[go: up one dir, main page]

CN112637635A - File security method and system, computer readable storage medium and processor - Google Patents

File security method and system, computer readable storage medium and processor Download PDF

Info

Publication number
CN112637635A
CN112637635A CN202011483307.3A CN202011483307A CN112637635A CN 112637635 A CN112637635 A CN 112637635A CN 202011483307 A CN202011483307 A CN 202011483307A CN 112637635 A CN112637635 A CN 112637635A
Authority
CN
China
Prior art keywords
image
desktop
file
display
coded data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011483307.3A
Other languages
Chinese (zh)
Other versions
CN112637635B (en
Inventor
马权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202011483307.3A priority Critical patent/CN112637635B/en
Publication of CN112637635A publication Critical patent/CN112637635A/en
Application granted granted Critical
Publication of CN112637635B publication Critical patent/CN112637635B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2343Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
    • H04N21/234309Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4 or from Quicktime to Realvideo
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • G06F9/452Remote windowing, e.g. X-Window System, desktop virtualisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440218Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Graphics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

The invention discloses a file security method and system, a computer readable storage medium and a processor. Wherein, the method comprises the following steps: receiving a file operation instruction sent by a display terminal, and sending the file operation instruction to image source equipment; acquiring a first desktop image displayed by image source equipment, wherein the first desktop image is a desktop image obtained by opening a target file corresponding to a file operation instruction; generating first coded data corresponding to the first desktop image based on the security level of the target file; and sending the first coded data to a display end, wherein the display end is used for decoding the first coded data to obtain a first image and controlling display equipment to display the first image. The invention solves the technical problem that the content of the confidential or secret-isolated file is leaked due to the content being peeped when a user views the confidential file.

