[go: up one dir, main page]

CN108156116A - A kind of guard method of issue object and device - Google Patents

A kind of guard method of issue object and device Download PDF

Info

Publication number
CN108156116A
CN108156116A CN201611103128.6A CN201611103128A CN108156116A CN 108156116 A CN108156116 A CN 108156116A CN 201611103128 A CN201611103128 A CN 201611103128A CN 108156116 A CN108156116 A CN 108156116A
Authority
CN
China
Prior art keywords
published
mobile terminal
copy
release
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611103128.6A
Other languages
Chinese (zh)
Other versions
CN108156116B (en
Inventor
卢丽君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201611103128.6A priority Critical patent/CN108156116B/en
Priority to PCT/CN2017/114541 priority patent/WO2018103616A1/en
Publication of CN108156116A publication Critical patent/CN108156116A/en
Application granted granted Critical
Publication of CN108156116B publication Critical patent/CN108156116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种发布对象的保护方法,包括:确定发布对象,对所述发布对象进行处理获得所述发布对象的副本;将所述发布对象和所述发布对象的副本发送到第一服务器;以使所述发布对象发布到互联网络后被保存时,所述发布对象被所述第一服务器删除,所述发布对象的副本由所述第一服务器发送给保存发布对象的移动终端。本发明还公开了一种发布对象的保护装置。

The invention discloses a method for protecting a publishing object, comprising: determining the publishing object, processing the publishing object to obtain a copy of the publishing object; sending the publishing object and the copy of the publishing object to a first server ; When the publishing object is published to the Internet and stored, the publishing object is deleted by the first server, and a copy of the publishing object is sent by the first server to the mobile terminal storing the publishing object. The invention also discloses a protection device for issuing objects.

