WO2019174090A1 - Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique - Google Patents
Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique Download PDFInfo
- Publication number
- WO2019174090A1 WO2019174090A1 PCT/CN2018/082706 CN2018082706W WO2019174090A1 WO 2019174090 A1 WO2019174090 A1 WO 2019174090A1 CN 2018082706 W CN2018082706 W CN 2018082706W WO 2019174090 A1 WO2019174090 A1 WO 2019174090A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- file
- screen capture
- information
- preset
- screen
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- the present application relates to the field of screen capture monitoring, and in particular, to a method, device, device and computer storage medium for controlling screen file sharing.
- the existing screen capture files lack detection mechanism, and the screen capture files have sensitive information.
- the sharing of existing files does not involve sensitive information monitoring in the personal field, which may easily lead to the leakage of sensitive personal information.
- the present application provides a method, device, device and computer storage medium for controlling screen file sharing performed by a computer, which can reduce the leakage of personal sensitive information and ensure information security by identifying screen capture files.
- the present application provides a method for controlling screen file sharing performed by a computer, and the method for controlling screen file sharing includes the following steps:
- Receiving a file save request saving the file associated with the file save request to the local storage, generating corresponding attribute information, and establishing an association relationship between the file and the attribute information;
- the screen capture file shares the risk warning.
- the step of comparing the attribute information with the preset screen capture determination rule, and determining whether the file to be shared is a screen capture file includes:
- the attribute information includes: a storage path and/or size data
- the storage identifier corresponding to the storage path matches the path standard identifier in the preset screen capture determination rule and/or the size data matches the screen size in the preset screen capture determination rule, it is determined that the file to be shared is a screen capture file.
- the step of comparing the attribute information with the preset screen capture determination rule, and determining whether the file to be shared is a screen capture file further includes:
- the file to be shared is a screen capture file.
- the method includes:
- the screen capture file contains sensitive information, and the screen capture file is added with a sensitive label.
- determining that the screen capture file contains sensitive information, and adding the sensitive label to the screen capture file includes:
- the sensitive information in the screen capture file is blurred to obtain a transmission file
- the sensitive information in the screen capture file is blurred, and the step of obtaining the transmission file includes:
- the coordinate data of the sensitive information in the screen capture file is determined
- the sensitive information of the corresponding coordinate position is blurred to obtain a transmission file.
- the method includes:
- the screen capture file sending permission setting prompt information is output, so that the user inputs the verification standard information of the screen file sending permission;
- the authentication information is compared with the verification standard information. If the authentication information matches the verification standard information, it is determined that the user has the permission to send the screen capture file, and the screen capture file is sent.
- the present application further provides a control device for screen file sharing, and the control device for sharing the screen file includes:
- the save creation module is configured to receive a file save request, save the file associated with the file save request to the local storage, generate corresponding attribute information, and establish an association relationship between the file and the attribute information;
- Receiving an obtaining module configured to receive a file sharing request, obtain a file to be shared in the file sharing instruction, and obtain attribute information according to the association relationship;
- the comparison determination module is configured to compare the attribute information with the preset screen capture determination rule, and determine whether the file to be shared is a screen capture file;
- the prompt module is displayed, and if the file to be shared is a screen capture file, the screen capture file sharing risk prompt is output.
- control device for screen file sharing includes: a memory, a processor, and is stored on the memory and operable on the processor
- the screenshot control file sharing control program where:
- the present application further provides a computer storage medium
- the computer storage medium stores a control program for screen capture file sharing, and the control program of the screen capture file sharing is executed by the processor to implement the steps of the control method of the screen capture file sharing as described above.
- the method, device, device and computer storage medium for controlling screen capture file sharing receive a file save request by the terminal, save the file associated with the file save request to local storage, generate corresponding attribute information, and create a file and an attribute.
- the rule is compared, and it is determined whether the file to be shared is a screen capture file; if the file to be shared is a screen capture file, the screen capture file sharing risk prompt is output.
- the saved files are compared according to the preset screen capture determination rules, and the saved file is accurately identified as a screen capture file.
- the terminal performs screen capture file display information detection, and implements a personal field screen capture. Sensitive information monitoring of documents reduces the leakage of sensitive personal information.
