CN113961125A - Image sharing method, device, terminal device and storage medium - Google Patents
Image sharing method, device, terminal device and storage medium Download PDFInfo
- Publication number
- CN113961125A CN113961125A CN202111225610.8A CN202111225610A CN113961125A CN 113961125 A CN113961125 A CN 113961125A CN 202111225610 A CN202111225610 A CN 202111225610A CN 113961125 A CN113961125 A CN 113961125A
- Authority
- CN
- China
- Prior art keywords
- image
- sharing
- information
- environment
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04845—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses an image sharing method and device, terminal equipment and a storage medium. The image sharing method comprises the following steps executed by a server: receiving a first encrypted image and sharing environment information sent by terminal equipment; decrypting the first encrypted image to obtain a first image; verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information; if the sharing environment of the first image meets the safety condition, performing watermarking processing on the first image to obtain a second image; and encrypting the second image to obtain a second encrypted image, and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image. The image sharing method can effectively improve the image sharing efficiency.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to an image sharing method and apparatus, a terminal device, and a storage medium.
Background
With the complexity of the application program interface becoming higher and higher, when sharing information related to the application program, a user often shares the information screenshot on the application program interface to other devices. However, such operations are somewhat of a safety concern, for example, some sensitive information related to personal privacy may cause loss to users and companies if directly transmitted. At present, in order to prevent information leakage on an application program interface, some application programs forbid a screenshot function, and although this practice prevents potential safety hazards of image sharing to a certain extent, image sharing operation is limited when a user really has a sharing demand. Many limitations result in inefficient image sharing.
Disclosure of Invention
In view of this, embodiments of the present application provide an image sharing method, an image sharing apparatus, a terminal device, and a storage medium, so as to solve the problem that the current image sharing efficiency is too low.
In a first aspect, an embodiment of the present application provides an image sharing method, where the method includes the following steps performed by a server:
receiving a first encrypted image and sharing environment information sent by terminal equipment;
decrypting the first encrypted image to obtain a first image;
verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information;
if the sharing environment of the first image meets the safety condition, performing watermarking processing on the first image to obtain a second image;
and encrypting the second image to obtain a second encrypted image, and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image.
As to the above-mentioned aspect and any possible implementation manner, there is further provided an implementation manner, where the sharing environment information includes network environment information, user sensitive information, and page type information, and the verifying whether the sharing environment of the first image meets a security condition according to the sharing environment information includes:
determining whether the sharing environment of the first image meets network security conditions or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
The above aspect and any possible implementation manner further provide an implementation manner, where after the watermarking is performed on the first image to obtain a second image if the sharing environment of the first image meets a security condition, the method further includes:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not meet the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In a second aspect, an embodiment of the present application provides an image sharing method, where the method includes the following steps that are executed by a terminal device:
acquiring an image generation instruction, wherein the image generation instruction comprises a generation type identifier;
generating a first image according to the generation type identifier and encrypting the first image to obtain a first encrypted image;
acquiring sharing environment information;
sending the first encrypted image and the sharing environment information to a server;
receiving a second encrypted image sent by the server and decrypting the second encrypted image to obtain a second image based on the first encrypted image and the sharing environment information;
determining an image sharing mode according to the generation type identifier;
and sending the second image to the target equipment according to the image sharing mode.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the generating a type identifier includes a screenshot identifier and a sharing control identifier, and the generating a first image according to the generating a type identifier includes:
when the generation type identification is the screenshot identification, intercepting a current page according to the screenshot identification to generate an intercepted image;
generating the first image according to a cutting instruction input by a user;
and when the generation type identifier is the sharing control identifier, generating the first image according to the sharing control identifier.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the image sharing manner includes a screenshot sharing manner and a sharing control sharing manner, and the sending the second image to the target device according to the image sharing manner includes:
if the image sharing mode is the screenshot sharing mode, the second image is displayed in a sharing window in a thumbnail mode, and the second image is sent to the target device after a sharing confirmation instruction input by a user is obtained;
if the image sharing mode is the sharing control sharing mode, sending the second image to the target device, or displaying the second image in a preview interface, and sending the second image to the target device after acquiring the sharing confirmation instruction input by the user, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In a third aspect, an embodiment of the present application provides an image sharing apparatus, including:
the first receiving module is used for receiving a first encrypted image and sharing environment information sent by the terminal equipment;
the first obtaining module is used for decrypting the first encrypted image to obtain a first image;
the verification module is used for verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information;
the second acquisition module is used for carrying out watermarking processing on the first image to obtain a second image when the sharing environment of the first image meets the safety condition;
the first sending module is used for encrypting the second image to obtain a second encrypted image and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image.