Description

File security method and system, computer readable storage medium and processor
Technical Field
The invention relates to the field of security, in particular to a file security method and system, a computer readable storage medium and a processor.
Background
With the popularization and penetration of office automation, electronic documents have become one of important information carriers. Meanwhile, due to the rapid development of computer networks, people can more easily use electronic files to share information across regions, and the electronic files can be conveniently read. However, while enjoying convenience of electronic documents and networks, the leakage of electronic document information is also endless. Especially for the wide use of the cloud desktop at present, for a user, even if the user can not divulge a secret, other people can not be prevented from blowing up the sensitive secret information, for example, when the user views a secret-related file, the content of the confidential file is often peeped by people, or a person who does not have the authority to view the confidential file reads the content of the file, so that the leakage of the content of the confidential or secret-related file is caused, huge economic loss is brought, and even the security of the country is threatened.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a file security method and system, a computer readable storage medium and a processor, which at least solve the technical problem that contents of confidential or secret-isolated files are leaked due to peeping when a user views the confidential files.
According to an aspect of an embodiment of the present invention, there is provided a file security method, including: receiving a file operation instruction sent by a display terminal, and sending the file operation instruction to image source equipment; acquiring a first desktop image displayed by image source equipment, wherein the first desktop image is a desktop image obtained by opening a target file corresponding to a file operation instruction; generating first coded data corresponding to the first desktop image based on the security level of the target file; and sending the first coded data to a display end, wherein the display end is used for decoding the first coded data to obtain a first image and controlling display equipment to display the first image.
Optionally, based on the security level of the target document, first encoded data corresponding to the first desktop image is generated, and the method further includes: judging whether the security level of the target file is a preset level or not; if the security level of the target file is a preset level, encoding the first desktop image according to a first encoding rule to obtain first encoded data; and if the security level of the target file is not the preset level, the first desktop image is coded according to a second coding rule to obtain first coded data.
Optionally, the first desktop image comprises: the multi-layer image layer, wherein the encoding the first desktop image according to the first encoding rule to obtain the first encoded data includes: coding a first image layer in the multi-layer image layers to obtain first coded data; the encoding the first desktop image according to the second encoding rule to obtain first encoded data includes: and coding the multilayer image layer to obtain first coded data.
Optionally, after sending the first encoded data to the display end, the method further includes: receiving a verification result sent by a display end, wherein the verification result is used for representing whether illegal operation exists at the display end; generating second coded data corresponding to the first desktop image based on the verification result; and sending the second coded data to a display end, wherein the display end is used for displaying a second image obtained by decoding the second coded data.
Optionally, the first desktop image comprises: the multi-layer image layer, wherein generating second encoding data corresponding to the first desktop image based on the verification result comprises: under the condition that the verification result is that illegal operation does not exist, coding a second image layer in the multi-layer image layers to obtain second coded data, wherein the second image layer is the other image layer except for the first image layer corresponding to the first coded data in the multi-layer image layers; and determining the first coded data as the second coded data when the verification result is that the illegal operation exists.
Optionally, the display end is configured to identify the acquired first image to obtain a verification result, where the first image is an image around the display device acquired when the display end displays the first image.
Optionally, the display end is further configured to identify the first image, determine an object included in the first image, and determine whether the object included in the first image is a target object; wherein if the object contained in the first image is the target object, determining that there is no illegal operation as a result of the verification; if the object contained in the first image is not the target object, it is determined that an illegal operation exists as a result of the verification.
Optionally, the display terminal is further configured to identify a second acquired image and determine the target object, where the second image is an image around the display device acquired when the display terminal logs in the image source device.
Optionally, the display end is further configured to identify the second image, determine an object included in the second image, and determine that the object included in the second image is the target object when the object included in the second image is a legal object.
Optionally, before receiving the file operation instruction sent by the display terminal, the method further includes: receiving a login instruction sent by a display end, wherein the login instruction is used for logging in image source equipment; acquiring a second desktop image displayed by the image source equipment, wherein the second desktop image is a desktop image of the display terminal after logging in the image source equipment; coding the second desktop image to obtain third coded data; and sending the third coded data to a display end, wherein the display end is used for displaying a second desktop image obtained by decoding the third coded data.
According to another aspect of the embodiments of the present invention, there is also provided a file security system, including: the display end is used for sending a file operation instruction; the receiving end is connected with the display end and the image source device and used for sending a file operation instruction to the image source device, acquiring a first desktop image displayed by the image source device and generating first coded data corresponding to the first desktop image based on the security level of the target file, wherein the first desktop image is the desktop image after the target file corresponding to the file operation instruction is opened; the display end is further used for decoding the received first coded data to obtain a first image and controlling the display equipment to display the first image.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, which includes a stored program, wherein when the program runs, the apparatus on which the computer-readable storage medium is located is controlled to execute the above-mentioned method for file security.
According to another aspect of the embodiments of the present invention, there is also provided a processor, configured to execute a program, where the program executes the method for file security.
In the embodiment of the invention, after a file operation instruction sent by a display terminal is received, the file operation instruction is sent to image source equipment, the image source equipment opens a target file corresponding to the file operation instruction, after a first desktop image displayed by the image source equipment is collected, first coded data corresponding to the first desktop image can be generated based on the security level of the target file, the first coded data is sent to the display terminal, the display terminal decodes the first coded data to obtain a first image, and the display equipment is controlled to display the first image. Compared with the prior art, the first encoding data is generated according to different confidentiality levels, the first image displayed finally by the display device is not identical to the first desktop image, so that the file protection at the image level is realized, the technical effects of avoiding the leakage of the file content and improving the file security are achieved, the aim of peeping is finally achieved, and the technical problem that the content of confidential or confidential files is leaked due to the fact that the content is peeped when a user views the confidential files is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a method of securing a document according to an embodiment of the invention;
FIG. 2 is a flow diagram of an alternative method of securing a document according to an embodiment of the invention;
FIG. 3 is a schematic diagram of an alternative document security system according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of a document security system according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
In accordance with an embodiment of the present invention, there is provided an embodiment of a file security method, it should be noted that the steps illustrated in the flowchart of the accompanying drawings may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than that described herein.
FIG. 1 is a flow chart of a document security method according to an embodiment of the present invention, as shown in FIG. 1, the method includes the following steps:
and S102, receiving a file operation instruction sent by the display end, and sending the file operation instruction to the image source equipment.
