些实施例中,上述服务器可以在接收到客户端授予的权限时对截屏图片 添加带有用户信息的水印,并利用添加水印的截屏图片替换客户端相册中因截屏操作生成的截屏图片。或者服务器也可以在获取截屏图片之后将存储在客户端相册中的截屏图片删除,这样可以直接将添加水印的截屏图片保存到客户端相册。通过上述两种方式可以保证客户端相册的图片数目比在生成截屏图片之前的数目增加一张,从而避免以及降低当用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,造成信息安全泄露的风险。In some embodiments of the present disclosure, the above server may add a watermark with user information to the screenshot image when receiving the permission granted by the client, and replace the screenshot generated by the screenshot operation in the client album with the screenshot with the watermark added image. Or the server can also delete the screenshot pictures stored in the client album after obtaining the screenshot pictures, so that the watermarked screenshot pictures can be directly saved to the client album. The above two methods can ensure that the number of pictures in the client's album is increased by one compared with the number before the screenshots are generated, thereby avoiding and reducing the possibility that users may send screenshot pictures without watermarks to the network when using the client, causing information Risk of security breach.
图2示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图。FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
如图2所示,除了图1实施例描述的步骤S101~步骤S103之外,在步骤S101之前,该方法还包括步骤S201。As shown in FIG. 2, in addition to steps S101 to S103 described in the embodiment of FIG. 1, before step S101, the method further includes step S201.
在步骤S201中,接收所述客户端同意对所述客户端的相册监控的权限。In step S201, receiving the permission of the client to monitor the album of the client.
在步骤S101中,在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目。In step S101, when the application program of the client is in a running state, the number of pictures of the client album is monitored.
在步骤S102中,接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片。In step S102, a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
在步骤S103中,对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。In step S103, a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
在本公开的一些实施例中,上述客户端同意对所述客户端的相册监控的权限可以指在用户第一次使用客户端运行上述应用程序时始终授予的权限。当然也可以指在用户每次使用客户端运行上述应用程序时授予的权限。In some embodiments of the present disclosure, the permission that the client agrees to monitor the client ’s photo album may refer to a permission that is always granted when a user runs the application for the first time using the client. Of course, it can also refer to the permissions granted each time the user runs the above application using the client.
图3示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图。FIG. 3 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
如图3所示,除了图1实施例描述的步骤S101~步骤S103之外,在获取增加的截屏图片之前,该方法还包括步骤S301和步骤S302。As shown in FIG. 3, in addition to steps S101 to S103 described in the embodiment of FIG. 1, before acquiring an added screenshot, the method further includes steps S301 and S302.
在步骤S301中,向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印。In step S301, a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
在步骤S302中,接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。In step S302, the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
该方法可以通过向客户端发送选择提示框来征求用户的意见,该意见可以用于询问用户是否对生成的截屏图片进行添加水印,这样可以在用户允许的条件下对截屏图片添加水印,使得该方法具有人性化的有益效果。In this method, a user's opinion can be sought by sending a selection prompt box to the client. This opinion can be used to ask the user whether to add a watermark to the generated screenshot image. In this way, the user can add a watermark to the screenshot image under the conditions allowed by the user. The method has humanized beneficial effects.
在本公开的一些实施例中,上述选择提示框可以是展示在应用程序界面的提示框,其中,该提示框可以包括两个选项,例如,一个选项可以是允许对截屏图片添加水印的选项,另一个选项可以是不允许对截屏图片添加水印的选项。这样可以根据用户的选择执行是否 对截屏图片添加水印。In some embodiments of the present disclosure, the above selection prompt box may be a prompt box displayed on an application program interface, where the prompt box may include two options, for example, one option may be an option that allows watermarking of screenshot images, Another option could be an option that does not allow watermarking of screenshots. This can be performed according to the user's choice whether to add a watermark to the screenshot.
图4示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图。FIG. 4 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
如图4所示,除了图3实施例描述的步骤S301和步骤S302之外,该方法还包括步骤S401。As shown in FIG. 4, in addition to steps S301 and S302 described in the embodiment of FIG. 3, the method further includes step S401.
在步骤S301中,向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印。In step S301, a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
在步骤S302中,接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。In step S302, the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
在步骤S401中,当所述用户不允许对所述截屏图片添加水印时,记录所述用户的信息和所述截屏图片。In step S401, when the user is not allowed to add a watermark to the screenshot picture, the user information and the screenshot picture are recorded.