Further, the sharing environment information includes network environment information, user sensitive information and page type information.
Further, the verification module is specifically configured to:
determining whether the sharing environment of the first image meets network security conditions or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
Further, the image sharing apparatus is further specifically configured to:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not meet the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In a fourth aspect, an embodiment of the present application further provides another image sharing apparatus, including:
the third acquisition module is used for acquiring an image generation instruction, wherein the image generation instruction comprises a generation type identifier;
the fourth obtaining module is used for generating a first image according to the generation type identifier and encrypting the first image to obtain a first encrypted image;
the fifth acquisition module is used for acquiring the sharing environment information;
the second sending module is used for sending the first encrypted image and the sharing environment information to a server;
the second receiving module is used for receiving a second encrypted image sent by the server and decrypting the second encrypted image to obtain a second image based on the first encrypted image and the sharing environment information;
the determining module is used for determining an image sharing mode according to the generation type identifier;
and the third sending module is used for sending the second image to the target equipment according to the image sharing mode.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
Further, the fourth obtaining module is specifically configured to:
when the generation type identification is the screenshot identification, intercepting a current page according to the screenshot identification to generate an intercepted image;
generating the first image according to a cutting instruction input by a user;
and when the generation type identifier is the sharing control identifier, generating the first image according to the sharing control identifier.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
Further, the third sending module is specifically configured to:
if the image sharing mode is the screenshot sharing mode, the second image is displayed in a sharing window in a thumbnail mode, and the second image is sent to the target device after a sharing confirmation instruction input by a user is obtained;
if the image sharing mode is the sharing control sharing mode, sending the second image to the target device, or displaying the second image in a preview interface, and sending the second image to the target device after acquiring the sharing confirmation instruction input by the user, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, where the processor executes the computer readable instructions to perform the steps of the image sharing method according to the first aspect, or executes the computer readable instructions to perform the steps of the image sharing method according to the second aspect.
In a sixth aspect, the present application provides a computer-readable storage medium, which stores computer-readable instructions, when executed by a processor, implement the steps of the image sharing method according to the first aspect, or implement the steps of the image sharing method according to the second aspect when executed by the processor.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of an image sharing method according to an embodiment of the present disclosure;
fig. 2 is a schematic block diagram of an image sharing apparatus 1 according to an embodiment of the present disclosure;
fig. 3 is a schematic block diagram of an image sharing apparatus 2 according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a terminal device in an embodiment of the present application.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely a field that describes the same of an associated object, meaning that three relationships may exist, e.g., A and/or B, may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, third, etc. may be used to describe preset ranges, etc. in the embodiments of the present application, these preset ranges should not be limited to these terms. These terms are only used to distinguish preset ranges from each other. For example, the first preset range may also be referred to as a second preset range, and similarly, the second preset range may also be referred to as the first preset range, without departing from the scope of the embodiments of the present application.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
Fig. 1 is a flowchart of an image sharing method according to an embodiment of the present disclosure. The image sharing method can be realized in terminal equipment and a server, and is applied to a scene that a user initiates image sharing by adopting the terminal equipment, in particular to a scene that a mobile terminal application program is related to page image sharing. As shown in fig. 1, the image sharing method includes the following steps:
s100: the terminal equipment acquires an image generation instruction, wherein the image generation instruction comprises a generation type identifier.
The image generation instruction is an instruction for generating a first image.
The generation type identifier is an identifier that uniquely identifies the type of the first image. Note that the concept corresponding to the first image is a second image. The first image and the second image are mainly used to distinguish between images processed at different execution subject stages. If the image initially generated at the terminal device is the first image, the image obtained after the server watermarking is the second image.
