Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal information tracing method and device, terminal and medium

A terminal information and terminal technology, applied in the computer field, can solve the problems of weak security protection capability of confidential information and inability to determine information stealer information, etc., to achieve the effects of improving security protection capability, simple and convenient implementation process, and high generation efficiency

Inactive Publication Date: 2019-08-09
软通智慧科技有限公司
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the scheme to prevent the leakage of confidential information is mainly implemented by encrypting files or managing the access rights of files. Once the password is leaked or the access rights are cracked, or insiders use the camera function of mobile terminals to steal confidential information , after the confidential information is lost, it is impossible to determine the information of the information stealer, resulting in a weak security protection capability for the confidential information on the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal information tracing method and device, terminal and medium
  • Terminal information tracing method and device, terminal and medium
  • Terminal information tracing method and device, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of the terminal information traceability method provided by Embodiment 1 of the present invention. This embodiment is applicable when someone uses a camera to capture the terminal screen to steal confidential information on the terminal. By analyzing the information image captured by the user, In the case of obtaining a blind watermark to trace the source of information leaked on the terminal, the method can be executed by a terminal information traceability device, which can be implemented in the form of software and / or hardware, and can be integrated on the terminal.

[0027] Such as figure 1 As shown, the terminal information traceability method provided in this embodiment may include:

[0028] S110. Acquire identification information of the terminal.

[0029] In this embodiment, before generating the blind watermark, there is no specific limitation on the acquisition timing of the terminal identification information. For example, the a...

Embodiment 2

[0048] image 3 It is a flow chart of the terminal information traceability method provided in Embodiment 2 of the present invention, and this embodiment is further optimized on the basis of the foregoing embodiments. Such as image 3 As shown, the method may include:

[0049] S210. Acquire identification information of the terminal.

[0050] S220. Acquire the target image captured by the terminal camera in real time, and use the image recognition technology to identify the human body posture on the target image.

[0051] S230. If recognizing the posture of the human body is a photographing action, extract pixels of the target image, and rearrange the order of the pixels of the target image according to a preset sorting rule.

[0052] For example, using the set key to rearrange the pixel order of the target image according to the corresponding relationship between the key and the pixel arrangement rules is equivalent to improving the confidentiality of the blind watermark i...

Embodiment 3

[0065] Figure 4 It is a schematic structural diagram of the terminal information traceability device provided by Embodiment 3 of the present invention. This embodiment is applicable when someone uses a camera to capture the terminal screen to steal confidential information on the terminal. By analyzing the information image captured by the user, Get the blind watermark, so as to trace the source of the information leaked on the terminal. The device can be implemented in the form of software and / or hardware, and can be integrated on the terminal.

[0066] Such as Figure 4 As shown, the terminal information traceability device provided in this embodiment may include a terminal identification information acquisition module 310, a target image acquisition module 320, and a blind watermark generation and display module 330, wherein:

[0067] Terminal identification information acquisition module 310, configured to acquire identification information of the terminal;

[0068] Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a terminal information tracing method and device, a terminal and a medium, wherein the method comprises the steps of obtaining the identification informationof the terminal; acquiring a target image shot by a terminal camera in real time, and identifying a human body posture on the target image by utilizing an image identification technology; and if it isidentified that the human body posture belongs to the photographing behavior, encoding the target image and the identification information to generate a blind watermark, and displaying the blind watermark on a terminal screen, so that the information leaked by the terminal is traced based on the blind watermark on the terminal screen. According to the embodiment of the invention, the informationleaked by the terminal can be effectively traced based on the blind watermark displayed on the terminal screen; the safety protection capability of the information on the terminal can be improved, theimplementation process of the technical scheme is simple and convenient, the generation of the blind watermark does not need to depend on other external devices, the generation efficiency is higher,and the operation efficiency of the terminal cannot be affected.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a terminal information traceability method, device, terminal and medium. Background technique [0002] With the rapid development of computer technology, it is very common to use computers for data storage and sharing. For example, governments, militaries, corporations, financial institutions, hospitals, and private businesses accumulate vast amounts of confidential information about their employees, customers, products, research, and financial data, the vast majority of which is collected, generated, and stored in within the computer and transmitted to other computers via the network. Ensuring the security of confidential information within computers is a business imperative as well as an ethical and legal imperative. [0003] At present, the scheme to prevent the leakage of confidential information is mainly implemented by encrypting files or m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N5/232H04N5/913G06K9/00G06T1/00G06T5/10
CPCH04N5/913G06T1/0021G06T5/10H04N2005/91335G06T2207/20056G06T2207/30196G06V40/23H04N23/80
Inventor 鲍永伟王虹超
Owner 软通智慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products