在该方法中,当用户不允许对所述截屏图片添加水印时,可以记录用户的信息和截屏图片,在这种情况下,当用户在使用客户端的时候将没添加水印的截屏图片发送在网络上,且该截屏图片中包含有敏感数据时,可以根据记录的用户信息和截屏图片分析出该用户的身份,进而防止客户端数据截屏被泄露后而无法追踪,并且在一定程度上也防止客户端数据截屏被泄露。In this method, when the user is not allowed to add a watermark to the screenshot picture, the user information and the screenshot picture can be recorded. In this case, when the user uses the client, the screenshot picture without the watermark is sent to the network When the screenshot contains sensitive data, you can analyze the user ’s identity based on the recorded user information and screenshots to prevent the client ’s data screenshot from being leaked and cannot be tracked, and to a certain extent, it also prevents customers A screenshot of the data was leaked.
在本公开的一些实施例中,可以将不允许对截屏图片添加水印的用户信息和截屏图片保存在上述服务器的数据库中。所述用户信息可以包括以下任意一条或多条:用户的ID、用户的名字、用户的联系方式、用户在公司的职工号等等,但不限于此。In some embodiments of the present disclosure, user information and screenshots that do not allow watermarking of screenshots may be saved in the database of the server described above. The user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
图5示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现方法的流程图。FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure.
如图5所示,除了图1实施例描述的步骤S101~步骤S103之外,该方法还包括步骤S501。As shown in FIG. 5, in addition to steps S101 to S103 described in the embodiment of FIG. 1, the method further includes step S501.
在步骤S101中,在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目。In step S101, when the application program of the client is in a running state, the number of pictures of the client album is monitored.
在步骤S102中,接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片。In step S102, a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
在步骤S501中,对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。In step S501, the screenshot picture is compressed, so as to reduce the screenshot picture occupying the memory space of the client.
在步骤S103中,对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。In step S103, a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
该方法可以对截屏图片进行压缩,以便于减少截屏图片占用客户端的内存空间,从而有效地防止了客户端内存过大造成的系统故障。This method can compress the screenshot image, so as to reduce the screenshot image occupying the client's memory space, thereby effectively preventing system failure caused by excessive client memory.
在本公开的一些实施例中,图片的压缩处理也可以在对截屏图片添加水印之后执行。 例如,可以是对添加水印后的截屏图片进行压缩。In some embodiments of the present disclosure, the compression process of the picture may also be performed after adding a watermark to the screenshot picture. For example, it can be compressing the screenshot after adding a watermark.
图6示意性示出了根据本公开实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
如图6所示,客户端数据被截屏的安全实现装置600包括监控模块610、获取模块620和添加水印模块630。As shown in FIG. 6, the security implementation device 600 in which the client data is captured includes a monitoring module 610, an obtaining module 620, and a watermarking module 630.
监控模块610,用于在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目。The monitoring module 610 is configured to monitor the number of pictures in the client album when the client application is running.
获取模块620,用于接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片。The obtaining module 620 is configured to receive a screenshot notification from the client. In this case, if the number of pictures of the album is monitored to increase, obtain the increased screenshot picture.
添加水印模块630,用于对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。A watermark adding module 630 is configured to add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that before the screenshot image is generated. The number is increased by one.
在该客户端数据被截屏的安全实现装置600中,当客户端的应用程序处于运行状态时,可以监控客户端相册的图片数目,如果在监控的过程中接收来自所述客户端的截屏通知,且此时监控到相册的图片数目增加,在这种情况下,表明在客户端的相册中有截屏图片生成,这样能够有效地克服在现有技术中当客户端的应用程序处于运行状态时完全禁止用户对该应运程序截屏,给用户带来的不便。进一步地,对截屏图片添加带有用户信息的水印,然后利用添加水印后的截屏图片替换相册的截屏图片,以使得相册的图片数目比在生成截屏图片之前的数目增加一张,从而有效地避免了现有技术向客户端相册中添加一张新的带水印的截屏图片,导致相册中没有添加水印的截屏图片仍旧存在(此时,相册增加了2张图片),这样当用户在使用客户端的时候可能将没添加水印的截屏图片发送在网络,造成信息安全泄露的风险。In the security implementation device 600 where the client data is screenshotd, when the client application is running, the number of pictures in the client's album can be monitored. If a screenshot notification is received from the client during the monitoring process, and When the number of pictures in the album is monitored, in this case, it indicates that screenshots are generated in the client's album, which can effectively overcome the prohibition of the user when the client application is running in the prior art. Screenshots of the application program, inconvenience to users. Further, a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding In the prior art, a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
根据本公开的实施例,该客户端数据被截屏的安全实现装置600可以用于实现图1实施例描述的方法。According to the embodiment of the present disclosure, the security implementing device 600 in which the client data is captured may be used to implement the method described in the embodiment of FIG. 1.