In an embodiment, when a user uses an application (APP for short) on a smart phone, if an image related to a current application page needs to be shared, an image generation instruction may be triggered by a manner of clicking a control related to image acquisition, a manner of voice input control, and the like, so that a terminal device may acquire the image generation instruction according to an input of the user. It is to be understood that the first image may be generated in various ways, and the image generation instruction may be determined according to the generation type identifier.
S110: and the terminal equipment generates a first image according to the generation type identifier and encrypts the first image to obtain a first encrypted image.
It will be appreciated that different generation types identify the manner in which the first image is generated. In the embodiment of the application, a generation mode for generating the first image is determined according to the generation type identifier, and the first image is generated according to the generation mode. The object to which the first image is to be sent is a server, and in order to enhance the security of the first image in the transmission process, the first image can be encrypted in a preset encryption mode to obtain a first encrypted image. The preset encryption mode can be an encryption mode appointed with the server, and the server can decrypt the first image which is sent after the terminal equipment is encrypted by adopting a decryption function corresponding to the encryption function. The encryption method is not limited in this embodiment, and may be implemented by an encryption method such as asymmetric encryption.
S120: and the terminal equipment acquires the sharing environment information.
The sharing environment information refers to information capable of reflecting the security condition of the sharing environment of the terminal device, and specifically may include the security condition of the sharing environment influenced by the outside, such as the security condition of a network; the security conditions of the sharing environment, which are influenced by the inside, can also be included, such as the security condition of the terminal device, the security limit of the application program, and the like. In an embodiment, the terminal device obtains the sharing environment information, and can further determine whether the image obtained by the current terminal device can meet the sharing safety requirement according to the sharing environment information, so that the image sharing safety and flexibility can be improved, and the limitation that some application programs can only forbid image sharing by one operation is effectively avoided.
S130: and the terminal equipment sends the first encrypted image and the sharing environment information to the server.
S140: the server receives the first encrypted image and the sharing environment information sent by the terminal device.
In one embodiment, the server may determine whether to further process the first encrypted image using the received shared environment information. If the sharing environment information indicates that the current sharing environment is not suitable for sharing the image, the first encrypted image is not further processed, a message of refusing processing is returned to the terminal equipment, and prompt information such as 'the system detects that the current image sharing environment has risks and please try again in a safe environment' is displayed on an interface of the terminal equipment. In this way, redundant operations between the terminal device and the server can be reduced in the case where there is a risk in the image sharing environment.
S150: the server decrypts the first encrypted image to obtain a first image.
In an embodiment, the server may decrypt the first encrypted image using a decryption method corresponding to the encryption method used by the terminal device, to obtain the first image initially generated at the terminal device. It should be noted that, the execution sequence of the step may be arranged after step S160, and when the sharing environment of the first image meets the security condition, the server decrypts the first encrypted image to obtain the first image.
S160: and the server verifies whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information.
In an embodiment, the server may preset a check table for checking the sharing environment information. The check table stores the mapping relation between the check items and the check parameters, and can be used for checking whether the sharing environment of the first image meets the safety condition or not. It can be understood that the shared environment information may include event types of the internally influenced shared environment information or the externally influenced shared environment information, and different event types of the shared environment information may correspond to verification events in the verification table, and then, the verification parameter is determined through the mapping relationship, and after the shared environment information is verified with the verification parameter, it is determined whether the shared environment of the first image meets the security condition.
S170: and if the sharing environment of the first image meets the safety condition, the server carries out watermarking processing on the first image to obtain a second image.
In an embodiment, when the sharing environment of the first image meets the security condition, it is stated that the server considers that the terminal device is allowed to send the first image in the current environment, and at this time, the server may perform watermarking on the first image to obtain the second image. The watermark in the second image may be information that can be used for tracing, such as the job number of the user, the mobile phone number of the user, and the like. According to the embodiment, the first image meeting the safety condition is subjected to watermarking, so that the traceability can be provided, and the safety of picture sharing is further improved.
S180: the server encrypts the second image to obtain a second encrypted image, and sends the second encrypted image to the terminal device.
In one embodiment, whether the terminal device sends the first image to the server or the server sends the second image to the server, the sent image may be encrypted. Specifically, the encryption mode used by the server and the decryption mode used by the terminal device are also predetermined, and the encryption mode used by the server and the encryption mode used by the terminal device may be the same or different, and are not limited herein.