The display end in the above steps may be a terminal connected with the display device, and may receive the cloud virtual desktop image sent by the virtual cloud desktop system, and transmit the cloud virtual desktop image to the display device for display after decoding; in addition, a user can operate the cloud virtual desktop through a mouse, a keyboard and other devices connected with the display device, the display device transmits local mouse and keyboard information to the display end, the display end transmits the encoded information to the virtual cloud desktop system, and the virtual cloud desktop system operates based on relevant information; the virtual cloud Desktop system includes, but is not limited to, a vdi (virtual Desktop infrastructure) virtual Desktop infrastructure, an rds (remote Desktop services) remote Desktop service, an idv (intelligent Desktop virtualization) intelligent Desktop virtualization architecture, and a vol (virtual Operating system infrastructure) virtual Operating system infrastructure.
The image source device in the above step may be a virtual cloud desktop system, and the image source device may provide a cloud virtual desktop image for the display device through the system, and process the image based on the local mouse and keyboard information transmitted in reverse direction, for example, when a user wishes to open a file to browse, the user may click or double click on a related file icon on the display device using the mouse, at this time, the display end may transmit the click information of the mouse to the virtual cloud desktop system, and open the related file through the virtual cloud desktop system.
The file operation instruction in the above step may be an operation instruction generated when a user wishes to open, modify, save, replace, export, and the like the file, and the user operates the file on the display device.
In an optional embodiment, taking an application scenario of cloud Desktop zero terminal office as an example, the cloud Desktop zero terminal office is based on a VGTP image transfer protocol, and mainly includes a zero terminal VGTP-R end (i.e., the display end), a VGTP-S end, and a Virtual Desktop server (i.e., the image source device); the VGTP-R end is used for receiving images from the cloud virtual desktop, reversely transmitting local mouse and keyboard information to the cloud and injecting the information into the virtual desktop, and can be understood as a receiving end of data, so that the VGTP-R end receives the local information for uploading and decodes related information transmitted by the virtual desktop; the VGTP-S end is an image acquisition and coding module running in the cloud virtual operating system and is responsible for the injection function of user input data, and the VGTP-S end can be understood as a server and is used for carrying out related data operation.
In the process that a user uses a cloud Desktop zero terminal to work, when a file is expected to be opened, a display end can acquire a file operation instruction which is performed by the user aiming at the file, the acquired file operation instruction is transmitted to a Virtual Desktop server, and the Virtual Desktop server opens the corresponding file.
And step S104, acquiring a first desktop image displayed by image source equipment.
The first desktop image is the desktop image after the target file corresponding to the file operation instruction is opened.
The target file in the above step may be a file that the user wishes to open.
In an optional embodiment, still taking an application scene of cloud Desktop zero terminal office as an example, after the Virtual Desktop server opens the target file, the Virtual Desktop image after the target file is opened may be acquired through the VGTP-S terminal, so as to obtain the first Desktop image.
And S106, generating first coded data corresponding to the first desktop image based on the security level of the target file.
In an application scene of cloud desktop zero-terminal office, a large number of files are stored in a virtual cloud system, different files are often different in secret-related degree, for files with higher secret-related degree, different secret grades can be set in advance for different files in order to avoid the content of the files being peeped by people and cause sensitive information leakage, and the higher the secret grade of the files with higher secret-related degree is, so that a plurality of secret grades can be set in advance for different files, for example, common, secret, absolute secret and the like, and for files without related to sensitive information, the secret grade of the files can be set to be common; for documents relating to personal sensitive information, the security level may be set to security; for documents relating to sensitive information of a company or a client, the security level can be set to be confidential; for documents relating to important information such as contracts, finances, etc., the security level may be set to be top secret.
In an optional embodiment, for target files with different security levels, in order to avoid information leakage, after a first desktop image containing file content is acquired, encoding can be performed in different encoding modes, so as to generate the first encoded data, thereby ensuring that desktop images with different degrees of sharpness can be obtained after the first encoded data is decoded.
For example, encoding modes with different compression rates can be adopted for encoding, and decoding modes with the same compression rate are adopted for decoding, so that the definition of the decoded desktop images viewed by a user is different for target files with different security levels; for another example, the first desktop image may be composed of a plurality of image layers, and the greater the number of image layers, the higher the definition of the first desktop image is, so that encoding may be performed by using encoding methods of different numbers of image layers, thereby ensuring that the number of decoded image layers viewed by a user is different for target files of different security levels, and thus the definition of the desktop image is different.
It should be noted that, if the first desktop image is encoded only according to the security level of the target file, a legitimate user cannot view the file normally in the using process, which affects the user experience of the user. In order to solve the problems, the user identity can be further identified after the target file is opened, if the target file is identified to be a legal user, the first desktop image can be encoded in a normal encoding mode, and the legal user can be ensured to see a clear image; if the first desktop image is identified as an illegal user, the first desktop image is still encoded by adopting the encoding mode, so that the illegal user can be ensured to view the fuzzy image, and information leakage is avoided.
In an alternative embodiment, it is assumed that the security level of the target document may be a first security level, a second security level, and a third security level, wherein the first security level may be expressed as a standard for accessing the relevant document if the first security level is satisfied as long as the login password can be correctly input; the second security level may be expressed as that, when the user inputs a correct login password, accurate recognition of the voice information must be simultaneously completed, which is regarded as a standard for reaching the second security level; the third security level may be that the user must simultaneously satisfy three conditions of correct password information, correct voice information recognition and correct image recognition, wherein the correct image recognition may further include image information with absolute identification such as a card number image, a face image, and the like.
Step S108, the first coded data is sent to the display end.
The display end is used for decoding the first coded data to obtain a first image and controlling the display equipment to display the first image.
Because different encoding modes are adopted for different security levels, the first image can be an image with the same definition as the first desktop image, and is called a clear image; or an image with a different sharpness than the first desktop image, which is called a blurred image.
In an optional embodiment, a cloud desktop office worker logs in a virtual cloud desktop through a display device, a user operates a file on the display device, a display end sends out a corresponding file operation instruction, a receiving end forwards the received file operation instruction to an image source device for processing, collects a first desktop image of the image source device after the image source device opens a relevant file, further encodes the first desktop image by adopting different encoding modes according to the security level of the relevant file to obtain first encoded data, finally sends the first encoded data to the display end, the display end decodes the first encoded data, and the decoded first image is displayed to the user through the display device for viewing.
In the embodiment of the invention, after a file operation instruction sent by a display terminal is received, the file operation instruction is sent to image source equipment, the image source equipment opens a target file corresponding to the file operation instruction, after a first desktop image displayed by the image source equipment is collected, first coded data corresponding to the first desktop image can be generated based on the security level of the target file, the first coded data is sent to the display terminal, the display terminal decodes the first coded data to obtain a first image, and the display equipment is controlled to display the first image. Compared with the prior art, the first encoding data is generated according to different confidentiality levels, the first image displayed finally by the display device is not identical to the first desktop image, so that the file protection at the image level is realized, the technical effects of avoiding the leakage of the file content and improving the file security are achieved, the aim of peeping is finally achieved, and the technical problem that the content of confidential or confidential files is leaked due to the fact that the content is peeped when a user views the confidential files is solved.
Optionally, based on the security level of the target document, first encoding data corresponding to the first desktop image is generated, and the method includes: judging whether the security level of the target file is a preset level or not; if the security level of the target file is a preset level, encoding the first desktop image according to a first encoding rule to obtain first encoded data; and if the security level of the target file is not the preset level, the first desktop image is coded according to a second coding rule to obtain first coded data.
The preset level in the above steps may be a secret level which needs to be taken in a peep-proof manner and is specified by the user from different secret levels, wherein the specified secret level may be set according to the actual needs of the user, and illustratively, secret and absolute secret may all be set to be specified secret levels; or, setting the secret and the absolute secret as a specified secret level; it is also possible to set the absolute secret to a specified secret level only, and the invention is not limited thereto.
The first encoding rule in the above steps may be an encoding rule that ensures that the content of the target file is not leaked, that is, an encoding rule that makes the first image decoded by the display end be a blurred image, for example, the first encoding rule may be an encoding rule that performs encoding with a compression rate higher than that of a normal encoding rule, may also be an encoding rule that performs encoding on a part of image layers in the first desktop image, and may also be an encoding rule that increases a scrambling code in an encoding process. The second encoding rule in the above steps may be a normal encoding rule, that is, the first desktop image may be obtained after the display end decodes the first desktop image.
In an optional embodiment, when it is detected that a user performs a document opening operation, it is first determined whether a security level of a document opened by the user is a preset level, and if the security level of a target file is the preset level, it is determined that security protection needs to be performed on the target file, so that a current desktop image can be encoded according to a preset first encoding rule, and a first image obtained after decoding by a display end is a blurred image; if the security level of the target file is not the preset level, it is determined that corresponding protection is not needed to be performed on the target file, and the current desktop image can be encoded according to a preset second encoding rule, so that the first image obtained after decoding by the display end is the first desktop image.
Optionally, the first desktop image comprises: the multi-layer image layer, wherein the encoding the first desktop image according to the first encoding rule to obtain the first encoded data includes: coding a first image layer in the multi-layer image layers to obtain first coded data; the encoding the first desktop image according to the second encoding rule to obtain first encoded data includes: and coding the multilayer image layer to obtain first coded data.
The desktop image can be formed by overlapping a plurality of image layers, different image layers contain different information, and the lower the image layer is, the less information is contained, and the more fuzzy the image is; the higher the image layer contains more information, the sharper the image, wherein the image layer at the bottom can be called a base layer (base layer), and the other image layers above can be called enhancement layers of 1 to N layers. In order to ensure file security, the first image layer in the above steps may be a base layer (base layer) of the desktop image, or a superposition of the base layer and a part of the enhancement layer, which may be, for example, the base layer plus the enhancement layers 1 to M, where M < N.
In an optional embodiment, after determining whether security protection needs to be performed on a target file, encoding may be performed in different encoding manners, and when determining that encoding is performed by using a first encoding rule, only a first image layer of a plurality of image layers may be encoded, and the obtained first encoded data is sent to a display end, where the file content viewed by a current user is processed file content, that is, may be a blurred desktop image, so as to achieve a protection effect of a confidential file; when the second encoding rule is determined to be used for encoding, all image layers can be encoded, and the file content seen by the current user is the original file content, namely, a clear desktop image.
Optionally, after sending the first encoded data to the display end, the method further includes: receiving a verification result sent by a display end, wherein the verification result is used for representing whether illegal operation exists at the display end; generating second coded data corresponding to the first desktop image based on the verification result; and sending the second coded data to a display end, wherein the display end is used for displaying a second image obtained by decoding the second coded data.
The illegal operation in the above steps may include but is not limited to: whether the user includes only a legal user, whether the legal user leaves the seat, whether a person other than the legal user views the screen image, whether other person takes a posture similar to photographing, whether other person holds the image pickup apparatus, and the like are determined. At this time, the final image rendering result of the display side may be determined based on the verification result of such illegal operation.
In an optional embodiment, after the first encoded data is sent to the display end, the user may view the decoded first image, in order to ensure that a legitimate user can view the original file content and ensure that no information leakage occurs during the process of viewing the original file content by the legitimate user. The display end can verify whether illegal operation exists in real time in the using process of a user and feed back a verification result to the receiving end, and after the receiving end receives the verification result, the receiving end can generate second coded data based on the verification result.
If the verification result is that no illegal operation exists, in order to ensure that a legal user can check the content of the original file, the first desktop image can be directly coded according to a normal coding rule to obtain second coded data, or the residual image layer which is not coded in the last coding process can be continuously coded to obtain the second coded data.
And if the verification result is that illegal operation exists, the receiving end immediately starts a peeping process, destroys the source end coding information, stops the coding mode adopted before, codes the first desktop image according to the first coding rule to obtain second coding data, and ensures that the image obtained after decoding by the display end is a fuzzy image.
Optionally, the first desktop image comprises: the multi-layer image layer, wherein generating second encoding data corresponding to the first desktop image based on the verification result comprises: under the condition that the verification result is that illegal operation does not exist, coding a second image layer in the multi-layer image layers to obtain second coded data, wherein the second image layer is the other image layer except for the first image layer corresponding to the first coded data in the multi-layer image layers; and determining the first coded data as the second coded data when the verification result is that the illegal operation exists.
In an optional embodiment, after a user performs a document opening operation, first encoding a first image layer of a current desktop image, and sending the encoded data to a display end, that is, only the first encoded data of the first image layer is transmitted when a document is just opened, so that only a blurred file image can be obtained by decoding at the display end, the blurred image is directed to all persons logging in the virtual desktop, and then the persons are further subjected to security authentication, if the user is determined to be a legal user and has no illegal operation temporarily, other image layers except the first image layer can be encoded, and a clear first desktop image is obtained; if the legal user has at least one of the illegal operations in the virtual process, the first coded data obtained by the previous coding can be directly sent to the receiving end without additional coding, and the initial blurred image is still obtained by the display end.
In an optional embodiment, a cloud desktop office worker logs in a virtual cloud desktop through a display end, a camera collects a use image of a user, the user is judged to be a legal user, the display end receives a coded image, and a source image obtained through decoding is displayed on the display end; in the using process of a user, the camera continuously collects real-time images of the user, if the real-time images are always under the condition that illegal operation does not exist, the first desktop image, namely a clear image, is always obtained, once the condition that the illegal operation exists is detected, the receiving end stops encoding the first desktop image according to a normal encoding mode, and the first desktop image is encoded by adopting a first encoding rule to obtain a fuzzy image.
Optionally, the display end is configured to identify the acquired first image to obtain a verification result, where the first image is an image around the display device acquired when the display end displays the first image.
The display end in the above steps may include a camera, and before a legal user starts to use the intelligent terminal, the camera first collects an image of the legal user sitting in front of the screen when using the display end; the collected image can be used for identity authentication on one hand, and can be used for judging whether the use state of the user is changed or not through image comparison subsequently on the other hand. Therefore, the first image can be an image which is continuously acquired by the display end in the using process of the user, wherein the content of the first image can be used as a basis for subsequently judging whether the peeping process is performed.
In an optional embodiment, a user enters a virtual cloud desktop after using a correct login password, the user is determined to be a legal user after personnel verification, a display end acquires a first image through a camera when the user reads a document, if the user leaves the desktop temporarily, the content of the first image is judged to be unsafe, a peep-proof shooting flow is started, the desktop image is processed, and the effect of protecting the file is achieved; when the user returns to the desktop, whether the current user is a legal user is determined through comparison with the first image before the user leaves the desktop, and at the moment, a larger database is not needed to be searched for matching information, so that the waiting time of the user is saved.
Optionally, the display end is further configured to identify the first image, determine an object included in the first image, and determine whether the object included in the first image is a target object; wherein if the object contained in the first image is the target object, determining that there is no illegal operation as a result of the verification; if the object contained in the first image is not the target object, it is determined that an illegal operation exists as a result of the verification.
The target object in the above steps may be a legal user, and may also represent the posture of the legal user, including whether the posture is a suspected posture of peeping.
In an optional embodiment, if the content displayed by the first image is a legal user or a legal posture of the legal user, it may be determined that there is no illegal operation, the receiving end may encode the second image layer, the display end decodes, and displays a clear image; and if the content displayed by the first image has any user except legal user, or no user, or has illegal posture, the receiving end starts a peeping shooting program.
Optionally, the display terminal is further configured to identify a second acquired image and determine the target object, where the second image is an image around the display device acquired when the display terminal logs in the image source device.
The second image in the above step may be an image of the periphery of the display device acquired by the camera when the user logs in the virtual cloud desktop using the display terminal.
In an optional embodiment, the user included in the second image may be determined through image recognition, and whether the user is a legal user is determined by comparing the collected user information with information inside the system, and if the user is a legal user, the user may be used as a target object. And then, whether the current user is a legal user can be quickly determined by comparing the first image with the second image, so that the calculation amount of the system is reduced, a large amount of time is saved, and meanwhile, the accuracy is also ensured.
In another optional embodiment, a legal user often performs operation when logging in the virtual cloud desktop, so that after the second image is acquired, the user included in the second image can be determined in an image recognition mode, and the user is directly used as a target object.
Optionally, the display end is further configured to identify the second image, determine an object included in the second image, and determine that the object included in the second image is the target object when the object included in the second image is a legal object.
In an optional embodiment, the identity information of the user included in the second image may be determined in an image recognition manner, and then whether the user included in the image is a valid user is determined by the identity information.
It should be noted that, since the second image may include a plurality of users, as long as one user is detected as an illegal user in the second image, it is determined that the object included in the second image is not the target object.
Optionally, before receiving the file operation instruction sent by the display terminal, the method further includes: receiving a login instruction sent by a display end, wherein the login instruction is used for logging in image source equipment; acquiring a second desktop image displayed by the image source equipment, wherein the second desktop image is a desktop image of the display terminal after logging in the image source equipment; coding the second desktop image to obtain third coded data; and sending the third coded data to a display end, wherein the display end is used for displaying a second desktop image obtained by decoding the third coded data.
The second desktop image in the above step may be a virtual desktop image viewed after sending a login instruction to log in the image source device, and the image may be a default desktop image of the virtual cloud desktop.
The third encoded data in the above steps may be data obtained by encoding the second desktop image in a normal encoding manner, that is, data obtained by encoding all image layers included in the second desktop image.
In an optional embodiment, after the user logs in the virtual cloud desktop by using a correct login password, it may be determined that the current user is a valid user and any file is not opened currently, and therefore, the default desktop image may be encoded according to a normal encoding manner, so that after the display end is decoded, the user may view the normal default desktop image and further may perform an operation on the default desktop image, for example, open the file.
A preferred embodiment of the present invention will be described in detail with reference to fig. 2 to 3. As shown in fig. 2, the method may include the steps of:
step S201, a camera collects the postures of office personnel;
step S202, office staff log in a virtual cloud desktop;
step S203, building a VGTP image transmission channel and transmitting a virtual desktop;
step S204, a user browses the document;
step S205, the image source equipment terminal selects a corresponding coding strategy according to the security level of the browsed document;
step S206, the image source device carries out first layer coding and image blurring;
step S207, judging whether the file security level is internally disclosed, if so, executing step S208; if not, go to step S210;
step S208, image source equipment carries out all layer coding;
step S209, the display end completely decodes and displays a clear image;
step S210, the display end uploads the legal information of the user;
step S211, judging whether the section is in a legal state, if so, executing step S212; if not, go to step S214;
step S212, the image source equipment end performs second layer coding transmission;
step S213, the display end carries out progressive decoding and displays clear images;
in step S214, the image source device does not perform the second image layer encoding transmission.
As shown in fig. 3, the document security system includes: the system comprises a peep-shot intelligent zero terminal and a server, wherein the peep-shot intelligent zero terminal and the server are connected through a local area network or a wide area network, the peep-shot intelligent zero terminal comprises a decoder which can decode images of a base layer and an enhancement layer 1-N layer which are coded under different coding rules, and the decoded images show images with different definitions through display equipment; files of word/excel/ppt/pdf/imag and other types are installed on the server, the files can be divided into several security levels such as internal disclosure, secret and the like, and different encoding rules are set for the files with different security levels.
The file security method can be realized by the file security system, the types of the cameras in the steps are not limited, and in principle, the higher the precision of the cameras is, the higher the accuracy of image identification is. The office staff can log in through the password when logging in initially, and the person who knows the password is considered to be a legal person possibly at the moment, and meanwhile, the camera starts to collect images and carries out information retention for subsequent peep-proof shooting. And if the office staff open a certain file, unifying the presented file images into unclear images, judging whether the office staff can continuously read the file according to the file security level, if so, displaying the clear images, otherwise, further uploading legal information, and after the legal information exists, immediately stopping the second image layer coding transmission as long as at least one illegal state exists when the office staff reads the file.
According to another aspect of the embodiments of the present invention, a file security system is further provided, where the file security method in the foregoing embodiments can be executed by the security system, and a specific implementation manner and a preferred application scenario are the same as those in the foregoing embodiments, and are not described herein again.
FIG. 4 is a schematic diagram of a document security system according to an embodiment of the present invention, as shown in FIG. 4, the system comprising:
and the display end 42 is used for sending file operation instructions.
The display terminal may be a zero terminal, where the zero terminal is a terminal product without a CPU (central processing unit), a memory, or a hard disk operating system, that is, except for a host administrator, each user only needs to have one keyboard, one mouse, and one zero terminal to implement the functions of the computer.
And the receiving end 40 is connected with the display end and the image source device, and is used for sending a file operation instruction to the image source device, acquiring a first desktop image displayed by the image source device, and generating first coded data corresponding to the first desktop image based on the security level of the target file, wherein the first desktop image is the desktop image obtained after the target file corresponding to the file operation instruction is opened.
The receiving end in the above steps may be a device for performing data encoding and other operations.
And the display device 44, the display end is further configured to decode the received first encoded data to obtain a first image, and control the display device to display the first image.
The specific type and model of the display device in the above steps are not limited, and the display device may be a computer screen or a projection surface.
According to another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, which includes a stored program, wherein when the program runs, the apparatus on which the computer-readable storage medium is located is controlled to execute the above-mentioned method for file security.
According to another aspect of the embodiments of the present invention, there is also provided a processor, configured to execute a program, where the program executes the method for file security.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (13)

