Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security processing method, storage medium and terminal device

A technology of terminal equipment and processing methods, which is applied in the field of information security, can solve problems such as the disclosure of debtors' personal privacy information, and achieve the effect of improving security

Active Publication Date: 2022-04-26
湖南珩君软件开发有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing collection system cannot prevent the debtor's personal privacy information from being leaked through screenshots and photos

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security processing method, storage medium and terminal device
  • Information security processing method, storage medium and terminal device
  • Information security processing method, storage medium and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention provides an information security processing method, a storage medium, and a terminal device. In order to make the purpose, technical solution, and effect of the present invention clearer and clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The content of the invention will be further described below by describing the embodiments in conjunction with the accompanying drawings.

[0045] This embodiment provides an information security processing method, such as figure 1 As shown, the method includes:

[0046] S10. When the terminal device detects a user login, acquire the user ID and login time of the user, and generate watermark characters according to the user ID and login time.

[0047] Specifically, the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security processing method, a computer-readable storage medium, and a terminal device. The method includes: when the terminal device monitors a user's login, obtains the user's user ID and login time, and according to the user's Generate a watermark character with the logo and login time; acquire the resolution of the terminal device, and generate a watermark view according to the resolution and the watermark character; superimpose the watermark view on the display interface of the terminal device, so that the interface image displayed on the display interface A view that carries the watermark. The present invention obtains the user ID and login time of the user, and converts the user ID and login time into Hex characters to make a watermark and superimpose it on the interface containing the debtor information, so as to prevent the user from leaking the debtor information by taking screenshots or taking pictures. Thereby improving the security of information.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security processing method, storage medium and terminal equipment. Background technique [0002] In the process of asset management and collection, it is inevitable to involve the debtor's personal privacy data, which generally includes the debtor's personal identity information, contact information, and debt status. Therefore, in the process of communication between the collection company and the debtor, how to ensure the effectiveness and compliance of the operation is a big challenge. The way to ensure information security in the existing collection system is to block the external interface by customizing the office computer, and the system is connected to the network through a secure local area network to block the uploading and sending of files and information. However, the existing collection system cannot prevent the debtor's personal privacy inf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/16G06F21/62G06Q40/02
CPCG06F21/16G06F21/6245G06Q40/02
Inventor 谭曼
Owner 湖南珩君软件开发有限公司