CN109828810A - Screen shots intercept method, watermark adding method, device, equipment and medium - Google Patents
Screen shots intercept method, watermark adding method, device, equipment and medium Download PDFInfo
- Publication number
- CN109828810A CN109828810A CN201811627124.7A CN201811627124A CN109828810A CN 109828810 A CN109828810 A CN 109828810A CN 201811627124 A CN201811627124 A CN 201811627124A CN 109828810 A CN109828810 A CN 109828810A
- Authority
- CN
- China
- Prior art keywords
- watermark
- screen interface
- screen
- identity information
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 238000007650 screen-printing Methods 0.000 claims abstract description 17
- 238000003860 storage Methods 0.000 claims abstract description 9
- 238000004891 communication Methods 0.000 claims description 12
- 238000005242 forging Methods 0.000 abstract description 5
- 238000001514 detection method Methods 0.000 description 16
- 238000012545 processing Methods 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 2
- 230000000712 assembly Effects 0.000 description 2
- 238000000429 assembly Methods 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008707 rearrangement Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Landscapes
- User Interface Of Digital Computer (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Present disclose provides a kind of screen shots intercept method, watermark adding method, device, electronic equipment and non-transitorycomputer readable storage mediums, applied to terminal, the screen shots intercept method includes: when detecting screen printing instruction, if including session window on the screen interface that terminal is shown, watermark pattern is opened;Obtain the multiple subscriber identity informations for including in session window;It is added in the Background From Layer of screen interface using multiple subscriber identity informations as watermark;Screenshotss operation is carried out to the screen interface after addition watermark.The screenshot capture piece that the disclosure provides takes method; before screenshotss; first open watermark pattern; the multiple subscriber identity informations that will acquire are added in the Background From Layer of screen interface as watermark, carry out screenshotss operation, then convenient for protecting to the session content; and verify the authenticity of subscriber identity information; the confidence level for improving conversation recording avoids unnecessary forgery screenshot, reduces a possibility that forging chat record.
Description
Technical field
This disclosure relates to technical field of information processing more particularly to a kind of screen shots intercept method, watermark adding method,
Device, electronic equipment and non-transitorycomputer readable storage medium.
Background technique
With the development of terminal technology, current intelligent terminal is equipped with screenshot function, can not only intercept display screen
Picture, moreover it is possible to the long figure of interception.Especially in instant messaging (IM, InstantMessaging) scene, it is sometimes necessary to right
The chat record of two people carries out screenshot, to be used to save, shares or as the supplementary means put on record.But current section
Screen mode is all simple screenshot, and chat content can not be effectively protected and prove the authenticity of both sides' identity.For example,
It may include user name, head portrait etc. in the picture of interception in daily screenshotss operation, and the user name and head shown in the picture
As that taking human as change or can forge, so that the picture to interception is faked, not only leads to the propagation wantonly of imperfect picture, also drop
The low confidence level of chat content.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of screen shots intercept method, watermark addition side
Method, device, electronic equipment and non-transitorycomputer readable storage medium.
According to the first aspect of the embodiments of the present disclosure, a kind of screen shots intercept method is provided, terminal is applied to, comprising:
When detecting screen printing instruction, if on the screen interface that the terminal is shown including session window,
Then open watermark pattern;
Obtain the identity information for the multiple users for including in the session window;
It is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark;
Screenshotss operation is carried out to the screen interface after the addition watermark.
Optionally, in the Background From Layer for being added to the screen interface using the identity information of the multiple user as watermark
In step before, the method also includes:
The identity information of the multiple user is ranked up according to setting sequence;
It is described to be added in the Background From Layer of the screen interface using the identity information of multiple users as watermark, it is specific to wrap
It includes:
Using the identity information of the multiple user after sequence as watermark, and it is added to the screen according to setting rule
In the Background From Layer at interface.
Optionally, the identity information of the multiple user includes: multiple user identifiers, by the body of the multiple user
Before part information is added in the Background From Layer of the screen interface as watermark, the method also includes:
MD5 value is calculated according to the multiple user identifier;
Identity information and MD5 value to the multiple user are ranked up according to setting sequence;
It is described to be added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark, tool
Body includes:
Using the identity information of the multiple user after sequence and MD5 value as watermark, and it is added to according to setting rule
In the Background From Layer of the screen interface.
Optionally, before opening watermark pattern, the method also includes:
Whether detect on the screen interface that the terminal is shown includes session window;
If the step of on the screen interface including the session window, executing the unlatching watermark pattern.
According to the second aspect of an embodiment of the present disclosure, a kind of watermark adding method is provided, terminal, the method packet are applied to
It includes:
When receiving watermark pattern open command, if on the screen interface that the terminal is shown including conversation window
Mouthful, then open watermark pattern;
Obtain the identity information for the multiple users for including in the session window;
It is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark.
Optionally, in the Background From Layer for being added to the screen interface using the identity information of the multiple user as watermark
In after, the method also includes:
When detecting screen interception instruction, screenshotss operation is carried out to the screen interface after the addition watermark.
Optionally, after carrying out screenshotss operation to the screen interface after the addition watermark, the method also includes:
When receiving watermark pattern out code, the watermark pattern is closed
According to the third aspect of an embodiment of the present disclosure, a kind of screen shots capture device is provided, terminal, the dress are applied to
It sets and includes:
Opening module is configured as on the screen interface that the instruction and the terminal for detecting screen printing are shown
When including session window, watermark pattern is opened;
Module is obtained, is configured as obtaining in the session window identity information for the multiple users for including;
Adding module is configured as being added to the screen interface for the identity information of the multiple user as watermark
In Background From Layer;
Screen capture module is configured as carrying out intercept operation to the screen interface for adding the watermark.
Optionally, described device further include:
First sorting module is configured as adding the identity information of the multiple user as watermark in the adding module
Before being added in the Background From Layer of the screen interface, the identity information of the multiple user is arranged according to setting sequence
Sequence;
The adding module is specifically configured to the identity information of the multiple user after sorting as watermark, and
It is added in the Background From Layer of the screen interface according to setting rule.
Optionally, the identity information of the multiple user includes: multiple user identifiers, described device further include:
Computing module is configured as adding in the adding module using the identity information of the multiple user as watermark
Before into the Background From Layer of the screen interface, MD5 value is calculated according to the multiple user identifier;
Second sorting module is configured as carrying out the identity information and MD5 value of the multiple user according to setting sequence
Sequence;
The adding module is specifically configured to the identity of the multiple user after second sorting module sorts
Information and MD5 value are added in the Background From Layer of the screen interface as watermark according to setting rule.
Optionally, described device further include:
Detection module is configured as before the opening module opens watermark pattern, detects the screen that the terminal is shown
It whether include session window on curtain interface;
The opening module is specifically configured to detect to include conversation window on the screen interface in the detection module
When mouth, watermark pattern is opened;
The screen capture module is additionally configured to detect on the screen interface not include conversation window in the detection module
When mouth, common screenshotss operation is directly carried out.
According to a fourth aspect of embodiments of the present disclosure, a kind of watermark adding set is provided, terminal, described device packet are applied to
It includes:
Opening module is configured as in the screen interface for receiving watermark pattern open command and the terminal and showing
When above including session window, watermark pattern is opened;
Module is obtained, is configured as obtaining in the session window identity information for the multiple users for including;
Adding module is configured as being added to the screen interface for the identity information of the multiple user as watermark
In Background From Layer.
Optionally, described device further include:
Detection module is configured as being added to the identity information of the multiple user as watermark in the adding module
After in the Background From Layer of the screen interface, detect whether to receive screen interception instruction;
Screen capture module is configured as when the detection module detects screen interception instruction, after adding the watermark
Screen interface carry out screenshotss operation.
Optionally, described device further include:
Closedown module is configured as carrying out screenshotss operation to the screen interface after adding the watermark in the screen capture module
Later, when receiving watermark pattern out code, the watermark pattern is closed.
According to a fifth aspect of the embodiments of the present disclosure, a kind of electronic equipment is provided, is equipped on the electronic equipment immediately
Telecommunication customer end includes: watermark pattern operation key on the instant communication client, the watermark pattern operation key and the end
Screenshotss are fast keyed on end, wherein the watermark pattern operation key is configured as executing above-mentioned screen shots intercept method
Or execute above-mentioned watermark adding method.
According to a sixth aspect of an embodiment of the present disclosure, a kind of electronic equipment is provided, comprising:
Processor;
For storing the memory of the processor-executable instruction;
Wherein, add the processor is configured to executing the above-mentioned watermark of above-mentioned screen shots intercept method or execution
Adding method.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of non-transitorycomputer readable storage medium is provided, when described
When instruction in storage medium is executed by the processor of electronic equipment, so that the electronic equipment is able to carry out above-mentioned screen map
Piece intercept method executes above-mentioned watermark adding method.
According to the eighth aspect of the embodiment of the present disclosure, a kind of computer program product, including one or more instruction are provided,
When one or more instruction can be executed by the processor of electronic equipment, so that electronic equipment is able to carry out above-mentioned screen map
Piece intercept method executes above-mentioned watermark adding method.
The technical scheme provided by this disclosed embodiment can include the following benefits:
Screen shots intercept method shown in the present exemplary embodiment, when detecting screen printing instruction, if screen
Upper includes session window, automatically turns on watermark pattern;Then, the identity information for the multiple users for including in session window is obtained;
And it is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark;Finally, to addition
The screen interface of the watermark carries out screenshotss operation.As it can be seen that the screen shots intercept method that the embodiment of the present disclosure provides, in screenshotss
Before, watermark pattern is first opened, and the identity information of session both sides or multi-party user are added to screen interface as watermark
In Background From Layer, screenshotss operation is then carried out, convenient for protecting to the session content, and verifies multi-party users identity information
Authenticity improves the confidence level of conversation recording, avoids unnecessary forgery screenshot, reduces the possibility for forging chat record
Property.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of screen shots intercept method shown according to an exemplary embodiment;
Fig. 2 is a kind of another flow chart of screen shots intercept method shown according to an exemplary embodiment;
Fig. 3 is a kind of another flow chart of screen shots intercept method shown according to an exemplary embodiment;
Fig. 4 is a kind of flow chart of watermark adding method shown according to an exemplary embodiment;
Fig. 5 is a kind of another flow chart of watermark adding method shown according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of screen shots capture device shown according to an exemplary embodiment;
Fig. 7 is a kind of another block diagram of screen shots capture device shown according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of watermark adding set shown according to an exemplary embodiment;
Fig. 9 is the structural block diagram of a kind of electronic equipment shown according to an exemplary embodiment;
Figure 10 is another structural block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of flow chart of screen shots intercept method shown according to an exemplary embodiment, as shown in Figure 1
Screen shots intercept method is in terminal, comprising the following steps:
In a step 101, when detecting screen interception instruction, if wrapped on the screen interface that the terminal is shown
Session window is included, then opens watermark pattern.
Watermark pattern is the one mode increased newly in instant messaging IM client.That is, being wrapped in IM client
It includes: normal conversation mode and watermark pattern.Wherein, normal conversation mode is exactly under common session context (chat scenario)
Background based on, default is white, is arranged Background it is of course also possible to like according to oneself.Watermark pattern is for protecting
The one mode for protecting both sides' session content safety, can control it by the watermark pattern operation key on instant communication client
It opens and closes, it can also be when terminal detects screen interception instruction, if on the screen interface that the terminal is shown
It including session window, then triggers watermark pattern operation key and opens watermark pattern, and after screen interception, automatically switch to normal
Conversation modes.
In the step, by taking user A and user B chat as an example, in the chat process of user A and user B, if user A
The chat interface of user A and user B are shown on the screen of place terminal, user A can according to need selection watermark pattern
Screenshotss, or selection general mode screenshotss;If user selects watermark pattern screenshotss, the screenshotss in terminal are pressed in user A
After shortcut key, which detects that screen printing instructs, and is shown including session window, then in triggering terminal on the screen
Watermark pattern operation key opens watermark pattern.If user selects general mode screenshotss, when detecting screen printing instruction,
Directly carry out common screenshotss operation.
In a step 102, the identity information for the multiple users for including in the session window is obtained.
In the step, it may include screen interface that the identity information of user, which is the information for unique identification user identity,
The user identifier (UID, User Identification) of the chat side of upper display, wherein user identifier is for indicating
The unique character string of identity, for example, may include following one or more: cell-phone number, mailbox, when registering system automatically as should
The identification code of user's distribution and two-dimensional barcode information etc., it is, of course, also possible to include multi-party Real Name (i.e. non-remark names) of chatting,
The information such as the head portrait shone including oneself major part.
In step 103, it is added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer;
In the step, the mode of addition can need to be added, for example, back can be evenly scattered according to user
Each position in scape figure layer is also possible in the middle position of the screen interface currently shown perhaps top or bottom
Deng the present embodiment is with no restriction.It is of course also possible to as needed, the identity information of multiple users (is referred to as watermark
Data) addition Background From Layer top layer or bottom.Under normal conditions, if addition is in bottom, the data of watermark need more
It is some, it avoids being covered by chat content.So which kind of addition manner no matter is selected, or which layer selection is added to, as long as
The watermark including multiple subscriber identity informations can be seen in the picture that screen interface is shown.
In addition, the data of addition watermark, also can according to need adaptive change, for example, selection Arts font, normally
The Song typeface, the fonts such as regular script, the present embodiment is with no restriction.
At step 104, intercept operation is carried out to the screen interface for adding the watermark.
In the embodiment, after addition is including the watermark of identity information in the Background From Layer of the screen interface currently shown,
The picture shown on the screen interface can be intercepted, long figure can also be intercepted, specific interception way and process have been known
Technology, details are not described herein.
Screen shots intercept method shown in the present exemplary embodiment, when detecting screen printing instruction, if screen
Upper includes session window, automatically turns on watermark pattern;Then, the identity information for the multiple users for including in session window is obtained;
And it is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark;Finally, to addition
The screen interface of the watermark carries out screenshotss operation.As it can be seen that the screen shots intercept method that the embodiment of the present disclosure provides, in screenshotss
Before, watermark pattern is first opened, and the identity information of session both sides or multi-party user are added to screen interface as watermark
In Background From Layer, screenshotss operation is then carried out, convenient for protecting to the session content, and verifies multi-party users identity information
Authenticity improves the confidence level of conversation recording, avoids unnecessary forgery screenshot, reduces the possibility for forging chat record
Property.
Fig. 2 is a kind of another flow chart of screen shots intercept method shown according to an exemplary embodiment, such as Fig. 2 institute
The screen shots intercept method shown is for including the following steps in terminal;
In step 201, when detecting screen printing instruction, continuing to test on the screen interface that the terminal is shown is
No includes session window, if so, executing step 202;Otherwise, step 207 is executed.
In the step, whether including session window judge currently to shield by detecting on the screen interface that the terminal show
Whether curtain interface is in normal conversation mode, if detecting session window on screen interface, account for screen interface is in just
Normal conversation modes or Chat mode illustrate that current screen interface is in improper session mould if not detecting session window
Formula or non-chat mode then directly carry out the intercept operation at ordinary screen interface.
In step 202, watermark pattern is opened.
When it includes session window that terminal, which detects on screen interface, can be opened with the watermark pattern operation key in triggering terminal
Open watermark pattern.
In step 203, the identity information for the multiple users for including in the session window is obtained.
In the step, when detecting session window, the identity for the multiple users for including in the available session window
Information, for example, user A, user B and user C carry out group chat, at this point, the identity of user A, user B and user C should be obtained respectively
Information.Wherein identity information may include: user identifier etc., such as cell-phone number, mailbox, or when registering system automatically as should
The identification code of user's distribution and two-dimensional barcode information it is one or more etc..
In step 204, the identity information of the multiple user is ranked up according to setting sequence.
Wherein, setting sequence can need to carry out the identity information of multiple users according to certain rule according to user
Sequence.For example, if the identity information of user A is XA, and the identity information of user B is there are two user, i.e. user A and user B
XB, sequence can be set as XAXB or XBXA, or after the identity information of user A and user B are upset sequence,
Rearrangement, the present embodiment is with no restriction.
In step 205, using the identity information of the multiple user after sequence as watermark, according to setting rule addition
Into the Background From Layer of the screen interface.
Wherein, in the step, the complexity of watermark can be increased by setting rule.Wherein, setting rule can be by
Habit or hobby according to user are arranged, for example, watermark can be evenly scattered in each position in Background From Layer, it can also
With by watermark addition, in the middle position of the screen interface currently shown, perhaps top or bottom etc., the present embodiment are not limited
Production.It is of course also possible to as needed, by watermark addition in the top layer or bottom of Background From Layer, no matter which layer be added to,
As long as can see the watermark including multiple subscriber identity informations in the picture that screen interface is shown.
In step 206, screenshotss operation is carried out to the screen interface for adding the watermark.
The step is identical as step 104, is specifically detailed in above-mentioned, and details are not described herein.
In step 207, common screenshotss operation directly is carried out to screen interface.
Common screenshotss in the step, the screenshotss exactly carried out to the screen interface for not adding watermark are operated, were intercepted
Journey has been known technology, and details are not described herein.
The screen shots intercept method that the embodiment of the present disclosure provides detects the end when detecting screen printing instruction
When whether holding on the screen interface of display including session window, and when including session window, just obtain in the session window
Including multiple users identity information, improve obtain user identity information efficiency, then to the identity of multiple users
Information is ranked up according to setting sequence, and using the identity information of the multiple user after sequence as watermark according to setting
Rule is added in the Background From Layer of the screen interface, not only protects to the session content, and verifies multi-party users body
The authenticity of part information, also improves the confidence level of conversation recording, avoids unnecessary forgery screenshot, reduces forgery chat
A possibility that record, further also improves the complexity of watermark.
Fig. 3 is a kind of another flow chart of screen shots intercept method shown according to an exemplary embodiment, such as Fig. 3 institute
The screen shots intercept method shown is for including the following steps in terminal;
In step 301, it when detecting screen printing instruction, detects and whether is wrapped on the screen interface that the terminal is shown
Session window is included, if so, executing step 302;Otherwise, step 308 is executed.
The step is identical as step 202, is specifically detailed in above-mentioned, and details are not described herein.
In step 302, watermark pattern is opened.
When it includes session window that terminal, which detects on screen interface, can be opened with the watermark pattern operation key in triggering terminal
Open watermark pattern.
In step 303, the identity information for the multiple users for including in the session window is obtained;Wherein, the multiple
The identity information of user may include: multiple user identifiers.
Certainly, the identity information can also include: other information, such as the Real Name of multiple users, there is oneself photograph
The head portrait etc. of piece, is specifically detailed in above-mentioned, and details are not described herein.
In step 304, MD5 value is calculated according to the multiple user identifier.
In the step, it is more to calculate to can use Message Digest 55 (MD5, Message DigestAlgorithm 5)
The MD5 value of a user identifier, still, however it is not limited to which such algorithm can also be other algorithms, for example, sha-1, RIPEMD
And Haval etc..
It is assumed that two users are shown on screen interface in session, the user identifier of user 1 is uid1, and user 2
User identifier be uid2, MD5 value can be specifically calculated according to uid1:uid2 mode.Exactly uid1:uid2 is formed
Byte serial is transformed into the hexadecimal number word string of a fixed length.It is of course also possible to only include a user identifier to calculate MD5
Value.Its specific calculating process has been known technology, details are not described herein to those skilled in the art.
In step 305, the identity information to the multiple user and MD5 value are ranked up according to setting sequence.
Wherein it is possible to be ranked up according to identity information and MD5 value of certain sequence to multiple users.If for example, having
Two users, i.e. user A and user B, the identity information of user A are XA, and the identity information of user B is XB, and according to XA and
The sequence of the MD5 value that XB is calculated, setting can be set as XAXBMD5 value or MD5 value XBXA or XAMD5XB
Value, or after the identity information of user A and user B are upset sequence, with the rearrangement of MD5 value etc., the present embodiment is not limited
System.
Within step 306, using the identity information of the multiple user after sequence and MD5 value as watermark, according to setting
Rule is added in the Background From Layer of the screen interface.
Wherein, setting rule can be accustomed to or like according to user to carry out well-regulated setting.For example, after sorting
The multiple user identity information and MD5 value according to setting rule be scattering into the Background From Layer at current screen interface appoint
What position etc., specific process is similar with step 205, is specifically detailed in above-mentioned, and details are not described herein.
In step 307, screenshotss operation is carried out to the screen interface for adding the watermark.
In step 308, common screenshotss operation directly is carried out to screen interface.
The screen shots intercept method that the embodiment of the present disclosure provides detects the end when detecting screen printing instruction
When whether holding on the screen interface of display including session window, and just obtains in the session window and wrap when including session window
The identity information of the multiple users included improves the efficiency for obtaining the identity information of user, then, is marked according to the multiple user
Know symbol and calculate MD5 value, identity information and MD5 value to multiple users are ranked up according to setting sequence, and will be after sequence
The identity information and MD5 value of the multiple user is added to the Background of the screen interface according to setting rule as watermark
In layer, screenshotss operation is then carried out.While obtaining the accuracy of subscriber identity information, convenient for being protected to the session content
Shield verifies the authenticity of multi-party users identity information, improves the confidence level of conversation recording, avoids unnecessary forge and cuts
Figure reduces a possibility that forging chat record.Also improve the complexity of watermark.Further, since being identified according to multi-party users
Symbol calculates MD5 value automatically, and also watermark is used as to be added in the Background From Layer of screen interface MD5 value, according to the MD5 value
It can accurately judge that whose interception the picture is, reduce a possibility that screenshot is faked, it is standby to provide reasonable chat record
Case mechanism.
Fig. 4 is a kind of flow chart of watermark adding method shown according to an exemplary embodiment, and the method is for eventually
End, may comprise steps of;
In step 401, when receiving watermark pattern open command, if on the screen interface that the terminal is shown
Including session window, then watermark pattern is opened;
In the step, when user both sides or in many ways be in conversation modes when, if it is desired to protecting the session content, then want to protect
The side for protecting session content opens watermark pattern operation key (under normal conditions, watermark pattern operation key is in close state), i.e.,
When receiving watermark open command of the user by watermark pattern operation key input, if screen circle that the terminal is shown
Include session window on face, then opens watermark pattern.
Wherein, the description of watermark pattern is detailed in the description of the step 101 in above-described embodiment, and details are not described herein.
In step 402, the identity information for the multiple users for including in the session window is obtained;
The step and step 102 are same, are specifically detailed in above-mentioned, and details are not described herein.
In step 403, it is added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer.
The step and step 103 are same, are specifically detailed in above-mentioned, and details are not described herein.
Watermark adding method shown in the present exemplary embodiment, when receiving watermark open command, if the terminal is aobvious
Include session window on the screen interface shown, then opens watermark pattern;Then, include in the session window more are obtained
The identity information of a user;And it is added to the Background of the screen interface using the identity information of the multiple user as watermark
In layer.As it can be seen that the screen shots intercept method that the embodiment of the present disclosure provides, in conversation procedure, if it is desired to protection conversation recording,
After opening watermark pattern, and it is added to using the identity information of session both sides or multi-party user as watermark the back of screen interface
In scape figure layer, convenient for protecting to the conversation recording, and the authenticity of multi-party users identity information is verified, improves session note
The confidence level of record reduces a possibility that forging chat record.
Fig. 5 is a kind of another flow chart of watermark adding method shown according to an exemplary embodiment, and the method is used
In terminal, may comprise steps of;
In step 501, when receiving watermark pattern open command, if on the screen interface that the terminal is shown
Including session window, then watermark pattern is opened;
In step 502, the identity information for the multiple users for including in the session window is obtained;
In step 503, it is added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer.
In the embodiment, step 501 to step 503 is identical to step 403 as the step 401 in above-described embodiment, specifically
It is detailed in above-mentioned, details are not described herein.
In step 504, when detecting screen interception instruction, the screen interface after the addition watermark is carried out common
Screenshotss operation.
In the step, in the Background for being added to the screen interface using the identity information of the multiple user as watermark
After in layer, if a terminal detects that screen printing instructs, then screenshotss operation is carried out to the screen interface after the addition watermark.
Its screen interface intercepted can be the picture shown on the current screen, it is of course also possible to long figure is intercepted, it is specific to intercept
Process has been known technology, and details are not described herein.
In step 505, when receiving watermark pattern out code, the watermark pattern is closed.
In the step, after screen printing operation, if receiving watermark pattern out code, for example reception can be
The watermark out code for operating key input by watermark pattern to user, then close watermark pattern, later, the both sides or multi-party
Conversation modes are switched to normal conversation mode from watermark pattern.
Watermark adding method shown in the present exemplary embodiment, when receiving watermark open command, if the terminal is aobvious
Include session window on the screen interface shown, then opens watermark pattern;Then, include in the session window more are obtained
The identity information of a user;And it is added to the Background of the screen interface using the identity information of the multiple user as watermark
In layer.As it can be seen that the watermark adding method that the embodiment of the present disclosure provides, when receiving watermark pattern open command, if the screen
Curtain includes session window on interface, then opens watermark pattern, and using the identity information of session both sides or multi-party user as water
Print is added in the Background From Layer of screen interface, convenient for protecting to the conversation recording, and verifies multi-party users identity information
Authenticity, improve the confidence level of conversation recording, reduce forge chat record a possibility that, further, detecting screen
When curtain interception instruction, screenshotss protection is carried out to the screen interface after the addition watermark, avoids unnecessary forgery screenshot, with
And when being connected to the instruction for closing watermark pattern, watermark pattern is closed, so that watermark pattern is switched to normal conversation mode.It is real
The multi-mode switching for having showed session, improves the satisfaction of user conversation.
Optionally, in another embodiment, the embodiment is on the basis of the above embodiments, described before adding watermark
Method can also include:
The identity information of the multiple user is ranked up according to setting sequence;
It is described to be added in the Background From Layer of the screen interface using the identity information of multiple users as watermark, it is specific to wrap
It includes:
Using the identity information of the multiple user after sequence as watermark, and it is added to the screen according to setting rule
In the Background From Layer at interface.
Specific implementation process in the embodiment, is detailed in above-mentioned, and details are not described herein.
Optionally, in another embodiment, the embodiment on the basis of the above embodiments, the identity of the multiple user
Information includes: multiple user identifiers, is being added to the screen interface for the identity information of the multiple user as watermark
Background From Layer in front of, the method can also include:
MD5 value is calculated according to the multiple user identifier;
Identity information and MD5 value to the multiple user are ranked up according to setting sequence;
It is described to be added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark, tool
Body includes:
Using the identity information of the multiple user after sequence and MD5 value as watermark, and it is added to according to setting rule
In the Background From Layer of the screen interface.
Further, the watermark adding method that the embodiment of the present disclosure provides, due to being calculated automatically according to multi-party users identifier
MD5 value out, and also watermark is used as to be added in the Background From Layer of screen interface MD5 value, it can accurately be sentenced according to the MD5 value
It is disconnected go out the picture be whose interception, reduce a possibility that screenshot is faked, provide reasonable chat record and put on record mechanism.
Optionally, in another embodiment, the embodiment on the basis of the above embodiments, open watermark pattern it
Before, the method can also include:
Whether detect on the screen interface that the terminal is shown includes session window;
If the step of on the screen interface including the session window, executing the unlatching watermark pattern;
If the screen interface does not include the session window, common screenshotss operation is directly carried out.
Its specific implementation process is detailed in above-mentioned, and details are not described herein.
The watermark adding method that the embodiment of the present disclosure provides detects the terminal when receiving watermark pattern open command
When whether including session window on the screen interface of display, and is just obtained in the session window when including session window and include
Multiple users identity information, improve obtain user identity information efficiency, then to the identity information of multiple users
It is ranked up according to setting sequence, and using the identity information of the multiple user after sequence as watermark according to setting rule
It is added in the Background From Layer of the screen interface, not only the session content is protected, and verifies multi-party users identity letter
The authenticity of breath improves the confidence level of conversation recording, avoids unnecessary forgery screenshot, reduces and forges chat record
Possibility further also improves the complexity of watermark.
Fig. 6 is a kind of block diagram of screen shots capture device shown according to an exemplary embodiment.Referring to Fig. 6, the dress
Setting includes: opening module 601, obtains module 602, adding module 603 and screen capture module 604.
The opening module 601 is configured as the screen shown in the instruction and the terminal for detecting screen printing
When including session window on interface, watermark pattern is opened;
The acquisition module 602 is configured as obtaining in the session window identity information for the multiple users for including;
The adding module 603 is configured as being added to the screen for the identity information of the multiple user as watermark
In the Background From Layer at interface;
The screen capture module 604 is configured as carrying out intercept operation to the screen interface for adding the watermark.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: the first sorting module (not shown), wherein
First sorting module is configured as adding the identity information of the multiple user as watermark in the adding module
Be added to before the step in the Background From Layer of the screen interface, to the identity information of the multiple user according to setting sequence into
Row sequence;
The adding module, be specifically configured to the identity information of the multiple user after sorting module sorts as
Watermark, and be added in the Background From Layer of the screen interface according to setting rule.
Optionally, in another embodiment, the embodiment on the basis of the above embodiments, the identity of the multiple user
Information includes: multiple user identifiers, and described device can also include: computing module 701 and the second sorting module 702, knot
Composition is as shown in Figure 7, wherein
Computing module 701 is configured as in the adding module 603 using the identity information of the multiple user as watermark
Before being added in the Background From Layer of the screen interface, MD5 value is calculated according to the multiple user identifier;
Second sorting module 702, be configured as to the identity information of the multiple user and MD5 value according to setting sequence into
Row sequence;
The adding module 603 is specifically configured to the multiple user after second sorting module 702 sorts
Identity information and MD5 value as watermark, be added in the Background From Layer of the screen interface according to setting rule.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: detection module (not shown), wherein
Detection module is configured as before the opening module opens watermark pattern, detects the screen that the terminal is shown
It whether include session window on curtain interface;
The opening module is specifically configured to detect to include conversation window on the screen interface in the detection module
When mouth, watermark pattern is opened;
The screen capture module is specifically configured to detect on the screen interface not include session in the detection module
When window, common screenshotss operation is directly carried out.
Fig. 8 is that a kind of watermark adding set is shown according to an exemplary embodiment, and described device is applied to terminal, the dress
Setting includes: opening module 81, obtains module 82 and adding module 83, wherein
Opening module 81 is configured as in screen circle for receiving watermark pattern open command and the terminal and showing
When including session window on face, watermark pattern is opened;
Module 82 is obtained, is configured as obtaining in the session window identity information for the multiple users for including;
Adding module 83 is configured as being added to the screen interface for the identity information of the multiple user as watermark
Background From Layer in.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: detection module and screen capture module (not shown), wherein
Detection module is configured as being added to the identity information of the multiple user as watermark in the adding module
After in the Background From Layer of the screen interface, detect whether to receive screen interception instruction;
Screen capture module is configured as when the detection module detects screen interception instruction, after adding the watermark
Screen interface carry out screenshotss operation.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: closedown module (not shown), wherein
Closedown module is configured as carrying out screenshotss operation to the screen interface after adding the watermark in the screen capture module
Later, when receiving watermark pattern out code, the watermark pattern is closed.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: the first sorting module (not shown), wherein
First sorting module is configured as adding the identity information of the multiple user as watermark in the adding module
Before being added in the Background From Layer of the screen interface, the identity information of the multiple user is arranged according to setting sequence
Sequence;
The adding module is specifically configured to the identity information of the multiple user after sorting as watermark, and
It is added in the Background From Layer of the screen interface according to setting rule.
Optionally, in another embodiment, the embodiment on the basis of the above embodiments, the identity of the multiple user
Information includes: multiple user identifiers, and described device can also include: computing module and the second sorting module (not shown),
Wherein,
Computing module is configured as adding in the adding module using the identity information of the multiple user as watermark
Before into the Background From Layer of the screen interface, MD5 value is calculated according to the multiple user identifier;
Second sorting module is configured as carrying out the identity information and MD5 value of the multiple user according to setting sequence
Sequence;
The adding module is specifically configured to the identity of the multiple user after second sorting module sorts
Information and MD5 value are added in the Background From Layer of the screen interface as watermark according to setting rule.
Optionally, in another embodiment, on the basis of the above embodiments, described device can also wrap the embodiment
It includes: detection module (not shown), wherein
Detection module is configured as before the opening module opens watermark pattern, detects the screen that the terminal is shown
It whether include session window on curtain interface;
The opening module is specifically configured to detect to include conversation window on the screen interface in the detection module
When mouth, watermark pattern is opened;
The screen capture module is additionally configured to detect on the screen interface not include conversation window in the detection module
When mouth, common screenshotss operation is directly carried out.
The disclosure also provides a kind of electronic equipment, and instant communication client is equipped on the electronic equipment, described instant
It include: watermark pattern operation key on telecommunication customer end, the watermark pattern operation key is fast keyed with screenshotss in the terminal,
Wherein, the watermark pattern operation key is configured as above-mentioned watermark adding method or above-mentioned screen shots intercept method.
Wherein, watermark pattern operation key can be set in the setting a property of instant communication client, it is of course also possible to which the visitor is arranged in
The other positions at family end, the present embodiment is with no restriction.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 9 is the block diagram of a kind of electronic equipment 900 shown according to an exemplary embodiment.Electronic equipment can be movement
Terminal may be server, be illustrated so that electronic equipment is mobile terminal as an example in the embodiment of the present disclosure.For example, electronics is set
Standby 900 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, medical treatment
Equipment, body-building equipment, personal digital assistant etc..
Referring to Fig. 9, electronic equipment 900 may include following one or more components: processing component 902, memory 904,
Electric power assembly 906, multimedia component 908, audio component 910, the interface 912 of input/output (I/O), sensor module 914,
And communication component 916.
The integrated operation of the usual controlling electronic devices 900 of processing component 902, such as with display, call, data are logical
Letter, camera operation and record operate associated operation.Processing component 902 may include one or more processors 920 to hold
Row instruction, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more moulds
Block, convenient for the interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, with
Facilitate the interaction between multimedia component 908 and processing component 902.
Memory 904 is configured as storing various types of data to support the operation in electronic equipment 900.These data
Example include any application or method for being operated on electronic equipment 900 instruction, contact data, telephone directory
Data, message, picture, video etc..Memory 904 can by any kind of volatibility or non-volatile memory device or it
Combination realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable
Except programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, fastly
Flash memory, disk or CD.
Power supply module 906 provides electric power for the various assemblies of electronic equipment 900.Power supply module 906 may include power supply pipe
Reason system, one or more power supplys and other with for electronic equipment 900 generate, manage, and distribute the associated component of electric power.
Multimedia component 908 includes the screen of one output interface of offer between the electronic equipment 900 and user.
In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface
Plate, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touches
Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding
The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.In some embodiments,
Multimedia component 908 includes a front camera and/or rear camera.When electronic equipment 900 is in operation mode, as clapped
When taking the photograph mode or video mode, front camera and/or rear camera can receive external multi-medium data.It is each preposition
Camera and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike
Wind (MIC), when electronic equipment 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone
It is configured as receiving external audio signal.The received audio signal can be further stored in memory 904 or via logical
Believe that component 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.
I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 914 includes one or more sensors, for providing the state of various aspects for electronic equipment 900
Assessment.For example, sensor module 914 can detecte the state that opens/closes of electronic equipment 900, the relative positioning of component, example
As the component be electronic equipment 900 display and keypad, sensor module 914 can also detect electronic equipment 900 or
The position change of 900 1 components of electronic equipment, the existence or non-existence that user contacts with electronic equipment 900, electronic equipment 900
The temperature change of orientation or acceleration/deceleration and electronic equipment 900.Sensor module 914 may include proximity sensor, be configured
For detecting the presence of nearby objects without any physical contact.Sensor module 914 can also include optical sensor,
Such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, which may be used also
To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between electronic equipment 900 and other equipment.
Electronic equipment 900 can access the wireless network based on communication standard, such as WiFi, carrier network (such as 2G, 3G, 4G or 5G),
Or their combination.In one exemplary embodiment, communication component 916 receives via broadcast channel and comes from external broadcasting management
The broadcast singal or broadcast related information of system.In one exemplary embodiment, the communication component 916 further includes that near field is logical
(NFC) module is believed, to promote short range communication.For example, radio frequency identification (RFID) technology, infrared data association can be based in NFC module
Meeting (IrDA) technology, ultra wide band (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, electronic equipment 900 can be by one or more application specific integrated circuit (ASIC), number
Word signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing in above-mentioned Fig. 1, Fig. 2 and Fig. 3
Shown in screen shots intercept method, or for executing watermark adding method shown in above-mentioned Fig. 3, Fig. 4.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 920 of electronic equipment 900 to complete above-mentioned Fig. 1, Fig. 2
With screen shots intercept method shown in Fig. 3, or for executing watermark adding method shown in above-mentioned Fig. 3, Fig. 4.Example
Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft
Disk and optical data storage devices etc..
In the exemplary embodiment, a kind of computer program product is additionally provided, when the instruction in computer program product
When being executed by the processor 920 of electronic equipment 900, so that electronic equipment 900 executes screen shown in above-mentioned Fig. 1, Fig. 2 and Fig. 3
Curtain picture intercept method, or for executing watermark adding method shown in above-mentioned Fig. 3, Fig. 4.
Figure 10 is the block diagram of a kind of electronic equipment 1000 shown according to an exemplary embodiment.For example, electronic equipment
1000 may be provided as a server.Referring to Fig.1 0, it further comprises one that electronic equipment 1000, which includes processing component 1022,
A or multiple processors, and the memory resource as representated by memory 1032, can be by processing component 1022 for storing
The instruction of execution, such as application program.The application program stored in memory 1032 may include one or more every
One corresponds to the module of one group of instruction.In addition, processing component 1022 is configured as executing instruction, to execute above-mentioned Fig. 1, Fig. 2
With screen shots intercept method shown in Fig. 3, or for executing watermark adding method shown in above-mentioned Fig. 3, Fig. 4,
In, the screen shots intercept method includes:
When detecting screen printing instruction, watermark pattern is opened;It obtains on the screen interface that the terminal is shown and includes
Multiple users identity information;It is added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer;Screenshotss operation is carried out to the screen interface for adding the watermark.
Electronic equipment 1000 can also include that a power supply module 1026 is configured as executing the power supply of electronic equipment 1000
Management, a wired or wireless network interface 1050 is configured as electronic equipment 1000 being connected to network and an input is defeated
(I/O) interface 1058 out.Electronic equipment 1000 can be operated based on the operating system for being stored in memory 1032, such as
Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (10)
1. a kind of screen shots intercept method, which is characterized in that be applied to terminal, which comprises
When detecting screen printing instruction, if including session window on the screen interface that the terminal is shown, open
Open watermark pattern;
Obtain the identity information for the multiple users for including in the session window;
It is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark;
Screenshotss operation is carried out to the screen interface after the addition watermark.
2. the method according to claim 1, wherein the identity information of the multiple user includes: multiple users
Identifier, in the Background From Layer that the identity information of the multiple user is added to the screen interface as watermark before,
The method also includes:
MD5 value is calculated according to the multiple user identifier;
Identity information and MD5 value to the multiple user are ranked up according to setting sequence;
It is described to be added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark, it is specific to wrap
It includes:
Using the identity information of the multiple user after sequence and MD5 value as watermark, and it is added to according to setting rule described
In the Background From Layer of screen interface.
3. method according to claim 1 or 2, which is characterized in that before opening watermark pattern, the method is also wrapped
It includes:
Whether detect on the screen interface that the terminal is shown includes session window;
If the step of on the screen interface including the session window, executing the unlatching watermark pattern;
If the screen interface does not include the session window, common screenshotss operation is directly carried out.
4. a kind of watermark adding method, which is characterized in that be applied to terminal, which comprises
When receiving watermark pattern open command, if on the screen interface that the terminal is shown including session window,
Open watermark pattern;
Obtain the identity information for the multiple users for including in the session window;
It is added in the Background From Layer of the screen interface using the identity information of the multiple user as watermark.
5. according to the method described in claim 4, it is characterized in that, adding using the identity information of the multiple user as watermark
After being added in the Background From Layer of the screen interface, the method also includes:
When detecting screen interception instruction, screenshotss operation is carried out to the screen interface after the addition watermark.
6. a kind of screen shots capture device, which is characterized in that be applied to terminal, described device includes:
Opening module, be configured as in the instruction and the screen interface that shows of the terminal for detecting screen printing include
When session window, watermark pattern is opened;
Module is obtained, is configured as obtaining in the session window identity information for the multiple users for including;
Adding module is configured as being added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer;
Screen capture module is configured as carrying out intercept operation to the screen interface for adding the watermark.
7. a kind of watermark adding set, which is characterized in that be applied to terminal, described device includes:
Opening module is configured as wrapping on receiving the screen interface that watermark pattern open command and the terminal are shown
When including session window, watermark pattern is opened;
Module is obtained, is configured as obtaining in the session window identity information for the multiple users for including;
Adding module is configured as being added to the background of the screen interface using the identity information of the multiple user as watermark
In figure layer.
8. a kind of electronic equipment, which is characterized in that be equipped with instant communication client, the instant messaging on the electronic equipment
It include: watermark pattern operation key in client, the watermark pattern operation key is fast keyed with screenshotss in the terminal,
In, the watermark pattern operation key be configured as perform claim require any one of 1 to 3 described in screen shots intercept method or
Person's perform claim requires 4 or 5 described in any item watermark adding methods.
9. a kind of electronic equipment characterized by comprising
Processor;
For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to perform claim require any one of 1 to 3 described in screen shots intercept method or
Watermark adding method described in perform claim requirement 4 or 5.
10. a kind of non-transitorycomputer readable storage medium, which is characterized in that when the instruction in the storage medium is by electronics
When the processor of equipment executes, so that the electronic equipment is able to carry out screen shots described in any one of claims 1 to 3
Watermark adding method described in intercept method or perform claim requirement 4 or 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811627124.7A CN109828810A (en) | 2018-12-28 | 2018-12-28 | Screen shots intercept method, watermark adding method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811627124.7A CN109828810A (en) | 2018-12-28 | 2018-12-28 | Screen shots intercept method, watermark adding method, device, equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109828810A true CN109828810A (en) | 2019-05-31 |
Family
ID=66861307
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811627124.7A Pending CN109828810A (en) | 2018-12-28 | 2018-12-28 | Screen shots intercept method, watermark adding method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109828810A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111402109A (en) * | 2020-03-07 | 2020-07-10 | 北京北信源软件股份有限公司 | Method and device for setting digital watermark of instant messaging user interface |
CN112131539A (en) * | 2020-09-28 | 2020-12-25 | 北京达佳互联信息技术有限公司 | Watermark information adding method and device |
CN112306590A (en) * | 2019-07-30 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Screenshot generating method and related device |
CN113542206A (en) * | 2020-11-27 | 2021-10-22 | 腾讯科技(深圳)有限公司 | Image processing method and device and computer readable storage medium |
CN113923482A (en) * | 2021-09-02 | 2022-01-11 | 北京奇艺世纪科技有限公司 | A video playback method, system, electronic device and storage medium |
CN114637971A (en) * | 2022-03-28 | 2022-06-17 | 中国银行股份有限公司 | Information leakage tracking method and device for mobile terminal office chat software |
CN115562943A (en) * | 2022-10-21 | 2023-01-03 | 湖南北斗赛格导航科技有限公司 | Method, system, equipment and medium for monitoring computer screen |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102685076A (en) * | 2011-03-16 | 2012-09-19 | 中国电信股份有限公司 | Online information protection method and device |
CN105306479A (en) * | 2015-11-11 | 2016-02-03 | 江苏中威科技软件系统有限公司 | Computer data embedding method, computer data displaying method and computer data embedding and displaying device |
CN105653195A (en) * | 2016-01-29 | 2016-06-08 | 广东欧珀移动通信有限公司 | Screen capturing method and mobile terminal |
CN106023059A (en) * | 2016-05-26 | 2016-10-12 | 北京启迪思创科技有限公司 | Watermarking information generation method and apparatus |
US20170091835A1 (en) * | 2008-12-04 | 2017-03-30 | International Business Machines Corporation | System and method for item inquiry and information presentation via standard communication paths |
CN107015744A (en) * | 2017-05-18 | 2017-08-04 | 广东小天才科技有限公司 | Screen capture control method of tablet device and tablet device |
CN107885565A (en) * | 2017-10-31 | 2018-04-06 | 平安科技(深圳)有限公司 | Watermark embedding method, device, equipment and the storage medium at financial APP interfaces |
CN108985081A (en) * | 2018-07-06 | 2018-12-11 | 泰康保险集团股份有限公司 | A kind of watermark encrypting method, apparatus, medium and electronic equipment |
US20180373851A1 (en) * | 2015-09-09 | 2018-12-27 | Airwatch Llc | Screen shot marking and identification for device security |
-
2018
- 2018-12-28 CN CN201811627124.7A patent/CN109828810A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170091835A1 (en) * | 2008-12-04 | 2017-03-30 | International Business Machines Corporation | System and method for item inquiry and information presentation via standard communication paths |
CN102685076A (en) * | 2011-03-16 | 2012-09-19 | 中国电信股份有限公司 | Online information protection method and device |
US20180373851A1 (en) * | 2015-09-09 | 2018-12-27 | Airwatch Llc | Screen shot marking and identification for device security |
CN105306479A (en) * | 2015-11-11 | 2016-02-03 | 江苏中威科技软件系统有限公司 | Computer data embedding method, computer data displaying method and computer data embedding and displaying device |
CN105653195A (en) * | 2016-01-29 | 2016-06-08 | 广东欧珀移动通信有限公司 | Screen capturing method and mobile terminal |
CN106023059A (en) * | 2016-05-26 | 2016-10-12 | 北京启迪思创科技有限公司 | Watermarking information generation method and apparatus |
CN107015744A (en) * | 2017-05-18 | 2017-08-04 | 广东小天才科技有限公司 | Screen capture control method of tablet device and tablet device |
CN107885565A (en) * | 2017-10-31 | 2018-04-06 | 平安科技(深圳)有限公司 | Watermark embedding method, device, equipment and the storage medium at financial APP interfaces |
CN108985081A (en) * | 2018-07-06 | 2018-12-11 | 泰康保险集团股份有限公司 | A kind of watermark encrypting method, apparatus, medium and electronic equipment |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112306590A (en) * | 2019-07-30 | 2021-02-02 | 腾讯科技(深圳)有限公司 | Screenshot generating method and related device |
CN111402109A (en) * | 2020-03-07 | 2020-07-10 | 北京北信源软件股份有限公司 | Method and device for setting digital watermark of instant messaging user interface |
CN112131539A (en) * | 2020-09-28 | 2020-12-25 | 北京达佳互联信息技术有限公司 | Watermark information adding method and device |
CN112131539B (en) * | 2020-09-28 | 2024-05-14 | 北京达佳互联信息技术有限公司 | Watermark information adding method and device |
CN113542206A (en) * | 2020-11-27 | 2021-10-22 | 腾讯科技(深圳)有限公司 | Image processing method and device and computer readable storage medium |
CN113542206B (en) * | 2020-11-27 | 2023-07-04 | 腾讯科技(深圳)有限公司 | Image processing method, device and computer readable storage medium |
CN113923482A (en) * | 2021-09-02 | 2022-01-11 | 北京奇艺世纪科技有限公司 | A video playback method, system, electronic device and storage medium |
CN114637971A (en) * | 2022-03-28 | 2022-06-17 | 中国银行股份有限公司 | Information leakage tracking method and device for mobile terminal office chat software |
CN115562943A (en) * | 2022-10-21 | 2023-01-03 | 湖南北斗赛格导航科技有限公司 | Method, system, equipment and medium for monitoring computer screen |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109828810A (en) | Screen shots intercept method, watermark adding method, device, equipment and medium | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN104850769B (en) | Operation executes method and device | |
CN104933351B (en) | The treating method and apparatus of information security | |
CN105120122A (en) | Alarm method and device | |
CN105516508A (en) | Method and device for activating virtual SIM card | |
CN104837154B (en) | The control method and device of wireless access points | |
CN105335062B (en) | Information editing's operation processing method and device | |
CN105554255B (en) | Method of controlling operation thereof and device for terminal device | |
US20180144176A1 (en) | Fingerprint template acquisition method and device | |
EP3644177B1 (en) | Input method, device, apparatus, and storage medium | |
CN105791325A (en) | Image sending method and device | |
CN104899501A (en) | Dialog list display method and device and terminal | |
CN105868709A (en) | Method and apparatus for closing fingerprint identifying function | |
CN106775224A (en) | Remark information method to set up and device | |
CN106529253A (en) | Unlocking method and apparatus, and terminal device | |
CN106096369A (en) | Method, device and mobile terminal to terminal user ID checking | |
CN107733872A (en) | Information Method of printing and device | |
CN104883385B (en) | Rich media file transmission method and device | |
CN104918253B (en) | Recognition methods, device and the terminal device of false base station | |
CN108984098A (en) | The control method and device that information based on social software is shown | |
US10263925B2 (en) | Method, device and medium for sending message | |
CN106534551B (en) | Information display method and device | |
CN105430639B (en) | Information processing method and device | |
CN105069344B (en) | mobile terminal locking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190531 |
|
RJ01 | Rejection of invention patent application after publication |