Unlock instant, AI-driven research and patent intelligence for your innovation.

Reporting police method and device based on watermark monitoring

A technology for watermarking and encoding information, applied in the field of data security, can solve the problem that watermarks cannot be leaked and traced to the source, and achieve the effect of improving confidentiality and effectiveness

Active Publication Date: 2021-04-06
GUANGZHOU HUYA TECH CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method and device for reporting alarms based on watermark monitoring to solve the problem in the prior art that the source of leaks cannot be traced after the watermark is removed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reporting police method and device based on watermark monitoring
  • Reporting police method and device based on watermark monitoring
  • Reporting police method and device based on watermark monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032]figure 1 A flowchart of an embodiment of a watermark-based method according to an embodiment of the present application, which may be applied to the client, wherein the client can include a browser client. In a possible application scenario, the browser client can render the content of the web page after receiving the web page content sent. To protect the data security of text data on the web, the client can get the account information of logging in to the current web page. Web Page Watermarks, rendering the webpage watermark while rendering the webpage content, so that the webpage content is accessed by a screenshot, take pictures, etc. After stealing the traceability of the leak channel.

[0033]In a possible implementation scenario, this embodiment can be applied to the internal development management system, such as a data system, an OA system, etc., which may be a B / S structure system, or other embedded monitoring code. The system of the mechanism, this embodiment does not...

Embodiment 2

[0049]figure 2 For a flow chart of an embodiment of a watermarking, a watermarking, an embodiment of a watermark monitor, and the present embodiment will provide a watermark encoding method, and the specifically may include the following steps:

[0050]Step 210 gets the account information that logs in to the client and performs the transformation of the account information.

[0051]In this embodiment, after obtaining the current login account information, the operation of the account information can be improved by encoding the account information. In this step, the present embodiment first can be converted to the account information when encoding the account information.

[0052]In one example, the account information can be a decimal numeric string, for example, the account information can be an employee number. In implementation, the TOSTRING () method can be employed to convert the decimal numeric string into other numeric strings, such as converting to tetrafi digital strings or six-bin...

Embodiment 3

[0076]Figure 5 A flow chart of an embodiment of the first embodiment of the present invention, a watermarking, based on the first embodiment, and the process of monitoring and reporting the destruction of watermarks on the basis of the first or embodiment 2. The specifically can include the following steps:

[0077]Step 501 When the client page is turned on, a timer is generated.

[0078]In one implementation, when the user opens the current website to enter the client page, the client can generate a timer setTimeout, which can set one or more timing to perform one or more scan tasks through the timer.

[0079]Step 502, obtain the account information of the client, and encodes the account information into a first encoded information, the first encoded information being a watermark pattern.

[0080]In the present embodiment, in order to better discharge the sever-retroactive charter, the client can obtain the current login account information as a watermark to embed into the current client page....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reporting police method and device based on watermark monitoring, which are applied to a client. The method comprises the following steps: obtaining account information logging in the client, and encoding the account information into first encoding information which is a watermark graph; embedding the first coded information into a currently displayed client page in the form of a dark watermark; if it is detected that the attribute of the dark watermark changes or the node corresponding to the dark watermark is removed, encoding the account information into second encoding information, and storing the second encoding information in a specified file; periodically scanning the specified file, and when it is detected that the specified file has the second coded information, performing reporting alarm based on the second coded information. According to the embodiment of the invention, the method can achieve the tracing of secret leakage information and the monitoring of a secret leakage person, improves the effectiveness of data safety monitoring, and improves the confidentiality of data.

Description

Technical field[0001]Embodiments of the present application relate to data security technology, and more particularly to a watermark-based monitoring and apparatus.Background technique[0002]With the continuous development of data technology, data security issues are increasingly valued. Data security includes confidentiality of data, in order to improve data confidentiality, the data provider can be added to the data to identify the source or data of the data to be able to disclose the source or data of the data. The people constitute a warning and shocking, or can be respoter after the data is discussed.[0003]One of the watermark applications is a watermark display in the company's internal platform. Warning company employees do not disclose the company's internal confidential information. However, the watermark in the platform can be removed by technical means. If the watermark in the platform's page is removed by the employee through technical means, and after leaking through the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N19/467H04L29/06
CPCH04N19/467H04L63/126H04L63/30
Inventor 冯凯程曹政
Owner GUANGZHOU HUYA TECH CO LTD