图7示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
如图7所示,除了图6实施例描述的监控模块610、获取模块620和添加水印模块630之外,客户端数据被截屏的安全实现装置700包括第一接收模块710。As shown in FIG. 7, in addition to the monitoring module 610, the obtaining module 620, and the watermarking module 630 described in the embodiment of FIG. 6, the security implementation device 700 in which the client data is captured includes a first receiving module 710.
第一接收模块710,用于接收所述客户端同意对所述客户端的相册监控的权限。A first receiving module 710 is configured to receive a permission that the client agrees to monitor an album of the client.
根据本公开的实施例,该客户端数据被截屏的安全实现装置600可以用于实现图2实施例描述的方法。According to the embodiment of the present disclosure, the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 2.
图8示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
如图8所示,除了图6实施例描述的监控模块610、获取模块620和添加水印模块630之外,客户端数据被截屏的安全实现装置800包括发送模块810和第二接收模块820。As shown in FIG. 8, in addition to the monitoring module 610, the acquisition module 620, and the watermarking module 630 described in the embodiment of FIG. 6, the security implementation device 800 in which the client data is captured includes a sending module 810 and a second receiving module 820.
发送模块810,向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是 否对所述截屏图片添加水印。The sending module 810 sends a selection prompt box to the client, where the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
第二接收模块820,用于接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。The second receiving module 820 is configured to receive the user's operation information on the selection prompt box, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
该客户端数据被截屏的安全实现装置800可以通过向客户端发送选择提示框来征求用户的意见,该意见可以用于询问用户是否对生成的截屏图片进行添加水印,这样可以在用户允许的条件下对截屏图片添加水印,使得该方法具有人性化的有益效果。The security implementation device 800 where the client data is captured can send a selection prompt box to the client to solicit the user's opinion. This opinion can be used to ask the user whether to add a watermark to the generated screenshot image. Adding a watermark to the screenshots makes the method humane and beneficial.
根据本公开的实施例,该客户端数据被截屏的安全实现装置600可以用于实现图3实施例描述的方法。According to the embodiment of the present disclosure, the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 3.
图9示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
如图9所示,除了图8实施例描述的监控模块610、获取模块620、添加水印模块630、发送模块810和第二接收模块820之外,客户端数据被截屏的安全实现装置900还包括记录模块910。As shown in FIG. 9, in addition to the monitoring module 610, the acquisition module 620, the watermarking module 630, the sending module 810, and the second receiving module 820 described in the embodiment of FIG. Recording module 910.
记录模块910,用于当所述用户不允许对所述截屏图片添加水印时,记录所述用户的信息和所述截屏图片。The recording module 910 is configured to record information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
在该客户端数据被截屏的安全实现装置900中,当用户不允许对所述截屏图片添加水印时,可以记录用户的信息和截屏图片,在这种情况下,当用户在使用客户端的时候将没添加水印的截屏图片发送在网络上,且该截屏图片中包含有敏感数据时,可以根据记录的用户信息和截屏图片分析出该用户的身份,进而防止客户端数据截屏被泄露后而无法追踪,并且在一定程度上也防止客户端数据截屏被泄露。In the security implementation device 900 where the client data is screenshotd, when the user is not allowed to add a watermark to the screenshot picture, the user's information and the screenshot picture can be recorded. In this case, when the user is using the client, When the screenshot without watermark is sent on the network, and the screenshot contains sensitive data, the user's identity can be analyzed based on the recorded user information and the screenshot, thereby preventing the client data screenshot from being leaked and cannot be tracked. , And to some extent prevent client data screenshots from being leaked.
根据本公开的实施例,该客户端数据被截屏的安全实现装置900可以用于实现图4实施例描述的方法。According to the embodiment of the present disclosure, the security implementing device 900 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 4.