1. A method for securing a document, comprising:
receiving a file operation instruction sent by a display terminal, and sending the file operation instruction to image source equipment;
acquiring a first desktop image displayed by the image source equipment, wherein the first desktop image is a desktop image obtained by opening a target file corresponding to the file operation instruction;
generating first coded data corresponding to the first desktop image based on the security level of the target file;
and sending the first coded data to the display end, wherein the display end is used for decoding the first coded data to obtain a first image and controlling display equipment to display the first image.
2. The method of claim 1, wherein generating first encoding data corresponding to the first desktop image based on the security level of the target document comprises:
judging whether the security level of the target file is a preset level or not;
if the security level of the target file is the preset level, encoding the first desktop image according to a first encoding rule to obtain first encoded data;
and if the security level of the target file is not the preset level, encoding the first desktop image according to a second encoding rule to obtain the first encoded data.
3. The method of claim 2, wherein the first desktop image comprises: a plurality of image layers, wherein,
encoding the first desktop image according to a first encoding rule to obtain first encoded data, wherein the first encoded data comprises: encoding a first image layer in the multi-layer image layers to obtain first encoded data;
encoding the first desktop image according to a second encoding rule to obtain first encoded data, wherein the first encoding data comprises: and coding the multi-layer image layer to obtain the first coded data.
4. The method of claim 1, wherein after sending the first encoded data to the display, the method further comprises:
receiving a verification result sent by the display end, wherein the verification result is used for representing whether illegal operation exists at the display end;
identifying the verification result, and generating second coded data corresponding to the first desktop image;
and sending the second coded data to the display end, wherein the display end is used for displaying a second image obtained by decoding the second coded data.
5. The method of claim 4, wherein the first desktop image comprises: the multi-layer image layer, wherein generating second encoding data corresponding to the first desktop image based on the verification result comprises:
under the condition that the verification result is that the illegal operation does not exist, coding a second image layer in the multi-layer image layers to obtain second coded data, wherein the second image layer is the other image layer except for a first image layer corresponding to the first coded data in the multi-layer image layers;
and determining the first coded data as the second coded data when the verification result is that the illegal operation exists.
6. The method according to claim 4, wherein the display end is configured to identify a first captured image to obtain the verification result, wherein the first image is an image around the display device captured when the display end displays the first image.
7. The method according to claim 6, wherein the display end is further configured to identify the first image, determine an object included in the first image, and determine whether the object included in the first image is a target object; wherein if an object contained in the first image is the target object, it is determined that the illegal operation does not exist as the verification result; and if the object contained in the first image is not the target object, determining that the illegal operation exists as the verification result.
8. The method of claim 7, wherein the display is further configured to identify a second captured image and determine the target object, wherein the second image is an image around the display captured when the display logs in to the image source device.
9. The method according to claim 8, wherein the display end is further configured to identify the second image, determine an object included in the second image, and determine that the object included in the second image is the target object when the object included in the second image is a legal object.
10. The method according to any one of claims 1 to 9, wherein before receiving the file operation instruction sent by the display terminal, the method further comprises:
receiving a login instruction sent by the display end, wherein the login instruction is used for logging in the image source equipment;
acquiring a second desktop image displayed by the image source equipment, wherein the second desktop image is a desktop image obtained after the display end logs in the image source equipment;
coding the second desktop image to obtain third coded data;
and sending the third coded data to the display end, wherein the display end is used for displaying the second desktop image obtained by decoding the third coded data.
11. A document security system, comprising:
the display end is used for sending a file operation instruction;
the receiving end is connected with the display end and the image source device and used for sending the file operation instruction to the image source device, acquiring a first desktop image displayed by the image source device and generating first coded data corresponding to the first desktop image based on the security level of a target file, wherein the first desktop image is the desktop image after the target file corresponding to the file operation instruction is opened;
the display end is further configured to decode the received first encoded data to obtain a first image, and control a display device to display the first image.
12. A computer-readable storage medium, comprising a stored program, wherein when the program runs, the program controls a device in which the computer-readable storage medium is located to execute the file security method according to any one of claims 1 to 10.
13. A processor, configured to run a program, wherein the program when running performs the file security method of any one of claims 1 to 10.
CN202011483307.3A 2020-12-15 2020-12-15 File confidentiality method and system, computer readable storage medium and processor Active CN112637635B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011483307.3A CN112637635B (en) 2020-12-15 2020-12-15 File confidentiality method and system, computer readable storage medium and processor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011483307.3A CN112637635B (en) 2020-12-15 2020-12-15 File confidentiality method and system, computer readable storage medium and processor

