[go: up one dir, main page]

CN113961125A - Image sharing method, device, terminal device and storage medium - Google Patents

Image sharing method, device, terminal device and storage medium Download PDF

Info

Publication number
CN113961125A
CN113961125A CN202111225610.8A CN202111225610A CN113961125A CN 113961125 A CN113961125 A CN 113961125A CN 202111225610 A CN202111225610 A CN 202111225610A CN 113961125 A CN113961125 A CN 113961125A
Authority
CN
China
Prior art keywords
image
sharing
information
environment
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111225610.8A
Other languages
Chinese (zh)
Inventor
陈优优
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN202111225610.8A priority Critical patent/CN113961125A/en
Publication of CN113961125A publication Critical patent/CN113961125A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04845Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses an image sharing method and device, terminal equipment and a storage medium. The image sharing method comprises the following steps executed by a server: receiving a first encrypted image and sharing environment information sent by terminal equipment; decrypting the first encrypted image to obtain a first image; verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information; if the sharing environment of the first image meets the safety condition, performing watermarking processing on the first image to obtain a second image; and encrypting the second image to obtain a second encrypted image, and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image. The image sharing method can effectively improve the image sharing efficiency.

Description

Image sharing method and device, terminal equipment and storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to an image sharing method and apparatus, a terminal device, and a storage medium.
Background
With the complexity of the application program interface becoming higher and higher, when sharing information related to the application program, a user often shares the information screenshot on the application program interface to other devices. However, such operations are somewhat of a safety concern, for example, some sensitive information related to personal privacy may cause loss to users and companies if directly transmitted. At present, in order to prevent information leakage on an application program interface, some application programs forbid a screenshot function, and although this practice prevents potential safety hazards of image sharing to a certain extent, image sharing operation is limited when a user really has a sharing demand. Many limitations result in inefficient image sharing.
Disclosure of Invention
In view of this, embodiments of the present application provide an image sharing method, an image sharing apparatus, a terminal device, and a storage medium, so as to solve the problem that the current image sharing efficiency is too low.
In a first aspect, an embodiment of the present application provides an image sharing method, where the method includes the following steps performed by a server:
receiving a first encrypted image and sharing environment information sent by terminal equipment;
decrypting the first encrypted image to obtain a first image;
verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information;
if the sharing environment of the first image meets the safety condition, performing watermarking processing on the first image to obtain a second image;
and encrypting the second image to obtain a second encrypted image, and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image.
As to the above-mentioned aspect and any possible implementation manner, there is further provided an implementation manner, where the sharing environment information includes network environment information, user sensitive information, and page type information, and the verifying whether the sharing environment of the first image meets a security condition according to the sharing environment information includes:
determining whether the sharing environment of the first image meets network security conditions or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
The above aspect and any possible implementation manner further provide an implementation manner, where after the watermarking is performed on the first image to obtain a second image if the sharing environment of the first image meets a security condition, the method further includes:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not meet the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In a second aspect, an embodiment of the present application provides an image sharing method, where the method includes the following steps that are executed by a terminal device:
acquiring an image generation instruction, wherein the image generation instruction comprises a generation type identifier;
generating a first image according to the generation type identifier and encrypting the first image to obtain a first encrypted image;
acquiring sharing environment information;
sending the first encrypted image and the sharing environment information to a server;
receiving a second encrypted image sent by the server and decrypting the second encrypted image to obtain a second image based on the first encrypted image and the sharing environment information;
determining an image sharing mode according to the generation type identifier;
and sending the second image to the target equipment according to the image sharing mode.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the generating a type identifier includes a screenshot identifier and a sharing control identifier, and the generating a first image according to the generating a type identifier includes:
when the generation type identification is the screenshot identification, intercepting a current page according to the screenshot identification to generate an intercepted image;
generating the first image according to a cutting instruction input by a user;
and when the generation type identifier is the sharing control identifier, generating the first image according to the sharing control identifier.
The above-described aspect and any possible implementation manner further provide an implementation manner, where the image sharing manner includes a screenshot sharing manner and a sharing control sharing manner, and the sending the second image to the target device according to the image sharing manner includes:
if the image sharing mode is the screenshot sharing mode, the second image is displayed in a sharing window in a thumbnail mode, and the second image is sent to the target device after a sharing confirmation instruction input by a user is obtained;
if the image sharing mode is the sharing control sharing mode, sending the second image to the target device, or displaying the second image in a preview interface, and sending the second image to the target device after acquiring the sharing confirmation instruction input by the user, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In a third aspect, an embodiment of the present application provides an image sharing apparatus, including:
the first receiving module is used for receiving a first encrypted image and sharing environment information sent by the terminal equipment;
the first obtaining module is used for decrypting the first encrypted image to obtain a first image;
the verification module is used for verifying whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information;
the second acquisition module is used for carrying out watermarking processing on the first image to obtain a second image when the sharing environment of the first image meets the safety condition;
the first sending module is used for encrypting the second image to obtain a second encrypted image and sending the second encrypted image to the terminal equipment, so that the terminal equipment can complete image sharing according to the second encrypted image.
Further, the sharing environment information includes network environment information, user sensitive information and page type information.