图10示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
如图10所示,除了图6实施例描述的监控模块610、获取模块620和添加水印模块630之外,客户端数据被截屏的安全实现装置1000还包括压缩模块1010。As shown in FIG. 10, in addition to the monitoring module 610, the obtaining module 620, and the watermarking module 630 described in the embodiment of FIG. 6, the security implementation device 1000 in which the client data is screenshotd further includes a compression module 1010.
压缩模块1010,用于对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。The compression module 1010 is configured to compress the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
该客户端数据被截屏的安全实现装置1000可以对截屏图片进行压缩,以便于减少截屏图片占用客户端的内存空间,从而有效地防止了客户端内存过大造成的系统故障。The device 1000 for security-captured data of a client screen can compress the screen-captured pictures, so as to reduce the screen-captured pictures occupying the client's memory space, thereby effectively preventing system failures caused by excessive client memory.
根据本公开的实施例,该客户端数据被截屏的安全实现装置1000可以用于实现图5实施例描述的方法。According to the embodiment of the present disclosure, the security implementing apparatus 1000 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 5.
图11示意性示出了根据本公开另一个实施例的客户端数据被截屏的安全实现装置的方框图。FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
如图11所示,除了图6实施例描述的监控模块610、获取模块620和添加水印模块 630之外,客户端数据被截屏的安全实现装置1100还包括生成模块1110。As shown in FIG. 11, in addition to the monitoring module 610, the acquisition module 620, and the watermarking module 630 described in the embodiment of FIG.
生成模块1110,基于所述用户信息,生成带有用户信息的水印。The generating module 1110 generates a watermark with user information based on the user information.
可以理解的是,监控模块610、获取模块620、添加水印模块630、第一接收模块710、发送模块810、第二接收模块820、记录模块910、压缩模块1010、以及生成模块1110可以合并在一个模块中实现,或者其中的任意一个模块可以被拆分成多个模块。或者,这些模块中的一个或多个模块的至少部分功能可以与其他模块的至少部分功能相结合,并在一个模块中实现。根据本发明的实施例,监控模块610、获取模块620、添加水印模块630、第一接收模块710、发送模块810、第二接收模块820、记录模块910、压缩模块1010、以及生成模块1110中的至少一个可以至少被部分地实现为硬件电路,例如现场可编程门阵列(FPGA)、可编程逻辑阵列(PLA)、片上系统、基板上的系统、封装上的系统、专用集成电路(ASIC),或可以以对电路进行集成或封装的任何其他的合理方式等硬件或固件来实现,或以软件、硬件以及固件三种实现方式的适当组合来实现。或者,监控模块610、获取模块620、添加水印模块630、第一接收模块710、发送模块810、第二接收模块820、记录模块910、压缩模块1010、以及生成模块1110中的至少一个可以至少被部分地实现为计算机程序模块,当该程序被计算机运行时,可以执行相应模块的功能。It can be understood that the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 can be combined into one Implemented in modules, or any one of them can be split into multiple modules. Alternatively, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module. According to the embodiment of the present invention, the monitoring module 610, the obtaining module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 At least one may be implemented at least partially as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package, an application specific integrated circuit (ASIC), Or it can be implemented in hardware or firmware such as any other reasonable way to integrate or package the circuit, or in an appropriate combination of software, hardware and firmware. Alternatively, at least one of the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generation module 1110 may be at least Partially implemented as a computer program module, when the program is run by a computer, the functions of the corresponding module can be performed.
图12示意性示出了根据本公开实施例的客户端数据被截屏的安全实现装置的计算机系统的方框图。图12示出的计算机系统仅仅是一个示例,不应对本公开实施例的功能和使用范围带来任何限制。FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure. The computer system shown in FIG. 12 is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present disclosure.
如图12所示,根据本公开实施例的客户端数据被截屏的安全实现装置的计算机系统1200包括处理器1201,其可以根据存储在只读存储器(ROM)1202中的程序或者从存储部分1208加载到随机访问存储器(RAM)1203中的程序而执行各种适当的动作和处理。处理器1201例如可以包括通用微处理器(例如CPU)、指令集处理器和/或相关芯片组和/或专用微处理器(例如,专用集成电路(ASIC)),等等。处理器1201还可以包括用于缓存用途的板载存储器。处理器1201可以包括用于执行参考图1~图5描述的根据本公开实施例的方法流程的不同动作的单一处理单元或者是多个处理单元。As shown in FIG. 12, the computer system 1200 of the security implementation device for which the client data is screenshotd according to the embodiment of the present disclosure includes a processor 1201, which may be based on a program stored in a read-only memory (ROM) 1202 or from a storage section 1208. A program loaded into a random access memory (RAM) 1203 performs various appropriate actions and processes. The processor 1201 may include, for example, a general-purpose microprocessor (for example, a CPU), an instruction set processor and / or an associated chipset and / or a special-purpose microprocessor (for example, an application-specific integrated circuit (ASIC)), and so on. The processor 1201 may also include on-board memory for cache use. The processor 1201 may include a single processing unit or multiple processing units for performing different actions of the method flow according to the embodiment of the present disclosure described with reference to FIG. 1 to FIG. 5.
