Security implementation method, device and medium for client data being screenshotted

An implementation method and client-side technology, which is applied in the field of security implementation where client-side data is screen-captured, can solve problems such as untraceable data user identity, reduced user experience, and client-side inconvenience

Active Publication Date: 2021-03-05
JINGDONG TECH HLDG CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the process of realizing the concept of the present invention, the inventor found that there are at least the following problems in the prior art: in the prior art, completely prohibiting screenshots will cause certain inconvenience to users when using the client
In some occasions, it may be necessary to take a screenshot, but because it is completely prohibited, it will reduce the user experience; add a new screenshot with a watermark to the client album, and the screenshot without a watermark still exists in the album (At this time, 2 pictures have been added to the album), in this case, when using the client, the user may send the screenshot without watermark to the network, which will cause the risk of information security leakage, and once leaked, it cannot be traced to the identity of the leaked data user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security implementation method, device and medium for client data being screenshotted
  • Security implementation method, device and medium for client data being screenshotted
  • Security implementation method, device and medium for client data being screenshotted

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0035] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of stated features, steps, operations and / or components, but do not exclude the presence or addition of one or more other features, steps, operations or components.

[0036] All terms (including technical and scientific terms) used herein have the meaning commonly understood by one of ordinary skill in the art, unless otherw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a security implementation method for client data being screenshotted, including: when the client application program is running, monitor the number of pictures in the client album; receive a screenshot notification from the client, and In this case, if it is monitored that the number of pictures in the album increases, then obtain the increased screenshot; add a watermark with user information to the screenshot, and replace the screenshot of the album with the screenshot after adding the watermark pictures, so that the number of pictures in the album is increased by one compared to the number before generating the screenshot. The disclosure also provides a security implementation device and medium for client data to be screenshotted.

Description

technical field [0001] The present disclosure relates to the technical field of the Internet, and in particular to a security implementation method, device and medium for client data being screenshotted. Background technique [0002] At present, the rapid development of mobile Internet and the portability of mobile devices have promoted more and more people using mobile devices for office work, and users can even use mobile clients to access company data on any occasion. The data accessed by users is likely to involve sensitive data of the company. For example, if a user takes a screenshot of sensitive data and then sends it to the network, it will pose a great threat to the company. For such problems, the prior art adopts the following two methods to solve such problems: the first method is to completely prohibit screenshots. For example, users are completely prohibited from using the client to take screenshots on certain occasions. The second is to add a new screenshot ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F3/0484G06T1/00
CPCG06F3/04845G06F21/602G06F21/6218G06F2221/2107G06T1/0021G06T2201/005
Inventor 尚晋胡小锋秦亚洲
Owner JINGDONG TECH HLDG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products