Further, the verification module is specifically configured to:
determining whether the sharing environment of the first image meets network security conditions or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
Further, the image sharing apparatus is further specifically configured to:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not meet the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In a fourth aspect, an embodiment of the present application further provides another image sharing apparatus, including:
the third acquisition module is used for acquiring an image generation instruction, wherein the image generation instruction comprises a generation type identifier;
the fourth obtaining module is used for generating a first image according to the generation type identifier and encrypting the first image to obtain a first encrypted image;
the fifth acquisition module is used for acquiring the sharing environment information;
the second sending module is used for sending the first encrypted image and the sharing environment information to a server;
the second receiving module is used for receiving a second encrypted image sent by the server and decrypting the second encrypted image to obtain a second image based on the first encrypted image and the sharing environment information;
the determining module is used for determining an image sharing mode according to the generation type identifier;
and the third sending module is used for sending the second image to the target equipment according to the image sharing mode.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
Further, the fourth obtaining module is specifically configured to:
when the generation type identification is the screenshot identification, intercepting a current page according to the screenshot identification to generate an intercepted image;
generating the first image according to a cutting instruction input by a user;
and when the generation type identifier is the sharing control identifier, generating the first image according to the sharing control identifier.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
Further, the third sending module is specifically configured to:
if the image sharing mode is the screenshot sharing mode, the second image is displayed in a sharing window in a thumbnail mode, and the second image is sent to the target device after a sharing confirmation instruction input by a user is obtained;
if the image sharing mode is the sharing control sharing mode, sending the second image to the target device, or displaying the second image in a preview interface, and sending the second image to the target device after acquiring the sharing confirmation instruction input by the user, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In a fifth aspect, an embodiment of the present application provides a terminal device, including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, where the processor executes the computer readable instructions to perform the steps of the image sharing method according to the first aspect, or executes the computer readable instructions to perform the steps of the image sharing method according to the second aspect.
In a sixth aspect, the present application provides a computer-readable storage medium, which stores computer-readable instructions, when executed by a processor, implement the steps of the image sharing method according to the first aspect, or implement the steps of the image sharing method according to the second aspect when executed by the processor.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
Fig. 1 is a flowchart of an image sharing method according to an embodiment of the present disclosure;
fig. 2 is a schematic block diagram of an image sharing apparatus 1 according to an embodiment of the present disclosure;
fig. 3 is a schematic block diagram of an image sharing apparatus 2 according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a terminal device in an embodiment of the present application.
Detailed Description
For better understanding of the technical solutions of the present application, the following detailed descriptions of the embodiments of the present application are provided with reference to the accompanying drawings.
It should be understood that the embodiments described are only a few embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely a field that describes the same of an associated object, meaning that three relationships may exist, e.g., A and/or B, may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, third, etc. may be used to describe preset ranges, etc. in the embodiments of the present application, these preset ranges should not be limited to these terms. These terms are only used to distinguish preset ranges from each other. For example, the first preset range may also be referred to as a second preset range, and similarly, the second preset range may also be referred to as the first preset range, without departing from the scope of the embodiments of the present application.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
Fig. 1 is a flowchart of an image sharing method according to an embodiment of the present disclosure. The image sharing method can be realized in terminal equipment and a server, and is applied to a scene that a user initiates image sharing by adopting the terminal equipment, in particular to a scene that a mobile terminal application program is related to page image sharing. As shown in fig. 1, the image sharing method includes the following steps:
s100: the terminal equipment acquires an image generation instruction, wherein the image generation instruction comprises a generation type identifier.
The image generation instruction is an instruction for generating a first image.
The generation type identifier is an identifier that uniquely identifies the type of the first image. Note that the concept corresponding to the first image is a second image. The first image and the second image are mainly used to distinguish between images processed at different execution subject stages. If the image initially generated at the terminal device is the first image, the image obtained after the server watermarking is the second image.
In an embodiment, when a user uses an application (APP for short) on a smart phone, if an image related to a current application page needs to be shared, an image generation instruction may be triggered by a manner of clicking a control related to image acquisition, a manner of voice input control, and the like, so that a terminal device may acquire the image generation instruction according to an input of the user. It is to be understood that the first image may be generated in various ways, and the image generation instruction may be determined according to the generation type identifier.
S110: and the terminal equipment generates a first image according to the generation type identifier and encrypts the first image to obtain a first encrypted image.
It will be appreciated that different generation types identify the manner in which the first image is generated. In the embodiment of the application, a generation mode for generating the first image is determined according to the generation type identifier, and the first image is generated according to the generation mode. The object to which the first image is to be sent is a server, and in order to enhance the security of the first image in the transmission process, the first image can be encrypted in a preset encryption mode to obtain a first encrypted image. The preset encryption mode can be an encryption mode appointed with the server, and the server can decrypt the first image which is sent after the terminal equipment is encrypted by adopting a decryption function corresponding to the encryption function. The encryption method is not limited in this embodiment, and may be implemented by an encryption method such as asymmetric encryption.
S120: and the terminal equipment acquires the sharing environment information.
The sharing environment information refers to information capable of reflecting the security condition of the sharing environment of the terminal device, and specifically may include the security condition of the sharing environment influenced by the outside, such as the security condition of a network; the security conditions of the sharing environment, which are influenced by the inside, can also be included, such as the security condition of the terminal device, the security limit of the application program, and the like. In an embodiment, the terminal device obtains the sharing environment information, and can further determine whether the image obtained by the current terminal device can meet the sharing safety requirement according to the sharing environment information, so that the image sharing safety and flexibility can be improved, and the limitation that some application programs can only forbid image sharing by one operation is effectively avoided.
S130: and the terminal equipment sends the first encrypted image and the sharing environment information to the server.
S140: the server receives the first encrypted image and the sharing environment information sent by the terminal device.
In one embodiment, the server may determine whether to further process the first encrypted image using the received shared environment information. If the sharing environment information indicates that the current sharing environment is not suitable for sharing the image, the first encrypted image is not further processed, a message of refusing processing is returned to the terminal equipment, and prompt information such as 'the system detects that the current image sharing environment has risks and please try again in a safe environment' is displayed on an interface of the terminal equipment. In this way, redundant operations between the terminal device and the server can be reduced in the case where there is a risk in the image sharing environment.
S150: the server decrypts the first encrypted image to obtain a first image.
In an embodiment, the server may decrypt the first encrypted image using a decryption method corresponding to the encryption method used by the terminal device, to obtain the first image initially generated at the terminal device. It should be noted that, the execution sequence of the step may be arranged after step S160, and when the sharing environment of the first image meets the security condition, the server decrypts the first encrypted image to obtain the first image.
S160: and the server verifies whether the sharing environment of the first image meets the safety condition or not according to the sharing environment information.
In an embodiment, the server may preset a check table for checking the sharing environment information. The check table stores the mapping relation between the check items and the check parameters, and can be used for checking whether the sharing environment of the first image meets the safety condition or not. It can be understood that the shared environment information may include event types of the internally influenced shared environment information or the externally influenced shared environment information, and different event types of the shared environment information may correspond to verification events in the verification table, and then, the verification parameter is determined through the mapping relationship, and after the shared environment information is verified with the verification parameter, it is determined whether the shared environment of the first image meets the security condition.
S170: and if the sharing environment of the first image meets the safety condition, the server carries out watermarking processing on the first image to obtain a second image.
In an embodiment, when the sharing environment of the first image meets the security condition, it is stated that the server considers that the terminal device is allowed to send the first image in the current environment, and at this time, the server may perform watermarking on the first image to obtain the second image. The watermark in the second image may be information that can be used for tracing, such as the job number of the user, the mobile phone number of the user, and the like. According to the embodiment, the first image meeting the safety condition is subjected to watermarking, so that the traceability can be provided, and the safety of picture sharing is further improved.
S180: the server encrypts the second image to obtain a second encrypted image, and sends the second encrypted image to the terminal device.
In one embodiment, whether the terminal device sends the first image to the server or the server sends the second image to the server, the sent image may be encrypted. Specifically, the encryption mode used by the server and the decryption mode used by the terminal device are also predetermined, and the encryption mode used by the server and the encryption mode used by the terminal device may be the same or different, and are not limited herein.
S190: and the terminal equipment receives the second encrypted image sent by the server and decrypts the second encrypted image to obtain a second image.
It is understood that the second image obtained by the terminal device is the image watermarked by the server, so that the terminal device is prevented from directly sending the first image. In addition, in the whole image processing process, the mobile terminal does not store the first image locally all the time, so that the user can be prevented from changing or sharing the first image randomly, and the image sharing safety can be improved.
S200: and the terminal equipment determines an image sharing mode according to the generation type identifier.
In one embodiment, the image sharing mode is determined by the generation type identifier. The mode of the first image generation determines an image sharing mode adopted by the terminal device, different sharing strategies can be selected according to different image sharing modes, and a user can safely and quickly finish image sharing under image sharing scenes with different requirements.
S210: and the terminal equipment sends the second image to the target equipment according to the image sharing mode.
The target device is a device to which the user wants to send the second image, and may be a mobile terminal used by another user. In an embodiment, in a face-to-face transmission scene, a user can directly send a second image to a target device through a communication channel established face-to-face by using a terminal device according to an image sharing mode; in a long-distance transmission scene, a user can firstly send a second image to the server by adopting the terminal equipment according to an image sharing mode, and then forwards the second image to the target equipment through the server.
In steps S100 to S210, the server side is used to complete verification of the sharing environment information of the image, and whether the sharing of the image meets the security condition can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can quickly finish image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
The screenshot identification is used for identifying screenshot operation. The sharing control identification is an identification for identifying the image sharing operation.
In an embodiment, a user can share an image by adopting a screenshot sharing mode or a direct sharing mode through a mobile terminal. Specifically, the user can trigger the screenshot identifier and the sharing control identifier by clicking the screenshot control or the sharing control on the page of the mobile terminal. The screenshot sharing method includes the steps of capturing a current page image and then completing image sharing, directly sharing the current page image from the perspective of a user, and directly sending the current page image to a target device after the user clicks a sharing control.
Further, in step S110, that is, in the terminal device generates the first image according to the generation type identifier, the method specifically includes the following steps:
s1101: and when the generated type identifier is the screenshot identifier, the terminal equipment intercepts the current page according to the screenshot identifier and generates an intercepted image.
The image is obtained by capturing the current page.
In an embodiment, the mobile terminal intercepts the current page according to the screenshot identifier, and stores the intercepted image in dot-matrix formats such as a preset image exchange Format (GIF), a Portable Network Graphics Format (PNG), a JPEG Format (Joint Photographic Experts Group), and the like, wherein the storage is a short-time storage, and the storage does not support other operations except for the operations of sending the intercepted image to a server and deleting the intercepted image after encryption.
S1102: the terminal equipment generates a first image according to a cutting instruction input by a user.
Wherein the cropping instruction is an instruction for cropping an image. In the embodiment of the application, after the mobile terminal completes screenshot operation, a user can trigger a cutting instruction by clicking a control related to screenshot, and cutting can be performed on the basis of the screenshot to obtain the first image.
S1103: and when the generated type identifier is the sharing control identifier, the terminal equipment generates a first image according to the sharing control identifier.
In an embodiment, the mobile terminal can intercept the current page according to the sharing control identifier and directly generate the first image. It can be understood that if the user directly clicks the sharing control, the user may think that the user wants to directly perform image sharing, and directly intercepts the current page as the first image.
In S1101-S1103, a specific embodiment is provided, where the screenshot identifier and the sharing control identifier are respectively used for generating a first image, and a user may trigger the mobile terminal to obtain the screenshot identifier or the sharing control identifier according to an actual sharing requirement, and obtain the first image after an image generation process of different identifiers, so that the user can quickly complete image sharing in an image sharing scene with different requirements.
Further, the shared environment information includes network environment information, user sensitive information and page type information.
In an embodiment, the network environment information may specifically include information such as a Wi-Fi environment and a shared network environment where the mobile terminal is located when the image is shared. The user sensitive information may specifically be information such as preset sensitive words and graphics, and the user sensitive information may appear on the application page. The page type information may be type information preset by the application program according to the page security level, for example, some application program pages are considered to have high security level requirements in the development process, and the page type information may be set as an un-sharable page type. In the embodiment of the application, various sharing environment information is integrated during image sharing, and whether current image sharing is safe or not is confirmed according to the sharing environment information.
Further, in step S160, namely, in verifying whether the sharing environment of the first image meets the security condition according to the sharing environment information, the method specifically includes the following steps:
s1601: the server determines whether the sharing environment of the first image meets the network security condition or not according to the network environment information.
In an embodiment, first, whether the first image meets the security requirement in the network security level (corresponding to the verification item) is determined according to the network environment where the mobile terminal is located during image sharing. Specifically, the server may determine, according to a preset network security determination condition (corresponding verification parameter), whether the network environment where the mobile terminal is located is secure when the image is shared, according to a Wi-Fi network, a shared network, and the like to which the mobile terminal is connected. In this way, the security of the image sharing process can be improved.
S1602: if the sharing environment of the first image meets the network security condition, the server determines whether the sharing environment of the first image meets the page security condition or not according to the page type information.
In an embodiment, after the network environment where the mobile terminal is located during image sharing is determined to be safe, whether the page of the current screenshot of the mobile terminal belongs to a page with strong confidentiality or not can be judged according to the page type information. Specifically, the mobile terminal may define the confidentiality requirement of each page in the application program through the page type information during the development stage or after the mobile terminal is online. For example, in the page A, B, C, the requirement on security of the page a and the page B is not high, and the page type information of the page a and the page B corresponds to a sharing-allowed page type; and if the page C has higher requirement on confidentiality, the page type information of the page C is corresponding to an unshared type. According to the page type information, whether the sharing environment of the first image meets the page safety condition or not can be determined.
S1603: if the sharing environment of the first image meets the page safety condition, the server determines whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information.
In an embodiment, after determining that the security requirement of a page corresponding to a first image is not high when the mobile terminal shares an image, it may be determined whether a sharing environment of the first image meets a user information security condition according to whether the first image has user sensitive information. Specifically, the user sensitive information is contained in the first image, and the server can identify the first image by adopting a character recognition model or an image recognition model and determine whether the first image meets the user information safety condition.
S1604: if the sharing environment of the first image meets the user information safety condition, the server determines that the sharing environment of the first image meets the safety condition.
In an embodiment, when the sharing environment of the first image meets the network security condition, the page security condition, and the user information security condition, that is, it is determined that the sharing environment of the first image meets the security condition, the first image may be allowed to be shared to other computer devices.
In steps S1601 to S1604, according to the network environment information, the user sensitive information, and the page type information, from a plurality of security dimensions, whether the sharing environment of the first image meets the network security condition is comprehensively considered, so that the security of image sharing can be further improved.
Further, after step S170, that is, after the first image is watermarked to obtain the second image if the sharing environment of the first image meets the security condition, the image sharing method further includes the following steps:
s1701: and if the sharing environment of the first image does not accord with the safety condition, the server determines a judgment node which does not accord with the safety condition.
In an embodiment, when the sharing environment of the first image does not meet the security condition, the determination node of the security condition may be analyzed to determine at which stage the condition that does not meet the security condition occurs.
S1702: and if the judgment node which does not accord with the safety condition is the user information safety condition, the server sends a sensitive information shielding request to the mobile terminal.
In an embodiment, if a situation that the security condition is not met occurs at the stage of the user information environment judgment, the application allows to make a compromise to the situation so as to complete the image sharing as much as possible. Specifically, the server may send a sensitive information blocking request to the mobile terminal. The sensitive information shielding request can request to shield the sensitive information in the first image to achieve the desensitization effect, so that the problem that the user information security condition does not pass does not exist on the first image. The image sharing can be completed to the maximum extent on the premise of ensuring the safe image sharing.
S1703: based on the sensitive information shielding request, the server acquires the shielding confirmation information sent by the mobile terminal, and determines the sensitive information on the first image according to the shielding confirmation information.
S1704: the server determines the processing coordinates based on the sensitive information.
The processing coordinate refers to the coordinate of the corresponding pixel of the sensitive information on the first image.
In an embodiment, if the mobile terminal agrees to mask the sensitive information on the first image, the server may lock the sensitive information in a coordinate manner to mask the sensitive information according to the processing coordinates.
S1705: and the server shields the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
In an embodiment, the server may perform desensitization operations such as mosaic and doodling to cover sensitive information on the first image, so that the desensitized first image satisfies security conditions for image sharing.
In steps 1701-1705, an embodiment is provided in which image sharing can be completed even if the user information security condition is not satisfied. After the sensitive information on the first image is shielded, the mobile terminal can still finish image sharing, so that the image sharing can be finished to the maximum extent on the premise of ensuring the safe image sharing.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
In an embodiment, the image sharing manner may specifically include a screenshot sharing manner and a sharing control sharing manner, corresponding to the screenshot identifier and the sharing control identifier.
Further, in step S210, sending a second image to the target device according to the image sharing manner includes the following steps:
s2101: and if the image sharing mode is the screenshot sharing mode, displaying the second image in a sharing window in a thumbnail mode, and after acquiring a sharing confirmation instruction input by the user, sending the second image to the target equipment by the mobile terminal.
In an embodiment, when a user screenshot is shared, a sharing window may be displayed on an interface of the mobile terminal, and the size of the sharing window may be about one fourth of the size of the interface. The sharing window is used for displaying a thumbnail of the second image. In this way, the user can simply preview the second image to be sent on the current page and send it to the target device after the user confirms it.
S2102: if the image sharing mode is the sharing control sharing mode, the mobile terminal sends the second image to the target device, or displays the second image in the preview interface, and after a sharing confirmation instruction input by the user is obtained, the mobile terminal sends the second image to the target device, wherein the size of the second image displayed on the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In an embodiment, when the image sharing mode is the sharing control sharing mode, one mode is to directly send the second image to the target device. In another mode, a preview interface may be displayed on the mobile terminal, and the second image may be sent to the target device after the user confirms the preview interface. The preview interface is an independent interface, the size of the displayed second image is larger than that of the second image displayed in the thumbnail in the sharing window, and before the user sends the second image, the user can acquire more information related to the second image through the preview interface, so that the user can be helped to accurately send the second image.
In steps S2101-S2102, a specific implementation of sending the second image to the target device according to the image sharing mode is provided, and the user may confirm the second image before sending the second image through the sharing window or the preview interface, so as to help the user accurately send the second image.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Further, in the embodiment of the application, a user can trigger the mobile terminal to acquire the screenshot identifier or the sharing control identifier according to actual sharing requirements, and obtain the first image after the image generation process of different identifiers, so that the user can quickly finish image sharing in image sharing scenes of different requirements.
Furthermore, according to the network environment information, the user sensitive information and the page type information, whether the sharing environment of the first image meets the network security condition or not is comprehensively considered from multiple security dimensions, and the security of image sharing can be further improved.
Furthermore, in the embodiment of the application, after the sensitive information on the first image is shielded, the mobile terminal can still complete image sharing, so that the image sharing can be completed to the maximum extent on the premise of ensuring the safe image sharing.
Furthermore, in the embodiment of the application, the user can confirm the second image before sending out the second image through the sharing window or the preview interface, so that the user can be helped to accurately send out the second image.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Fig. 2 is a schematic block diagram of an image sharing apparatus 1 according to an embodiment of the present disclosure. As shown in fig. 2, the image sharing apparatus 1 includes a first receiving module 10, a first obtaining module 20, a verifying module 30, a second obtaining module 40, and a first sending module 50. The implementation functions of the first receiving module 10, the first obtaining module 20, the verifying module 30, the second obtaining module 40, and the first sending module 50 correspond to the steps of the image sharing method executed by the server one to one, and for avoiding redundancy, detailed description is not needed in this embodiment.
Further, the shared environment information includes network environment information, user sensitive information and page type information.
Further, the verification module 30 is specifically configured to:
determining whether the sharing environment of the first image meets the network security condition or not according to the network environment information;
if the sharing environment of the first image meets the network security condition, determining whether the sharing environment of the first image meets the page security condition or not according to the page type information;
if the sharing environment of the first image meets the page safety condition, determining whether the sharing environment of the first image meets the user information safety condition or not according to the user sensitive information;
and if the sharing environment of the first image meets the user information safety condition, determining that the sharing environment of the first image meets the safety condition.
Further, the image sharing apparatus is further specifically configured to:
if the sharing environment of the first image does not accord with the safety condition, determining a judgment node which does not accord with the safety condition;
if the judgment node which does not accord with the safety condition is the user information safety condition, sending a sensitive information shielding request to the mobile terminal;
acquiring confirmation shielding information sent by the mobile terminal based on the sensitive information shielding request, and determining sensitive information on the first image according to the confirmation shielding information;
determining processing coordinates according to the sensitive information;
and shielding the sensitive information according to the processing coordinate by adopting a preset desensitization operation.
Fig. 3 is a schematic block diagram of an image sharing apparatus 2 according to an embodiment of the present disclosure. As shown in fig. 3, the image sharing apparatus 2 includes a third obtaining module 60, a fourth obtaining module 70, a fifth obtaining module 80, a second sending module 90, a second receiving module 100, a determining module 110, and a third sending module 120. The implementation functions of the third obtaining module 60, the fourth obtaining module 70, the fifth obtaining module 80, the second sending module 90, the second receiving module 100, the determining module 110, and the third sending module 120 correspond to the steps corresponding to the image sharing method executed by the terminal device, and in order to avoid redundancy, detailed description is not needed in this embodiment.
Further, the generation type identifier includes a screenshot identifier and a sharing control identifier.
Further, the fourth obtaining module 70 is specifically configured to:
when the generated type identifier is a screenshot identifier, intercepting the current page according to the screenshot identifier to generate an intercepted image;
generating a first image according to a cutting instruction input by a user;
and when the generation type identifier is a sharing control identifier, generating a first image according to the sharing control identifier.
Further, the image sharing mode comprises a screenshot sharing mode and a sharing control sharing mode.
Further, the third sending module 120 is specifically configured to:
if the image sharing mode is the screenshot sharing mode, displaying the second image in a sharing window in a thumbnail mode, and sending the second image to the target equipment after acquiring a sharing confirmation instruction input by a user;
and if the image sharing mode is the sharing control sharing mode, sending the second image to the target equipment, or displaying the second image in a preview interface, and sending the second image to the target equipment after acquiring a sharing confirmation instruction input by a user, wherein the size of the second image displayed in the preview interface is larger than that of the second image displayed in the sharing window in a thumbnail mode.
In the embodiment of the application, the server side is used for completing the verification of the sharing environment information of the image, and whether the image sharing meets the safety condition or not can be determined based on the verification of the sharing environment information. When the sharing of the image meets the safety condition, the shared image can be subjected to watermarking processing so as to provide traceability and further improve the safety of image sharing. Wherein, the shared image can be generated by different generation type identifications. The image sharing mode can be determined according to the generation type identifier, so that a user can safely and quickly complete image sharing under image sharing scenes with different requirements. According to the image sharing method and device, the terminal device side is allowed to share the relevant images, the user can initiate image sharing at any time and any place, and the image sharing efficiency is effectively improved on the premise that the image sharing safety is guaranteed.
Fig. 4 is a schematic diagram of a terminal device in an embodiment of the present application.