S190: and the terminal equipment receives the second encrypted image sent by the server and decrypts the second encrypted image to obtain a second image.
It is understood that the second image obtained by the terminal device is the image watermarked by the server, so that the terminal device is prevented from directly sending the first image. In addition, in the whole image processing process, the mobile terminal does not store the first image locally all the time, so that the user can be prevented from changing or sharing the first image randomly, and the image sharing safety can be improved.
S200: and the terminal equipment determines an image sharing mode according to the generation type identifier.
In one embodiment, the image sharing mode is determined by the generation type identifier. The mode of the first image generation determines an image sharing mode adopted by the terminal device, different sharing strategies can be selected according to different image sharing modes, and a user can safely and quickly finish image sharing under image sharing scenes with different requirements.
S210: and the terminal equipment sends the second image to the target equipment according to the image sharing mode.
The target device is a device to which the user wants to send the second image, and may be a mobile terminal used by another user. In an embodiment, in a face-to-face transmission scene, a user can directly send a second image to a target device through a communication channel established face-to-face by using a terminal device according to an image sharing mode; in a long-distance transmission scene, a user can firstly send a second image to the server by adopting the terminal equipment according to an image sharing mode, and then forwards the second image to the target equipment through the server.
In steps S100 to S210, the server side is used to complete verification of the sharing environment information of the image, and whether the sharing of the image meets the security condition can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can quickly finish image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
The screenshot identification is used for identifying screenshot operation. The sharing control identification is an identification for identifying the image sharing operation.
In an embodiment, a user can share an image by adopting a screenshot sharing mode or a direct sharing mode through a mobile terminal. Specifically, the user can trigger the screenshot identifier and the sharing control identifier by clicking the screenshot control or the sharing control on the page of the mobile terminal. The screenshot sharing method includes the steps of capturing a current page image and then completing image sharing, directly sharing the current page image from the perspective of a user, and directly sending the current page image to a target device after the user clicks a sharing control.
Further, in step S110, that is, in the terminal device generates the first image according to the generation type identifier, the method specifically includes the following steps:
s1101: and when the generated type identifier is the screenshot identifier, the terminal equipment intercepts the current page according to the screenshot identifier and generates an intercepted image.
The image is obtained by capturing the current page.
In an embodiment, the mobile terminal intercepts the current page according to the screenshot identifier, and stores the intercepted image in dot-matrix formats such as a preset image exchange Format (GIF), a Portable Network Graphics Format (PNG), a JPEG Format (Joint Photographic Experts Group), and the like, wherein the storage is a short-time storage, and the storage does not support other operations except for the operations of sending the intercepted image to a server and deleting the intercepted image after encryption.
S1102: the terminal equipment generates a first image according to a cutting instruction input by a user.
Wherein the cropping instruction is an instruction for cropping an image. In the embodiment of the application, after the mobile terminal completes screenshot operation, a user can trigger a cutting instruction by clicking a control related to screenshot, and cutting can be performed on the basis of the screenshot to obtain the first image.
S1103: and when the generated type identifier is the sharing control identifier, the terminal equipment generates a first image according to the sharing control identifier.
In an embodiment, the mobile terminal can intercept the current page according to the sharing control identifier and directly generate the first image. It can be understood that if the user directly clicks the sharing control, the user may think that the user wants to directly perform image sharing, and directly intercepts the current page as the first image.
In S1101-S1103, a specific embodiment is provided, where the screenshot identifier and the sharing control identifier are respectively used for generating a first image, and a user may trigger the mobile terminal to obtain the screenshot identifier or the sharing control identifier according to an actual sharing requirement, and obtain the first image after an image generation process of different identifiers, so that the user can quickly complete image sharing in an image sharing scene with different requirements.
Further, the shared environment information includes network environment information, user sensitive information and page type information.
In an embodiment, the network environment information may specifically include information such as a Wi-Fi environment and a shared network environment where the mobile terminal is located when the image is shared. The user sensitive information may specifically be information such as preset sensitive words and graphics, and the user sensitive information may appear on the application page. The page type information may be type information preset by the application program according to the page security level, for example, some application program pages are considered to have high security level requirements in the development process, and the page type information may be set as an un-sharable page type. In the embodiment of the application, various sharing environment information is integrated during image sharing, and whether current image sharing is safe or not is confirmed according to the sharing environment information.
Further, in step S160, namely, in verifying whether the sharing environment of the first image meets the security condition according to the sharing environment information, the method specifically includes the following steps:
s1601: the server determines whether the sharing environment of the first image meets the network security condition or not according to the network environment information.
In an embodiment, first, whether the first image meets the security requirement in the network security level (corresponding to the verification item) is determined according to the network environment where the mobile terminal is located during image sharing. Specifically, the server may determine, according to a preset network security determination condition (corresponding verification parameter), whether the network environment where the mobile terminal is located is secure when the image is shared, according to a Wi-Fi network, a shared network, and the like to which the mobile terminal is connected. In this way, the security of the image sharing process can be improved.
S1602: if the sharing environment of the first image meets the network security condition, the server determines whether the sharing environment of the first image meets the page security condition or not according to the page type information.
In an embodiment, after the network environment where the mobile terminal is located during image sharing is determined to be safe, whether the page of the current screenshot of the mobile terminal belongs to a page with strong confidentiality or not can be judged according to the page type information. Specifically, the mobile terminal may define the confidentiality requirement of each page in the application program through the page type information during the development stage or after the mobile terminal is online. For example, in the page A, B, C, the requirement on security of the page a and the page B is not high, and the page type information of the page a and the page B corresponds to a sharing-allowed page type; and if the page C has higher requirement on confidentiality, the page type information of the page C is corresponding to an unshared type. According to the page type information, whether the sharing environment of the first image meets the page safety condition or not can be determined.
S1603: if the sharing environment of the first image meets the page safety condition, the server determines whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information.
In an embodiment, after determining that the security requirement of a page corresponding to a first image is not high when the mobile terminal shares an image, it may be determined whether a sharing environment of the first image meets a user information security condition according to whether the first image has user sensitive information. Specifically, the user sensitive information is contained in the first image, and the server can identify the first image by adopting a character recognition model or an image recognition model and determine whether the first image meets the user information safety condition.
S1604: if the sharing environment of the first image meets the user information safety condition, the server determines that the sharing environment of the first image meets the safety condition.
In an embodiment, when the sharing environment of the first image meets the network security condition, the page security condition, and the user information security condition, that is, it is determined that the sharing environment of the first image meets the security condition, the first image may be allowed to be shared to other computer devices.
In steps S1601 to S1604, according to the network environment information, the user sensitive information, and the page type information, from a plurality of security dimensions, whether the sharing environment of the first image meets the network security condition is comprehensively considered, so that the security of image sharing can be further improved.
Further, after step S170, that is, after the first image is watermarked to obtain the second image if the sharing environment of the first image meets the security condition, the image sharing method further includes the following steps:
s1701: and if the sharing environment of the first image does not accord with the safety condition, the server determines a judgment node which does not accord with the safety condition.
In an embodiment, when the sharing environment of the first image does not meet the security condition, the determination node of the security condition may be analyzed to determine at which stage the condition that does not meet the security condition occurs.
S1702: and if the judgment node which does not accord with the safety condition is the user information safety condition, the server sends a sensitive information shielding request to the mobile terminal.
In an embodiment, if a situation that the security condition is not met occurs at the stage of the user information environment judgment, the application allows to make a compromise to the situation so as to complete the image sharing as much as possible. Specifically, the server may send a sensitive information blocking request to the mobile terminal. The sensitive information shielding request can request to shield the sensitive information in the first image to achieve the desensitization effect, so that the problem that the user information security condition does not pass does not exist on the first image. The image sharing can be completed to the maximum extent on the premise of ensuring the safe image sharing.
S1703: based on the sensitive information shielding request, the server acquires the shielding confirmation information sent by the mobile terminal, and determines the sensitive information on the first image according to the shielding confirmation information.
S1704: the server determines the processing coordinates based on the sensitive information.
The processing coordinate refers to the coordinate of the corresponding pixel of the sensitive information on the first image.
In an embodiment, if the mobile terminal agrees to mask the sensitive information on the first image, the server may lock the sensitive information in a coordinate manner to mask the sensitive information according to the processing coordinates.
S1705: and the server shields the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In an embodiment, the server may perform desensitization operations such as mosaic and doodling to cover sensitive information on the first image, so that the desensitized first image satisfies security conditions for image sharing.
In steps 1701-1705, an embodiment is provided in which image sharing can be completed even if the user information security condition is not satisfied. After the sensitive information on the first image is shielded, the mobile terminal can still finish image sharing, so that the image sharing can be finished to the maximum extent on the premise of ensuring the safe image sharing.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
In an embodiment, the image sharing manner may specifically include a screenshot sharing manner and a sharing control sharing manner, corresponding to the screenshot identifier and the sharing control identifier.
Further, in step S210, sending a second image to the target device according to the image sharing manner includes the following steps:
s2101: and if the image sharing mode is the screenshot sharing mode, displaying the second image in a sharing window in a thumbnail mode, and after acquiring a sharing confirmation instruction input by the user, sending the second image to the target equipment by the mobile terminal.
In an embodiment, when a user screenshot is shared, a sharing window may be displayed on an interface of the mobile terminal, and the size of the sharing window may be about one fourth of the size of the interface. The sharing window is used for displaying a thumbnail of the second image. In this way, the user can simply preview the second image to be sent on the current page and send it to the target device after the user confirms it.
S2102: if the image sharing mode is the sharing control sharing mode, the mobile terminal sends the second image to the target device, or displays the second image in the preview interface, and after a sharing confirmation instruction input by the user is obtained, the mobile terminal sends the second image to the target device, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In an embodiment, when the image sharing mode is the sharing control sharing mode, one mode is to directly send the second image to the target device. In another mode, a preview interface may be displayed on the mobile terminal, and the second image may be sent to the target device after the user confirms the preview interface. The preview interface is an independent interface, the size of the displayed second image is larger than that of the second image displayed in the thumbnail in the sharing window, and before the user sends the second image, the user can acquire more information related to the second image through the preview interface, so that the user can be helped to accurately send the second image.
In steps S2101-S2102, a specific implementation of sending the second image to the target device according to the image sharing mode is provided, and the user may confirm the second image before sending the second image through the sharing window or the preview interface, so as to help the user accurately send the second image.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Further, in the embodiment of the application, a user can trigger the mobile terminal to acquire the screenshot identifier or the sharing control identifier according to actual sharing requirements, and obtain the first image after the image generation process of different identifiers, so that the user can quickly finish image sharing in image sharing scenes of different requirements.
Furthermore, according to the network environment information, the user sensitive information and the page type information, whether the sharing environment of the first image meets the network security condition or not is comprehensively considered from multiple security dimensions, and the security of image sharing can be further improved.
Furthermore, in the embodiment of the application, after the sensitive information on the first image is shielded, the mobile terminal can still complete image sharing, so that the image sharing can be completed to the maximum extent on the premise of ensuring the safe image sharing.
Furthermore, in the embodiment of the application, the user can confirm the second image before sending out the second image through the sharing window or the preview interface, so that the user can be helped to accurately send out the second image.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 2 is a schematic block diagram of an image sharing apparatus 1 according to an embodiment of the present disclosure. As shown in fig. 2, the image sharing apparatus 1 includes a first receiving module 10, a first obtaining module 20, a verifying module 30, a second obtaining module 40, and a first sending module 50. The implementation functions of the first receiving module 10, the first obtaining module 20, the verifying module 30, the second obtaining module 40, and the first sending module 50 correspond to the steps of the image sharing method executed by the server one to one, and for avoiding redundancy, detailed description is not needed in this embodiment.
Further, the shared environment information includes network environment information, user sensitive information and page type information.
Further, the verification module 30 is specifically configured to:
determining whether the sharing environment of the first image meets the network security condition or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
Further, the image sharing apparatus is further specifically configured to:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not accord with the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
Fig. 3 is a schematic block diagram of an image sharing apparatus 2 according to an embodiment of the present disclosure. As shown in fig. 3, the image sharing apparatus 2 includes a third obtaining module 60, a fourth obtaining module 70, a fifth obtaining module 80, a second sending module 90, a second receiving module 100, a determining module 110, and a third sending module 120. The implementation functions of the third obtaining module 60, the fourth obtaining module 70, the fifth obtaining module 80, the second sending module 90, the second receiving module 100, the determining module 110, and the third sending module 120 correspond to the steps corresponding to the image sharing method executed by the terminal device, and in order to avoid redundancy, detailed description is not needed in this embodiment.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
Further, the fourth obtaining module 70 is specifically configured to:
when the generated type identifier is a screenshot identifier, intercepting the current page according to the screenshot identifier to generate an intercepted image;
generating a first image according to a cutting instruction input by a user;
and when the generation type identifier is a sharing control identifier, generating a first image according to the sharing control identifier.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
Further, the third sending module 120 is specifically configured to:
if the image sharing mode is the screenshot sharing mode, displaying the second image in a sharing window in a thumbnail mode, and sending the second image to the target equipment after acquiring a sharing confirmation instruction input by a user;
and if the image sharing mode is the sharing control sharing mode, sending the second image to the target equipment, or displaying the second image in a preview interface, and sending the second image to the target equipment after acquiring a sharing confirmation instruction input by a user, wherein the size of the second image displayed in the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Fig. 4 is a schematic diagram of a terminal device in an embodiment of the present application.
As shown in fig. 4, terminal device 130 includes a processor 131, a memory 132, and computer readable instructions 133 stored in memory 132 and executable on processor 131. The processor 131, when executing the computer readable instructions 133, implements the steps of the image sharing method performed by the server. Alternatively, the processor 131, when executing the computer readable instructions 133, implements the functions of the modules/units of the image sharing apparatus 1; alternatively, the processor 131, when executing the computer readable instructions 133, implements the steps of the image sharing method performed by the terminal device. Alternatively, the processor 131, when executing the computer readable instructions 133, implements the functions of the modules/units of the image sharing apparatus 2.
Illustratively, the computer readable instructions 133 may be divided into one or more modules/units, which are stored in the memory 132 and executed by the processor 131 to accomplish the present application. One or more modules/units may be a series of computer-readable instruction segments capable of performing certain functions, which are used to describe the execution of computer-readable instructions 133 in terminal device 130.
The terminal device 130 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 131, a memory 132. Those skilled in the art will appreciate that fig. 4 is merely an example of the terminal device 130 and does not constitute a limitation of the terminal device 130 and may include more or less components than those shown, or combine certain components, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 131 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 132 may be an internal storage unit of the terminal device 130, such as a hard disk or a memory of the terminal device 130. The memory 132 may also be an external storage device of the terminal device 130, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal device 130. Further, the memory 132 may also include both an internal storage unit of the terminal device 130 and an external storage device. The memory 132 is used to store computer readable instructions and other programs and data required by the terminal device. The memory 132 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
In the embodiment of the application, the server may be an independent server, or may be a cloud server that provides basic cloud computing services such as cloud service, a cloud database, cloud computing, cloud functions, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, Content Delivery Network (CDN), big data, an artificial intelligence platform, and the like.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by the present application, and can also be realized by hardware related to computer readable instructions, which can be stored in a computer readable storage medium, and when the computer readable instructions are executed by a processor, the steps of the above described method embodiments can be realized. Wherein the computer readable instructions comprise computer readable instruction code which may be in source code form, object code form, an executable file or some intermediate form, and the like. The computer-readable medium may include: any entity or device capable of carrying the computer-readable instruction code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The present application also provides a computer readable storage medium storing computer readable instructions which, when executed by a processor, implement an image sharing method performed by a server, or which, when executed by a processor, implement an image sharing method performed by a client.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111225610.8A CN113961125A (en) | 2021-10-21 | 2021-10-21 | Image sharing method, device, terminal device and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202111225610.8A CN113961125A (en) | 2021-10-21 | 2021-10-21 | Image sharing method, device, terminal device and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN113961125A true CN113961125A (en) | 2022-01-21 |
Family
ID=79465789
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202111225610.8A Pending CN113961125A (en) | 2021-10-21 | 2021-10-21 | Image sharing method, device, terminal device and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113961125A (en) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050277405A1 (en) * | 2004-06-09 | 2005-12-15 | Fuji Photo Film Co., Ltd. | Server, mobile terminal, and service method |
| KR101427733B1 (en) * | 2013-04-24 | 2014-08-07 | 주식회사 리턴트루 | Device and method for authenticating server |
| CN111259407A (en) * | 2018-12-03 | 2020-06-09 | 珠海格力电器股份有限公司 | Picture processing method and device, storage medium and terminal |
| CN111460398A (en) * | 2020-03-16 | 2020-07-28 | 南京南瑞继保电气有限公司 | Watermark adding method, device, equipment and storage medium |
| CN111797430A (en) * | 2020-06-30 | 2020-10-20 | 平安国际智慧城市科技股份有限公司 | Data verification method, device, server and storage medium |
| CN112351093A (en) * | 2020-10-30 | 2021-02-09 | 深圳Tcl新技术有限公司 | Screenshot image sharing method, device and equipment and computer readable storage medium |
| CN113326462A (en) * | 2021-06-29 | 2021-08-31 | 平安普惠企业管理有限公司 | H5 page watermarking method, server, computer equipment and storage medium |
-
2021
- 2021-10-21 CN CN202111225610.8A patent/CN113961125A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050277405A1 (en) * | 2004-06-09 | 2005-12-15 | Fuji Photo Film Co., Ltd. | Server, mobile terminal, and service method |
| KR101427733B1 (en) * | 2013-04-24 | 2014-08-07 | 주식회사 리턴트루 | Device and method for authenticating server |
| CN111259407A (en) * | 2018-12-03 | 2020-06-09 | 珠海格力电器股份有限公司 | Picture processing method and device, storage medium and terminal |
| CN111460398A (en) * | 2020-03-16 | 2020-07-28 | 南京南瑞继保电气有限公司 | Watermark adding method, device, equipment and storage medium |
| CN111797430A (en) * | 2020-06-30 | 2020-10-20 | 平安国际智慧城市科技股份有限公司 | Data verification method, device, server and storage medium |
| CN112351093A (en) * | 2020-10-30 | 2021-02-09 | 深圳Tcl新技术有限公司 | Screenshot image sharing method, device and equipment and computer readable storage medium |
| CN113326462A (en) * | 2021-06-29 | 2021-08-31 | 平安普惠企业管理有限公司 | H5 page watermarking method, server, computer equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113806806B (en) | Desensitization and restoration method and system for webpage screenshot | |
| US10504289B2 (en) | Method and apparatus for securely displaying private information using an augmented reality headset | |
| EP3474211A1 (en) | Offline payment method and device | |
| US20160267290A1 (en) | Information viewing method, device, system and storage medium | |
| US11962600B2 (en) | Apparatus and methods for secure, distributed, augmented-reality (AR) communication systems | |
| WO2016169437A1 (en) | Verification picture generation method and device, and server | |
| US12165134B2 (en) | Location based wallets | |
| WO2020233223A1 (en) | Payment method, apparatus and system, device, and storage medium | |
| CN114386059A (en) | Web page text obfuscation and anti-crawling method, device, electronic device and storage medium | |
| CN113051542A (en) | Two-dimensional code processing method and equipment | |
| US12198175B2 (en) | Object comparison method, and device | |
| CN111181831A (en) | Communication data processing method and device, storage medium and electronic device | |
| CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
| CN114239026A (en) | Information desensitization conversion processing method, device, computer equipment and storage medium | |
| WO2017000340A1 (en) | Encryption method and apparatus | |
| CN111343130A (en) | A privacy protection method, device and device | |
| CN107483314B (en) | A kind of information processing method and system, terminal device | |
| CN113961125A (en) | Image sharing method, device, terminal device and storage medium | |
| CN118247093B (en) | Will evidence control method, device, equipment, storage medium and product | |
| CN113506090A (en) | Audit data processing method and device, storage medium and electronic equipment | |
| CN112687363A (en) | Health code public service method and platform | |
| CN109636922B (en) | Method and device for presenting augmented reality content | |
| CN116132185B (en) | Data calling method, system, device, equipment and medium | |
| CN115499845B (en) | NFC-based identity recognition method and device | |
| CN105468988A (en) | Data protection method and device during connection of terminal and PC (Personal Computer) |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20220121 |