A data processing method, terminal and watermark server

A data processing and server technology, applied in the field of data security, can solve problems such as the inability to effectively protect the rights and interests of data owners, the difficulty of accountability, and the inability to identify leakers.

Active Publication Date: 2020-12-25
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the case where the watermarked data is provided to multiple data recipients, when the data is leaked, the existing technology cannot determine which data recipient leaked the secrets
Since the leaker cannot be identified, it is difficult to be held accountable and the rights and interests of data owners cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method, terminal and watermark server
  • A data processing method, terminal and watermark server
  • A data processing method, terminal and watermark server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] refer to figure 1 , the application scenarios of the data processing method of the present application include: data owners, watermark servers and data users.

[0039] The data owner sends the source file to the watermark server;

[0040] The watermark server embeds the digital watermark into the source file to obtain watermark data.

[0041] The data user receives the watermark data sent by the watermark server.

[0042] In the following content of this application, the terminal used by the data owner is marked as the first terminal, and the terminal used by the data user is marked as the second terminal.

[0043] A digital watermark may be an encoding of a sequence. When the watermark data is displayed on the display screen, the digital watermark is displayed on the background of the source data, which can be specifically displayed as text, graphics, symbols, etc. Source data can be database data, text data, etc. In the event of a copyright dispute, the data owne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A data processing method includes: receiving source data sent by a first terminal and a second digital watermark, wherein the second digital watermark is obtained by encrypting the first digital watermark using a second public key, the first digital watermark belongs to a user of the first terminal and the second public key belongs to the second terminal; embedding the second digital watermark into the source data to obtain the target data; acquiring a second public key and a second private key, wherein the second public key and the second private key constitute a key pair; signing the seconddigital watermark using the second private key to obtain a watermark signature; sending all or part of the target data is transmitted to the second terminal. The above method can identify the leaker and guarantee the copyright of the data owner. The present application also provides a terminal and a server capable of implementing the above method.

Description

technical field [0001] This application relates to data security technology, in particular to a data processing method, terminal and watermark server. Background technique [0002] Digital watermarking technology is a technology that embeds digital watermarking (identification information) directly into digital carriers (such as multimedia, documents, software, etc.). It does not affect the use value of the digital carrier, is not easy to be detected and modified, and can be recognized by the device that generates the digital watermark. Through digital watermarking, it is possible to confirm content creators, buyers, transmit secret information, or judge whether digital carriers have been tampered with, etc. Therefore, digital watermarking technology is an effective copyright protection technology. [0003] In the prior art, the method of sharing data is generally as follows: the data owner provides the data to the watermark server, and the watermark server embeds the digit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/14H04L9/08
CPCH04L9/0863H04L9/14H04L9/3247H04L63/0428
Inventor 石岭
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products