在RAM 1203中,存储有系统1200操作所需的各种程序和数据。处理器1201、ROM1202以及RAM 1203通过总线1204彼此相连。处理器1201通过执行ROM 1202和/或RAM1203中的程序来执行以上参考图1~图5描述的客户端数据被截屏的安全实现方法的各种步骤。需要注意,该程序也可以存储在除ROM 1202和RAM 1203以外的一个或多个存储器中。处理器1201也可以通过执行存储在该一个或多个存储器中的程序来执行以上参考图1~图5描述的客户端数据被截屏的安全实现方法的各种步骤。In the RAM 1203, various programs and data required for the operation of the system 1200 are stored. The processors 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204. The processor 1201 executes various steps of the security implementation method of the client-side data screen capture described above with reference to FIGS. 1 to 5 by executing programs in the ROM 1202 and / or the RAM 1203. Note that this program can also be stored in one or more memories other than ROM 1202 and RAM 1203. The processor 1201 may also execute various steps of the method for implementing the security of the client data screen capture described above with reference to FIGS. 1-5 by executing a program stored in the one or more memories.
根据本公开的实施例,系统1200还可以包括输入/输出(I/O)接口1207,输入/输出(I/O)接口1207也连接至总线1204。系统1200还可以包括连接至I/O接口1205的以下部件中的一项或多项:包括键盘、鼠标等的输入部分1206;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分1207;包括硬盘等的存储部分1208;以 及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分1209。通信部分1209经由诸如因特网的网络执行通信处理。驱动器1210也根据需要连接至I/O接口1205。可拆卸介质1211,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器1210上,以便于从其上读出的计算机程序根据需要被安装入存储部分1208。According to an embodiment of the present disclosure, the system 1200 may further include an input / output (I / O) interface 1207, and the input / output (I / O) interface 1207 is also connected to the bus 1204. The system 1200 may also include one or more of the following components connected to the I / O interface 1205: an input portion 1206 including a keyboard, a mouse, and the like; including, such as a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker Output section 1207, etc .; a storage section 1208 including a hard disk, etc .; and a communication section 1209, including a network interface card such as a LAN card, a modem, and the like. The communication section 1209 performs communication processing via a network such as the Internet. The driver 1210 is also connected to the I / O interface 1205 as needed. A removable medium 1211, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1210 as needed, so that a computer program read therefrom is installed into the storage section 1208 as needed.
根据本公开的实施例,上文参考流程图描述的方法可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分1209从网络上被下载和安装,和/或从可拆卸介质1211被安装。在该计算机程序被处理器1201执行时,执行本公开实施例的系统中限定的上述功能。根据本公开的实施例,上文描述的系统、设备、装置、模块、单元等可以通过计算机程序模块来实现。According to an embodiment of the present disclosure, the method described above with reference to the flowchart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing a method shown in a flowchart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 1209, and / or installed from a removable medium 1211. When the computer program is executed by the processor 1201, the above functions defined in the system of the embodiment of the present disclosure are executed. According to the embodiments of the present disclosure, the systems, devices, devices, modules, units, and the like described above may be implemented by computer program modules.
需要说明的是,本公开所示的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本公开中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本公开中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、RF等等,或者上述的任意合适的组合。根据本公开的实施例,计算机可读介质可以包括上文描述的ROM 1202和/或RAM 1203和/或ROM 1202和RAM 1203以外的一个或多个存储器。It should be noted that the computer-readable medium shown in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium or any combination of the foregoing. The computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programming read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing. In this disclosure, a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in combination with an instruction execution system, apparatus, or device. In this disclosure, a computer-readable signal medium may include a data signal that is included in baseband or propagated as part of a carrier wave, and which carries computer-readable program code. Such a propagated data signal may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing. The computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device. . Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, optical fiber cable, RF, etc., or any suitable combination of the foregoing. According to an embodiment of the present disclosure, the computer-readable medium may include one or more memories other than the ROM 1202 and / or the RAM 1203 and / or the ROM 1202 and the RAM 1203 described above.
附图中的流程图和框图,图示了按照本公开各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,上述模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图或流程图中的每个方框、以及框图或流程图中的方框的组合,可以用 执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagram may represent a module, program segment, or part of code, which contains one or more of the logic functions used to implement the specified logic. Executable instructions. It should also be noted that in some alternative implementations, the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two blocks represented one after the other may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved. It should also be noted that each block in the block diagram or flowchart, and combinations of blocks in the block diagram or flowchart, can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with A combination of dedicated hardware and computer instructions.
作为另一方面,本公开还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的设备中所包含的;也可以是单独存在,而未装配入该设备中。上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被一个该设备执行时,使得该设备执行根据本公开实施例的客户端数据被截屏的安全实现方法。该方法包括:在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。As another aspect, the present disclosure also provides a computer-readable medium, which may be included in the device described in the above embodiments; or may exist alone without being assembled into the device. The computer-readable medium described above carries one or more programs, and when the one or more programs are executed by one of the devices, the device is caused to execute a security implementation method in which the client data according to the embodiment of the present disclosure is screenshotd. The method includes: monitoring the number of pictures of the client's album when the client's application is running; receiving a screenshot notification from the client; in this case, if the number of pictures of the album is monitored If it is increased, then obtain an increased screenshot image; add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that in the generated screenshot The number before the picture is increased by one.
以上对本公开的实施例进行了描述。但是,这些实施例仅仅是为了说明的目的,而并非为了限制本公开的范围。尽管在以上分别描述了各实施例,但是这并不意味着各个实施例中的措施不能有利地结合使用。本公开的范围由所附权利要求及其等同物限定。不脱离本公开的范围,本领域技术人员可以做出多种替代和修改,这些替代和修改都应落在本公开的范围之内。The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only, and are not intended to limit the scope of the disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in an advantageous combination. The scope of the disclosure is defined by the following claims and their equivalents. Without departing from the scope of the present disclosure, those skilled in the art can make various substitutions and modifications, and these substitutions and modifications should all fall within the scope of the present disclosure.

Claims (14)

  1. 一种客户端数据被截屏的安全实现方法,包括:A method for safely implementing client-side data screen capture includes:
    在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;Monitoring the number of pictures in the client album when the client application is running;
    接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;Receiving a screenshot notification from the client, in this case, if the number of pictures of the album is monitored to increase, obtaining the increased screenshot picture;
    对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。Add a watermark with user information to the screenshot picture, and replace the screenshot picture of the album with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated.
  2. 根据权利要求1所述的方法,其特征在于,在监控所述客户端相册的图片数目之前,该方法包括:The method according to claim 1, wherein before monitoring the number of pictures in the client album, the method comprises:
    接收所述客户端同意对所述客户端的相册监控的权限。Receiving the client's permission to monitor the client's photo album.
  3. 根据权利要求1所述的方法,其特征在于,在获取增加的截屏图片之前,该方法还包括:The method according to claim 1, characterized in that before acquiring the added screenshot picture, the method further comprises:
    向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印;Sending a selection prompt box to the client, the selection prompt box being used to ask the user whether to add a watermark to the screenshot picture;
    接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。Receiving operation information of the selection prompt box by the user, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  4. 根据权利要求3所述的方法,其特征在于,该方法还包括:The method according to claim 3, further comprising:
    当所述用户不允许对所述截屏图片添加水印时,记录所述用户的信息和所述截屏图片。When the user is not allowed to add a watermark to the screenshot picture, record the information of the user and the screenshot picture.
  5. 根据权利要求1所述的方法,其特征在于,该方法还包括:The method according to claim 1, further comprising:
    对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。Compressing the screenshot picture, so as to reduce the screenshot picture occupying the memory space of the client.
  6. 根据权利要求1所述的方法,其特征在于,该方法还包括:The method according to claim 1, further comprising:
    基于所述用户信息,生成带有用户信息的水印。Based on the user information, a watermark with user information is generated.
