A screen information leakage tracing system and method

A technology of screen information and traceability system, applied in the field of traceability system, can solve the problems of weak anti-attack ability of images, difficult to leak the source of information, traceability, etc., so as to achieve difficult forgery and tampering, little attention disturbance, and visual disturbance. less effect

Active Publication Date: 2019-05-07
CHENGDU YUFEI INFORMATION ENG
View PDF11 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Only by adopting security protection measures such as access control, information encryption, and log auditing, it is difficult to trace the source of information leaked in this way, and it cannot prevent the outflow of sensitive information
Because the image information in the digital environment is transferred to other carriers through the computer by taking pictures, although the information content has not changed, the way the information is carried has changed greatly. The general traceability technology is due to its tracking information The life cycle of the image is short and the anti-attack ability of the image is weak, and it is impossible to continue to track and trace the source in the case of digital-to-analog conversion and analog-to-digital conversion, perspective changes, and noise attacks on the information carrier.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A screen information leakage tracing system and method
  • A screen information leakage tracing system and method
  • A screen information leakage tracing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Embodiment 1: adopt browser / server mode (B / S) automated office system (OA system) to the traceability mode of screen information leakage:

[0057] Install a browser plug-in containing a screen watermark display module for each client terminal, install a screen watermark generation module and a server control module on the server, install a screen watermark information extraction module and a screen watermark information query module on the system administrator computer; Provide an operation interface for the existing OA system, relying on the computer network to cooperate with the operation of the existing business system.

[0058] Step 1: After the client logs in to the OA system through the browser, the browser plug-in collects the client's computer name, network address (IP address), hardware address (MAC address), login user name and other software and hardware information, and sends the information to the server control module Send a login application; the server c...

Embodiment 2

[0062] Implementation example 2: The desktop system screen information leakage traceability method using the client / server mode (C / S):

[0063] In this embodiment, the difference from Embodiment 1 is that an application program containing a screen watermark display module is installed for each client terminal, and the screen watermark display module automatically starts and starts to work following the client system. The server configuration and implementation process are the same as those in Example 1.

Embodiment 3

[0064] Embodiment 3: Traceability method of mobile device screen information leakage using mobile terminal application software / server mode:

[0065] In this embodiment, the only difference from Embodiment 1 is that a mobile application program containing a screen watermark display module is installed for each client terminal, and when the user starts the mobile application program, the screen watermark display module starts to work. The server configuration and implementation process are the same as those in Example 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a screen information leakage tracing system and a screen information leakage tracing method. A system architecture that client screen information carries out watermark embedding and a server cooperates with an original business system to carry out centralized management and control is provided. The system comprises a screen watermark generation module, a Screen watermark display module, a server management and control module, a watermark information extraction module and a watermark information query module, can encode the equipment number, the user information and thetime information, can generate a screen watermark image, update the screen watermark image in real time, link the screen watermark image with a service system, and control the screen watermark image to be displayed on a client screen when a client views or modifies sensitive information. When screen information leakage occurs, the screen watermark information in the screen information leakage is extracted according to the obtained screen shot and screen shot images, secret divulging personnel and secret divulging time can be reliably traced, and sensitive information safety of enterprises or departments is protected.

Description

technical field [0001] The invention belongs to the technical field of network security, information protection, and screen information leak tracking and traceability. It specifically involves the use of embedded digital watermark protection in order to prevent user screen information from being leaked by screenshots or screen shots in a network environment, and the traceability system and traceability method adopted for leaked information. Background technique [0002] With the development of smart handheld terminals and mobile Internet technologies, it is inevitable that there will be prominent problems such as screenshots of sensitive information and leakage of photos in paperless office. Only by adopting security protection measures such as access control, information encryption, and log auditing, it is difficult to trace the source of information leaked in this way, and it cannot prevent the outflow of sensitive information. Because the image information in the digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 华建和杨季春李鹏程徐波刘安立范力
Owner CHENGDU YUFEI INFORMATION ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products