A screen information leakage tracing system and method
A technology of screen information and traceability system, applied in the field of traceability system, can solve the problems of weak anti-attack ability of images, difficult to leak the source of information, traceability, etc., so as to achieve difficult forgery and tampering, little attention disturbance, and visual disturbance. less effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Embodiment 1: adopt browser / server mode (B / S) automated office system (OA system) to the traceability mode of screen information leakage:
[0057] Install a browser plug-in containing a screen watermark display module for each client terminal, install a screen watermark generation module and a server control module on the server, install a screen watermark information extraction module and a screen watermark information query module on the system administrator computer; Provide an operation interface for the existing OA system, relying on the computer network to cooperate with the operation of the existing business system.
[0058] Step 1: After the client logs in to the OA system through the browser, the browser plug-in collects the client's computer name, network address (IP address), hardware address (MAC address), login user name and other software and hardware information, and sends the information to the server control module Send a login application; the server c...
Embodiment 2
[0062] Implementation example 2: The desktop system screen information leakage traceability method using the client / server mode (C / S):
[0063] In this embodiment, the difference from Embodiment 1 is that an application program containing a screen watermark display module is installed for each client terminal, and the screen watermark display module automatically starts and starts to work following the client system. The server configuration and implementation process are the same as those in Example 1.
Embodiment 3
[0064] Embodiment 3: Traceability method of mobile device screen information leakage using mobile terminal application software / server mode:
[0065] In this embodiment, the only difference from Embodiment 1 is that a mobile application program containing a screen watermark display module is installed for each client terminal, and when the user starts the mobile application program, the screen watermark display module starts to work. The server configuration and implementation process are the same as those in Example 1.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com