  7. 一种客户端数据被截屏的安全实现装置,包括:A device for implementing security on screen capture of client data includes:
    监控模块,用于在所述客户端的应用程序处于运行状态时,监控所述客户端相册的图片数目;A monitoring module, configured to monitor the number of pictures in the client album when the client application is running;
    获取模块,用于接收来自所述客户端的截屏通知,在这种情况下,如果监控到所述相册的图片数目增加,则获取增加的截屏图片;An obtaining module, configured to receive a screenshot notification from the client; in this case, if the number of pictures of the album is monitored to increase, obtain the increased screenshot picture;
    添加水印模块,用于对所述截屏图片添加带有用户信息的水印,并利用添加水印后的截屏图片替换所述相册的截屏图片,以使得所述相册的图片数目比在生成截屏图片之前的数目增加一张。A watermark adding module is used to add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than Increase the number by one.
  8. 根据权利要求7所述的装置,其特征在于,在监控所述客户端相册的图片数目之前,该装置还包括:The device according to claim 7, wherein before monitoring the number of pictures in the client album, the device further comprises:
    第一接收模块,用于接收所述客户端同意对所述客户端的相册监控的权限。A first receiving module is configured to receive the client's permission to monitor the client's photo album.
  9. 根据权利要求7所述的装置,其特征在于,在获取增加的截屏图片之前,该装置 还包括:The device according to claim 7, characterized in that before acquiring the added screenshot picture, the device further comprises:
    发送模块,向所述客户端发送选择提示框,所述选择提示框用于询问所述用户是否对所述截屏图片添加水印;A sending module, sending a selection prompt box to the client, where the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture;
    第二接收模块,用于接收所述用户对所述选择提示框的操作信息,所述操作信息包括允许对所述截屏图片添加水印或者不允许对所述截屏图片添加水印。A second receiving module is configured to receive operation information of the selection prompt box by the user, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  10. 根据权利要求9所述的装置,其特征在于,该装置还包括:The device according to claim 9, further comprising:
    记录模块,用于当所述用户不允许对所述截屏图片添加水印时,记录所述用户的信息和所述截屏图片。The recording module is configured to record information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  11. 根据权利要求7所述的装置,其特征在于,该装置还包括:The apparatus according to claim 7, further comprising:
    压缩模块,用于对所述截屏图片进行压缩,以便于减少所述截屏图片占用所述客户端的内存空间。The compression module is configured to compress the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
  12. 根据权利要求7所述的装置,其特征在于,该装置还包括:The apparatus according to claim 7, further comprising:
    生成模块,基于所述用户信息,生成带有用户信息的水印。A generating module generates a watermark with user information based on the user information.
  13. 一种客户端数据被截屏的安全实现装置,包括:A device for implementing security on screen capture of client data includes:
    一个或多个处理器;以及One or more processors; and
    存储装置,用于存储一个或多个程序,A storage device for storing one or more programs,
    其中,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行根据权利要求1~6任意一项所述的方法。Wherein, when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the method according to any one of claims 1 to 6.
  14. 一种计算机可读介质,其上存储有可执行指令,该指令被处理器执行时使处理器执行根据权利要求1~6任意一项所述的方法。A computer-readable medium stores executable instructions, which when executed by a processor, cause the processor to execute the method according to any one of claims 1 to 6.
PCT/CN2019/089341 2018-06-11 2019-05-30 Secure implementation method and apparatus for screenshot of client data, and medium WO2019237941A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810597385.2A CN108875393B (en) 2018-06-11 2018-06-11 Security realization method, device and medium for client data screen capturing
CN201810597385.2 2018-06-11

Publications (1)

Publication Number Publication Date
WO2019237941A1 true WO2019237941A1 (en) 2019-12-19

Family

ID=64337745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/089341 WO2019237941A1 (en) 2018-06-11 2019-05-30 Secure implementation method and apparatus for screenshot of client data, and medium

Country Status (2)

Country Link
CN (1) CN108875393B (en)
WO (1) WO2019237941A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364196A (en) * 2020-11-30 2021-02-12 深圳市六度人和科技有限公司 Notification information data analysis method and device, electronic equipment and storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875393B (en) * 2018-06-11 2021-03-05 京东数字科技控股有限公司 Security realization method, device and medium for client data screen capturing
CN109740010A (en) * 2018-12-29 2019-05-10 上海诚数信息科技有限公司 The analysis method and system of the photograph album of intelligent terminal
CN112632644A (en) * 2020-12-18 2021-04-09 深圳市安络科技有限公司 Android system-based app screen capture prevention method, device and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN107273753A (en) * 2017-05-11 2017-10-20 北京明朝万达科技股份有限公司 A kind of screenshotss leakage prevention method and device
