Reporting police method and device based on watermark monitoring
A technology for watermarking and encoding information, applied in the field of data security, can solve the problem that watermarks cannot be leaked and traced to the source, and achieve the effect of improving confidentiality and effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032]figure 1 A flowchart of an embodiment of a watermark-based method according to an embodiment of the present application, which may be applied to the client, wherein the client can include a browser client. In a possible application scenario, the browser client can render the content of the web page after receiving the web page content sent. To protect the data security of text data on the web, the client can get the account information of logging in to the current web page. Web Page Watermarks, rendering the webpage watermark while rendering the webpage content, so that the webpage content is accessed by a screenshot, take pictures, etc. After stealing the traceability of the leak channel.
[0033]In a possible implementation scenario, this embodiment can be applied to the internal development management system, such as a data system, an OA system, etc., which may be a B / S structure system, or other embedded monitoring code. The system of the mechanism, this embodiment does not...
Embodiment 2
[0049]figure 2 For a flow chart of an embodiment of a watermarking, a watermarking, an embodiment of a watermark monitor, and the present embodiment will provide a watermark encoding method, and the specifically may include the following steps:
[0050]Step 210 gets the account information that logs in to the client and performs the transformation of the account information.
[0051]In this embodiment, after obtaining the current login account information, the operation of the account information can be improved by encoding the account information. In this step, the present embodiment first can be converted to the account information when encoding the account information.
[0052]In one example, the account information can be a decimal numeric string, for example, the account information can be an employee number. In implementation, the TOSTRING () method can be employed to convert the decimal numeric string into other numeric strings, such as converting to tetrafi digital strings or six-bin...
Embodiment 3
[0076]Figure 5 A flow chart of an embodiment of the first embodiment of the present invention, a watermarking, based on the first embodiment, and the process of monitoring and reporting the destruction of watermarks on the basis of the first or embodiment 2. The specifically can include the following steps:
[0077]Step 501 When the client page is turned on, a timer is generated.
[0078]In one implementation, when the user opens the current website to enter the client page, the client can generate a timer setTimeout, which can set one or more timing to perform one or more scan tasks through the timer.
[0079]Step 502, obtain the account information of the client, and encodes the account information into a first encoded information, the first encoded information being a watermark pattern.
[0080]In the present embodiment, in order to better discharge the sever-retroactive charter, the client can obtain the current login account information as a watermark to embed into the current client page....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


