WO2019237941A1 - Procédé et appareil de mise en œuvre sécurisée pour capture d'écran de données de client et support - Google Patents

Procédé et appareil de mise en œuvre sécurisée pour capture d'écran de données de client et support Download PDF

Info

Publication number
WO2019237941A1
WO2019237941A1 PCT/CN2019/089341 CN2019089341W WO2019237941A1 WO 2019237941 A1 WO2019237941 A1 WO 2019237941A1 CN 2019089341 W CN2019089341 W CN 2019089341W WO 2019237941 A1 WO2019237941 A1 WO 2019237941A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
screenshot
watermark
album
user
Prior art date
Application number
PCT/CN2019/089341
Other languages
English (en)
Chinese (zh)
Inventor
尚晋
胡小锋
秦亚洲
Original Assignee
京东数字科技控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东数字科技控股有限公司 filed Critical 京东数字科技控股有限公司
Publication of WO2019237941A1 publication Critical patent/WO2019237941A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to a method, a device, and a medium for securely implementing a screen capture of client data.
  • the rapid development of mobile Internet and the portability of mobile devices are increasing the number of people who use mobile devices for office work. Users can even use mobile clients to access company data on any occasion.
  • the data accessed by users is likely to involve sensitive data of the company. For example, if a user takes a screenshot of sensitive data and then sends it to the network, it will pose a great threat to the company.
  • the prior art adopts the following two methods to solve this kind of problem: the first is to completely prohibit screen capture. For example, users are completely prohibited from using the client to take screenshots in certain situations.
  • the second is to add a new watermarked screenshot to the user's album after the user takes a screenshot.
  • the present disclosure provides a method, a device, and a medium for safely implementing screen capture of client data, thereby at least partially solving one or more problems due to limitations and defects of related technologies.
  • An aspect of the present disclosure provides a method for securely capturing a screenshot of client data, comprising: monitoring the number of pictures of the client's album when an application of the client is running; and receiving a screenshot from the client Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
  • the method before monitoring the number of pictures of the client album, the method includes receiving a permission that the client agrees to monitor the client's album.
  • the method before acquiring the added screenshot picture, further includes: sending a selection prompt box to the client, the selection prompt box being used to ask the user whether to add a watermark to the screenshot picture; Receiving operation information of the selection prompt box by the user, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the method further includes recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the method further includes compressing the screenshot image, so as to reduce the screenshot image occupying a memory space of the client.
  • the method further includes generating a watermark with user information based on the user information.
  • Another aspect of the present disclosure provides a device for implementing security on screen capture of client data, including: a monitoring module for monitoring the number of pictures of the client's album when an application of the client is running; an acquisition module To receive a screenshot notification from the client.
  • a monitoring module for monitoring the number of pictures of the client's album when an application of the client is running
  • an acquisition module To receive a screenshot notification from the client.
  • the number of pictures of the album is monitored to increase, obtain the increased screenshot picture; add a watermark module to add a screenshot with the screenshot picture Watermark the user information, and replace the screenshots of the album with the screenshots after adding the watermark, so that the number of pictures in the album is increased by one compared to the number before the screenshots are generated.
  • the apparatus before monitoring the number of pictures of the client album, the apparatus further includes: a first receiving module, configured to receive a permission that the client agrees to monitor the client's album.
  • the device before acquiring the added screenshot picture, the device further includes: a sending module that sends a selection prompt box to the client, the selection prompt box is used to ask the user whether to take the screenshot picture Adding a watermark; a second receiving module, configured to receive the user's operation information on the selection prompt box, the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the device further includes a recording module for recording information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the device further includes a compression module for compressing the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
  • the device further includes a generating module that generates a watermark with user information based on the user information.
  • the device includes one or more processors, and a storage device.
  • the storage device is used to store one or more programs. Wherein, when the one or more programs are executed by the one or more processors, the one or more processors are caused to execute the security implementation method of the client data being captured as described above.
  • Another aspect of the present disclosure provides a computer-readable medium having executable instructions stored thereon that, when executed by a processor, cause the processor to perform a secure implementation method of the client-side data being captured as described above.
  • Another aspect of the present disclosure provides a computer program including computer-executable instructions that, when executed, are used to implement a secure implementation method of a client-side data screen capture.