US20170329943A1 (en) * 2016-05-12 2017-11-16 Markany Inc. Method and apparatus for embedding and extracting text watermark
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107679419A (en) * 2017-10-17 2018-02-09 田进 A kind of screenshotss method and device
CN108875393A (en) * 2018-06-11 2018-11-23 北京京东金融科技控股有限公司 Client data is by the safety implementation method, device and medium of screenshotss

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256702C (en) * 2003-12-31 2006-05-17 马堃 Method for synthesizing digital image
CN102760131B (en) * 2011-04-28 2015-11-04 腾讯科技(深圳)有限公司 A kind of methods of exhibiting of network album and system
CN103685939B (en) * 2013-11-22 2016-07-13 杭州百航信息技术有限公司 The method that when taking pictures, photo is added a cover watermark
CN105279675A (en) * 2015-10-20 2016-01-27 惠州Tcl移动通信有限公司 Mobile terminal and advertisement putting method therefor
CN105426721A (en) * 2015-11-10 2016-03-23 广东欧珀移动通信有限公司 Picture encryption method and device
CN106168872A (en) * 2016-06-23 2016-11-30 珠海市魅族科技有限公司 Screenshotss method and apparatus
CN106202194A (en) * 2016-06-27 2016-12-07 北京小米移动软件有限公司 The storage method and device of screenshot picture
CN107633475B (en) * 2017-08-31 2021-05-04 努比亚技术有限公司 Picture processing method, terminal and computer readable storage medium
CN108055383A (en) * 2017-10-19 2018-05-18 福建中金在线信息科技有限公司 Acquisition methods, device and the mobile terminal of screenshot picture

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170329943A1 (en) * 2016-05-12 2017-11-16 Markany Inc. Method and apparatus for embedding and extracting text watermark
CN106372473A (en) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 Screen capturing method, screen capturing device, terminal and server
CN107423629A (en) * 2017-04-12 2017-12-01 李晓妮 A kind of anti-method and system divulged a secret with tracing of fileinfo output
CN107273753A (en) * 2017-05-11 2017-10-20 北京明朝万达科技股份有限公司 A kind of screenshotss leakage prevention method and device
CN107679419A (en) * 2017-10-17 2018-02-09 田进 A kind of screenshotss method and device
CN108875393A (en) * 2018-06-11 2018-11-23 北京京东金融科技控股有限公司 Client data is by the safety implementation method, device and medium of screenshotss

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364196A (en) * 2020-11-30 2021-02-12 深圳市六度人和科技有限公司 Notification information data analysis method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108875393B (en) 2021-03-05
CN108875393A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
WO2019237941A1 (en) Secure implementation method and apparatus for screenshot of client data, and medium
US10616194B2 (en) Secure data destruction in a distributed environment using key protection mechanisms
KR102264288B1 (en) Systems and methods for monitoring cloud-based operating system events and data access
US8955153B2 (en) Privacy control in a social network
US10116690B2 (en) System and method for the protection of computers and computer networks against cyber threats
US10178077B2 (en) Preventing persistent storage of cryptographic information using signaling
US9454790B2 (en) Apparatus and method for displaying watermark on a screen
US8918878B2 (en) Restoration of file damage caused by malware
US20170070539A1 (en) Method of and system for privacy awarness
US11743306B2 (en) Intelligent screen and resource sharing during a meeting
JP7471321B2 (en) Sensitive Data Management
Zhou et al. Vulnerable gpu memory management: towards recovering raw data from gpu
WO2017107896A1 (en) Document protection method and device
US10970532B1 (en) Systems and methods for preventing sharing of sensitive content in image data on a closed computing platform
EP3910511A1 (en) System and method for identifying files based on hash values
JP6276709B2 (en) Context-sensitive application interaction
CN112560090A (en) Data detection method and device
JP2014525638A (en) Managing content for applications
WO2021017277A1 (en) Image capture method and apparatus, and computer storage medium
CN111461955A (en) Method and device for automatically increasing digital blind watermark in screenshot, electronic equipment and storage medium
US20170031737A1 (en) Restricted application visibility
Verma et al. Preserving dates and timestamps for incident handling in android smartphones
CN112367314B (en) Identity authentication method, device, computing equipment and medium
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
US9223976B2 (en) Content inspection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19820470

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19820470

Country of ref document: EP

Kind code of ref document: A1