Publications (2)

Publication Number Publication Date
CN112637635A true CN112637635A (en) 2021-04-09
CN112637635B CN112637635B (en) 2023-07-04

Family

ID=75313518

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011483307.3A Active CN112637635B (en) 2020-12-15 2020-12-15 File confidentiality method and system, computer readable storage medium and processor

Country Status (1)

Country Link
CN (1) CN112637635B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114722384A (en) * 2022-06-02 2022-07-08 南京中成越科技有限公司 Risk data transmission processing method and system for end-to-end remote communication
CN116471363A (en) * 2023-04-06 2023-07-21 西安万像电子科技有限公司 A method of anti-spying based on out-of-sequence encoding of video images

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006074338A (en) * 2004-09-01 2006-03-16 Fuji Xerox Co Ltd Data concealing device, concealed data extraction device, data concealing method, concealed data extraction method, and program for them
CN101305375A (en) * 2005-09-12 2008-11-12 沙盒技术有限公司 System and method for controlling distribution of electronic information
JP2009044320A (en) * 2007-08-07 2009-02-26 Ricoh Co Ltd File transfer apparatus and file transfer method
US20090289944A1 (en) * 2008-05-20 2009-11-26 Konica Minolta Business Technologies, Inc. Image processing apparatus, image outputting method, and image outputting program embodied on computer readable medium
CN102316360A (en) * 2010-07-09 2012-01-11 华为终端有限公司 Video refreshing method, device and system
CN104933375A (en) * 2015-07-07 2015-09-23 上海谐桐信息技术有限公司 Method and system for protecting electronic display document
CN105659601A (en) * 2013-10-11 2016-06-08 索尼公司 Image processing device and image processing method
CN106529339A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Picture display method, device and terminal
CN107333118A (en) * 2017-07-17 2017-11-07 上海青橙实业有限公司 The control method and device of project content
CN108206953A (en) * 2016-12-20 2018-06-26 安讯士有限公司 Privacy mask image is encoded
CN108809913A (en) * 2017-05-04 2018-11-13 中国移动通信集团重庆有限公司 The method, apparatus and equipment of data desensitization
CN110377763A (en) * 2019-07-12 2019-10-25 腾讯科技(深圳)有限公司 Media file inspection method and device, storage medium and electronic device
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN111191257A (en) * 2019-12-02 2020-05-22 泰康保险集团股份有限公司 File preview processing method and device
CN111338744A (en) * 2020-05-22 2020-06-26 北京小米移动软件有限公司 Image display method and device, electronic device and storage medium
CN111581621A (en) * 2020-05-07 2020-08-25 中芯集成电路(宁波)有限公司 Data security processing method, device, system and storage medium
CN111611562A (en) * 2020-04-29 2020-09-01 西安万像电子科技有限公司 Method and device for accessing a server
CN111654699A (en) * 2020-05-29 2020-09-11 西安万像电子科技有限公司 Image transmission method and device
CN111917558A (en) * 2020-08-13 2020-11-10 南开大学 A blockchain-based dual authentication and hierarchical encryption method for video frame data
CN111950042A (en) * 2020-08-25 2020-11-17 西安万像电子科技有限公司 Image data processing method, system and device

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006074338A (en) * 2004-09-01 2006-03-16 Fuji Xerox Co Ltd Data concealing device, concealed data extraction device, data concealing method, concealed data extraction method, and program for them
CN101305375A (en) * 2005-09-12 2008-11-12 沙盒技术有限公司 System and method for controlling distribution of electronic information
JP2009044320A (en) * 2007-08-07 2009-02-26 Ricoh Co Ltd File transfer apparatus and file transfer method
US20090289944A1 (en) * 2008-05-20 2009-11-26 Konica Minolta Business Technologies, Inc. Image processing apparatus, image outputting method, and image outputting program embodied on computer readable medium
CN102316360A (en) * 2010-07-09 2012-01-11 华为终端有限公司 Video refreshing method, device and system
CN105659601A (en) * 2013-10-11 2016-06-08 索尼公司 Image processing device and image processing method
CN104933375A (en) * 2015-07-07 2015-09-23 上海谐桐信息技术有限公司 Method and system for protecting electronic display document
CN106529339A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Picture display method, device and terminal
CN108206953A (en) * 2016-12-20 2018-06-26 安讯士有限公司 Privacy mask image is encoded
CN108809913A (en) * 2017-05-04 2018-11-13 中国移动通信集团重庆有限公司 The method, apparatus and equipment of data desensitization
CN107333118A (en) * 2017-07-17 2017-11-07 上海青橙实业有限公司 The control method and device of project content
CN110377763A (en) * 2019-07-12 2019-10-25 腾讯科技(深圳)有限公司 Media file inspection method and device, storage medium and electronic device
CN110659512A (en) * 2019-09-27 2020-01-07 Oppo(重庆)智能科技有限公司 Picture management method, device, terminal and storage medium
CN111191257A (en) * 2019-12-02 2020-05-22 泰康保险集团股份有限公司 File preview processing method and device
CN111611562A (en) * 2020-04-29 2020-09-01 西安万像电子科技有限公司 Method and device for accessing a server
CN111581621A (en) * 2020-05-07 2020-08-25 中芯集成电路(宁波)有限公司 Data security processing method, device, system and storage medium
CN111338744A (en) * 2020-05-22 2020-06-26 北京小米移动软件有限公司 Image display method and device, electronic device and storage medium
CN111654699A (en) * 2020-05-29 2020-09-11 西安万像电子科技有限公司 Image transmission method and device
CN111917558A (en) * 2020-08-13 2020-11-10 南开大学 A blockchain-based dual authentication and hierarchical encryption method for video frame data
CN111950042A (en) * 2020-08-25 2020-11-17 西安万像电子科技有限公司 Image data processing method, system and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭福亮;周钢;: "基于Unicode编码文本水印的分密级公文系统" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114722384A (en) * 2022-06-02 2022-07-08 南京中成越科技有限公司 Risk data transmission processing method and system for end-to-end remote communication
CN116471363A (en) * 2023-04-06 2023-07-21 西安万像电子科技有限公司 A method of anti-spying based on out-of-sequence encoding of video images

Also Published As

Publication number Publication date
CN112637635B (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CN109120597B (en) Identity verification and login method and device and computer equipment
US20070112775A1 (en) Method for user biometric artifical authentication
US20050265548A1 (en) Apparatus, method and computer product for preventing copy of data
CN112257124A (en) Image processing method and device
EP2990959B1 (en) Terminal and method for hiding and protecting data information
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN112270647B (en) Image processing method and system
EP3023900A1 (en) A method, device and system for account recovery with a durable code
KR101867326B1 (en) Method and system for providing social media using partition function
US20080046751A1 (en) System, apparatus and method for providing data security using usb device
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
CN112637635A (en) File security method and system, computer readable storage medium and processor
KR101305901B1 (en) Authentication method and system
CN117375986A (en) Application access method, device and server
CN115374420B (en) Cross-browser high-concurrency data access software system based on face security verification
CN115484086B (en) Cloud mobile phone screen sharing method and electronic equipment and computer-readable storage media
US12137167B2 (en) Watermarking in a virtual desktop infrastructure environment
CN116088685A (en) Meta universe information interaction control system
CN107292133A (en) The obfuscation method and device of artificial intelligence
CN114357524B (en) Electronic document processing method and device
EP3384632B1 (en) Apparatus and method for camera-based user authentication for content access
CN106878018B (en) Operation verification method and device
CN117155673A (en) Login verification method and device based on digital human video, electronic equipment and medium
CN112351048B (en) Interface access control method, device, equipment and storage medium
CN111400683A (en) Method and system for automatically distributing authority for application system user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant