Screenshot leakage prevention method and device
An anti-leak, screenshot technology, applied in the field of data security, can solve the problems of reducing product usability, user unfriendliness, destruction, etc., to prevent illegal screenshots and facilitate viewing and editing.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] Such as figure 2 , is the flow chart of generating encrypted watermark in the present invention:
[0062] (1) Create a process and inject the watermark processing DLL.
[0063] (2) Request the user policy from the server.
[0064] (3) According to the issued strategy, it is judged whether it is a controlled process (that is, screen capture control is required), and if not, it is not processed.
[0065] (4) If it is a controlled process, obtain the user ID and key.
[0066] (5) Using conversion algorithm to generate image encryption watermark based on user identification and key.
[0067] Such as image 3 , is the screenshot control flowchart of the present invention:
[0068] (1) Use HOOK technology to intercept the screenshot operation.
[0069] (2) Determine the type of screen capture. If the screen capture is selected by the mouse, it is necessary to additionally obtain the size and position of the screen capture area.
[0070] (3) Intercept and set the clipb...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


