WO2021012502A1 - 截屏信息控制方法、装置、计算机设备及存储介质 - Google Patents

截屏信息控制方法、装置、计算机设备及存储介质 Download PDF

Info

Publication number
WO2021012502A1
WO2021012502A1 PCT/CN2019/117298 CN2019117298W WO2021012502A1 WO 2021012502 A1 WO2021012502 A1 WO 2021012502A1 CN 2019117298 W CN2019117298 W CN 2019117298W WO 2021012502 A1 WO2021012502 A1 WO 2021012502A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
picture
confidential
preset
display
Prior art date
Application number
PCT/CN2019/117298
Other languages
English (en)
French (fr)
Inventor
任超超
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021012502A1 publication Critical patent/WO2021012502A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour

Definitions

  • This application relates to the field of security protection, and in particular to a method, device, computer equipment, and storage medium for controlling screenshot information.
  • the method of stealing encrypted information through screenshots is usually circumvented in the following ways: the first is to add a watermark to the displayed encrypted information, and the second is to monitor the intercepted encrypted information after the other party takes a screenshot.
  • the third is to restrict the screen capture function at the software or hardware level.
  • these methods have drawbacks: for example, watermarking technology can only achieve the effect of pre-deterrence and post-mortem tracing, and cannot avoid leaks at the time of screenshots, and the distribution density of general watermarks will not cover 100% of the screen, nor can it prevent repairs.
  • the image software erases the watermark, so the effect of encryption is also limited; although the method of monitoring after screenshots can allow information security personnel to grasp potential information leakage risks in time, this method can only play a role in post-monitoring to prevent the timeliness of leakage Limited; For the method of restricting the screenshot function at the software or hardware level, this method will cause the entire device to be unable to use the screenshot function. During normal work, if you need to use the screenshot function, it will be quite inconvenient. Work has a negative impact, and for some devices (such as iphone), it is impossible to restrict the use of screenshots at the application level of the device. Therefore, there is an urgent need for a method that can prevent leaks through screenshots from the source of information.
  • the embodiments of the application provide a method, device, computer equipment, and storage medium for controlling screenshot information.
  • This application can prevent the stealing of the information to be kept secret by taking screenshots from the source of the information, which greatly improves the security of the information to be kept secret.
  • a method for controlling screenshot information including:
  • the picture frames are displayed in batches in the current display interface according to a preset display rule.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In the display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • a screenshot information control device including:
  • Conversion module used to convert the information to be kept secret into a secret picture
  • a dividing module configured to divide the confidential picture into a first number of information blocks; each of the information blocks has the same size;
  • a disassembly module configured to disassemble each of the information blocks into a second number of picture frames according to a preset disassembly rule, and each of the picture frames has the same size;
  • the display module is configured to display the picture frames in batches in the current display interface according to a preset display rule.
  • the preset display rule refers to displaying each batch of the picture frames at a predetermined rate at a constant speed, and In each batch of display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • a computer device includes a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, and the processor implements the following steps when the processor executes the computer-readable instructions:
  • the picture frames are displayed in batches in the current display interface according to a preset display rule.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In the display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • a computer-readable storage medium that stores computer-readable instructions.
  • the one or more processors execute the following steps :
  • the picture frames are displayed in batches in the current display interface according to a preset display rule.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In the display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • FIG. 1 is a schematic diagram of an application environment of a screenshot information control method in an embodiment of the present application
  • FIG. 2 is a flowchart of a method for controlling screenshot information in an embodiment of the present application
  • step S10 is a flowchart of step S10 of the method for controlling screenshot information in an embodiment of the present application
  • step S101 of the method for controlling screenshot information in an embodiment of the present application is a flowchart of step S101 of the method for controlling screenshot information in an embodiment of the present application
  • step S20 is a flowchart of step S20 of the method for controlling screenshot information in an embodiment of the present application
  • step S20 is a flowchart of step S20 of the method for controlling screenshot information in another embodiment of the present application.
  • FIG. 7 is a flowchart of step S30 of the method for controlling screenshot information in an embodiment of the present application.
  • Fig. 8 is a functional block diagram of a screenshot information control device in an embodiment of the present application.
  • Fig. 9 is a schematic diagram of a computer device in an embodiment of the present application.
  • the screenshot information control method provided by this application can be applied in the application environment as shown in Fig. 1, where the client (computer equipment) communicates with the server through the network.
  • the client includes, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, cameras, and portable wearable devices.
  • the server can be implemented as an independent server or a server cluster composed of multiple servers.
  • a method for controlling screenshot information is provided. Taking the method applied to the server in FIG. 1 as an example for description, the method includes the following steps S10-S40:
  • the confidential picture refers to a confidential picture converted from the to-be-confidential information to be displayed, and the to-be-confidential information includes text information. Or picture information.
  • the step S10 includes:
  • S101 Obtain information to be kept secret in a preset display area; the information to be kept secret includes text information and picture information.
  • the preset display area may refer to an area measured by a pixel area or other display sizes (for example, a 600 ⁇ 800 pixel area on the page is set as the preset display area).
  • the obtaining the information to be kept secret in the preset display area includes:
  • step S1011 Read each piece of information to be displayed in the preset display area; that is, after receiving a display instruction to display the information to be displayed in the preset display area, read each piece of information according to the display instruction
  • the information to be displayed understandably, if the information to be displayed is stored in the database in advance, at this time, the information to be displayed can be directly read from the database.
  • the step S1011 includes: reading each piece of information to be displayed in the preset display area and the display object of the area to be displayed; that is, obtaining the area to be displayed included in the display instruction
  • the display object may be the user name or/and terminal address logging in the current system.
  • step S1013 it may be determined according to the display object whether the information to be displayed needs to be encrypted, that is, , Confirming whether the display element in the information to be displayed is a secret element according to the display object, and then determining whether the information to be displayed is the information to be secret.
  • S1012 Determine the security density of the display element in each piece of the information to be displayed according to preset judgment rules; the security density represents the security level of the display element that is required to be kept confidential;
  • each display element can be judged according to a preset judgment rule, so as to confirm the density of the display element.
  • the preset judgment rule includes a one-to-one correspondence between each display element and the security of the display element. For example, if the display element is the ID number of an employee of a company, if the security of the company is divided into Level 1-10, the security of the employee’s ID number can be set to one of the security levels of 1-10 in the judgment rule.
  • the information to be displayed may include many display elements, such as name, ID number, mobile phone number, mailbox, identification, code, and specific confidential pictures, etc., which can be extracted from the information to be displayed The above display elements.
  • the information to be displayed includes text information and picture information. Therefore, on the one hand, for the picture information in the information to be displayed, the pictures in the picture information in the information to be displayed can be kept secret from the preset.
  • the confidential picture in the picture library (the confidential picture has a preset density in the judgment rule) is matched, and after the matching is successful, the confidential picture is obtained with the preset density in the preset judgment rule, and the The preset security density of the secret picture is taken as the security density of the picture matching the secret picture in the information to be displayed.
  • the text information in the information to be displayed can be divided into multiple words; at the same time, each confidential vocabulary that needs to be kept secret, such as the name and identity that need to be kept secret
  • each confidential vocabulary that needs to be kept secret such as the name and identity that need to be kept secret
  • the vocabulary attribute corresponding to the storage location of the ID card number can be: 18 digits, the first 6 digits are the administrative division code, the 7th to 14th digits are the date of birth code; the vocabulary attribute corresponding to the storage location of the name can be: by surname
  • the surname is composed of surnames, and the first name is composed of 1-6 Chinese characters;
  • the vocabulary attribute corresponding to the storage location of the mailbox can be: composed of user name + @ + mail server domain name, user name is composed of letters, Numbers and other common characters (such as underscores, plus and minus symbols) are composed, and the mail server domain name is the server domain name that can
  • the word After obtaining the storage location corresponding to the secret vocabulary for which the word after each segmentation is about to be matched, the word is matched with the secret vocabulary stored in the storage location, and after the matching is successful, the secret vocabulary is obtained in the preset judgment rule
  • the pre-determined density of the secret vocabulary is used as the pre-determined density of the word matching the secret vocabulary in the information to be displayed.
  • the information to be displayed since the information to be displayed also includes text information and picture information, after the density keeping of each picture (display element) in the picture information is determined through the above step S1012 , Record the picture whose density exceeds the preset density threshold as a confidential element.
  • the text information containing the word can also be directly recorded as the information to be kept secret (the text information to which the word belongs is required at this time Perform screenshot information control processing); at this time, other information to be displayed (non-confidential information) in the area to be displayed that is not recorded as confidential information will not be affected during the screenshot process. Further, it is also possible to record all the information to be displayed in the entire area to be displayed containing the confidential element as the information to be displayed.
  • the display elements whose density is less than or equal to the preset density threshold will be recorded as non-secret elements.
  • the recording the display element whose density is greater than a preset density threshold as a confidential element includes: when the density of the display element is greater than the preset density threshold, determining whether the display object is the same The confidential element or/and the non-confidential object matching the confidentiality; each non-confidential object has the confidential element or/and the confidentiality matching it; that is, the confidentiality of the displayed element is greater than
  • the security threshold is preset, it can be further determined whether the display object is a non-secret object matching the security element or/and the security density, and further determine whether the display element is a security element; that is, The non-confidential object has the right to freely take screenshots of the confidential element or/and the information to be displayed corresponding to the confidentiality.
  • the display object is a non-confidential object matching the confidential element or/and the security density, record the display element as a non-confidential element; if the display object is not a non-confidential element or / Only the non-secret object matching the security density will record the display element as a security element and perform subsequent processing.
  • the text information may be first converted into a text picture containing the text information, so that the text picture and the picture information in the information to be kept secret can be shared.
  • the image processing in step S103 is performed.
  • the preset format refers to a preset format of the confidential picture.
  • a block of text information in a 600x800 pixel area (in the preset display area) is set as confidential information.
  • the preset format of the confidential picture can be set to a 600x800 pixel picture.
  • the text picture and the picture information in the information to be kept confidential need to be converted into all the pictures according to the preset format.
  • the secret picture that is, the format of the secret picture acquired in step S10 is fixed, that is, the preset format.
  • the confidential picture generated in the above step S10 needs to be first divided into a first number of information blocks, where the first number can be set according to requirements. And when dividing information blocks, you can set the first number of divided information blocks to be fixed, for example, set the first number of divided information blocks to 1200; you can also set the information after being divided The size of the block is fixed, for example, the size of the information block after division is set to 20*20 pixels. Understandably, after using the above two methods to divide different confidential pictures, the first number or/and size of the generated information blocks may not be equal, but in the case that the sizes of each of the confidential pictures are equal Next, the first number or/and size of the divided information blocks may also be equal.
  • the step S20 includes:
  • the size of the confidential picture is the size of the confidential picture obtained synchronously with the confidential picture after the confidential picture is obtained in step S10.
  • the size of the confidential picture may be based on the amount of confidential information The difference is different, which can be set and modified by the user according to requirements; therefore, the size of the confidential picture can be acquired once before the confidential picture is divided into information blocks, so as to facilitate accurate segmentation.
  • the size of the secret picture may be the secret picture generated according to the preset format in step S103. At this time, the sizes of the obtained secret pictures are all equal. At this time, the secret picture is combined in the preset format. When it is not modified, the size of the confidential picture only needs to be obtained once. If the preset format is changed, the size of the confidential picture needs to be acquired again.
  • the first number can be set according to requirements.
  • the first number when the first number can be the product of multiple sets of natural numbers, it can be selected according to a preset rule (for example, selecting the lengthwise natural number and The product of a group of natural numbers whose values are relatively close in the width direction) or the product of a group of natural numbers is randomly selected as a basis for determining the edge position of each information block in the confidential picture.
  • the first number is 1200. 1200 can be equal to the product of 60 and 20, or equal to the product of 30 and 40.
  • a confidential picture can be divided into 60 rows and 20 columns, a total of 1200 information blocks. It can be divided into a total of 1200 information blocks with 30 rows and 40 columns. Understandably, the size of the information block after each secret picture is divided according to this embodiment (the size of the information block after the same secret picture must be the same) It may be different, but the total number of all information blocks after each secret picture is divided can be kept the same.
  • each of the confidential pictures is divided into the information blocks, in order to display in an orderly manner in the subsequent display process, it is first necessary to assign a module number to each information block, and each information block corresponds to For a unique module number, afterwards, the first edge position of the information block (the area range of the information block can be determined according to the first edge position) and its assigned module number are stored in the database in association with each other.
  • the information block is displayed, it is only necessary to confirm the position of the information block according to the module number.
  • the method further includes:
  • S204 Obtain the size of the information block that needs to be divided into the confidential picture, and determine the second edge position of each information block in the confidential picture according to the size of the information block and the size of the confidential picture .
  • the size of the information block can be set according to requirements, for example, the size of the information block can be set to 10*10 pixels.
  • the edge position of each information block in the confidential picture can be determined according to the size of the confidential picture.
  • the number of information blocks after each secret picture is divided according to this embodiment because the size of the information block after the division is limited, so if the size of each secret picture is not the same, the size of the information block after the division is The total number will not be the same) may be different, but the size of the information block after each secret picture is divided according to this embodiment can be kept the same.
  • the first number may be obtained based on the size of the confidential picture and the size of the information block, that is, the confidential picture is divided into each information according to the size of the information block.
  • the first number of all information blocks and the area range of each information block can be determined, and the confidential picture can be divided accordingly.
  • the confidential picture can be divided accordingly.
  • the second edge position of the information block (the area range of the information block can be determined according to the second edge position) and its assigned module number are associated and stored in the database.
  • each information block after the division in step S20 needs to be disassembled into a second number of picture frames, and the picture frames may be disassembled according to the preset disassembly rule,
  • the preset disassembly rule may be to disassemble each information block into four of the same size (the second number may be other values other than four, which can be set according to requirements). It can also be a picture frame of other shapes.
  • the step S30 includes:
  • the size of the information block may be the size of the information block after being divided in step S203.
  • the size of the information block is the same.
  • the size of the information block corresponding to each secret picture may be different. Therefore, the size of the information block needs to be acquired once for each secret picture.
  • the size of the information block may also be the size of the information block divided in step S205. At this time, regardless of whether it is a different confidential picture, the size of each information block is the same.
  • step S204 when the confidential picture is divided, if the size of the information block obtained in step S204 is not modified, it is only necessary to obtain the size of the information block after dividing the information block of the first confidential picture. OK. If the size of the information block obtained in step S204 is changed, it is necessary to obtain the size of the information block after the secret picture is divided again after the change.
  • the second number can be set according to requirements, such as four.
  • the third edge position may be determined according to the second number and the size of the information block.
  • S303 Disassemble the information block into the second number of the picture frames at the third edge position of each of the picture frames, and after assigning a frame number to each of the picture frames, divide each of the pictures The third edge position of the frame is associated with the frame number of the picture frame.
  • each of the information blocks is disassembled into picture frames, in order to display them in an orderly manner in the subsequent display process, it is first necessary to assign a frame number to the picture frames in each of the information blocks.
  • the picture frame corresponds to a unique frame number.
  • the third edge position of the picture frame (the area of the picture frame can be determined according to the third edge position) and its assigned frame number are stored in the database in association with the assigned frame number.
  • the position of the picture frame can be confirmed only according to the frame number.
  • the frame number may include the module number of the information block to which it belongs (or the number keyword extracted from the module number). At this time, only the frame number needs to be determined to determine the information block to which the picture frame belongs and the position of the picture frame in the information block.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In each display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • the preset display rule may be to display each batch of picture frames at a high speed at a preset rate (the preset rate can be set according to requirements, for example, a frequency of display once every 0.01 second).
  • the visual effect achieved by humans is that the secret picture corresponding to the picture frame is displayed on the current page at a constant speed (that is, the time interval between each batch of display process is equal, so that the display process is The display of the confidential pictures will be more stable)
  • 1 picture frame is displayed in 1200 information blocks simultaneously (each information block contains at least two picture frames of the same number), that is, simultaneous display There are 1200 picture frames, and the process of selecting the displayed picture frame from each information block is random.
  • the number of displayed batches can be set according to requirements. For example, it can be set as long as the display period of the confidential picture in the current display interface (the user opens the current page displaying the confidential picture to the current page Within the duration of switching to other pages), the picture frames will be displayed at the same preset rate at a constant speed until the display period of the secret picture ends.
  • each batch of picture frames is displayed at a constant speed and high speed at a preset rate.
  • the picture frame to be displayed refers to a picture frame randomly selected from the 4 picture frames of each of the 1200 information blocks (the number of picture frames to be displayed in each batch is 1200 ).
  • the probability that an information block is superimposed into a complete information block in each picture frame in the 4 screenshots is:
  • the foregoing embodiments of the present application can prevent the information to be kept secret from being stolen by taking screenshots from the source of the information, which greatly improves the security of the information to be kept secret.
  • this application only converts the information to be confidential into a confidential picture and then performs screenshot information control processing on it. Therefore, for non-confidential information other than the information to be confidential, it will not affect the use of the normal screenshot function, which improves the user experience .
  • a screenshot information control device is provided, and the screenshot information control device corresponds to the screenshot information control method in the foregoing embodiment one-to-one.
  • the screenshot information control device includes:
  • the conversion module 11 is used to convert the information to be kept secret into a secret picture
  • the dividing module 12 is configured to divide the confidential picture into a first number of information blocks; each of the information blocks has the same size;
  • the disassembly module 13 is configured to disassemble each of the information blocks into a second number of picture frames according to a preset disassembly rule, and each of the picture frames has the same size;
  • the display module 14 is configured to display the picture frames in batches in the current display interface according to a preset display rule.
  • the preset display rule refers to displaying the picture frames of each batch at a predetermined rate at a uniform speed, and In each batch of display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • Each module in the above-mentioned screenshot information control device can be implemented in whole or in part by software, hardware and a combination thereof.
  • the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 9.
  • the computer equipment includes a processor, a memory, a network interface and a database connected through a system bus.
  • the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a readable storage medium and an internal memory.
  • the readable storage medium stores an operating system, computer readable instructions, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer readable instructions in the readable storage medium.
  • the computer-readable instruction is executed by the processor to realize a screenshot information control method.
  • the readable storage medium provided in this embodiment includes a non-volatile readable storage medium and a volatile readable storage medium.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and capable of running on the processor, and the processor implements the following steps when the processor executes the computer-readable instructions:
  • the picture frames are displayed in batches in the current display interface according to a preset display rule.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In the display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • one or more readable storage media storing computer readable instructions are provided.
  • the readable storage media provided in this embodiment include non-volatile readable storage media and volatile readable storage Medium; the readable storage medium stores computer readable instructions, and when the computer readable instructions are executed by one or more processors, the one or more processors implement the following steps:
  • the picture frames are displayed in batches in the current display interface according to a preset display rule.
  • the preset display rule means that the picture frames of each batch are displayed at a predetermined rate at a constant speed, and in each batch In the display, one of the picture frames in the information block selected randomly from each of the information blocks is synchronously displayed.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Document Processing Apparatus (AREA)

Abstract

一种截屏信息控制方法、装置、计算机设备及存储介质,所述方法包括:将待保密信息转换为保密图片(S10);将保密图片分割为第一数量的信息块,各信息块的大小相等(S20);将每一个信息块按照预设拆解规则拆解为第二数量的图片帧,各图片帧的大小相等(S30);按照预设展示规则在当前显示界面中分批次展示图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的图片帧,且在每一批次的展示中,均同步展示自各信息块中随机选取的该信息块中的一个图片帧(S40)。该方法从信息源头防止通过截屏的方式窃取待保密信息,大大提升了待保密信息的安全性;且对于除待保密信息之外的非保密信息,不会影响其正常截图功能的使用,提升了用户体验。

Description

截屏信息控制方法、装置、计算机设备及存储介质
本申请以2019年7月22日提交的申请号为201910662195.9,名称为“截屏信息控制方法、装置、计算机设备及存储介质”的中国发明专利申请为基础,并要求其优先权。
技术领域
本申请涉及安全防护领域,具体涉及一种截屏信息控制方法、装置、计算机设备及存储介质。
背景技术
目前,针对通过截屏方式窃取加密信息的方式,通常用以下方式来进行规避:第一种是在显示的加密信息上增加水印,第二种是在对方截屏后对截取的加密信息进行监控,第三种是在软件或硬件层面限制截屏功能。但是,这些方法均存在缺陷:比如,水印技术只能起到事前威慑和事后追查的效果,无法在截屏当时即进行避免泄密,且一般水印的分布密度不会覆盖100%屏幕,也不能防止修图软件抹掉水印,所以加密的效果也有限;截屏后监控的方式虽然可以让信息安全人员及时掌握潜在信息泄露风险,但是这种方法也是仅能起到事后监控的作用,防止泄密的时效性有限;而对于在软件或硬件层面限制截屏功能这种方式来说,该方式会导致整个设备无法使用截屏功能,在正常工作过程中,若需要使用截屏功能,会相当不便,如此,会对正常工作产生负面影响,而且对于某些设备(比如iphone)来说,在其设备的应用程序层面做不到限制截屏功能的使用。因此,当前急需一种可以从信息源头防止通过截屏泄密的方法。
发明内容
本申请实施例提供一种截屏信息控制方法、装置、计算机设备及存储介质,本申请可以从信息源头防止通过截屏的方式窃取待保密信息,大大提升了待保密信息的安全性。
一种截屏信息控制方法,包括:
将待保密信息转换为保密图片;
将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
一种截屏信息控制装置,包括:
转换模块,用于将待保密信息转换为保密图片;
分割模块,用于将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
拆解模块,用于将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
展示模块,用于按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现如下步骤:
将待保密信息转换为保密图片;
将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
将待保密信息转换为保密图片;
将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求变得明显。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对本申请实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一实施例中截屏信息控制方法的应用环境示意图;
图2是本申请一实施例中截屏信息控制方法的流程图;
图3是本申请一实施例中截屏信息控制方法的步骤S10的流程图;
图4是本申请一实施例中截屏信息控制方法的步骤S101的流程图;
图5是本申请一实施例中截屏信息控制方法的步骤S20的流程图;
图6是本申请另一实施例中截屏信息控制方法的步骤S20的流程图;
图7是本申请一实施例中截屏信息控制方法的步骤S30的流程图;
图8是本申请一实施例中截屏信息控制装置的原理框图;
图9是本申请一实施例中计算机设备的示意图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请提供的截屏信息控制方法,可应用在如图1的应用环境中,其中,客户端(计算机设备)通过网络与服务器进行通信。其中,客户端(计算机设备)包括但不限于为各种个人计算机、笔记本电脑、智能手机、平板电脑、摄像头和便携式可穿戴设备。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。
在一实施例中,如图2所示,提供一种截屏信息控制方法,以该方法应用在图1中的服务器为例进行说明,包括以下步骤S10-S40:
S10,将待保密信息转换为保密图片。
在该实施例中,需要首先获取在防止截屏泄密过程中需要进行保密的保密图片,所述保密图片是指由待展示的待保密信息转换而成的保密图片,所述待保密信息包括文字信息或图片信息。
在一实施例中,如图3所示,所述步骤S10包括:
S101,获取预设显示区域内的待保密信息;所述待保密信息包括文字信息和图片信息。
可理解地,在通过服务器展示一个页面之前,首先需要对展示的该页面中待展示信息进行判定,以确认其是否为待保密信息。所述预设显示区域可以是指以像素区域或其他显示尺寸来衡量的一个区域(比如,设定页面中一块600x800像素区域为预设显示区域)。
在一实施例中,如图4所示,所述步骤S10中,所述获取预设显示区域内的待保密信息,包括:
S1011,读取所述预设显示区域内的每一条待展示信息;也即,可以在接收到对所述预设显示区域中待展示信息进行展示的展示指令之后,根据展示指令读取每一条待展示信息,可理解地,若待展示信息预先存储在数据库中,此时,可以直接从数据库中读取所述待展示信息。进一步地,所述步骤S1011包括:读取所述预设显示区域内的每一条待展示信息以及所述待展示区域的展示对象;也即,获取所述展示指令中包含的所述待展示区域的展示对象,比如,所述展示对象为登录当前系统的用户名称或/和终端地址等均可,后续在所述步骤S1013中可以根据所述展示对象确定是否需要对待展示信息进行加密,也即,根据所述展示对象确认该待展示信息中的展示元素是否为保密元素,进而确定所述待展示信息是否为待保密信息。
S1012,根据预设判断规则分别判断所述每一条所述待展示信息中的展示元素的保密度;所述保密度表征了所述展示元素被要求保密的保密等级;
具体地,当所述待展示信息中包含有多个展示元素时,可以将每个展示元素通过预设判断规则进行判断,从而确认该展示元素的保密度。其中,所述预设判断规则中包含每一个展示元素以及该展示元素的保密度之间的一一对应关系,比如,展示元素为某公司员工的身份证号码,若该公司的保密度分为1-10级,则该员工的身份证号码的保密度可以在该判断规则中设定为1-10级保密度中的其中一个保密度。在本实施例中,所述待展示信息中可以包括很多展示元素,比如姓名、身份证号码、手机号码、邮箱、标识、编码和特定保密图片等展示元素,可以自所述待展示信息中提取上述展示元素。
在本实施例中,所述待展示信息包括文字信息和图片信息,因此,一方面,对于待展示信息中的图片信息,可以将所述待展示信息中的图片信息中的图片与预设保密图片库中的保密图片(该保密图片在该判断规则中有一个预设的保密度)进行匹配,并在匹配成功之后,获取该保密图片在预设判断规则中预设的保密度,将该保密图片的预设的保密度作为该待展示信息中与所述保密图片匹配的图片的保密度。
在另一方面,对于所述待展示信息中的文字信息,可以将所述待展示信息中的文字信息分词为多个词语;同时,需要保密的各个保密词汇,比如需要进行保密的姓名、身份证号码、手机号码、邮箱、标识、编码等分类放入预设保密文字库中的各个不同存储位置中;此时,首先需要根据各个分词之后的词语的词汇特征(比如词语的字数、词语类型、词语中包含的特定字符,特定字符所在的位数等)确定每一个分词后的词语即将要进行匹配的保密词汇对应的存储位置(一个存储位置也对应于某些特定的词汇特征);比如,身份证号码的存储位置对应的词汇属性可以为:18位数字,前6位为行政区划分代码,第7位至14位为出生日期码;姓名的存储位置对应的词汇属性可以为:由姓和名组成,姓包括百家姓,而名则是由1-6个汉字构成;邮箱的存储位置对应的词汇属性可以为:由用户名+@+邮件服务器域名组成,用户名是由字母、数字和其他普通字符(例如下划线、加减符号)组成,邮件服务器域名则是通过英特网连接测试能够连接到的服务器域名。在获取各分词之后的词语即将要进行匹配的保密词汇对应的存储位置之后,将所述词语与该存储位置存储的保密词汇进行匹配,并在匹配成功之后,获取该保密词汇在预设判断规则中预设的保密度,将该保密词汇的预设的保密度作为该待展示信息中与所述保密词汇匹配的词语的保密度。
S1013,将保密度大于预设保密度阈值的展示元素记录为保密元素,并将所述预设显示区域内的所述保密元素,或所述预设显示区域内具有所述保密元素的所述待展示信息记录为待保密信息。
也即,在所述预设显示区域内,由于所述待展示信息也包括文字信息和图片信息,在通过上述步骤S1012确定所述图片信息中各图片(展示元素)的保密度的保密度之后,将保密度超过预设保密度阈值的图片记录为保密元素,此时,可以仅将为保密元素的该图片记录为待保密信息(此时仅对该图片进行截屏信息控制处理),但在该图片属于一图片信息时,也可以直接将包含所述图片的图片信息记录为待保密信息(此时需要对该图片所属的图片信息进 行截屏信息控制处理);同理,在通过上述步骤S1012确定所述文字信息中的词语(展示元素)的保密度之后,将保密度超过预设保密度阈值的词语记录为保密元素,此时,可以仅将为保密元素的该词语记录为待保密信息(此时仅对该词语进行截屏信息控制处理),但在该词语属于一文字信息时,也可以直接将包含所述词语的文字信息记录为待保密信息(此时需要对该词语所属的文字信息进行截屏信息控制处理);此时,在所述待展示区域内的其他不被记录为待保密信息的所述待展示信息(非保密信息)在截图过程中不会受到影响。进一步地,亦可以将包含保密元素的整个所述待展示区域中的所有待展示信息均记录为待保密信息,此时,只有不具有所述保密元素的所述待展示区域(非保密信息)才能不进行截屏信息控制处理而在截图过程中不受影响。可理解地,保密度小于或等于预设保密度阈值的展示元素均会被记录为非保密元素。
在一实施例中,所述将保密度大于预设保密度阈值的展示元素记录为保密元素,包括:在展示元素的保密度大于预设保密度阈值时,判断所述展示对象是否为与所述保密元素或/和所述保密度匹配的非保密对象;每一个所述非保密对象均具有与其匹配的所述保密元素或/和所述保密度;也即,在展示元素的保密度大于预设保密度阈值时,还可以进一步判断所述展示对象是否为与所述保密元素或/和所述保密度匹配的非保密对象,进而进一步确定该展示元素是否为保密元素;也即,所述非保密对象具有对上述与其匹配的所述保密元素或/和所述保密度对应的待展示信息具有自由截屏的权利,此时,无需针对该展示对象进行上述与其匹配的所述保密元素或/和所述保密度对应的待展示信息进行本申请中的截屏信息控制处理。此时,若所述展示对象为与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为非保密元素;若所述展示对象不是与所述保密元素或/和所述保密度匹配的非保密对象,才将所述展示元素记录为保密元素,并进行后续处理。
S102,将所述待保密信息中的所述文字信息转换为包含所述文字信息的文字图片。
也即,在所述待保密信息为文字信息时,可以首先将所述文字信息转换为包含所述文字信息的文字图片,以便于将所述文字图片和所述待保密信息中的图片信息共同进行步骤S103中的图片处理。
S103,按照预设格式将所述文字图片与所述图片信息转换为所述保密图片。
也即,在该步骤中,所述预设格式是指所述保密图片的预先设定的格式,比如,设定一块600x800像素区域(预设显示区域内)的文字信息为保密信息,此时,可以将所述保密图片的预设格式设定为600x800像素的图片,在该步骤中,就需要按照所述预设格式将所述文字图片与所述待保密信息中的图片信息转换为所述保密图片,也即,在步骤S10中获取的所述保密图片的格式是固定的,也即为所述预设格式。
S20,将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等。
也即,在该步骤中,需要将上述步骤S10中生成的保密图片首先分割为第一数量的信息块,其中,所述第一数量可以根据需求设定。且分割的信息块时,可以设定被分割之后的信息块的第一数量是固定的,比如,设定分割之后的信息块的第一数量是1200个;也可以设定被分割之后的信息块的尺寸是固定的,比如,设定分割之后的信息块的大小为20*20像素。 可理解地,使用上述两种方式对不同的保密图片进行分割之后,生成的信息块的第一数量或/和尺寸可能是不相等的,但在每一个所述保密图片的尺寸均相等的情况下,分割之后的信息块的第一数量或/和尺寸也可能相等。
在一实施例中,如图5所示,所述步骤S20包括:
S201,获取所述保密图片的尺寸;所述保密图片的尺寸即为步骤S10中获取到所述保密图片之后,与其同步获取的该保密图片的尺寸,该保密图片的尺寸可以根据保密信息的多少而不同,可以由用户根据需求自行设定和修改;因此,可以在每次将所述保密图片分割为信息块之前,均获取一次所述保密图片的尺寸,以便于对其进行精确分割。作为优选,所述保密图片的尺寸可以为上述步骤S103中根据预设格式生成的保密图片,此时,获取到的所述保密图片的尺寸均相等,此时,在保密图片的预设格式并未修改时,仅需要获取一次保密图片的尺寸即可。若所述预设格式发生变更,则需要重新获取一次所述保密图片的尺寸。
S202,获取所述保密图片需要被分割的所述信息块的所述第一数量,并根据所述第一数量和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第一边缘位置。
所述第一数量可以根据需求进行设定,在本实施例中,作为优选,在所述第一数量可以为多组自然数的乘积时,可以根据预设规则选取(比如选取其中长度方向自然数与宽度方向自然数的数值相对比较接近的一组自然数的乘积)或随机选取其中一组自然数的乘积,作为确定各所述信息块在所述保密图片中的边缘位置的划分依据。比如第一数量为1200,1200可以等于60与20之间的乘积,也可以等于30与40的乘积,此时,可以将一个保密图片划分为60行、20列的一共1200个信息块,也可以将其划分为30行、40列的一共1200个信息块,可理解地,各保密图片根据本实施例进行分割之后的信息块(同一个保密图片分割之后的信息块大小必须一致)的大小可能会各不相同,但是每一个保密图片分割之后的所有信息块的总数量可以保持一致。
S203,在各所述信息块的所述第一边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第一边缘位置与该信息块的模块编号关联。
可理解地,各所述保密图片被分割为所述信息块之后,为了在后续的展示过程中可以有序进行展示,首先需要对各所述信息块分配模块编号,每一个所述信息块对应于一个唯一的模块编号,之后,将该信息块的第一边缘位置(根据第一边缘位置可以确定该信息块的所属区域范围)与其分配的模块编号关联存储至数据库中,在后续需要对所述信息块进行展示时,仅需要根据所述模块编号即可确认该信息块的位置。
在一实施例中,如图6所示,所述步骤S201之后还包括:
S204,获取所述保密图片需要被分割的所述信息块的尺寸,并根据所述信息块的尺寸和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第二边缘位置。
在本实施例中,所述信息块的尺寸可以根据需求设定,比如,可以设定所述信息块的尺寸为10*10像素。此时,根据所述保密图片的尺寸即可确定各所述信息块在所述保密图片中的边缘位置。可理解地,各保密图片根据本实施例进行分割之后的信息块的数量(由于限定 了分割之后的信息块的尺寸,因此若每一个保密图片的尺寸并不相同,则分割之后的信息块的总数量也不会相同)可能会各不相同,但是每一个保密图片根据本实施例进行分割之后的信息块的尺寸可以保持一致。
S205,在各所述信息块的所述第二边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第二边缘位置与该信息块的模块编号关联。
在本实施例中,所述第一数量可以根据所述保密图片的尺寸和所述信息块的尺寸得出的,也即,在将所述保密图片根据所述信息块的尺寸划分每个信息块的边缘位置之后,即可确定所有信息块的第一数量和每一个信息块的所述区域范围,并据此对所述保密图片进行分割。可理解地,各所述保密图片被分割为所述信息块之后,为了在后续的展示过程中可以有序进行展示,首先需要对各所述信息块分配模块编号,每一个所述信息块对应于一个唯一的模块编号,之后,将该信息块的第二边缘位置(根据第二边缘位置可以确定该信息块的所属区域范围)与其分配的模块编号关联存储至数据库中,在后续需要对所述信息块进行展示时,仅需要根据所述模块编号即可确认该信息块的位置。
S30,将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
也即,在该步骤中,需要将上述步骤S20中分割之后的每一个信息块再拆解为第二数量的图片帧,所述图片帧的拆解可以根据所述预设拆解规则进行,比如,所述预设拆解规则可以为,将每一个信息块拆解为相同大小的四个(第二数量为除四之外的其他数值亦可,可以根据需求进行设定)方块形状(亦可以为其他形状)的图片帧。
在一实施例中,如图7所示,所述步骤S30包括:
S301,获取已分割的所述信息块的尺寸;可理解地,在本实施例的一方面,所述信息块的尺寸可以为所述步骤S203中分割之后的信息块的尺寸,此时,在同一个保密图片中,信息块的尺寸均相等,而对于不同的保密图片,各保密图片对应的信息块的尺寸可能并不相同,因此,需要针对每一个保密图片获取一次信息块的尺寸。在本实施例的另一方面,所述信息块的尺寸亦可以为步骤S205中分割之后的信息块的尺寸,此时,不管是否为不同的保密图片,各所述信息块的尺寸均相等,因此,在对保密图片进行分割时,若步骤S204中获取的所述信息块的尺寸并未修改,此时仅需要在对第一个保密图片的信息块进行分割之后,获取该信息块的尺寸即可。若步骤S204中获取的所述信息块的尺寸发生变更,则需要在变更之后重新获取一次所述保密图片分割之后的信息块的尺寸。
S302,获取所述信息块需要被拆解的所述图片帧的所述第二数量,并根据所述第二数量和所述信息块的尺寸确定各所述图片帧在所述信息块中的第三边缘位置。
可理解地,所述第二数量可以根据需求进行设定,比如设定为4个。所述第三边缘位置可以根据所述第二数量和所述信息块的尺寸进行确定。
S303,在各所述图片帧的所述第三边缘位置将所述信息块拆解为所述第二数量的所述图片帧,为各所述图片帧分配帧号之后,将各所述图片帧的第三边缘位置与该图片帧的帧号关 联。
可理解地,各所述信息块被拆解为图片帧之后,为了在后续的展示过程中可以有序进行展示,首先需要对各所述信息块中的图片帧分配帧号,每一个所述图片帧对应于一个唯一的帧号,之后,将该图片帧的第三边缘位置(根据第三边缘位置可以确定该图片帧的所属区域范围)与其分配的帧号关联存储至数据库中,在后续需要对所述图片帧进行展示时,仅需要根据所述帧号即可确认该图片帧的位置。
可理解地,为了将图片帧与该图片帧所属的信息块关联起来,所述帧号中可以包含其所属的信息块的模块编号(或自所述模块编号中提取的编号关键词),此时,只需要确定帧号,即可以确定该图片帧所属的信息块以及该图片帧在该信息块中所处的位置。
S40,按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
在该实施例中,所述预设展示规则可以为以预设速率(该预设速率可以根据需求设定,比如0.01秒展示一次的频率高速展示每个批次的图片帧,此时,在人的视觉上达到的观看效果是当前页面上显示的是与该图片帧对应的保密图片)匀速(也即,每一个批次的展示过程中间间隔的时间时相等的,如此,展示过程中对于所述保密图片的显示才会更加稳定)展示每一批次的所述图片帧;且每一个批次的展示中,所有信息块中的每一个所述信息块均同步展示一个随机选取的图片帧。比如,若一个保密图片被分割为1200个信息块,则同步在1200个信息块中均展示1个图片帧(每一个信息块中均包含相同数量的至少两个图片帧),也即同时展示1200个图片帧,且从每一个信息块中选取展示的图片帧的过程是随机的。
可理解地,展示的批次的数量可以根据需求设定,比如可以设定只要是在所述保密图片在当前显示界面中的展示期限(用户打开显示所述保密图片的当前页面至将当前页面切换至其他页面的时长)之内,就一直以相同的所述预设速率匀速展示所述图片帧,直至结束该保密图片的展示期限为止。
以下,以一实例说明帮助理解本申请:
比如,若一个保密图片被分割为1200个信息块,而每个信息块被拆解为4个图片帧,此时以预设速率匀速且高速展示每一批次的图片帧,每一批次的待展示的图片帧均是指自1200个信息块中的每一个信息块的4个图片帧中随机选取的1个图片帧(每一批次的待展示的图片帧的数量均为1200个)。此时,截屏4次之后,一个信息块在4次截屏中的每一个图片帧恰好叠加成完整的一个信息块的概率为:
Figure PCTCN2019117298-appb-000001
进而,1200个信息块在4次截屏中的恰好叠加成完整的保密图片的概率为:
Figure PCTCN2019117298-appb-000002
因此,通过截屏这种方式获取完整的保密信息的概率接近于0。
本申请上述实施例可以从信息源头防止通过截屏的方式窃取待保密信息,大大提升了待保密信息的安全性。并且,本申请仅将待保密信息转换为保密图片之后对其进行截屏信息控制处理,因此,对于除待保密信息之外的非保密信息,不会影响其正常截图功能的使用,提升了用户体验。
在一实施例中,如图8所示,提供一种截屏信息控制装置,该截屏信息控制装置与上述实施例中截屏信息控制方法一一对应。所述截屏信息控制装置包括:
转换模块11,用于将待保密信息转换为保密图片;
分割模块12,用于将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
拆解模块13,用于将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
展示模块14,用于按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
关于截屏信息控制装置的具体限定可以参见上文中对于截屏信息控制方法的限定,在此不再赘述。上述截屏信息控制装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图9所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括可读存储介质、内存储器。该可读存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为可读存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机可读指令被处理器执行时以实现一种截屏信息控制方法。本实施例所提供的可读存储介质包括非易失性可读存储介质和易失性可读存储介质。
在一个实施例中,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机可读指令,处理器执行计算机可读指令时实现以下步骤:
将待保密信息转换为保密图片;
将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
在一个实施例中,提供了一个或多个存储有计算机可读指令的可读存储介质,本实施例所提供的可读存储介质包括非易失性可读存储介质和易失性可读存储介质;该可读存储介质上存储有计算机可读指令,该计算机可读指令被一个或多个处理器执行时,使得一个或多个 处理器实现以下步骤:
将待保密信息转换为保密图片;
将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质或易失性可读存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路DRAM(SLDRAM)、存储器总线直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,仅以上述各功能单元或模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能单元或模块完成,即将所述装置的内部结构划分成不同的功能单元或模块,以完成以上描述的全部或者部分功能。
以上所述实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种截屏信息控制方法,其特征在于,包括:
    将待保密信息转换为保密图片;
    将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
    将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
    按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
  2. 如权利要求1所述的截屏信息控制方法,其特征在于,所述将待保密信息转换为保密图片,包括:
    获取预设显示区域内的待保密信息;所述待保密信息包括文字信息和图片信息;
    将所述待保密信息中的所述文字信息转换为包含所述文字信息的文字图片;
    按照预设格式将所述文字图片与所述图片信息转换为所述保密图片。
  3. 如权利要求2所述的截屏信息控制方法,其特征在于,所述获取预设显示区域内的待保密信息,包括:
    读取所述预设显示区域内的每一条待展示信息;
    根据预设判断规则分别判断所述每一条所述待展示信息中的展示元素的保密度;所述保密度表征了所述展示元素被要求保密的保密等级;
    将保密度大于预设保密度阈值的展示元素记录为保密元素,并将所述预设显示区域内的所述保密元素,或所述预设显示区域内具有所述保密元素的所述待展示信息记录为待保密信息。
  4. 如权利要求3所述的截屏信息控制方法,其特征在于,所述读取所述预设显示区域内的每一条待展示信息,包括:
    读取所述预设显示区域内的每一条待展示信息以及所述待展示区域的展示对象;
    所述将保密度大于预设保密度阈值的展示元素记录为保密元素,包括:
    在展示元素的保密度大于预设保密度阈值时,判断所述展示对象是否为与所述保密元素或/和所述保密度匹配的非保密对象;每一个所述非保密对象均具有与其匹配的所述保密元素或/和所述保密度;
    若所述展示对象为与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为非保密元素;
    若所述展示对象不是与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为保密元素。
  5. 如权利要求1所述的截屏信息控制方法,其特征在于,所述将所述保密图片分割为第一数量的信息块,包括:
    获取所述保密图片的尺寸;
    获取所述保密图片需要被分割的所述信息块的所述第一数量,并根据所述第一数量和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第一边缘位置;
    在各所述信息块的所述第一边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第一边缘位置与该信息块的模块编号关联。
  6. 如权利要求5所述的截屏信息控制方法,其特征在于,所述获取所述保密图片的尺寸之后,还包括:
    获取所述保密图片需要被分割的所述信息块的尺寸,并根据所述信息块的尺寸和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第二边缘位置;
    在各所述信息块的所述第二边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第二边缘位置与该信息块的模块编号关联。
  7. 如权利要求1所述的截屏信息控制方法,其特征在于,所述将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,包括:
    获取已分割的所述信息块的尺寸;
    获取所述信息块需要被拆解的所述图片帧的第二数量,并根据所述第二数量和所述信息块的尺寸确定各所述图片帧在所述信息块中的第三边缘位置;
    在各所述图片帧的所述第三边缘位置将所述信息块拆解为所述第二数量的所述图片帧,为各所述图片帧分配帧号之后,将各所述图片帧的第三边缘位置与该图片帧的帧号关联。
  8. 一种截屏信息控制装置,其特征在于,包括:
    转换模块,用于将待保密信息转换为保密图片;
    分割模块,用于将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
    拆解模块,用于将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
    展示模块,用于按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
  9. 如权利要求8所述的截屏信息控制装置,其特征在于,所述转换模块还用于:
    获取预设显示区域内的待保密信息;所述待保密信息包括文字信息和图片信息;
    将所述待保密信息中的所述文字信息转换为包含所述文字信息的文字图片;
    按照预设格式将所述文字图片与所述图片信息转换为所述保密图片。
  10. 如权利要求9所述的截屏信息控制装置,其特征在于,所述转换模块还用于:读取所述预设显示区域内的每一条待展示信息;
    根据预设判断规则分别判断所述每一条所述待展示信息中的展示元素的保密度;所述保密度表征了所述展示元素被要求保密的保密等级;
    将保密度大于预设保密度阈值的展示元素记录为保密元素,并将所述预设显示区域内的所述保密元素,或所述预设显示区域内具有所述保密元素的所述待展示信息记录为待保密信息。
  11. 如权利要求10所述的截屏信息控制装置,其特征在于,所述转换模块还用于:
    读取所述预设显示区域内的每一条待展示信息以及所述待展示区域的展示对象;
    所述将保密度大于预设保密度阈值的展示元素记录为保密元素,包括:
    在展示元素的保密度大于预设保密度阈值时,判断所述展示对象是否为与所述保密元素或/和所述保密度匹配的非保密对象;每一个所述非保密对象均具有与其匹配的所述保密元素或/和所述保密度;
    若所述展示对象为与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为非保密元素;
    若所述展示对象不是与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为保密元素。
  12. 如权利要求8所述的截屏信息控制装置,其特征在于,所述分割模块还用于:
    获取所述保密图片的尺寸;
    获取所述保密图片需要被分割的所述信息块的所述第一数量,并根据所述第一数量和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第一边缘位置;
    在各所述信息块的所述第一边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第一边缘位置与该信息块的模块编号关联。
  13. 如权利要求12所述的截屏信息控制装置,其特征在于,所述分割模块还用于:
    获取所述保密图片需要被分割的所述信息块的尺寸,并根据所述信息块的尺寸和所述保密图片的尺寸确定各所述信息块在所述保密图片中的第二边缘位置;
    在各所述信息块的所述第二边缘位置将所述保密图片分割为所述第一数量的所述信息块,为各所述信息块分配模块编号之后,将各所述信息块的第二边缘位置与该信息块的模块编号关联。
  14. 如权利要求8所述的截屏信息控制装置,其特征在于,所述拆解模块还用于:
    获取已分割的所述信息块的尺寸;
    获取所述信息块需要被拆解的所述图片帧的第二数量,并根据所述第二数量和所述信息块的尺寸确定各所述图片帧在所述信息块中的第三边缘位置;
    在各所述图片帧的所述第三边缘位置将所述信息块拆解为所述第二数量的所述图片帧,为各所述图片帧分配帧号之后,将各所述图片帧的第三边缘位置与该图片帧的帧号关联。
  15. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    将待保密信息转换为保密图片;
    将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
    将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小 相等;
    按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信息块中随机选取的该信息块中的一个所述图片帧。
  16. 如权利要求15所述的计算机设备,其特征在于,所述将待保密信息转换为保密图片,包括:
    获取预设显示区域内的待保密信息;所述待保密信息包括文字信息和图片信息;
    将所述待保密信息中的所述文字信息转换为包含所述文字信息的文字图片;
    按照预设格式将所述文字图片与所述图片信息转换为所述保密图片。
  17. 如权利要求16所述的计算机设备,其特征在于,所述获取预设显示区域内的待保密信息,包括:
    读取所述预设显示区域内的每一条待展示信息;
    根据预设判断规则分别判断所述每一条所述待展示信息中的展示元素的保密度;所述保密度表征了所述展示元素被要求保密的保密等级;
    将保密度大于预设保密度阈值的展示元素记录为保密元素,并将所述预设显示区域内的所述保密元素,或所述预设显示区域内具有所述保密元素的所述待展示信息记录为待保密信息。
  18. 如权利要求17所述的计算机设备,其特征在于,所述读取所述预设显示区域内的每一条待展示信息,包括:
    读取所述预设显示区域内的每一条待展示信息以及所述待展示区域的展示对象;
    所述将保密度大于预设保密度阈值的展示元素记录为保密元素,包括:
    在展示元素的保密度大于预设保密度阈值时,判断所述展示对象是否为与所述保密元素或/和所述保密度匹配的非保密对象;每一个所述非保密对象均具有与其匹配的所述保密元素或/和所述保密度;
    若所述展示对象为与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为非保密元素;
    若所述展示对象不是与所述保密元素或/和所述保密度匹配的非保密对象,将所述展示元素记录为保密元素。
  19. 一个或多个存储有计算机可读指令的可读存储介质,其特征在于,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行如下步骤:
    将待保密信息转换为保密图片;
    将所述保密图片分割为第一数量的信息块;各所述信息块的大小相等;
    将每一个所述信息块按照预设拆解规则拆解为第二数量的图片帧,各所述图片帧的大小相等;
    按照预设展示规则在当前显示界面中分批次展示所述图片帧,所述预设展示规则是指以预设速率匀速展示每一批次的所述图片帧,且在每一批次的展示中,均同步展示自各所述信 息块中随机选取的该信息块中的一个所述图片帧。
  20. 如权利要求19所述的可读存储介质,其特征在于,所述将待保密信息转换为保密图片,包括:
    获取预设显示区域内的待保密信息;所述待保密信息包括文字信息和图片信息;
    将所述待保密信息中的所述文字信息转换为包含所述文字信息的文字图片;
    按照预设格式将所述文字图片与所述图片信息转换为所述保密图片。
PCT/CN2019/117298 2019-07-22 2019-11-12 截屏信息控制方法、装置、计算机设备及存储介质 WO2021012502A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910662195.9A CN110531911B (zh) 2019-07-22 2019-07-22 截屏信息控制方法、装置、计算机设备及存储介质
CN201910662195.9 2019-07-22

Publications (1)

Publication Number Publication Date
WO2021012502A1 true WO2021012502A1 (zh) 2021-01-28

Family

ID=68661822

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/117298 WO2021012502A1 (zh) 2019-07-22 2019-11-12 截屏信息控制方法、装置、计算机设备及存储介质

Country Status (2)

Country Link
CN (1) CN110531911B (zh)
WO (1) WO2021012502A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111625854B (zh) * 2020-05-25 2022-10-14 聚好看科技股份有限公司 文档加密方法、访问方法、服务器及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643656B2 (en) * 1991-07-31 2003-11-04 Richard Esty Peterson Computerized information retrieval system
CN104820806A (zh) * 2015-05-26 2015-08-05 北京邮电大学 阅时信息保护方法和装置
CN106503598A (zh) * 2016-11-07 2017-03-15 安徽味唯网络科技有限公司 一种保密信息显示的方法
CN108337571A (zh) * 2017-01-20 2018-07-27 阿里巴巴集团控股有限公司 一种弹幕信息处理方法及设备
CN109739610A (zh) * 2019-01-04 2019-05-10 浪潮商用机器有限公司 截屏控制方法、装置、电子设备及计算机可读存储介质

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561852B (zh) * 2008-04-16 2012-10-10 联想(北京)有限公司 一种显示方法和装置
CN104660549B (zh) * 2013-11-19 2017-12-15 深圳市腾讯计算机系统有限公司 身份验证方法及装置
CN104715205B (zh) * 2013-12-12 2018-01-30 中国移动通信集团公司 一种图片资源处理、发布及获取方法和相关装置
CN105306208B (zh) * 2014-07-21 2020-05-08 腾讯科技(深圳)有限公司 身份验证方法及装置
CN107563232A (zh) * 2017-09-30 2018-01-09 北京奇虎科技有限公司 一种用户信息的显示方法及装置
CN108256360B (zh) * 2017-12-22 2020-02-07 福建天泉教育科技有限公司 一种敏感信息的显示方法及终端
CN108416722B (zh) * 2018-01-17 2020-04-17 深圳壹账通智能科技有限公司 一种图像显示方法、存储介质及终端设备
CN109388933A (zh) * 2018-09-06 2019-02-26 中南民族大学 基于动态子图的验证方法、装置、用户设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6643656B2 (en) * 1991-07-31 2003-11-04 Richard Esty Peterson Computerized information retrieval system
CN104820806A (zh) * 2015-05-26 2015-08-05 北京邮电大学 阅时信息保护方法和装置
CN106503598A (zh) * 2016-11-07 2017-03-15 安徽味唯网络科技有限公司 一种保密信息显示的方法
CN108337571A (zh) * 2017-01-20 2018-07-27 阿里巴巴集团控股有限公司 一种弹幕信息处理方法及设备
CN109739610A (zh) * 2019-01-04 2019-05-10 浪潮商用机器有限公司 截屏控制方法、装置、电子设备及计算机可读存储介质

Also Published As

Publication number Publication date
CN110531911A (zh) 2019-12-03
CN110531911B (zh) 2022-05-27

Similar Documents

Publication Publication Date Title
US11704764B2 (en) Method and system for generating watermark on the basis of graphic, terminal, and medium
Song et al. Protection of image ROI using chaos-based encryption and DCNN-based object detection
CN110245469B (zh) 网页的水印生成方法、水印解析方法、装置及存储介质
US9396310B2 (en) Method and apparatus for providing secure image encryption and decryption
CN113806806B (zh) 一种用于网页截图的脱敏、还原方法和系统
CN111402120A (zh) 一种标注图像处理方法及装置
US20220084063A1 (en) Dynamic machine-readable codes
US20220222953A1 (en) Managing camera actions
US20160020902A1 (en) Key Generating Method and Apparatus
CN109886047B (zh) 文件加密处理方法和装置
WO2021012502A1 (zh) 截屏信息控制方法、装置、计算机设备及存储介质
US20230274023A1 (en) Data management computer, data management system including the data management computer, and method thereof
CN110881033A (zh) 一种数据加密方法、装置、设备以及可读存储介质
CN114626079A (zh) 基于用户权限的文件查看方法、装置、设备及存储介质
CN111339556A (zh) 数据脱敏方法、终端、装置及存储介质
WO2018153299A1 (zh) 图像处理的方法、装置及存储介质
CN109729076B (zh) 数据脱敏、逆脱敏方法及装置、存储介质、终端
US11546141B1 (en) Cryptographic protection for portions of media
AU2014289975B2 (en) Method and system for providing information from print
KR102417814B1 (ko) 회원 식별 정보에 기반하여 전자 문서에 삽입된 일부 콘텐츠에 대한 보안 설정을 지원하는 전자 문서 관리 서버 및 그 동작 방법
CN108875403B (zh) 一种文件管理方法及装置
JP4922085B2 (ja) ネットサービス方法およびネットサービスシステム
US20240012936A1 (en) Image segmentation for anonymization for image processing
TWI650672B (zh) 電子文件的驗證方法
CN115952554A (zh) 电子签名数据处理方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19938328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19938328

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19938328

Country of ref document: EP

Kind code of ref document: A1