  • the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • FIG. 1 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to an embodiment of the present disclosure
  • FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 3 schematically illustrates a flowchart of a method for implementing a security method in which client data is captured according to another embodiment of the present disclosure
  • FIG. 4 schematically illustrates a flowchart of a method for implementing a security method for capturing data of a client according to another embodiment of the present disclosure
  • FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to an embodiment of the present disclosure
  • FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure.
  • FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screenshotd according to another embodiment of the present disclosure
  • FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • An embodiment of the present disclosure provides a method for safely implementing screen capture of client data, including: monitoring the number of pictures of the client's photo album when an application of the client is running; and receiving a screen capture from the client. Notice, in this case, if the number of pictures of the album is monitored to increase, obtain an increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot with the screenshot after adding the watermark Screenshot pictures of an album, so that the number of pictures in the album is increased by one more than the number before the screenshot pictures are generated.
  • the number of pictures in the client's album can be monitored. If a screen capture notification is received from the client during the monitoring process, and the number of pictures in the album is monitored at this time Increase, in this case, it indicates that there are screenshots generated in the client's photo album, which can effectively overcome that in the prior art, when the client's application is running, the user is completely prohibited from taking screenshots of the application. Inconvenience.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • FIG. 1 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to an embodiment of the present disclosure.
  • the method for implementing security on which the client data is captured includes steps S101 to S103.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • the number of pictures in the client's album can be monitored. If a screen capture notification from the client is received during the monitoring process, and the number of pictures monitored in the album increases at this time, In this case, it is indicated that a screenshot image is generated in the client's photo album, which can effectively overcome the fact that in the prior art, when the client application is running, the user is completely prohibited from taking a screenshot of the application program. inconvenient.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • the above-mentioned client application is in a running state may refer to an application of the client running on an interface of the client, that is, the application is in a foreground running state.
  • an application can run on the client's interface as a window.
  • the above-mentioned application may be an application that is only allowed to be used by internal users of the company, and the user may access internal data of the company through an application running on the client, and the data may include confidential data within the company Or other data, where confidential data can also be called sensitive data.
  • sensitive data For example, if a user of a company uses an application running on the client to access company's internal data and accidentally take a screenshot of it, and then send the screenshot to the network, in this case, if the screenshot has been added by the above method If the user has a watermark with user information, then it is discovered that the user ’s screenshots published on the network contain sensitive data within the company. At this time, the company can identify the user ’s watermark with the user ’s watermark on the screenshot. Identity, which can prevent client data screenshots from being leaked and cannot be tracked, and to a certain extent also prevent client data screenshots from being leaked.
  • the client's photo album may be monitored through a server associated with an application running on the client. For example, if the application is an application developed by Company A, the client's photo album can be monitored through the server of Company A. As another example, if the application is an application developed by company B, the client's photo album can be monitored through the server of company B.
  • a screenshot notification from the client may be received through the above-mentioned server associated with the application. After receiving the screenshot notification or after a preset time period (for example, the preset time period can be set to 0.5s, 0.8s, 1s, etc.), if the server monitors that the number of pictures on the client album increases, it passes the server Get the screenshot added by the client album.
  • a preset time period for example, the preset time period can be set to 0.5s, 0.8s, 1s, etc.
  • the above method may further include generating a watermark with user information based on the user information.
  • the user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
  • the watermark with user information may be a clear watermark with user information or a dark watermark with user information.
  • the above server may add a watermark with user information to the screenshot image when receiving the permission granted by the client, and replace the screenshot generated by the screenshot operation in the client album with the screenshot with the watermark added image.
  • the server can also delete the screenshot pictures stored in the client album after obtaining the screenshot pictures, so that the watermarked screenshot pictures can be directly saved to the client album.
  • FIG. 2 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes step S201.
  • step S201 receiving the permission of the client to monitor the album of the client.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • the permission that the client agrees to monitor the client ’s photo album may refer to a permission that is always granted when a user runs the application for the first time using the client. Of course, it can also refer to the permissions granted each time the user runs the above application using the client.
  • FIG. 3 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes steps S301 and S302.
  • step S301 a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • step S302 the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • a user's opinion can be sought by sending a selection prompt box to the client.
  • This opinion can be used to ask the user whether to add a watermark to the generated screenshot image.
  • the user can add a watermark to the screenshot image under the conditions allowed by the user.
  • the method has humanized beneficial effects.
  • the above selection prompt box may be a prompt box displayed on an application program interface, where the prompt box may include two options, for example, one option may be an option that allows watermarking of screenshot images, Another option could be an option that does not allow watermarking of screenshots. This can be performed according to the user's choice whether to add a watermark to the screenshot.
  • FIG. 4 schematically illustrates a flowchart of a method for implementing security in which client data is screen shot according to another embodiment of the present disclosure.
  • the method further includes step S401.
  • step S301 a selection prompt box is sent to the client, and the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • step S302 the operation information of the selection prompt box received by the user is received, and the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • step S401 when the user is not allowed to add a watermark to the screenshot picture, the user information and the screenshot picture are recorded.
  • the user information and the screenshot picture can be recorded.
  • the screenshot picture without the watermark is sent to the network
  • user information and screenshots that do not allow watermarking of screenshots may be saved in the database of the server described above.
  • the user information may include any one or more of the following: a user's ID, a user's name, a user's contact information, a user's employee number in the company, and the like, but is not limited thereto.
  • FIG. 5 schematically illustrates a flowchart of a method for implementing security in which client data is screenshotd according to another embodiment of the present disclosure.
  • the method further includes step S501.
  • step S101 when the application program of the client is in a running state, the number of pictures of the client album is monitored.
  • step S102 a screenshot notification from the client is received. In this case, if the number of pictures of the album is monitored to increase, an increased screenshot picture is obtained.
  • step S501 the screenshot picture is compressed, so as to reduce the screenshot picture occupying the memory space of the client.
  • step S103 a watermark with user information is added to the screenshot image, and the screenshot image of the album is replaced with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than the number before the screenshot image is generated. Add one.
  • This method can compress the screenshot image, so as to reduce the screenshot image occupying the client's memory space, thereby effectively preventing system failure caused by excessive client memory.
  • the compression process of the picture may also be performed after adding a watermark to the screenshot picture.
  • it can be compressing the screenshot after adding a watermark.
  • FIG. 6 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • the security implementation device 600 in which the client data is captured includes a monitoring module 610, an obtaining module 620, and a watermarking module 630.
  • the monitoring module 610 is configured to monitor the number of pictures in the client album when the client application is running.
  • the obtaining module 620 is configured to receive a screenshot notification from the client. In this case, if the number of pictures of the album is monitored to increase, obtain the increased screenshot picture.
  • a watermark adding module 630 is configured to add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that before the screenshot image is generated. The number is increased by one.
  • the number of pictures in the client's album can be monitored. If a screenshot notification is received from the client during the monitoring process, and When the number of pictures in the album is monitored, in this case, it indicates that screenshots are generated in the client's album, which can effectively overcome the prohibition of the user when the client application is running in the prior art. Screenshots of the application program, inconvenience to users.
  • a watermark with user information is added to the screenshot picture, and then the screenshot picture of the album is replaced with the screenshot picture after the watermark is added, so that the number of pictures in the album is increased by one compared to the number before the screenshot picture is generated, thereby effectively avoiding
  • a new watermarked screenshot was added to the client album, which resulted in the screenshot without the watermark added to the album (at this time, the album added 2 pictures), so when the user is using the client ’s At that time, screenshots without watermarks may be sent to the network, causing the risk of information security leakage.
  • the security implementing device 600 in which the client data is captured may be used to implement the method described in the embodiment of FIG. 1.
  • FIG. 7 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 700 in which the client data is captured includes a first receiving module 710.
  • a first receiving module 710 is configured to receive a permission that the client agrees to monitor an album of the client.
  • the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 2.
  • FIG. 8 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 800 in which the client data is captured includes a sending module 810 and a second receiving module 820.
  • the sending module 810 sends a selection prompt box to the client, where the selection prompt box is used to ask the user whether to add a watermark to the screenshot picture.
  • the second receiving module 820 is configured to receive the user's operation information on the selection prompt box, where the operation information includes allowing a watermark to the screenshot picture or disallowing adding a watermark to the screenshot picture.
  • the security implementation device 800 where the client data is captured can send a selection prompt box to the client to solicit the user's opinion. This opinion can be used to ask the user whether to add a watermark to the generated screenshot image. Adding a watermark to the screenshots makes the method humane and beneficial.
  • the security implementing device 600 in which the client data is screen-shot may be used to implement the method described in the embodiment of FIG. 3.
  • FIG. 9 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the acquisition module 620 As shown in FIG. 9, in addition to the monitoring module 610, the acquisition module 620, the watermarking module 630, the sending module 810, and the second receiving module 820 described in the embodiment of FIG. Recording module 910.
  • the recording module 910 is configured to record information of the user and the screenshot when the user is not allowed to add a watermark to the screenshot.
  • the security implementation device 900 where the client data is screenshotd
  • the user's information and the screenshot picture can be recorded.
  • the user when the user is using the client, When the screenshot without watermark is sent on the network, and the screenshot contains sensitive data, the user's identity can be analyzed based on the recorded user information and the screenshot, thereby preventing the client data screenshot from being leaked and cannot be tracked. , And to some extent prevent client data screenshots from being leaked.
  • the security implementing device 900 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 4.
  • FIG. 10 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the security implementation device 1000 in which the client data is screenshotd further includes a compression module 1010.
  • the compression module 1010 is configured to compress the screenshot image, so as to reduce the screenshot image occupying the memory space of the client.
  • the device 1000 for security-captured data of a client screen can compress the screen-captured pictures, so as to reduce the screen-captured pictures occupying the client's memory space, thereby effectively preventing system failures caused by excessive client memory.
  • the security implementing apparatus 1000 in which the client data is screen shot may be used to implement the method described in the embodiment of FIG. 5.
  • FIG. 11 schematically illustrates a block diagram of a security implementation device in which client data is screen shot according to another embodiment of the present disclosure.
  • the generating module 1110 generates a watermark with user information based on the user information.
  • the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 can be combined into one Implemented in modules, or any one of them can be split into multiple modules. Alternatively, at least part of the functions of one or more of these modules may be combined with at least part of the functions of other modules and implemented in one module.
  • the monitoring module 610, the obtaining module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generating module 1110 At least one may be implemented at least partially as a hardware circuit, such as a field programmable gate array (FPGA), a programmable logic array (PLA), a system on a chip, a system on a substrate, a system on a package, an application specific integrated circuit (ASIC), Or it can be implemented in hardware or firmware such as any other reasonable way to integrate or package the circuit, or in an appropriate combination of software, hardware and firmware.
  • FPGA field programmable gate array
  • PLA programmable logic array
  • ASIC application specific integrated circuit
  • At least one of the monitoring module 610, the acquisition module 620, the watermarking module 630, the first receiving module 710, the sending module 810, the second receiving module 820, the recording module 910, the compression module 1010, and the generation module 1110 may be at least Partially implemented as a computer program module, when the program is run by a computer, the functions of the corresponding module can be performed.
  • FIG. 12 schematically illustrates a block diagram of a computer system of a security implementation device in which client data is screen shot according to an embodiment of the present disclosure.
  • the computer system shown in FIG. 12 is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present disclosure.
  • the computer system 1200 of the security implementation device for which the client data is screenshotd according to the embodiment of the present disclosure includes a processor 1201, which may be based on a program stored in a read-only memory (ROM) 1202 or from a storage section 1208.
  • a program loaded into a random access memory (RAM) 1203 performs various appropriate actions and processes.
  • the processor 1201 may include, for example, a general-purpose microprocessor (for example, a CPU), an instruction set processor and / or an associated chipset and / or a special-purpose microprocessor (for example, an application-specific integrated circuit (ASIC)), and so on.
  • the processor 1201 may also include on-board memory for cache use.
  • the processor 1201 may include a single processing unit or multiple processing units for performing different actions of the method flow according to the embodiment of the present disclosure described with reference to FIG. 1 to FIG. 5.
  • the processors 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204.
  • the processor 1201 executes various steps of the security implementation method of the client-side data screen capture described above with reference to FIGS. 1 to 5 by executing programs in the ROM 1202 and / or the RAM 1203. Note that this program can also be stored in one or more memories other than ROM 1202 and RAM 1203.
  • the processor 1201 may also execute various steps of the method for implementing the security of the client data screen capture described above with reference to FIGS. 1-5 by executing a program stored in the one or more memories.
  • the system 1200 may further include an input / output (I / O) interface 1207, and the input / output (I / O) interface 1207 is also connected to the bus 1204.
  • the system 1200 may also include one or more of the following components connected to the I / O interface 1205: an input portion 1206 including a keyboard, a mouse, and the like; including, such as a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker Output section 1207, etc .; a storage section 1208 including a hard disk, etc .; and a communication section 1209, including a network interface card such as a LAN card, a modem, and the like.
  • CTR cathode ray tube
  • LCD liquid crystal display
  • speaker Output section 1207 etc .
  • storage section 1208 including a hard disk, etc .
  • a communication section 1209 including a network interface card such as a LAN card, a modem, and the like.
  • the communication section 1209 performs communication processing via a network such as the Internet.
  • the driver 1210 is also connected to the I / O interface 1205 as needed.
  • a removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 1210 as needed, so that a computer program read therefrom is installed into the storage section 1208 as needed.
  • the method described above with reference to the flowchart may be implemented as a computer software program.
  • embodiments of the present disclosure include a computer program product including a computer program carried on a computer-readable medium, the computer program containing program code for performing a method shown in a flowchart.
  • the computer program may be downloaded and installed from a network through the communication section 1209, and / or installed from a removable medium 1211.
  • the processor 1201 executes the above functions defined in the system of the embodiment of the present disclosure.
  • the systems, devices, devices, modules, units, and the like described above may be implemented by computer program modules.
  • the computer-readable medium shown in the present disclosure may be a computer-readable signal medium or a computer-readable storage medium or any combination of the foregoing.
  • the computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programming read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in combination with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal that is included in baseband or propagated as part of a carrier wave, and which carries computer-readable program code. Such a propagated data signal may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, and the computer-readable medium may send, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device. .
  • Program code embodied on a computer-readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
  • the computer-readable medium may include one or more memories other than the ROM 1202 and / or the RAM 1203 and / or the ROM 1202 and the RAM 1203 described above.
  • each block in the flowchart or block diagram may represent a module, program segment, or part of code, which contains one or more of the logic functions used to implement the specified logic. Executable instructions.
  • the functions labeled in the blocks may also occur in a different order than those labeled in the drawings. For example, two blocks represented one after the other may actually be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending on the functions involved.
  • each block in the block diagram or flowchart, and combinations of blocks in the block diagram or flowchart can be implemented with a dedicated hardware-based system that performs the specified function or operation, or can be implemented with A combination of dedicated hardware and computer instructions.
  • the present disclosure also provides a computer-readable medium, which may be included in the device described in the above embodiments; or may exist alone without being assembled into the device.
  • the computer-readable medium described above carries one or more programs, and when the one or more programs are executed by one of the devices, the device is caused to execute a security implementation method in which the client data according to the embodiment of the present disclosure is screenshotd.
  • the method includes: monitoring the number of pictures of the client's album when the client's application is running; receiving a screenshot notification from the client; in this case, if the number of pictures of the album is monitored If it is increased, then obtain an increased screenshot image; add a watermark with user information to the screenshot image, and replace the screenshot image of the album with the screenshot image after the watermark is added, so that the number of pictures in the album is greater than that in the generated screenshot The number before the picture is increased by one.

Abstract

La présente invention concerne un procédé de mise en œuvre sécurisée pour une capture d'écran de données de client. Le procédé comprend les étapes suivantes : lorsqu'un programme d'application d'un client est dans un état de fonctionnement, surveiller le nombre d'images dans un album de photographies du client ; recevoir une notification de capture d'écran en provenance du client et, dans cette condition, s'il est surveillé que le nombre d'images dans l'album de photographies augmente, acquérir l'image de capture d'écran ajoutée ; et ajouter un filigrane avec des informations d'utilisateur à l'image de capture d'écran et remplacer l'image de capture d'écran dans l'album de photographies par l'image de capture d'écran avec un filigrane ajouté, de telle sorte que le nombre d'images dans l'album de photographies soit supérieur de un au nombre avant la production de l'image de capture d'écran. La présente invention concerne en outre un appareil de mise en œuvre sécurisée pour une capture d'écran de données de client, ainsi qu'un support.
PCT/CN2019/089341 2018-06-11 2019-05-30 Procédé et appareil de mise en œuvre sécurisée pour capture d'écran de données de client et support WO2019237941A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810597385.2 2018-06-11
CN201810597385.2A CN108875393B (zh) 2018-06-11 2018-06-11 客户端数据被截屏的安全实现方法、装置及介质

Publications (1)

Publication Number Publication Date
WO2019237941A1 true WO2019237941A1 (fr) 2019-12-19

Family

ID=64337745

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/089341 WO2019237941A1 (fr) 2018-06-11 2019-05-30 Procédé et appareil de mise en œuvre sécurisée pour capture d'écran de données de client et support

Country Status (2)

Country Link
CN (1) CN108875393B (fr)
WO (1) WO2019237941A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364196A (zh) * 2020-11-30 2021-02-12 深圳市六度人和科技有限公司 通知信息数据分析方法、装置、电子设备及存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875393B (zh) * 2018-06-11 2021-03-05 京东数字科技控股有限公司 客户端数据被截屏的安全实现方法、装置及介质
CN109740010A (zh) * 2018-12-29 2019-05-10 上海诚数信息科技有限公司 智能终端的相册的分析方法及系统
CN112632644A (zh) * 2020-12-18 2021-04-09 深圳市安络科技有限公司 一种基于安卓系统的app防截屏方法、装置及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372473A (zh) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 截屏方法、截屏装置、终端和服务器
CN107273753A (zh) * 2017-05-11 2017-10-20 北京明朝万达科技股份有限公司 一种截屏防泄漏方法及装置
US20170329943A1 (en) * 2016-05-12 2017-11-16 Markany Inc. Method and apparatus for embedding and extracting text watermark
CN107423629A (zh) * 2017-04-12 2017-12-01 李晓妮 一种文件信息输出防泄密和溯源追踪的方法和系统
CN107679419A (zh) * 2017-10-17 2018-02-09 田进 一种截屏方法及装置
CN108875393A (zh) * 2018-06-11 2018-11-23 北京京东金融科技控股有限公司 客户端数据被截屏的安全实现方法、装置及介质

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256702C (zh) * 2003-12-31 2006-05-17 马堃 数字图像合成的方法
CN102760131B (zh) * 2011-04-28 2015-11-04 腾讯科技(深圳)有限公司 一种网络相册的展示方法及系统
CN103685939B (zh) * 2013-11-22 2016-07-13 杭州百航信息技术有限公司 拍照时对照片加盖水印的方法
CN105279675A (zh) * 2015-10-20 2016-01-27 惠州Tcl移动通信有限公司 移动终端及其广告投放方法
CN105426721A (zh) * 2015-11-10 2016-03-23 广东欧珀移动通信有限公司 一种图片加密的方法及装置
CN106168872A (zh) * 2016-06-23 2016-11-30 珠海市魅族科技有限公司 截屏方法和装置
CN106202194A (zh) * 2016-06-27 2016-12-07 北京小米移动软件有限公司 截屏图片的存储方法及装置
CN107633475B (zh) * 2017-08-31 2021-05-04 努比亚技术有限公司 一种图片处理方法、终端及计算机可读存储介质
CN108055383A (zh) * 2017-10-19 2018-05-18 福建中金在线信息科技有限公司 截屏图片的获取方法、装置和移动终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170329943A1 (en) * 2016-05-12 2017-11-16 Markany Inc. Method and apparatus for embedding and extracting text watermark
CN106372473A (zh) * 2016-09-02 2017-02-01 深圳中兴网信科技有限公司 截屏方法、截屏装置、终端和服务器
CN107423629A (zh) * 2017-04-12 2017-12-01 李晓妮 一种文件信息输出防泄密和溯源追踪的方法和系统
CN107273753A (zh) * 2017-05-11 2017-10-20 北京明朝万达科技股份有限公司 一种截屏防泄漏方法及装置
CN107679419A (zh) * 2017-10-17 2018-02-09 田进 一种截屏方法及装置
CN108875393A (zh) * 2018-06-11 2018-11-23 北京京东金融科技控股有限公司 客户端数据被截屏的安全实现方法、装置及介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364196A (zh) * 2020-11-30 2021-02-12 深圳市六度人和科技有限公司 通知信息数据分析方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN108875393A (zh) 2018-11-23
CN108875393B (zh) 2021-03-05

Similar Documents

Publication Publication Date Title
WO2019237941A1 (fr) Procédé et appareil de mise en œuvre sécurisée pour capture d'écran de données de client et support
US10616194B2 (en) Secure data destruction in a distributed environment using key protection mechanisms
KR102264288B1 (ko) 클라우드 기반 운영 체제 이벤트 및 데이터 액세스 감시를 위한 시스템 및 방법
US8955153B2 (en) Privacy control in a social network
US10116690B2 (en) System and method for the protection of computers and computer networks against cyber threats
US10178077B2 (en) Preventing persistent storage of cryptographic information using signaling
US9454790B2 (en) Apparatus and method for displaying watermark on a screen
US8918878B2 (en) Restoration of file damage caused by malware
US20170070539A1 (en) Method of and system for privacy awarness
US11743306B2 (en) Intelligent screen and resource sharing during a meeting
JP7471321B2 (ja) 機密データ管理
Zhou et al. Vulnerable gpu memory management: towards recovering raw data from gpu
WO2017107896A1 (fr) Procédé et dispositif de protection de documents
US20210357364A1 (en) System and method for identifying files based on hash values
US10970532B1 (en) Systems and methods for preventing sharing of sensitive content in image data on a closed computing platform
JP6276709B2 (ja) コンテキストに基づくアプリケーションとの対話処理
US20150193579A1 (en) Exchanging Medical Imaging Data Between Computer Systems
US9996705B2 (en) Determining potential sharing of private data associated with a private network domain to improve data security
JP2014525638A (ja) アプリケーションのためのコンテンツの管理
WO2018233549A1 (fr) Procédé et appareil de gestion de programme d'application de type paiement, et terminal mobile
US10073720B2 (en) Restricted application visibility
WO2021017277A1 (fr) Procédé et appareil de capture d'image, et support de stockage informatique
CN111461955A (zh) 一种截图自动增加数字盲水印方法、装置、电子设备和存储介质
Verma et al. Preserving dates and timestamps for incident handling in android smartphones
CN112367314B (zh) 身份认证的方法、装置、计算设备和介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19820470

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19820470

Country of ref document: EP

Kind code of ref document: A1