Description

Protection method and device for published object
Technical Field
The present invention relates to the field of image processing, and in particular, to a method and an apparatus for protecting a published object.
Background
With the rapid development of network communication modes, communication among users is more and more convenient and rapid, but meanwhile, the safety of personal privacy also has great hidden danger. For example, personal photos shared by users through social software such as microblogs and wechat may involve a large amount of personal privacy and sensitive information, and if some illegal or negative propaganda publicity is carried out by malicious use of the issued personal photos by lawbreakers, the users are difficult to know and cannot control in advance, which not only brings great troubles to privacy security and personal life, but also leads to many legal disputes without reason if the users are more serious.
In the prior art, a personal privacy protection method for photos mainly marks photos belonging to individuals by adding digital watermarks, and performs authenticity identification afterwards. The method can sign and authenticate the photo, and once malicious tampering and copyright dispute events occur and the effectiveness of the photo information needs to be authenticated, the original signature information can be authenticated and verified by extracting the digital watermark. However, this method also has great limitations, and it cannot perform preventive privacy protection on the photo, and more is a remedial measure taken after the photo has been maliciously stolen, tampered and infringed, so as to achieve the purpose of verifying and identifying the authenticity of the photo afterwards, and it cannot prevent other people from using image processing modification software, such as using image processing software such as Photoshop, to forcibly erase or cover the digital watermark on the photo.
In conclusion, the way of adding the digital watermark cannot achieve the effect of advance defense, cannot prevent personal information from being maliciously embezzled by others at the beginning, and cannot fundamentally play a role in protecting personal privacy. Moreover, the overall effect of the added digital watermark on the photo is also influenced to a certain extent, and is far less clear and intuitive than the original image.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a method and an apparatus for protecting a published object, which prevent other users from protecting the published object, such as: the photo is modified to play a role of defense fundamentally.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the embodiment of the invention provides a protection method for a published object, which comprises the following steps:
determining a release object, and processing the release object to obtain a copy of the release object;
sending the published object and a copy of the published object to a first server; and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
In the foregoing solution, the processing the published object to obtain the copy of the published object includes: and storing the release object in a preset unit, and processing the release object in the preset unit into a file which can not display the content of the release object as a copy of the release object.
The embodiment of the invention provides a protection method for a published object, which comprises the following steps: obtaining and caching a published object and a processed copy of the published object;
after the release object is released to the internet, when a request for storing the release object by a second mobile terminal is detected, the release object received by the second mobile terminal is deleted, and a copy of the release object is sent to the second mobile terminal according to the request for storing the release object.
In the foregoing solution, the obtaining and caching the published object and the processed copy of the published object includes: and receiving and caching the release object sent by the first mobile terminal and the processed copy of the release object.
In the foregoing solution, the obtaining and caching the published object and the processed copy of the published object includes: receiving a release object sent by a first mobile terminal, processing the release object to obtain a copy of the release object, and caching the release object and the copy of the release object.
In the above solution, after obtaining and caching the published object and the processed copy of the published object, the method further includes: binding the release object and the first mobile terminal and setting an identification code;
the sending the copy of the published object to the second mobile terminal according to the request for saving the published object includes: the network address information and the identification code of a second mobile terminal are obtained according to the request of storing the issued object, whether the identification code of the second mobile terminal is the same as the identification code corresponding to the issued object or not is judged, if not, the corresponding sending path is determined according to the network address information, and the copy of the issued object is sent to the second mobile terminal according to the sending path.
The embodiment of the invention provides a protection device for a published object, which comprises: the device comprises a first determination module and a first processing module; wherein,
the first determining module is configured to determine a published object, and process the published object to obtain a copy of the published object;
the first sending module is used for sending the published object and the copy of the published object to a first server;
and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
In the foregoing solution, the first determining module is specifically configured to: and storing the release object in a preset unit, and processing the release object in the preset unit into a file which can not display the content of the release object as a copy of the release object.
The embodiment of the invention provides a protection device for a published object, which comprises: the device comprises a first storage module and a first detection module; wherein,
the first storage module is used for obtaining and caching the issued object and the processed copy of the issued object;
the first detection module is configured to delete the published object received by the second mobile terminal when detecting a request for storing the published object by the second mobile terminal after the published object is published to the internet, and send a copy of the published object to the second mobile terminal according to the request for storing the published object.
In the foregoing solution, the first storage module is specifically configured to: and receiving and caching the release object sent by the first mobile terminal and the processed copy of the release object.
In the foregoing solution, the first storage module is specifically configured to: receiving a release object sent by a first mobile terminal, processing the release object to obtain a copy of the release object, and caching the release object and the copy of the release object.
In the foregoing solution, the first storage module is further configured to: binding the release object and the first mobile terminal and setting an identification code;