- FIG. 1 is a schematic structural diagram of an apparatus of a hardware operating environment involved in an embodiment of the present application
- FIG. 2 is a schematic flowchart of a first embodiment of a method for controlling screen file sharing according to the present application
- step S13 is a schematic flowchart of the refinement of step S13 of the control method for screen capture file sharing in FIG. 2;
- FIG. 4 is a schematic flowchart of a second embodiment of a method for controlling screen file sharing according to the present application
- FIG. 5 is a schematic flowchart of a third embodiment of a method for controlling screen file sharing according to the present application.
- FIG. 6 is a schematic flowchart of a fourth embodiment of a method for controlling screen file sharing according to the present application.
- FIG. 7 is a schematic diagram of functional modules of an embodiment of a control device for screen capture file sharing according to the present application.
- the screen capture function of the terminal device also includes three types: a normal screen capture, which can intercept the entire screen; a free screen capture, which can be determined by the user to determine the screen capture range, that is, a free screen capture, which is suitable for users in terms of privacy and the like.
- a normal screen capture which can intercept the entire screen
- a free screen capture which can be determined by the user to determine the screen capture range, that is, a free screen capture, which is suitable for users in terms of privacy and the like.
- a normal screen capture which can intercept the entire screen
- a free screen capture which can be determined by the user to determine the screen capture range, that is, a free screen capture, which is suitable for users in terms of privacy and the like.
- a normal screen capture Just want to intercept part of the content; long screen shot, users sometimes need not only cut out the content of a screen of the mobile phone, but also need to cut out the content of the interface, such as a conversation in the chat software is very long, more than one screen, need one time Cut out
- the main solution of the embodiment of the present application is: when the operation instruction of the storage file is detected by the user, the file identification instruction is automatically triggered, the terminal receives the file sharing request, and obtains the file to be shared in the file sharing instruction according to the association relationship. Obtaining the attribute information; comparing the attribute information with the preset screen capture determination rule, and determining whether the file to be shared is a screen capture file; if the file to be shared is a screen capture file, outputting the screen capture file sharing risk prompt.
- the terminal identifies the screen capture file to prevent the screen capture file sent by the user from containing sensitive information.
- FIG. 1 is a schematic structural diagram of a terminal in a hardware operating environment involved in an embodiment of the present application.
- the terminal in the embodiment of the present application may be a fixed terminal or a mobile terminal, wherein the fixed terminal is an "Internet of Things device", a smart air conditioner with networking function, a smart electric light, a smart power source, etc.; a mobile terminal, such as an AR with networking function /VR devices, smart speakers, self-driving cars, PCs, smart phones, tablets, e-book readers, portable computers and other terminal devices with display functions.
- the fixed terminal is an "Internet of Things device", a smart air conditioner with networking function, a smart electric light, a smart power source, etc.
- a mobile terminal such as an AR with networking function /VR devices, smart speakers, self-driving cars, PCs, smart phones, tablets, e-book readers, portable computers and other terminal devices with display functions.
- the terminal may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
- the communication bus 1002 is used to implement connection communication between these components.
- the user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface.
- the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
- the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
- the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
- the terminal may further include a camera, RF (Radio) Frequency, RF) circuit, sensor, audio circuit, WiFi module; input unit, display screen, touch screen; network interface optional in addition to wireless interface in addition to WiFi, Bluetooth, probe, 3G/4G/5G networked base station equipment, etc. .
- sensors such as light sensors, motion sensors, and other sensors.
- terminal structure shown in FIG. 1 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
- the computer software product is stored in a storage medium (storage medium: also called computer storage medium, computer medium, readable medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM).
- storage medium also called computer storage medium, computer medium, readable medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM).
- /RAM, disk, CD-ROM including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the various embodiments of the present application as a
- the memory 1005 of the computer storage medium may include an operating system, a network communication module, a user interface module, and a control application for screen file sharing.
- the network interface 1004 is mainly used to connect to the background server and perform data communication with the background server;
- the user interface 1003 is mainly used to connect the client (user end), and perform data communication with the client;
- the processor 1001 may be used to call a control application for screen capture sharing stored in the memory 1005 and perform the steps in the control method for screen file sharing provided by the following embodiments.
- the method for controlling screen file sharing includes:
- Step S11 Receive a file save request, save the file associated with the file save request to local storage, generate corresponding attribute information, and establish an association relationship between the file and the attribute information.
- the terminal receives the file save request, wherein the method for triggering the file save request is more, and the terminal may automatically trigger at the set time point, or the user manually triggers, for example, the user clicks the terminal virtual button “Save” button to trigger the file save request.
- the terminal acquires the file associated with the file save request, and the terminal saves the file to the local storage, and generates attribute information of the file, including: file type, file size, file creation time, file modification.
- the time, the file access time, the file storage path, and the like the terminal establishes an association relationship between the file and the corresponding attribute information, where the relationship between the file and the corresponding attribute information may be a one-to-one mapping relationship or a table. form.
- Step S12 Receive a file sharing request, obtain the to-be-shared file in the file sharing instruction, and obtain the attribute information according to the association relationship.
- the terminal receives the file sharing request, where the file sharing request refers to a request corresponding to the file selection performed before the user sends the file to the public platform or the file is sent to the receiving user end, and the terminal does not perform the file sending operation, wherein the file is triggered.
- sharing requests may be that the terminal automatically triggers at the set time, or when the user operates based on the file, manually triggers the file file type identification instruction, and the file sharing request needs to be supplemented, which is before the file sending instruction. In one step, it can be understood that the user selects to send a file request.
- the user clicks the virtual button of “add sharing information” on the terminal display interface to trigger a file sharing request, the terminal receives the file sharing request, and the terminal acquires the file in the sharing request.
- the terminal acquires attribute information corresponding to the file according to the association relationship. Determine if the file is a screen capture file.
- step S13 the attribute information is compared with the preset screen capture determination rule, and it is determined whether the file to be shared is a screen capture file.
- the terminal compares the attribute information with the preset screen capture determination rule to determine whether the file to be shared is a screen capture file, wherein the preset screen capture determination rule refers to a determination rule set in advance according to the standard information of the screen capture file, for example, storage of a standard screen capture file.
- the path includes storage path information such as screenshot. If the file attribute information includes storage path information such as screenshot, the terminal determines that the file to be shared is a screen capture file.
- the terminal determines, according to the attribute information, whether the file is a different implementation manner of the screen capture file.
- three implementation forms are specifically provided:
- Method 1 according to the file storage path in the attribute information, including:
- the terminal compares the file storage path in the attribute information with a preset path in the preset screen capture determination rule
- the file storage path in the attribute information matches the preset path in the preset screenshot determination rule, it is determined that the file to be shared is a screen capture file.
- the file is determined to be a screen capture file according to the storage path information of the file, that is, the terminal stores the file storage path in the attribute information and a preset path in the preset screen capture determination rule (the preset path is in advance).
- the standard path information of the set screen capture file is compared; if the file storage path in the attribute information matches the preset path in the preset screen capture determination rule, it is determined that the file to be shared is a screen capture file, in this embodiment Under the condition that the user does not change the storage path, the screen capture file can be accurately identified to ensure the accuracy of the screen capture file identification.
- Method 2 according to the file size information in the attribute information, including:
- the file size data in the attribute information matches the preset size in the preset screen capture determination rule, it is determined that the file to be shared is a screen capture file.
- the file size information in the attribute information is specifically described, that is, the file size data in the attribute information and the preset size in the preset screen capture determination rule (preset size: is the standard size of the screen capture file, The preset size of the normal screen capture is equal to the size of the terminal display screen, the width of the screenshot file of the long screen is the same as the width of the terminal display screen, and the preset size of the free screen capture is smaller than the size of the terminal display screen; if the file in the attribute information The size data is matched with the preset size in the preset screen capture determination rule, and the file to be shared is determined to be a screen capture file.
- the screen capture file can be accurately identified according to the screen size and the file size of the terminal. The screen capture file is accurately identified when the user takes a normal screen shot.
- Mode 3 according to the time information in the attribute information, including:
- the file to be shared is a screen capture file.
- the time information in the attribute information is specifically described, that is, the time when the terminal acquires the generation time in the attribute information and the current display time of the terminal display screen, and the time interval between the generation time and the current display time of the terminal display screen is obtained;
- the generation time refers to the generation time of the screen capture file, that is, the time information displayed on the screen capture file can be identified, and the generation time of the screen capture file is obtained, for example, the user screen captures the terminal, and the terminal display time included in the screen capture file is the generation of the screen capture file.
- the terminal sets the time interval in the attribute information and the preset time in the preset screen capture determination rule (preset time: is the interval between the preset file generation time and the display time on the terminal, and can be set to 1 second according to the specific situation. If the time interval matches the preset time in the preset screen capture determination rule, the file to be shared is determined to be a screen capture file. In this embodiment, the terminal generates the screen capture file and the current display screen of the terminal. Display the difference in time, determine whether the file is a screen capture file, and increase the screen capture file. The accuracy of the identification.
- the implementation manner of determining the screen capture file according to the attribute information is specifically given in this embodiment, and each mode can be combined to accurately identify the screen capture file.
- the terminal first reduces the current time of the application in the foreground.
- the time to add the database image is less than 1 second; again, the image size is not larger than the screen size; finally, the image path keyword includes: ""screen Cap", "screenshot” or “screenshot” keywords; the specific implementation of the combination is not detailed.
- Step S14 If the file to be shared is a screen capture file, output a screen capture file sharing risk prompt.
- the terminal determines that the file to be shared is a screen capture file
- the terminal displays an output screen capture file sharing risk prompt. For example, the terminal determines that the file shared by the user is a screen capture file, and the terminal displays a floating frame, and displays the file as a screen capture file in the floating box. Share the risk of whether to continue sharing, to remind users of the risk of screen file sharing.
- the files to be saved in the present application are compared according to the set rules, and the saved file is accurately identified as a screen capture file.
- the screenshot is sent according to the screen capture file sent by the user.
- the file displays information detection, which realizes sensitive information monitoring of screen capture files in the personal field and reduces the leakage of sensitive personal information.
- step S13 in the first embodiment is a refinement of step S13 in the first embodiment.
- the storage of the file to be shared is a screen capture file according to the preset screen capture determination rule:
- step S131 the attribute information is compared with a preset screen capture determination rule, where the attribute information includes: a storage path and/or size data.
- the terminal includes attribute information (wherein the attribute information includes: a storage path and/or a size data, and further, the attribute information further includes a file type, a file size, a file creation time, a file modification time, a file access time, etc., The description will not be repeated here).
- the preset screen capture determination rule is a determination rule preset according to the standard attribute information of the screen capture file, for example, the storage path in the preset screen capture determination rule.
- the decision rule is that the path standard identifier of the screen capture file, or the path keyword is also included: "screenshot”, “screen_shot”, “screen-shot”, “screen Shot”, “screencapture”, “screen_capture”, “screen-capture”, “screen Capture”, “screencap”, “screen_cap”, “screen-cap”, “screen Cap”, “screenshot” or “screenshot” means that the terminal determines the rule according to the storage path in the preset screen capture decision rule.
- step S132 if the storage identifier corresponding to the storage path matches the path standard identifier in the preset screen capture determination rule and/or the size data matches the screen size in the preset screen capture determination rule, it is determined that the file to be shared is a screen capture file.
- the terminal determines that the storage identifier corresponding to the storage path matches the path standard identifier in the preset screen capture determination rule and/or the size data matches the screen size in the preset screen capture determination rule, for example, if the path of the screen capture file includes: “screen capture”
- the terminal compares the "screen capture” with the path standard identifier of the screen capture file in the preset screen capture determination rule.
- the path standard identifier of the screen capture file in the preset screen capture determination rule includes "screen capture”
- the storage identifier corresponding to the storage path and The preset screen capture determination rule is matched; and/or the picture size in the size data attribute information is compared with the screen size of the terminal in the preset screen capture determination rule, if the picture size is the same as the screen size, that is, the size data and the preset screen capture determination rule If the screen size in the match is matched, it is determined that the file to be shared is a screen capture file.
- the terminal specifically determines, according to the attribute information and the preset screen capture determination rule, that the file to be shared is a screen capture file, compared with the existing screen capture monitoring, the prior art determines when the screen capture instruction is triggered. It is a screen capture file and saved. In the latter stage, the screen capture file cannot be identified. In this implementation, the accuracy of the screen capture file identification is guaranteed.
- the step of identifying the display information of the screen capture file includes:
- Step S21 Receive an identification instruction triggered by the screen capture file, and identify the information category of the display information and the display information included in the screen capture file.
- the terminal receives the identification instruction triggered by the screen capture file, and identifies the information category of the display information and the display information contained in the screen capture file. For example, the terminal determines to identify the screen capture file, and the screen capture file may include text, symbols or other identification information, and the terminal may include Determines whether the text, symbol, or other identifying information contained in the screen capture file belongs to the text category or to the image category.
- Step S22 Acquire pre-set sensitive information of the information category in the preset sensitive information database, and compare the display information with the preset sensitive information.
- the terminal acquires the preset sensitive information database (the preset sensitive information database includes sensitive text information, sensitive image identification information, etc., for example, the sensitive information can be set to the user's personal identification number, home address, etc.)
- the sensitive information compares the display information with the preset sensitive information, that is, if the display information included in the screen capture file is text information, the terminal acquires the preset sensitive text in the preset sensitive information database, and the terminal includes the text in the screen capture file.
- the information is compared with preset sensitive text in a preset sensitive information base.
- step S23 if the display information matches the preset sensitive information, it is determined that the screen capture file contains sensitive information, and the screen capture file is added with a sensitive label.
- the terminal includes the text information in the screen capture file and the preset sensitive text in the preset sensitive information database, and the terminal determines that the screen file contains the text information and the preset sensitive information database.
- the preset sensitive text matching, or the icon information contained in the screen capture file and the preset sensitive icon in the preset sensitive information database are more than 95%, the terminal determines that the icon information is included and the preset sensitive information in the preset sensitive information database The icon matches, the terminal determines that the screen capture file contains sensitive information, and the terminal adds a sensitive label to the screen capture file to determine whether the screen capture file involves sensitive information according to the sensitive label.
- the terminal identifies the display information in the screen capture file, and accurately identifies whether the screen capture file contains sensitive information, so as to monitor the transmission of the screen capture file according to the usage, and the user reminds the user that the page has sensitive information, in this embodiment.
- the detailed identification of the screen capture file ensures the security of the screen capture file information.
- the steps when the screen capture file is sent include:
- Step S31 Receive a sending instruction triggered by the screen capture file, obtain a receiving account included in the sending instruction, and determine whether the screen capture file has a sensitive label.
- the terminal receives the sending instruction triggered by the screen capture file. For example, when the user selects the shared screen capture file, the user clicks the “send” virtual button on the display screen, or the user voice verbal, triggers the terminal to send an instruction, and the terminal acquires the sending instruction to include Receive the account and determine if there is a sensitive tag in the screenshot file.
- step S32 if the screen capture file has a sensitive label, the sensitive information in the screen capture file is blurred, and the transmission file is obtained.
- the terminal determines that the screen capture file has a sensitive label
- the terminal performs a blurring process on the sensitive information in the screen capture file, where the blurring process refers to the blurring of the screen capture file, and the purpose is to prevent sensitive information from being leaked, for example, Mosaic the user's name, or the user's face, to get the transfer file.
- step S32 includes:
- step a1 if the screen capture file contains a sensitive label, the coordinate data of the sensitive information in the screen capture file is determined.
- step a2 the sensitive information of the corresponding coordinate position is blurred to obtain a transmission file.
- the terminal determines that the screen capture file contains the sensitive label, and the terminal identifies the location information of the sensitive information in the screen capture file, and the terminal performs the blur at the location information of the screen capture file sensitive information to ensure that the overall screen capture file is not affected. Accurately process sensitive information on screen capture files.
- Step S33 Send the transmission file to the receiving account corresponding client to prevent leakage of personal sensitive information.
- the terminal sends the transmission file to the receiving account corresponding client, for example, the user sends a screen capture file to the corresponding message on the WeChat to prevent leakage of personal sensitive information.
- the terminal sends the processed screenshot file to the user end, so that the leakage of the personal sensitive information is reduced, the user experience is improved, and the overall screen capture file is not affected.
- the step of determining the screen capture file transmission includes:
- step S41 if the display information does not match the preset sensitive information, the application to which the screen capture file belongs is determined, and the application to which the screen capture file belongs is used as the target application.
- the terminal display information does not match the preset sensitive information, that is, the screen capture file does not have obvious sensitive information
- the terminal further determines the application of the screen capture file, and uses the application of the screen capture file as the target application, and the terminal needs to determine the screen capture file.
- the application may be determined according to the display identifier on the screen capture file, or may be determined according to the program run by the terminal when the screen capture file is generated. Specifically, the method for determining the application of the screen capture file does not constitute a limitation on the present application.
- Step S42 Determine a sensitivity level of the target application according to the preset application level table, and determine whether the sensitivity level of the target application exceeds a preset threshold.
- the terminal determines the sensitivity level of the target application according to the preset application level table (the preset application level table: refers to setting according to the application type, for example, the application sensitive level of the financial information such as Alipay is the highest level), and determines the sensitivity of the target application. Whether the level exceeds the preset threshold, the preset threshold is set according to specific conditions. For example, the user screen file is the Alipay transaction interface, the Alipay transaction interface contains data information, the terminal determines that the Alipay transaction interface has no sensitive label, and the terminal will use the Alipay preset application level. The table is traversed, and the sensitivity level of the Alipay is determined to be level 3, and the terminal compares the sensitivity level 3 with the preset threshold level 2.
- the preset application level table refers to setting according to the application type, for example, the application sensitive level of the financial information such as Alipay is the highest level
- the preset threshold is set according to specific conditions.
- the user screen file is the Alipay transaction interface
- the Alipay transaction interface contains data information
- Step S43 If the sensitivity level of the target application exceeds a preset threshold, the screen capture file sending permission setting prompt information is output, so that the user inputs the verification standard information of the screen file sending permission.
- the terminal If the target application sensitive level exceeds the preset threshold, that is, the target application is sensitive, the terminal outputs the screen capture file sending permission setting prompt information for the user to set the sending permission of the screen capture file, for example, the terminal displays “Please set the screen file to send the verification.
- the information prompts the user to set the verification standard information of the permission permission of the user to send the authority, and the verification authority for the operation of the screen capture file is verified by the user later.
- the sensitivity level of the target application does not exceed the preset threshold, the user's later operation is directly performed.
- the user is prompted to set the verification standard information of the screen capture file, and when the user edits the screen capture file or other operations later, the user is verified to ensure the security of the screen capture file.
- the terminal needs to perform the rights verification, that is,
- Step S44 receiving a screen capture file sending instruction, and acquiring identity verification information in the screen capture file sending instruction.
- the terminal receives the screen capture file sending instruction, the user triggers the screen capture file sending instruction on the terminal screen capture file, and the terminal acquires the identity verification information in the screen capture file sending instruction, and the identity verification information may be the user input verification information, for example, the screen capture file sending instruction includes Password verification information.
- step S45 the identity verification information is compared with the verification standard information. If the identity verification information matches the verification standard information, it is determined that the user has the permission to send the screen capture file, and the screen capture file is sent.
- the terminal compares the authentication information with the verification standard information. If the authentication information matches the verification standard information, the terminal determines that the user has the permission to send the screen capture file, and sends the screen capture file; if the identity verification information does not match the verification standard information, Then, it is determined that the user does not have the permission to send the screen capture file, does not send the screen capture file, locks the screen capture file, and prevents the user from editing the screen capture file.
- the permission verification is performed on the sending of the partial screen capture file.
- the terminal verifies whether the user has the transmission authority, and the terminal performs the transmission of the screen capture file to prevent the information leakage caused by the editing by others.
- control device for screen file sharing includes:
- the save creation module 10 is configured to receive a file save request, save the file associated with the file save request to the local storage, generate corresponding attribute information, and establish an association relationship between the file and the attribute information;
- the receiving and obtaining module 20 is configured to receive a file sharing request, obtain a file to be shared in the file sharing instruction, and obtain attribute information according to the association relationship;
- the comparison determination module 30 is configured to compare the attribute information with the preset screen capture determination rule, and determine whether the file to be shared is a screen capture file;
- the prompting module 40 is configured to output a screenshot file sharing risk prompt if the file to be shared is a screen capture file.
- the embodiment of the present application further provides a computer storage medium.
- the computer storage medium stores a control program for screen capture file sharing, and the control program of the screen capture file sharing is executed by the processor to implement the operation in the control method of screen capture file sharing provided by the foregoing embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Medical Informatics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un procédé de commande de partage de fichier de capture d'écran, comprenant les étapes suivantes consistant à : recevoir une demande de stockage de fichier, stocker un fichier associé à la demande de stockage de fichier sur le dispositif de stockage local, générer des informations d'attribut correspondantes, et établir une relation d'association entre le fichier et les informations d'attribut ; recevoir une demande de partage de fichier, obtenir un fichier à partager dans une instruction de partage de fichier, et obtenir les informations d'attribut selon la relation d'association ; comparer les informations d'attribut à une règle de détermination de capture d'écran prédéfinie, et déterminer si le fichier à partager est un fichier de capture d'écran ; et si le fichier à partager est un fichier de capture d'écran, fournir en sortie un message d'invite de risque de partage de fichier de capture d'écran. L'invention concerne également un dispositif et un appareil de commande de partage de fichier de capture d'écran, et un support de stockage informatique.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810212956.6 | 2018-03-15 | ||
| CN201810212956.6A CN108509533B (zh) | 2018-03-15 | 2018-03-15 | 截屏文件分享的控制方法、装置、设备和计算机存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019174090A1 true WO2019174090A1 (fr) | 2019-09-19 |
Family
ID=63377139
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/082706 Ceased WO2019174090A1 (fr) | 2018-03-15 | 2018-04-11 | Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108509533B (fr) |
| WO (1) | WO2019174090A1 (fr) |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109388532B (zh) * | 2018-09-26 | 2022-10-28 | Oppo广东移动通信有限公司 | 测试方法、装置、电子设备及计算机可读取存储介质 |
| CN109710576B (zh) * | 2018-12-29 | 2024-03-19 | 努比亚技术有限公司 | 文件展示的方法、终端及存储介质 |
| CN110222526B (zh) * | 2019-05-21 | 2024-04-26 | 平安科技(深圳)有限公司 | 安全防外发的方法及装置 |
| CN110363020B (zh) * | 2019-06-12 | 2023-07-04 | 平安科技(深圳)有限公司 | 截屏监控方法、装置、计算机设备及存储介质 |
| CN110287061B (zh) * | 2019-06-25 | 2023-05-16 | 重庆城市职业学院 | 基于计算机的信息维护系统 |
| CN110399748A (zh) * | 2019-07-23 | 2019-11-01 | 中国建设银行股份有限公司 | 一种基于图像识别的截图方法和装置 |
| CN110569295B (zh) * | 2019-08-02 | 2022-06-21 | 杭州安恒信息技术股份有限公司 | 通过定位关键词提高文档预警的方法 |
| CN111079166B (zh) * | 2019-12-19 | 2020-11-03 | 深圳市图美电子技术有限公司 | 一种安全的可有效防止数据泄露的网络存储设备 |
| CN111327516B (zh) * | 2020-01-20 | 2021-09-24 | 深圳传音控股股份有限公司 | 信息处理方法、终端及可读存储介质 |
| CN111290675B (zh) * | 2020-03-02 | 2023-02-17 | Oppo广东移动通信有限公司 | 截屏图片的分享方法、装置、终端及存储介质 |
| CN112100041A (zh) * | 2020-08-03 | 2020-12-18 | 联想(北京)有限公司 | 一种处理方法、装置及电子设备 |
| CN112363988A (zh) * | 2020-11-13 | 2021-02-12 | 深圳传音控股股份有限公司 | 文件分享方法、移动终端及存储介质 |
| CN112464180A (zh) * | 2020-11-25 | 2021-03-09 | 平安信托有限责任公司 | 页面截图外发管控方法、系统、电子设备及存储介质 |
| CN112632644A (zh) * | 2020-12-18 | 2021-04-09 | 深圳市安络科技有限公司 | 一种基于安卓系统的app防截屏方法、装置及设备 |
| CN112764857A (zh) * | 2021-01-21 | 2021-05-07 | 维沃移动通信有限公司 | 信息处理方法、装置及电子设备 |
| CN113094332B (zh) * | 2021-04-23 | 2024-07-09 | 北京天空卫士网络安全技术有限公司 | 一种文件管理方法和装置 |
| CN113946386B (zh) * | 2021-12-20 | 2022-03-29 | 北京指掌易科技有限公司 | 截屏控制方法、装置、计算机设备和存储介质 |
| CN114518811A (zh) * | 2022-01-26 | 2022-05-20 | 维沃移动通信有限公司 | 基于卷轴屏的信息交互方法、装置及电子设备 |
| CN116738485B (zh) * | 2023-06-21 | 2023-12-05 | 江苏克胜集团股份有限公司 | 一种基于数字化信息传输的安全管理系统 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104408686A (zh) * | 2014-10-31 | 2015-03-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种截屏方法、系统及终端 |
| CN104407790A (zh) * | 2014-11-07 | 2015-03-11 | 深圳市中兴移动通信有限公司 | 图片显示方法和系统 |
| CN106055996A (zh) * | 2016-05-18 | 2016-10-26 | 维沃移动通信有限公司 | 一种多媒体信息分享方法及移动终端 |
| US20170132742A1 (en) * | 2015-11-10 | 2017-05-11 | International Business Machines Corporation | Context-based provision of screenshot modifications |
| CN106775625A (zh) * | 2016-11-15 | 2017-05-31 | 北京金山安全软件有限公司 | 一种截屏图片的分享方法、装置及电子设备 |
-
2018
- 2018-03-15 CN CN201810212956.6A patent/CN108509533B/zh active Active
- 2018-04-11 WO PCT/CN2018/082706 patent/WO2019174090A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104408686A (zh) * | 2014-10-31 | 2015-03-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种截屏方法、系统及终端 |
| CN104407790A (zh) * | 2014-11-07 | 2015-03-11 | 深圳市中兴移动通信有限公司 | 图片显示方法和系统 |
| US20170132742A1 (en) * | 2015-11-10 | 2017-05-11 | International Business Machines Corporation | Context-based provision of screenshot modifications |
| CN106055996A (zh) * | 2016-05-18 | 2016-10-26 | 维沃移动通信有限公司 | 一种多媒体信息分享方法及移动终端 |
| CN106775625A (zh) * | 2016-11-15 | 2017-05-31 | 北京金山安全软件有限公司 | 一种截屏图片的分享方法、装置及电子设备 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108509533A (zh) | 2018-09-07 |
| CN108509533B (zh) | 2019-08-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2019174090A1 (fr) | Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique | |
| WO2019144738A1 (fr) | Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique | |
| WO2020224246A1 (fr) | Procédé et appareil de gestion de données fondée sur une chaîne de blocs, dispositif et support d'informations | |
| WO2020147383A1 (fr) | Procédé, dispositif et système d'examen et d'approbation de processus utilisant un système de chaîne de blocs, et support de stockage non volatil | |
| WO2019161598A1 (fr) | Procédé, appareil et dispositif d'interaction entre messagerie instantanée et courrier électronique, et support d'informations | |
| WO2018233352A1 (fr) | Procédé de transmission de données, dispositif, terminal, et support de stockage lisible par ordinateur | |
| WO2021003956A1 (fr) | Procédé, appareil et dispositif de gestion d'informations de produit et support d'enregistrement | |
| WO2015108330A1 (fr) | Dispositif électronique de commande d'un dispositif externe à l'aide d'un numéro et procédé associé | |
| WO2018018695A1 (fr) | Procédé et dispositif de gestion de gel d'application, et terminal | |
| WO2016036115A1 (fr) | Dispositif électronique et procédé de gestion de réenregistrement | |
| WO2018076865A1 (fr) | Procédé, dispositif, support d'informations et dispositif électronique de partage de données | |
| WO2020062658A1 (fr) | Procédé et appareil de génération de contrat, dispositif et support de stockage | |
| WO2021027134A1 (fr) | Procédé, appareil et dispositif de stockage de données et support d'enregistrement informatique | |
| WO2020253131A1 (fr) | Procédé, appareil et dispositif de paiement par carte bancaire, et support de stockage informatique | |
| WO2016039582A1 (fr) | Procédé et appareil de reconnaissance de l'iris | |
| WO2020233060A1 (fr) | Procédé et appareil de notification d'événement, serveur de notification d'événement et support de stockage | |
| WO2020253120A1 (fr) | Procédé, système et dispositif d'enregistrement de page web, et support de stockage informatique | |
| WO2018035929A1 (fr) | Procédé et appareil de traitement de code de vérification | |
| EP3097743A1 (fr) | Dispositif électronique de commande d'un dispositif externe à l'aide d'un numéro et procédé associé | |
| WO2012022215A1 (fr) | Procédé, dispositif et système d'interaction permettant un message interactif sur internet | |
| WO2018053904A1 (fr) | Procédé et terminal de traitement d'informations | |
| WO2021056833A1 (fr) | Procédé et dispositif de protection d'informations privées pour contact privé, et support de stockage lisible | |
| WO2018079999A1 (fr) | Dispositif électronique et son procédé d'exploitation | |
| WO2018135800A1 (fr) | Appareil électronique, procédé de commande dudit appareil et support d'enregistrement | |
| WO2019093743A1 (fr) | Dispositif électronique et procédé de commande associé |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (=EPO FORM 1205A DATED 22.12.2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18909485 Country of ref document: EP Kind code of ref document: A1 |