As shown in fig. 4, terminal device 130 includes a processor 131, a memory 132, and computer readable instructions 133 stored in memory 132 and executable on processor 131. The processor 131, when executing the computer readable instructions 133, implements the steps of the image sharing method performed by the server. Alternatively, the processor 131, when executing the computer readable instructions 133, implements the functions of the modules/units of the image sharing apparatus 1; alternatively, the processor 131, when executing the computer readable instructions 133, implements the steps of the image sharing method performed by the terminal device. Alternatively, the processor 131, when executing the computer readable instructions 133, implements the functions of the modules/units of the image sharing apparatus 2.
Illustratively, the computer readable instructions 133 may be divided into one or more modules/units, which are stored in the memory 132 and executed by the processor 131 to accomplish the present application. One or more modules/units may be a series of computer-readable instruction segments capable of performing certain functions, which are used to describe the execution of computer-readable instructions 133 in terminal device 130.
The terminal device 130 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 131, a memory 132. Those skilled in the art will appreciate that fig. 4 is merely an example of the terminal device 130 and does not constitute a limitation of the terminal device 130 and may include more or less components than those shown, or combine certain components, or different components, e.g., the terminal device may also include input output devices, network access devices, buses, etc.
The Processor 131 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 132 may be an internal storage unit of the terminal device 130, such as a hard disk or a memory of the terminal device 130. The memory 132 may also be an external storage device of the terminal device 130, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal device 130. Further, the memory 132 may also include both an internal storage unit of the terminal device 130 and an external storage device. The memory 132 is used to store computer readable instructions and other programs and data required by the terminal device. The memory 132 may also be used to temporarily store data that has been output or is to be output.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
In the embodiment of the application, the server may be an independent server, or may be a cloud server that provides basic cloud computing services such as cloud service, a cloud database, cloud computing, cloud functions, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, Content Delivery Network (CDN), big data, an artificial intelligence platform, and the like.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by the present application, and can also be realized by hardware related to computer readable instructions, which can be stored in a computer readable storage medium, and when the computer readable instructions are executed by a processor, the steps of the above described method embodiments can be realized. Wherein the computer readable instructions comprise computer readable instruction code which may be in source code form, object code form, an executable file or some intermediate form, and the like. The computer-readable medium may include: any entity or device capable of carrying the computer-readable instruction code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain other components which may be suitably increased or decreased as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media which may not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
The present application also provides a computer readable storage medium storing computer readable instructions which, when executed by a processor, implement an image sharing method performed by a server, or which, when executed by a processor, implement an image sharing method performed by a client.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (10)

1.一种图像分享方法,其特征在于,包括由服务器执行的如下步骤:1. an image sharing method, is characterized in that, comprises the following steps that are carried out by server: 接收由终端设备发送的第一加密图像和分享环境信息;receiving the first encrypted image and sharing environment information sent by the terminal device; 解密所述第一加密图像得到第一图像;Decrypting the first encrypted image to obtain a first image; 根据所述分享环境信息校验所述第一图像的分享环境是否符合安全条件;Verifying whether the sharing environment of the first image complies with security conditions according to the sharing environment information; 若所述第一图像的分享环境符合安全条件,对所述第一图像进行水印处理,得到第二图像;If the sharing environment of the first image meets the security conditions, watermarking the first image is performed to obtain a second image; 加密所述第二图像得到第二加密图像,并将所述第二加密图像发送到所述终端设备,以使得所述终端设备根据所述第二加密图像完成图像分享。Encrypt the second image to obtain a second encrypted image, and send the second encrypted image to the terminal device, so that the terminal device completes image sharing according to the second encrypted image. 2.根据权利要求1所述的方法,其特征在于,所述分享环境信息包括网络环境信息、用户敏感信息和页面类型信息,所述根据所述分享环境信息校验所述第一图像的分享环境是否符合安全条件,包括:2 . The method according to claim 1 , wherein the sharing environment information includes network environment information, user sensitive information and page type information, and the sharing of the first image is verified according to the sharing environment information. 3 . Whether the environment meets safety conditions, including: 根据所述网络环境信息确定所述第一图像的分享环境是否符合网络安全条件;Determine, according to the network environment information, whether the sharing environment of the first image complies with network security conditions; 若所述第一图像的分享环境符合网络安全条件,根据所述页面类型信息确定所述第一图像的分享环境是否符合页面安全条件;If the sharing environment of the first image complies with the network security conditions, determining whether the sharing environment of the first image complies with the page security conditions according to the page type information; 若所述第一图像的分享环境符合页面安全条件,根据所述用户敏感信息确定所述第一图像的分享环境是否符合用户信息安全条件;If the sharing environment of the first image complies with the page security conditions, determining whether the sharing environment of the first image complies with the user information security conditions according to the user sensitive information; 若所述第一图像的分享环境符合用户信息安全条件,确定所述第一图像的分享环境符合所述安全条件。If the sharing environment of the first image complies with the user information security condition, it is determined that the sharing environment of the first image complies with the security condition. 3.根据权利要求2所述的方法,其特征在于,在所述若所述第一图像的分享环境符合安全条件,对所述第一图像进行水印处理,得到第二图像之后,所述方法还包括:3. The method according to claim 2, wherein, after the first image is watermarked to obtain the second image if the sharing environment of the first image meets the security conditions, the method Also includes: 若所述第一图像的分享环境不符合所述安全条件,确定不符合所述安全条件的判断节点;If the sharing environment of the first image does not meet the security condition, determine a judgment node that does not meet the security condition; 若不符合所述安全条件的所述判断节点为所述用户信息安全条件,向所述移动终端发送敏感信息屏蔽请求;If the judgment node that does not meet the security condition is the user information security condition, send a sensitive information shielding request to the mobile terminal; 基于所述敏感信息屏蔽请求,获取由所述移动终端发送的确认屏蔽信息,根据所述确认屏蔽信息在所述第一图像上确定敏感信息;Based on the sensitive information shielding request, obtain confirmation shielding information sent by the mobile terminal, and determine sensitive information on the first image according to the confirmation shielding information; 根据所述敏感信息确定处理坐标;determine processing coordinates according to the sensitive information; 采用预设的脱敏操作,根据所述处理坐标屏蔽所述敏感信息。Using a preset desensitization operation, the sensitive information is shielded according to the processing coordinates. 4.一种图像分享方法,其特征在于,包括由终端设备执行的如下步骤:4. An image sharing method, comprising the following steps performed by a terminal device: 获取图像生成指令,其中,所述图像生成指令包括生成类型标识;Obtaining an image generation instruction, wherein the image generation instruction includes a generation type identifier; 根据所述生成类型标识生成第一图像并对所述第一图像进行加密,得到第一加密图像;Generate a first image according to the generation type identifier and encrypt the first image to obtain a first encrypted image; 获取分享环境信息;Obtain and share environmental information; 将所述第一加密图像和所述分享环境信息发送到服务器;sending the first encrypted image and the sharing environment information to a server; 基于所述第一加密图像和所述分享环境信息,接收由所述服务器发送的第二加密图像并对所述第二加密图像进行解密,得到第二图像;Based on the first encrypted image and the sharing environment information, receiving a second encrypted image sent by the server and decrypting the second encrypted image to obtain a second image; 根据生成类型标识确定图像分享方式;Determine the image sharing method according to the generation type identifier; 根据所述图像分享方式发送所述第二图像到目标设备。Send the second image to the target device according to the image sharing method. 5.根据权利要求4所述的方法,其特征在于,所述生成类型标识包括截图标识和分享控件标识,所述根据所述生成类型标识生成第一图像,包括:5. The method according to claim 4, wherein the generation type identification comprises a screenshot identification and a sharing control identification, and the generation of the first image according to the generation type identification comprises: 当所述生成类型标识为所述截图标识时,根据所述截图标识截取当前页面,生成截取图像;When the generation type identification is the screenshot identification, intercept the current page according to the screenshot identification, and generate a intercepted image; 根据用户输入的裁剪指令生成所述第一图像;generating the first image according to the cropping instruction input by the user; 当所述生成类型标识为所述分享控件标识时,根据所述分享控件标识生成所述第一图像。When the generation type identification is the sharing control identification, the first image is generated according to the sharing control identification. 6.根据权利要求4所述的方法,其特征在于,所述图像分享方式包括截图分享方式和分享控件分享方式,所述根据所述图像分享方式发送所述第二图像到目标设备,包括:6. The method according to claim 4, wherein the image sharing method includes a screenshot sharing method and a sharing control sharing method, and the sending the second image to the target device according to the image sharing method comprises: 若所述图像分享方式为所述截图分享方式,所述第二图像缩略显示在分享窗口中,并在获取用户输入的确认分享指令后发送所述第二图像到所述目标设备;If the image sharing method is the screenshot sharing method, the thumbnail of the second image is displayed in the sharing window, and the second image is sent to the target device after obtaining the confirmation sharing instruction input by the user; 若所述图像分享方式为所述分享控件分享方式,将所述第二图像发送到所述目标设备,或者,在预览界面中显示所述第二图像,并在获取用户输入的所述确认分享指令后发送所述第二图像到所述目标设备,其中,所述预览界面显示的所述第二图像的尺寸大于所述分享窗口中缩略显示的所述第二图像。If the image sharing method is the sharing control sharing method, send the second image to the target device, or display the second image in the preview interface, and obtain the confirmation sharing input by the user After the instruction, the second image is sent to the target device, wherein the size of the second image displayed on the preview interface is larger than the second image displayed in a thumbnail in the sharing window. 7.一种图像分享装置,其特征在于,包括:7. An image sharing device, comprising: 第一接收模块,用于接收由终端设备发送的第一加密图像和分享环境信息;a first receiving module, configured to receive the first encrypted image and share environmental information sent by the terminal device; 第一获取模块,用于解密所述第一加密图像得到第一图像;a first acquisition module, configured to decrypt the first encrypted image to obtain a first image; 校验模块,用于根据所述分享环境信息校验所述第一图像的分享环境是否符合安全条件;a verification module, configured to verify whether the sharing environment of the first image complies with security conditions according to the sharing environment information; 第二获取模块,用于当所述第一图像的分享环境符合安全条件时,对所述第一图像进行水印处理,得到第二图像;a second acquisition module, configured to perform watermark processing on the first image to obtain a second image when the sharing environment of the first image meets the security conditions; 第一发送模块,用于加密所述第二图像得到第二加密图像,并将所述第二加密图像发送到所述终端设备,以使得所述终端设备根据所述第二加密图像完成图像分享。a first sending module, configured to encrypt the second image to obtain a second encrypted image, and send the second encrypted image to the terminal device, so that the terminal device completes image sharing according to the second encrypted image . 8.一种图像分享装置,其特征在于,包括:8. An image sharing device, comprising: 第三获取模块,用于获取图像生成指令,其中,所述图像生成指令包括生成类型标识;a third obtaining module, configured to obtain an image generation instruction, wherein the image generation instruction includes a generation type identifier; 第四获取模块,用于根据所述生成类型标识生成第一图像并对所述第一图像进行加密,得到第一加密图像;a fourth acquisition module, configured to generate a first image according to the generation type identifier and encrypt the first image to obtain a first encrypted image; 第五获取模块,用于获取分享环境信息;The fifth acquisition module is used to acquire and share environmental information; 第二发送模块,用于将所述第一加密图像和所述分享环境信息发送到服务器;a second sending module, configured to send the first encrypted image and the sharing environment information to a server; 第二接收模块,用于基于所述第一加密图像和所述分享环境信息,接收由所述服务器发送的第二加密图像并对所述第二加密图像进行解密,得到第二图像;a second receiving module, configured to receive a second encrypted image sent by the server based on the first encrypted image and the sharing environment information, and decrypt the second encrypted image to obtain a second image; 确定模块,用于根据生成类型标识确定图像分享方式;A determination module, used for determining the image sharing method according to the generation type identifier; 第三发送模块,用于根据所述图像分享方式发送所述第二图像到目标设备。The third sending module is configured to send the second image to the target device according to the image sharing method. 9.一种终端设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时执行如权利要求1-3任一项所述图像分享方法的步骤,或者,所述处理器执行所述计算机可读指令时执行如权利要求4-6任一项所述图像分享方法的步骤。9. A terminal device, comprising a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor, wherein when the processor executes the computer-readable instructions Execute the steps of the image sharing method according to any one of claims 1-3, or, when the processor executes the computer-readable instructions, execute the steps of the image sharing method according to any one of claims 4-6. 10.一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如权利要求1-3任一项所述图像分享方法的步骤,或者,所述计算机可读指令被处理器执行时实现如权利要求4-6任一项所述图像分享方法的步骤。10. A computer-readable storage medium storing computer-readable instructions, characterized in that, when the computer-readable instructions are executed by a processor, any one of claims 1-3 is implemented. The steps of the image sharing method, or, when the computer-readable instructions are executed by the processor, implement the steps of the image sharing method according to any one of claims 4-6.
CN202111225610.8A 2021-10-21 2021-10-21 Image sharing method, device, terminal device and storage medium Pending CN113961125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111225610.8A CN113961125A (en) 2021-10-21 2021-10-21 Image sharing method, device, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111225610.8A CN113961125A (en) 2021-10-21 2021-10-21 Image sharing method, device, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN113961125A true CN113961125A (en) 2022-01-21

Family

ID=79465789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111225610.8A Pending CN113961125A (en) 2021-10-21 2021-10-21 Image sharing method, device, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN113961125A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050277405A1 (en) * 2004-06-09 2005-12-15 Fuji Photo Film Co., Ltd. Server, mobile terminal, and service method
KR101427733B1 (en) * 2013-04-24 2014-08-07 주식회사 리턴트루 Device and method for authenticating server
CN111259407A (en) * 2018-12-03 2020-06-09 珠海格力电器股份有限公司 Picture processing method and device, storage medium and terminal
CN111460398A (en) * 2020-03-16 2020-07-28 南京南瑞继保电气有限公司 Watermark adding method, device, equipment and storage medium
CN111797430A (en) * 2020-06-30 2020-10-20 平安国际智慧城市科技股份有限公司 Data verification method, device, server and storage medium
CN112351093A (en) * 2020-10-30 2021-02-09 深圳Tcl新技术有限公司 Screenshot image sharing method, device and equipment and computer readable storage medium
CN113326462A (en) * 2021-06-29 2021-08-31 平安普惠企业管理有限公司 H5 page watermarking method, server, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050277405A1 (en) * 2004-06-09 2005-12-15 Fuji Photo Film Co., Ltd. Server, mobile terminal, and service method
KR101427733B1 (en) * 2013-04-24 2014-08-07 주식회사 리턴트루 Device and method for authenticating server
CN111259407A (en) * 2018-12-03 2020-06-09 珠海格力电器股份有限公司 Picture processing method and device, storage medium and terminal
CN111460398A (en) * 2020-03-16 2020-07-28 南京南瑞继保电气有限公司 Watermark adding method, device, equipment and storage medium
CN111797430A (en) * 2020-06-30 2020-10-20 平安国际智慧城市科技股份有限公司 Data verification method, device, server and storage medium
CN112351093A (en) * 2020-10-30 2021-02-09 深圳Tcl新技术有限公司 Screenshot image sharing method, device and equipment and computer readable storage medium
CN113326462A (en) * 2021-06-29 2021-08-31 平安普惠企业管理有限公司 H5 page watermarking method, server, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN113806806B (en) Desensitization and restoration method and system for webpage screenshot
US10504289B2 (en) Method and apparatus for securely displaying private information using an augmented reality headset
EP3474211A1 (en) Offline payment method and device
US20160267290A1 (en) Information viewing method, device, system and storage medium
US11962600B2 (en) Apparatus and methods for secure, distributed, augmented-reality (AR) communication systems
WO2016169437A1 (en) Verification picture generation method and device, and server
US12165134B2 (en) Location based wallets
WO2020233223A1 (en) Payment method, apparatus and system, device, and storage medium
CN114386059A (en) Web page text obfuscation and anti-crawling method, device, electronic device and storage medium
CN113051542A (en) Two-dimensional code processing method and equipment
US12198175B2 (en) Object comparison method, and device
CN111181831A (en) Communication data processing method and device, storage medium and electronic device
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
CN114239026A (en) Information desensitization conversion processing method, device, computer equipment and storage medium
WO2017000340A1 (en) Encryption method and apparatus
CN111343130A (en) A privacy protection method, device and device
CN107483314B (en) A kind of information processing method and system, terminal device
CN113961125A (en) Image sharing method, device, terminal device and storage medium
CN118247093B (en) Will evidence control method, device, equipment, storage medium and product
CN113506090A (en) Audit data processing method and device, storage medium and electronic equipment
CN112687363A (en) Health code public service method and platform
CN109636922B (en) Method and device for presenting augmented reality content
CN116132185B (en) Data calling method, system, device, equipment and medium
CN115499845B (en) NFC-based identity recognition method and device
CN105468988A (en) Data protection method and device during connection of terminal and PC (Personal Computer)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220121