the first detection module is specifically configured to obtain network address information and an identification code of a second mobile terminal according to a request for storing a published object, determine whether the identification code of the second mobile terminal is the same as the identification code corresponding to the published object, determine a corresponding sending path according to the network address information if the identification code of the second mobile terminal is not the same as the identification code corresponding to the published object, and send a copy of the published object to the second mobile terminal according to the sending path.
The method and the device for protecting the issued object, provided by the embodiment of the invention, are used for determining the issued object, processing the issued object to obtain a copy of the issued object; sending the published object and a copy of the published object to a first server; and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server. The method and the device of the embodiment of the invention determine whether to start the protection limiting process according to the operation of other mobile terminals under the condition of ensuring that other mobile terminals can normally check the issued object, so that other mobile terminals are limited to modify the issued object, and the issued object is protected more pertinently.
Drawings
Fig. 1 is a schematic flowchart of a first method for protecting a published object according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a second method for protecting a published object according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a first protection device for issuing an object according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a second protection device for issuing an object according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a third protection method for a published object according to an embodiment of the present invention.
Detailed Description
In various embodiments of the present invention, a published object is determined, and the published object is processed to obtain a copy of the published object; sending the published object and a copy of the published object to a first server; and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
The present invention will be described in further detail with reference to examples.
Fig. 1 is a schematic flowchart of a first method for protecting a published object according to an embodiment of the present invention; as shown in fig. 1, the method for protecting a published object, applied to a first mobile terminal, includes:
step 101, determining a release object, and processing the release object to obtain a copy of the release object;
specifically, the first mobile terminal receives information input by a user through a human-computer interaction interface, determines a publishing object to be published to the internet, such as an image, a photo and the like, and processes the publishing object to obtain a copy of the publishing object.
Here, the first mobile terminal is a mobile terminal that transmits a release object to the internet, and may include a smart terminal, a notebook computer, a PAD (PAD), a smart phone, and the like.
Specifically, the processing the published object to obtain the copy of the published object includes:
after determining a publishing object to be sent to the internet, the first mobile terminal stores the publishing object in a preset unit, where the preset unit may be a preset folder of a local album, such as a folder named folder one; and processing the published object in the preset unit to obtain a copy of the published object.
The processing of the release object in the preset unit includes: processing each release object in the preset unit into another abnormally displayed file as a copy of the release object;
the abnormally displayed file is a file which can not display the content of the release object; the mosaic effect can be added to the published objects or the published objects with the black screen effect can not be checked normally by the user.
Each publishing object corresponds to an abnormally displayed file, namely a copy of the publishing object, each publishing object and the corresponding copy of the publishing object are stored in the preset unit in a one-to-one correspondence mode through numbers, and the publishing object and the copy of the publishing object are jointly sent to the first server.
Specifically, before determining to publish the object, the method further includes:
a first mobile terminal starts a protection mode and sends a notification message to a first server, wherein the notification message is used for notifying the first server that the protection mode is started; receiving a calling command fed back by the first server according to the notification message, and opening a preset unit according to the calling command;
and processing the issued object stored in the preset unit by the first mobile terminal every time the issued object is stored in the preset unit.
The first mobile terminal can process the release object in the preset unit by using an image preprocessing function of a local album or image preprocessing software installed in the first mobile terminal.
It should be noted that, the mobile terminals starting the protection mode all communicate with the server, and the server sends the release object determined by the mobile terminal to the public network server, and then releases the release object to the internet through the public network server; and if the mobile terminal does not start the protection mode, enabling the mobile terminal to directly communicate with the public network server. Here, the first server is used as a server corresponding to the first mobile terminal which starts the protection mode, and is configured to receive a notification message sent by the first mobile terminal, confirm that the protection mode has been started by the first mobile terminal, send a call command to the first mobile terminal, and issue the issue object sent by the first mobile terminal to the internet through a public network server such as a microblog, a wechat, a network forum, and the like.
Step 102, sending the published object and the copy of the published object to a first server; when the published object is published to the internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
Specifically, after the published object is published to the internet through the first server, when the second mobile terminal normally views the published object, the first server does not perform any operation; when the first server detects the request for storing the published object, the first server sends the copy of the published object to the mobile terminal storing the published object, namely the second mobile terminal, and deletes the published object received by the second mobile terminal. The second mobile terminal is other mobile terminals different from the first mobile terminal.
Here, when the second mobile terminal requests the preservation of the published object, the first server may detect a traffic change with respect to the published object, so that whether the second mobile terminal requests the preservation of the published object may be determined according to whether the traffic is changed.
Fig. 2 is a flowchart illustrating a second method for protecting a published object according to an embodiment of the present invention; as shown in fig. 2, the method for protecting a published object, applied to a first server, includes:
step 201, obtaining and caching a release object and a processed copy of the release object;
specifically, when the first mobile terminal shown in fig. 1 is used, the first mobile terminal may process the published object to obtain a published object copy, and send the published object and the published object copy to the first server;
the obtaining and caching the published object and the processed copy of the published object includes:
and the first server receives and caches the published object and the processed copy of the published object sent by the first mobile terminal.
Here, before step 201, the method further includes: after receiving a notification message sent by the first mobile terminal, the first server determines that the first mobile terminal has started a protection mode according to the notification message, and feeds back a calling command to the first mobile terminal; and the first mobile terminal opens a preset unit according to the calling command and processes the issued object in the preset unit.
Specifically, when the first mobile terminal determines the published object, the method directly sends the published object to the first server, and the first server processes the published object, the obtaining and caching the published object and the processed copy of the published object includes:
the first server receives a published object sent by the first mobile terminal, processes the published object to obtain a copy of the published object, and caches the published object and the copy of the published object.
Here, the first server receives a publishing object sent by the first mobile terminal; the published object may be processed by using installed image preprocessing software, and the obtained copy of the published object and the published object are stored in the first server in a corresponding manner.
Here, the processing the published object includes: and processing the release object into an abnormally displayed file as a copy of the release object. For example, a published object, such as a picture, is treated as a black screen picture that cannot be normally viewed.
Specifically, after the step 201, the method further includes: binding the release object and the first mobile terminal and setting an identification code; here, the method may specifically include:
the first server uses the communication number of the first mobile terminal as the unique identification number of the release object and the first mobile terminal, or uses the IMEI code of the mobile terminal as the identification number to bind the release object and the first mobile terminal. The identification code can be set in other modes, and only the first mobile terminal is required to be in one-to-one correspondence with the release object, and the identification code is unique.
Step 202, after the release object is released to the internet, when detecting a request of a second mobile terminal for storing the release object, deleting the release object received by the second mobile terminal, and sending a copy of the release object to the second mobile terminal according to the request for storing the release object.
Here, after the first server sends the published object to a public network server, and the published object is published to the internet through the public network server such as a microblog, a WeChat, a network forum, and the like, a second mobile terminal, such as a mobile terminal B, a mobile terminal C, and the like different from the first mobile terminal, can view the published object disclosed by the first mobile terminal on social software such as a microblog, a WeChat, a network forum, and the like, and at this time, a copy of the published object is stored in the first server;
if the second mobile terminal only clicks and views the published objects such as pictures published by the first mobile terminal on the terminal device of the second mobile terminal, the protection process cannot be executed continuously, namely, the operation of replacing the published objects does not need to be executed, and the second mobile terminal can normally view the published objects such as pictures, photos, images and the like through social software.
If the first server detects that the second mobile terminal stores a request of a published object disclosed by the first mobile terminal to a local album, the first server acquires network address information of the second mobile terminal according to the request of storing the published object when the second mobile terminal is detected to click to store, a corresponding sending path is identified through the network address information, the protection process starts to continue to be carried out downwards, and the operation of replacing the published object is executed; the replacing the published object comprises: deleting the release object received and displayed on the second mobile terminal, and sending a copy of the release object to the second mobile terminal; and after the replacement is finished, the file stored in the local photo album by the second mobile terminal is a copy of the release object.
Specifically, the sending the copy of the published object to the second mobile terminal according to the request for saving the published object includes:
the network address information and the identification code of a second mobile terminal are obtained according to the request of storing the issued object, whether the identification code of the second mobile terminal is the same as the identification code corresponding to the issued object or not is judged, if not, the corresponding sending path is determined according to the network address information, and the copy of the issued object is sent to the second mobile terminal according to the sending path.
It should be noted that, the detecting, by the first server, that there is a mobile terminal that stores the published object may default to being stored by a second mobile terminal different from the first mobile terminal, and therefore, the sending, according to the request for storing the published object, the copy of the published object to the second mobile terminal may include: and determining the network address information, determining a corresponding sending path according to the network address information, and sending the copy of the release object to the second mobile terminal according to the sending path.
However, the case that the first mobile terminal requests to save the published object that is disclosed by the first mobile terminal is not excluded, and therefore, the sending the copy of the published object to the second mobile terminal according to the request for saving the published object may further include: obtaining network address information and an identification code of a second mobile terminal according to a request for storing a release object, judging whether the identification code of the second mobile terminal is the same as the identification code corresponding to the release object, if not, continuing to determine a corresponding sending path according to the network address information, and replacing the release object according to the sending path; if the two objects are the same, the protection process is not carried out, namely the issued object is not replaced; the replacement published object includes: and the first server deletes the release object received and displayed by the second mobile terminal and sends a copy of the release object to the second mobile terminal.
Fig. 3 is a schematic structural diagram of a first protection device for issuing an object according to an embodiment of the present invention; as shown in fig. 3, the protection apparatus for the published object includes: the device comprises a first determination module and a first processing module; wherein,
the first determining module is configured to determine a published object, and process the published object to obtain a copy of the published object;
the first sending module is used for sending the published object and the copy of the published object to a first server;
and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
Specifically, the first determining module is specifically configured to: and storing the release object in a preset unit, and processing the release object in the preset unit into a file which can not display the content of the release object as a copy of the release object.
Here, the protection device may process the distribution object in the preset unit using an image preprocessing function of its own or installed image preprocessing software. After processing, each release object corresponds to one copy, and each release object and the corresponding copy thereof are stored in the preset unit in a one-to-one correspondence manner through numbers; sending, by the protecting device, the published object and a copy of the published object together into a first server. The copy of the release object is a file which can not display the content of the release object; the mosaic effect can be added to the published objects or the published objects with the black screen effect and the like, and the user can not check the mosaic effect normally
Specifically, before the first determining module determines to publish the object, the first determining module may be further configured to: starting a protection mode, and sending a notification message to a first server, wherein the notification message is used for notifying the first server that the protection mode is started; receiving a calling command fed back by the first server according to the notification message, and opening a preset unit according to the calling command; and then, after the issued object is stored in a preset unit, processing the issued object stored in the preset unit.
Fig. 4 is a schematic structural diagram of a second protection device for issuing an object according to an embodiment of the present invention; as shown in fig. 4, the protection apparatus for the published object includes: the device comprises a first storage module and a first detection module; wherein,
the first storage module is used for obtaining and caching the issued object and the processed copy of the issued object;
the first detection module is configured to delete the published object received by the second mobile terminal when detecting a request for storing the published object by the second mobile terminal after the published object is published to the internet, and send a copy of the published object to the second mobile terminal according to the request for storing the published object.
Specifically, the first storage module is specifically configured to: and receiving and caching the release object sent by the first mobile terminal and the processed copy of the release object.
Specifically, the first storage module is specifically configured to: receiving a release object sent by a first mobile terminal, processing the release object to obtain a copy of the release object, and caching the release object and the copy of the release object.
Specifically, the first storage module is further configured to: binding the release object and the first mobile terminal and setting an identification code;
here, the first detection module is specifically configured to obtain network address information and an identification code of a second mobile terminal according to a request for storing a published object, determine whether the identification code of the second mobile terminal is the same as the identification code corresponding to the published object, determine a corresponding sending path according to the network address information if the identification code of the second mobile terminal is not the same as the identification code corresponding to the published object, and send a copy of the published object to the second mobile terminal according to the sending path.
Here, after the published object is published to the internet through the first server, when other mobile terminals normally view the published object, the first detection module does not perform any operation, and when the first detection module detects that the published object is stored, the published object received by the second mobile terminal is deleted, and a copy of the published object is sent to the second mobile terminal according to a request for storing the published object.
Fig. 5 is a flowchart illustrating a third method for protecting a published object according to an embodiment of the present invention; as shown in fig. 5, the method includes:
step 501, if a mobile terminal A needs to perform protection restriction on a publishing object to be published, such as a picture, a photo, an image and the like, a protection mode needs to be started in advance, a protection process is effective after the protection mode is started, and the mobile terminal A sends a notification message which is used for notifying the mobile terminal A that a server starts the protection mode;
the protection mode may be specifically turned on by receiving an on command input by a user, for example, receiving an input for selecting to turn on the protection mode by the user.
Step 502, after the protection mode is started, the server of the mobile terminal A receives the notification message sent by the mobile terminal A, and after the mobile terminal A confirms that the protection mode is started, a calling command is fed back, and the mobile terminal A can automatically call and open a preset unit, such as a set folder named as folder one, according to the calling command;
step 503, the mobile terminal A selects a publishing object to be published to the Internet, and then stores the publishing object in the first folder; the selection of the published objects to be published to the internet can be realized by a received selection command input by a user;
processing the published object in the first folder by using the image processing function of the local album of the mobile terminal A or the installed image processing software to obtain a copy of the published object; such as: each picture is processed into another abnormal display effect, namely the picture is a black screen and cannot be normally viewed; the original image and the copy of each picture are stored in a one-to-one correspondence mode by using numbers;
step 504, the server of the mobile terminal A binds the release object with the mobile terminal A, and the communication number of the mobile terminal A can be used as the unique identification number of the release object;
step 505, the mobile terminal A server sends the publishing object in the folder I to a public network server, and a copy of the publishing object is temporarily stored in the mobile terminal A server;
step 506, after the information is sent to the internet, other mobile terminals such as the mobile terminal B and the like can check the published object of the mobile terminal a on social software such as a microblog, a WeChat, a network forum and the like;
at the moment, if other mobile terminals only click and check the published object published by the mobile terminal A on the own equipment, the automatic protection process cannot be continuously started downwards, and the published object can be normally checked;
step 507, if the other mobile terminals have the operation of saving the published object of the mobile terminal A to the local album, the server of the mobile terminal A synchronously obtains the network address information of the other mobile terminals when the other mobile terminals click to save the published object;
step 508, the server of the mobile terminal a sends the copy of the published object to the public network server, identifies the corresponding sending path through the network address information of other mobile terminals, replaces the published object sent to other mobile terminals with the copy of the published object, and deletes the published object sent to other mobile terminals before;
step 509, after the replacement is completed, the mobile terminal B stores the release object in the local album as an abnormal display effect;
and step 510, ending the protection flow.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.

Claims (12)

1. A protection method for a published object, the method comprising:
determining a release object, and processing the release object to obtain a copy of the release object;
sending the published object and a copy of the published object to a first server; and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
2. The method of claim 1, wherein processing the published object to obtain a copy of the published object comprises: and storing the release object in a preset unit, and processing the release object in the preset unit into a file which can not display the content of the release object as a copy of the release object.
3. A method for protecting a published object, the method comprising: obtaining and caching a published object and a processed copy of the published object;
after the release object is released to the internet, when a request for storing the release object by a second mobile terminal is detected, the release object received by the second mobile terminal is deleted, and a copy of the release object is sent to the second mobile terminal according to the request for storing the release object.
4. The method of claim 3, wherein obtaining and caching published objects and processed copies of the published objects comprises: and receiving and caching the release object sent by the first mobile terminal and the processed copy of the release object.
5. The method of claim 3, wherein obtaining and caching published objects and processed copies of the published objects comprises: receiving a release object sent by a first mobile terminal, processing the release object to obtain a copy of the release object, and caching the release object and the copy of the release object.
6. The method of claim 3, wherein after obtaining and caching the published object and the processed copy of the published object, the method further comprises: binding the release object and the first mobile terminal and setting an identification code;
the sending the copy of the published object to the second mobile terminal according to the request for saving the published object includes: the network address information and the identification code of a second mobile terminal are obtained according to the request of storing the issued object, whether the identification code of the second mobile terminal is the same as the identification code corresponding to the issued object or not is judged, if not, the corresponding sending path is determined according to the network address information, and the copy of the issued object is sent to the second mobile terminal according to the sending path.
7. An apparatus for protecting a published object, the apparatus comprising: the device comprises a first determination module and a first processing module; wherein,
the first determining module is configured to determine a published object, and process the published object to obtain a copy of the published object;
the first sending module is used for sending the published object and the copy of the published object to a first server;
and when the published object is published to the Internet and then stored, the published object is deleted by the first server, and the copy of the published object is sent to the mobile terminal storing the published object by the first server.
8. The apparatus of claim 7, wherein the first determining module is specifically configured to: and storing the release object in a preset unit, and processing the release object in the preset unit into a file which can not display the content of the release object as a copy of the release object.
9. An apparatus for protecting a published object, the apparatus comprising: the device comprises a first storage module and a first detection module; wherein,
the first storage module is used for obtaining and caching the issued object and the processed copy of the issued object;
the first detection module is configured to delete the published object received by the second mobile terminal when detecting a request for storing the published object by the second mobile terminal after the published object is published to the internet, and send a copy of the published object to the second mobile terminal according to the request for storing the published object.
10. The apparatus of claim 9, wherein the first storage module is specifically configured to: and receiving and caching the release object sent by the first mobile terminal and the processed copy of the release object.
11. The apparatus of claim 9, wherein the first storage module is specifically configured to: receiving a release object sent by a first mobile terminal, processing the release object to obtain a copy of the release object, and caching the release object and the copy of the release object.
12. The apparatus of claim 9, wherein the first storage module is further configured to: binding the release object and the first mobile terminal and setting an identification code;
the first detection module is specifically configured to obtain network address information and an identification code of a second mobile terminal according to a request for storing a published object, determine whether the identification code of the second mobile terminal is the same as the identification code corresponding to the published object, determine a corresponding sending path according to the network address information if the identification code of the second mobile terminal is not the same as the identification code corresponding to the published object, and send a copy of the published object to the second mobile terminal according to the sending path.
CN201611103128.6A 2016-12-05 2016-12-05 A kind of protection method and device for publishing object Active CN108156116B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611103128.6A CN108156116B (en) 2016-12-05 2016-12-05 A kind of protection method and device for publishing object
PCT/CN2017/114541 WO2018103616A1 (en) 2016-12-05 2017-12-05 Posted subject protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611103128.6A CN108156116B (en) 2016-12-05 2016-12-05 A kind of protection method and device for publishing object

Publications (2)

Publication Number Publication Date
CN108156116A true CN108156116A (en) 2018-06-12
CN108156116B CN108156116B (en) 2021-04-20

Family

ID=62470489

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611103128.6A Active CN108156116B (en) 2016-12-05 2016-12-05 A kind of protection method and device for publishing object

Country Status (2)

Country Link
CN (1) CN108156116B (en)
WO (1) WO2018103616A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
CN1825330A (en) * 2005-02-24 2006-08-30 索尼株式会社 Information processing system, reproducing terminal device and reproducing method, information processing device and method
CN101150484A (en) * 2006-09-21 2008-03-26 周伟 Method and system for remotely playing slide photos by using computer background
CN101847185A (en) * 2009-03-27 2010-09-29 浙江省农业科学院 Anti-theft protection method for network pictures based on Flash embedded browser

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU7127400A (en) * 1999-09-08 2001-04-10 Freedesk.Com, Inc. System and method of permissive data flow and application transfer
US9615116B2 (en) * 2011-06-16 2017-04-04 Pasafeshare Llc System, method and apparatus for securely distributing content
CN102663293B (en) * 2012-03-28 2015-04-01 北京奇虎科技有限公司 Protection method and protection device for video devices of computer
US10275609B2 (en) * 2012-12-07 2019-04-30 Benedict Ow File sharing system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
CN1825330A (en) * 2005-02-24 2006-08-30 索尼株式会社 Information processing system, reproducing terminal device and reproducing method, information processing device and method
CN101150484A (en) * 2006-09-21 2008-03-26 周伟 Method and system for remotely playing slide photos by using computer background
CN101847185A (en) * 2009-03-27 2010-09-29 浙江省农业科学院 Anti-theft protection method for network pictures based on Flash embedded browser

Also Published As

Publication number Publication date
WO2018103616A1 (en) 2018-06-14
CN108156116B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
US10701069B2 (en) Online identity verification platform and process
US9769184B2 (en) Method and system for misuse detection
US9607147B2 (en) Method and device for detecting software-tampering
US20160267290A1 (en) Information viewing method, device, system and storage medium
US9137415B2 (en) Using a security feature with a digital image file
WO2015109668A1 (en) Application program management method, device, terminal, and computer storage medium
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN107346487A (en) Data processing method and device
CN103650459A (en) Information presentation method and equipment
US20200278948A1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
CN112508569A (en) Payment environment monitoring method and system
JP6989592B2 (en) Computer system for generating authentication data
CN110929232B (en) System and method for protecting picture privacy information based on block chain and mobile device
CN108156116B (en) A kind of protection method and device for publishing object
CN109743330B (en) License authentication method, device, electronic equipment and storage medium
CN106453057A (en) Method and terminal for preventing short message from being stolen
CN108650099B (en) Method, device and storage medium for picture authorization authentication and opening lookup
CN113596600B (en) Security management method, device, equipment and storage medium for live broadcast embedded program
KR20170054848A (en) Method of storing external information of electronic communcation device and method of certification of external information of electronic communcation device by using the same
CN104995635A (en) Image transmission method, device and terminal device
JP5457860B2 (en) Evidence preservation system for photographed photographs, evidence preservation method and program for photographed photographs
CN116566694B (en) Access request processing method and device
US12450373B2 (en) Document protection mechanism
KR102515362B1 (en) Method of protecting secure document leak by shooting security document displaying on display apparatus and system performing the same
JP2007140961A (en) Device for preventing usage of fraudulent copied file, and its program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant