CN107733773A - Information protecting method, protection information dispensing device and protection information reception device - Google Patents
Information protecting method, protection information dispensing device and protection information reception device Download PDFInfo
- Publication number
- CN107733773A CN107733773A CN201610658982.2A CN201610658982A CN107733773A CN 107733773 A CN107733773 A CN 107733773A CN 201610658982 A CN201610658982 A CN 201610658982A CN 107733773 A CN107733773 A CN 107733773A
- Authority
- CN
- China
- Prior art keywords
- information
- sensitive
- sent
- protection
- limitation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present invention provides a kind of information protecting method, protection information dispensing device and protection information reception device, and protection information dispensing device determines sensitive information from by all information to be sent;For these sensitive informations, corresponding limitation operation is set;Then sensitive information is sent to information receiving end, corresponding limit of the information receiving end sensitive information is informed about to operate, information receiving end is monitored to the information received, when the information for monitoring to receive is sensitive information, and it is when limiting operation to be directed to the operation that the sensitive information is initiated, and will forbid the operation to sensitive information initiation.On the one hand it can play a part of protecting the sensitive information, on the other hand, be readily applicable to various occasions.Solve directly to destroy protection information present in prior art, be not easy to the follow-up of user and check, it is impossible to while information is retained, limit the problem of user is directed to the operation of the information.
Description
Technical field
The present invention relates to information security field, more particularly to information protecting method, protection information dispensing device and protection letter
Cease reception device.
Background technology
With internet and mobile intelligent terminal explosive increase, all kinds of social networking applications are quickly grown, and what it is such as wechat class is
When communication system, common people's popularization degree is very high, and the live and work exchange to masses brings great convenience, but simultaneously, because instant
Information is easily stolen, some classified informations or the information that is not intended to be obtained by third party easily by random diffusion and propagation,
Larger safety problem is brought to instant messages.
In order to solve the safety problem that instant messages are arbitrarily spread and propagated, solution party is it is also proposed in the prior art
Formula is in the prior art, general by the way of being destroyed by fire after reading.The sender of information can be with configuration information when retaining
Between so that auto-destruct information in the short period of recipient upon receiving this information.
Using mode of the prior art come carry out information protection can be so that information obtains preferably protecting safe coefficient
Reliable, still, it is exactly that information can not preserve for a long time that it, which has the defects of larger, is generally required in people's daily life
Some information are temporarily retained, to use in the near future.If using aforesaid way, will be brought not to the normal use of information
Just, institute is in the above described manner, it is impossible to and it is real now for some privacy informations, while information is retained, user's pin can also be limited
Operation to the information.
In summary, protection information is directly destroyed in the prior art, is not easy to the follow-up of user and checks, it is impossible to retaining
While information, limitation user is directed to the operation of the information.
The content of the invention
Information protecting method and its device provided in an embodiment of the present invention, mainly solve in the prior art that protection information is straight
Pin is ruined, and is not easy to the follow-up of user and is checked, the problem of not being suitable for the protection of instant messages.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of information protecting method, including:
Sensitive information is determined from by all information to be sent;
For the sensitive information, corresponding limitation operation is set;
Information receiving end is sent to by operation is limited corresponding to the sensitive information and the sensitive information.
The embodiment of the present invention also provides another information protecting method, including:
Operation monitoring is carried out to the information received;
When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information is grasped for limitation
When making, forbid the operation.
The embodiment of the present invention provides a kind of information protection device, including:
Protection information selecting module:For determining sensitive information from by all information to be sent;
Setup module:For setting corresponding limitation operation for the sensitive information;
Protection information sending module:For limitation operation corresponding to the sensitive information and the sensitive information to be sent
To information receiving end.
The embodiment of the present invention also provides another information protection device, including:
Monitoring modular:For carrying out operation monitoring to the information received;
Processing module:For being sensitive information when the information for monitoring to receive, and initiated for the sensitive information
Operation for limitation operation when, forbid the operation.
The embodiment of the present invention also provides a kind of computer-readable storage medium, and computer is stored with the computer-readable storage medium
Executable instruction, the computer executable instructions are used for the information protecting method for performing foregoing any one.
The beneficial effects of the invention are as follows:
Information protecting method, protection information dispensing device and the protection information provided according to embodiments of the present invention receives dress
Put, protection information dispensing device determines sensitive information from by all information to be sent, and so-called sensitive information is namely
Information to be protected;For these sensitive informations, corresponding limitation operation is set;Then sensitive information is sent to information receiving end,
Inform about corresponding limit of the information receiving end sensitive information to operate, protection information reception device is as information receiving end, certainly
Body is monitored to the information received, is sent out when the information for monitoring to receive is sensitive information, and for the sensitive information
When the operation risen operates for limitation, the operation initiated the sensitive information will be forbidden, through the above way to the letter of transmission
Breath makes a distinction, only to needing information to be protected to take corresponding safeguard measure, when for needing information to be protected to initiate operation,
And the operation is when limiting operation, to forbid the operation.Compared with the mode of prior art, only forbid to the sensitive information
Limitation operation, but other operation or can normally perform, on the one hand can play a part of protect the sensitive information, separately
On the one hand, various occasions are readily applicable to.Solve directly to destroy protection information present in prior art, be not easy to user
Follow-up check, it is impossible to while information is retained, limitation user for the information operation the problem of.
Brief description of the drawings
Fig. 1 is the flow chart of the information protecting method in the embodiment of the present invention one;
Fig. 2 is the structural representation of the protection information dispensing device in the embodiment of the present invention one;
Fig. 3 is the flow chart of the information protecting method in the embodiment of the present invention two;
Fig. 4 is the structural representation of the protection information reception device in the embodiment of the present invention two;
Fig. 5 is the flow of the information protecting method in the information transmitting terminal execution embodiment one in the embodiment of the present invention three
Figure;
Fig. 6 is the flow of the information protecting method in the information receiving end execution embodiment two in the embodiment of the present invention three
Figure;
Fig. 7 is protection information dispensing device and the execution of protection information reception device in inventive embodiments one and embodiment two
The flow chart of information protecting method in embodiment three.
Embodiment
The embodiment of the present invention is described in further detail below by embodiment combination accompanying drawing.
Embodiment one:
In order to solve in the prior art directly to destroy protection information, caused the follow-up of user that be not easy to is checked, uncomfortable
The problem of protection for instant messages, the present embodiment provide a kind of information protecting method, refer to Fig. 1, this method includes:
S101:Sensitive information is determined from by all information to be sent;
S102:For sensitive information, corresponding limitation operation is set;
S103:Information receiving end is sent to by operation is limited corresponding to sensitive information and the sensitive information.
In step S101, the information that be able to will be sent to user is classified, and is determined in the information to be sent from these
Go out sensitive information, so-called sensitive information i.e. information to be protected, specifically determining the process of sensitive information can use down
State mode.Protection keyword can be set in advance, and protection keyword can flexibly be set by user according to real needs.Here institute
The protection keyword said is probably certain some specific keyword, for example, the wording such as " bank card ", all to carry " bank card " word
The information of eye can be identified;It can also be a category information, but not be worth specifically, for example, " phone number ", institute
Some phone numbers can be identified.Keyword mentioned here might not occur in the form of word, such as can also
It is picture, voice messaging etc..Above-mentioned embodiment is any without being carried out to the present embodiment only as the explanation to the present embodiment
Limit.
When user want send an information, this information be exactly by all information to be sent, will be to be sent
All information in the information that includes matched with protection keyword, whether see will include this in all information to be sent
A little protection keywords, are sensitive informations if comprising if, being considered as this by all information to be sent;If do not include
Be not just, in this way when.It can set the grade of all information to be sent in advance, for example, can set and be
Level information, portion's rating information and assigned stages information.Include all letters to be sent for system level information in system
Breath;Part level information includes the partial information in all information that will be sent;Include being sent out for assigned stages information
The appointed information of a certain bar in all information sent.So the setting of system level information is to the information system in whole system
System comes into force, and the setting of portion's rating information may be to coming into force to some single chat or group chat information, and the setting of assigned stages information is only to certain
Bar information comes into force.For example, user may think that a certain bar information is especially important, and special privacy, it is believed that it should be protected,
Then this information is set as sensitive information, and this mode is exactly to set assigned stages information mode.
Screening for sensitive information in portion's rating information and system level information, it is crucial that above-mentioned setting protection can be combined
The scheme of word carries out the screening of sensitive information.For example, user may think that the exchange of information with someone or some group compares
It is important, set to all information of this people or this pocket transmission and be required for being protected, will be sent out in this mode
All information sent just belong to portion's rating information.When user sends information, shielded group or individual is belonged to when monitoring
The information of people, these information can just be matched these information with protection keyword using aforesaid way.User may
Think to be required for being protected for all information sent, all information that can also be in setting system are required for being protected
Shield, then all information sent in system are set to be required for being matched, to carry out the screening of sensitive information, that is to say, that
User's each information to be sent, can all perform above-mentioned matching process, sensitive letter is matched from all information of transmission
Cease, all information to be sent are just belonged into system level information in this mode.For assigned stages information, typically by user
Specify, a certain bar information, naturally, the information inherently sensitive information.
After setting the screening rule of sensitive information, step S102 is performed, corresponding limitation behaviour is set for sensitive information
Make.Limitation operates any one or more that can include in the operation of limitation screenshotss, limitation duplication operation, limitation forwarding operation.
Such as set the limitation for system-level sensitive information to operate and operated for limitation screenshotss, if some system-level information is judged to
It is set to sensitive information, the screenshotss authority of the sensitive information will be limited.Specifically, can be to the sensitivity of information not at the same level
Information sets different limitation operations, and is directed to the limitation operation setting priority that different stage information needs to follow.For example, can
With setting, the highest priority of limitation operating right corresponding to assigned stages information, next to that the sensitive information in portion's rating information,
It is finally the sensitive information in system level information.For example, there is provided the limitation of the sensitive information in system level information operation to cut
Screen operation, the limitation operation of limitation operation corresponding to assigned stages information replicate operation for the operation of limitation screenshotss and limitation.Use now
Family will send an information, and it is sensitive information to specify it, and first, the information is the sensitive information belonged in system level information;
Secondly, it is also to belong to assigned stages information, but due to assigned stages information, so its highest priority for enjoying, so this is quick
The limitation operation for feeling information final choice should be just that the operation of limitation screenshotss and limitation replicate operation.
After above-mentioned steps are completed, it is possible to perform step S103, all information to be sent will be sent into information
Receiving terminal, can also limitation behaviour corresponding to the notification receiving terminal sensitive information if the information sent is sensitive information
Make.
The present embodiment also provides a kind of protection information dispensing device, refer to Fig. 2, and the protection information dispensing device includes protecting
Information choice module 21 is protected, for determining sensitive information from by all information to be sent.
The information that protection information selecting module 21 be able to will be sent to user is classified, in the information to be sent from these
Sensitive information is determined, following manner can be used by specifically determining the process of sensitive information.The protection information dispensing device is also
Including keyword setup module 22, keyword setup module 22 can set protection keyword in advance, and protection keyword can be by
User flexibly selects according to real needs.Protection keyword mentioned here is probably certain some specific keyword, can also
It is a category information, but is not worth specifically.Keyword mentioned here might not occur in the form of word, for example,
Can be picture, voice messaging etc..Above-mentioned embodiment is only as the explanation to the present embodiment, without being carried out to the present embodiment
Any restriction.
Protection information dispensing device also includes grade classification module 23, and grade classification module 23 can be set in advance will be by
The grade of all information sent, for example, system level information, portion's rating information and assigned stages information can be set.For being
Level information is included all information to be sent in system;Part level information is included in all information that will be sent
Partial information;Include the appointed information of a certain bar in all information that will be sent for assigned stages information.So it is
The setting of level information comes into force to the information system in whole system, and the setting of portion's rating information may be to some single chat or group
Merely information comes into force, and the setting of assigned stages information only comes into force to certain information.For example, user may think that a certain bar information is especially heavy
Will, special privacy, it is believed that it should be protected, then set this information as sensitive information, this mode is exactly to set
Assigned stages information mode.
Screening for sensitive information in portion's rating information and system level information, it is crucial that above-mentioned setting protection can be combined
The scheme of word carries out the screening of sensitive information.For example, user may think that the exchange of information with someone or some group compares
Important, protection information selecting module 21 sets to all information of this people or this pocket transmission and is required for being protected,
Set to all information of this people or this pocket transmission and be required for being protected, by institute to be sent in this mode
There is information just to belong to portion's rating information.When user sends information, the letter of shielded group or individual are belonged to when monitoring
Breath, these information can just be matched these information with protection keyword using aforesaid way.User may think that pin
All information of transmission are required for protecting, all information that protection information selecting module 21 can also be in setting system
It is required for being protected, then sets all information sent in system to be required for being matched, to carry out the sieve of sensitive information
Choosing, that is to say, that user's each information to be sent, above-mentioned matching process can be all performed, from all information of transmission
Match sensitive information, all information to be sent are just belonged into system level information in this mode.For assigned stages information,
Typically specified by user, a certain bar information, naturally, the information inherently sensitive information.
The protection information dispensing device also includes limitation operation processing module 24, corresponding to being set for sensitive information
Limitation operation.When the mode of sensitive information during user is from portion's rating information and system level information, above-mentioned set can be combined
The scheme for putting protection keyword carries out the screening of sensitive information.Limit screenshotss operation, limitation replicates operation, limitation forwarding operation
In any one or more.
For example, limitation operation processing module 24 sets the limitation for system-level sensitive information to operate for limitation screenshotss behaviour
Make, if some system-level information is judged as sensitive information, the screenshotss authority of the sensitive information will be limited.Tool
Body, limitation operation processing module 24 can set different limitations to operate the sensitive information of information not at the same level, and for not
Same level information needs the limitation operation setting priority followed.For example, it can set, limitation operation corresponding to assigned stages information
The highest priority of authority, next to that the sensitive information in portion's rating information, is finally the sensitive information in system level information.
The protection information dispensing device also includes protection information sending module 25, for by by all information to be sent
Information receiving end is sent to, can also the notification receiving terminal sensitive information pair if the information sent is sensitive information
The limitation operation answered.Described information in the present embodiment, can include short message or various use application software are carried out
Interactive information, for example, QQ, wechat, microblogging etc..
Protection information dispensing device in the present embodiment can be used for realizing the information protecting method in the present embodiment, this implementation
All steps of information protecting method in example have corresponding module to complete in protection information dispensing device.The present embodiment
In protection information dispensing device can be arranged in various terminals.Terminal can be come in a variety of manners in fact in the present embodiment
Apply, for example, such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digitals can be included
Assistant), PAD (tablet personal computer), PMP (portable media player), guider etc. mobile terminal and it is all in full
The fixed terminal of word TV, desktop computer etc..These terminals all carry information sending module, can complete information transmission.This
Each functional module of protection information dispensing device in embodiment, protection information selecting module 21, keyword setup module 22,
Limitation operation processing module 23, the function of protection information sending module 24 can be realized by the processor of terminal.
, can be according to specific protection keyword using the information protecting method in the present embodiment and protection information dispensing device
The difference of selection sets different sensitive informations, can also be that different sensitive informations set different limitation operations.Such one
Come, be more convenient the protection for sensitive information, and different grades of protection, Consumer's Experience can be divided into according to different demands
More preferably.
Embodiment two:
The present embodiment provides another information protecting method, refer to Fig. 3, the information protecting method includes:
S301:Operation monitoring is carried out to the information received;
S302:When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information is limited
During system operation, forbid the operation.
Information protecting method in the present embodiment is relative with the information protecting method that embodiment is a kind of, a kind of side of embodiment
Method is the step performed by sensitive information sender, and the information protecting method in the present embodiment is performed by sensitive information recipient
The step of.
So the information protecting method in the present embodiment, can first receive the information that sensitive information sender sends, these
Information may some belong to sensitive information, but it is also possible that some are not sensitive informations.Can be to the information that receives and right
The operation of these information is monitored, and performs step S301.Generally, in monitoring process, the mistake judged may can be also accompanied by
Journey, an information is received, it is sensitive information to judge the information, if sensitive information so limitation corresponding to it operates again
What is.In embodiment one kind, when being described sensitive information sender transmission sensitive information, sensitive information can be also informed
Corresponding limitation operation.When receiving an information, and receive limitation operation corresponding to the information, it is possible to know that the information is agreed
Surely it is to belong to sensitive information, and has also known limitation operation corresponding to it.
When the information for monitoring to receive is sensitive information, and limitation operation corresponding to its is known, but also has monitored
Certain operation will be carried out to the sensitive information to user, and this operation that will be carried out just is that the sensitive information is corresponding
Limitation operation when, the execution of the operation can be forbidden.For example, when receiving a sensitive information, the sensitive information corresponds to
Limitation operation be limitation screenshotss operation and limitation replicate operation.When attempting replicate operation to the sensitive information, can hinder
The only duplication operation of user, and prompt user that the operation is invalid.
In a kind of embodiment, it can also choose whether to destroy for sensitive information according to real needs.
It can set when user attempts to perform the limitation operation certain number of arrival, destroy the sensitive information.For example, showing in the preceding paragraph
In example, after the user replicates failure for this sensitive information, repeat replication operates always, is limitation behaviour due to replicating operation
Make, and be previously set, repeat if limitation operation reaches 10 times and just destroy corresponding sensitive information.Then, when this
User's repeat replication operate 10 times when, the sensitive information can be destroyed.The process specifically destroyed can be completed by itself,
Can when user being repeated into limitation operation to reach preset times, give the message informing to sensitive information sender, believed by sensitivity
Breath sender carrys out the remote destroying sensitive information.Any mode is specifically selected, can be flexible according to real needs due to user
Selection.
The present embodiment also provides a kind of protection information reception device, refer to Fig. 4, including sensitive information receiving module 41,
For receive sensitive information sender transmission information, these information may some belong to sensitive information, but it is also possible that having
A little is not sensitive information.
Protection information reception device, in addition to monitoring modular 42, can be to the information received and the behaviour to these information
It is monitored.Generally, in monitoring process, possible monitoring modular 42 can also be accompanied by the process judged, receive an information,
It is sensitive information to judge the information, if sensitive information is so corresponding to it, what limitation operation is again.When receiving one
Bar information, and receive limitation operation corresponding to the information, it is possible to it is to belong to sensitive information certainly to know the information, and
Limitation operation corresponding to it is known.
Protection information reception device also includes processing module 43, when the information that monitoring modular 42 monitors to receive is sensitivity
Information, and known limitation operation corresponding to it, but also monitor that user will carry out certain operation to the sensitive information,
And when this operation that will be carried out just is limitation operation corresponding to the sensitive information, processing module 43 can forbid this
The execution of operation.For example, when receiving a sensitive information, limitation operation corresponding to the sensitive information be the operation of limitation screenshotss and
Limitation replicates operation.When attempting replicate operation to the sensitive information, processing module 43 can prevent the duplication of user from operating,
It can also prompt user's operation invalid.
Described information in the present embodiment, can include short message or various use application software interact
Information, for example, QQ, wechat, microblogging etc..Limitation operation in the present embodiment can also include screenshotss operation, duplication operates,
Forward any one or more in operation.
Protection information reception device in the present embodiment can be used for realizing the information protecting method in the present embodiment, this implementation
All steps of information protecting method in example have corresponding module to complete in protection information dispensing device.The present embodiment
In protection information reception device can be arranged in various terminals.Terminal can be come in a variety of manners in fact in the present embodiment
Apply, for example, such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digitals can be included
Assistant), PAD (tablet personal computer), PMP (portable media player), guider etc. mobile terminal and it is all in full
The fixed terminal of word TV, desktop computer etc..These terminals all carry information sending module, can complete information transmission.This
Each functional module of protection information dispensing device in embodiment, sensitive information receiving module 41, monitoring modular 42, processing mould
The function of block 43 can be realized by the processor of terminal.
Using the information protecting method in the present embodiment and protection information reception device, on the one hand can playing protection, this is quick
Feel the effect of information, on the other hand, be readily applicable to various occasions.Solve present in prior art that protection information is direct
Destroy, be not easy to the follow-up of user and check, the problem of not being suitable for the protection of instant messages.
Embodiment three:
The present embodiment provides the specific example using above-described embodiment one and the information protecting method in embodiment two.The party
Method is performs in information transmitting terminal the step of, including:Setting up procedure and information transmission process, the process of being provided with refer to Fig. 5,
S501:The grade of security feature is set;System level information, portion's rating information and assigned stages letter can be included respectively
Breath.
S502:The screening that sensitive information is carried out according to keyword match is set;Satisfactory information could be arranged to quick
Feel information.
S503:The limitation for sensitive information is set to operate;Setting whether need restricted information recipient screenshotss, duplication,
Forwarding, it is settable only to limit a certain item, can also limit simultaneously it is multinomial, it is also settable to monitor recipient and attempt to perform limitation operation
Whether need to give afterwards prompt, whether chat message etc. is destroyed in auto-destruct chat message or remote control.
S504:Every setting in above-mentioned steps is preserved, and enters information transmission interface and enters row information transmission.
After above-mentioned S501-S504 setting up procedure has been performed, send into information, can be sent out when information is sent
Send the limitation for the information to operate, but it is also possible to after above-mentioned S501-S504 setting is completed, configuration information is sent
To information receiving end, information receiving end carries out corresponding operation limitation after information is received according to setting option.
Also include in the example of the present embodiment performed on information receiving end the step of, refer to Fig. 6, including:
S601:The information that receive information transmitting terminal is sent.The information that information transmitting terminal is sent, may be sensitive information, tool
Body judge information whether be sensitive information process can be information transmitting terminal complete can also be completed in local terminal.
S602:The operation for sensitive information can be monitored in information receiving end.For example, there is provided the limit for sensitive information
System operation operates for screenshotss, then monitors the screenshotss operation of local terminal.Can first monitor that information is sensitive information, then judge to operate
Whether sensitive operation;When can also monitor the operation in terminal to limit operation, judge whether operation object is sensitive letter
Breath.
S603:When judging performing limitation operation for sensitive information, the current operation of the user is limited.Example
Such as, operate and forward and operate to replicate operation and screenshotss there is provided the operation of the limitation for privacy information, when detecting user
For privacy information can all prevent the operation of user when any one above-mentioned operation.If be provided with transmitting terminal,
When preventing user from operating, display reminding information, now, it can also be shown to the user and prevent reason etc. information.
Fig. 7 is to use the protection information dispensing device and protection information reception device in above-described embodiment one and embodiment two
During using information protecting method in above-mentioned Fig. 5 and Fig. 6, the implementation procedure of each module.
S701:The information that recalls information editor module editor will send;Generally also wrapped on protection information dispensing device
Information editing's module is included, information editing's module is used to edit the information that will be sent.
S702:Call grade classification module that each message level is set, can complete information editing's for information at different levels
When directly specify the information to belong to system level information, portion's rating information and assigned stages information, without in advance set;When
Can also configuration information grade be in advance so system level information, portion's rating information or assigned stages information.That is, it is not
Information is sent every time to be required for performing S702-S705;It can be set when first using the information protecting method, follow-up
S702-S705 is just performed when needing to change some characteristics during use again to carry out the more various characteristics set
Change.
S703:Call keyword setup module that the limitation operation for system level information, portion's rating information is set.
S704:Protection information selecting module is called to filter out sensitive information, can for system level information, portion's rating information
First to determine the grade residing for information, the sensitive word set for the grade is then obtained, filters out sensitive information.For specifying
Level information, sensitive information are directly specified by user.
S705:Limitation operation processing module is called for limitation operation corresponding to the setting of various sensitive informations.It can also set
Put monitor receiving party attempt to perform whether need to give after limitation operation prompting and whether auto-destruct chat message
Or chat message etc. is destroyed in remote control.
S706:Recalls information sending module sends information to information receiving end.
S707:Protection information reception device is provided with information receiving end, calls sensitive information receiving module to receive letter
Cease transmitting terminal send information, these information may some belong to sensitive information, but it is also possible that some are not sensitive informations.
The screening of sensitive information can be completed in information transmitting terminal, can also be performed on information receiving end.
S708:Monitoring modular is called to be directed to the operation of sensitive information, in monitoring process, possible monitoring modular can also be adjoint
There is the process of judgement, receive an information, it is sensitive information to judge the information, if sensitive information is so corresponding to it
What limitation operation is again.
S709:When judging performing limitation operation for sensitive information, processing module is called to limit the user
Current operation.
S710:Auto-destruct after recipient performs sensitive information limitation operation fixed number of times is provided with this example to be somebody's turn to do
Sensitive information;So in this step, judge that recipient performs whether limitation operation reaches fixed number of times to sensitive information, if
It is then to start auto-destruct module, the sensitive information is destroyed.
It can play a part of protecting the sensitive information to solve prior art using the information protecting method in the present embodiment
Present in protection information is directly destroyed, be not easy to follow-up the problem of checking of user.
Obviously, those skilled in the art should be understood that each module of the embodiments of the present invention or each step can be used
General computing device realizes that they can be concentrated on single computing device, or be distributed in multiple computing device institutes
On the network of composition, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to by they
It is stored in computer-readable storage medium (ROM/RAM, magnetic disc, CD) and is performed by computing device, and in some cases, can
With to perform shown or described step different from order herein, or they are fabricated to each integrated circuit die respectively
Block, or the multiple modules or step in them are fabricated to single integrated circuit module to realize.So the present invention does not limit
Combined in any specific hardware and software.
Above content is to combine the further description that specific embodiment is made to the embodiment of the present invention, it is impossible to is recognized
The specific implementation of the fixed present invention is confined to these explanations.For general technical staff of the technical field of the invention,
Without departing from the inventive concept of the premise, some simple deduction or replace can also be made, should all be considered as belonging to the present invention
Protection domain.
Claims (10)
1. a kind of information protecting method, including:
Sensitive information is determined from by all information to be sent;
For the sensitive information, corresponding limitation operation is set;
Information receiving end is sent to by operation is limited corresponding to the sensitive information and the sensitive information.
2. information protecting method as claimed in claim 1, it is characterised in that also include:To be sent is owned by described
Information is divided into system level information, portion's rating information and assigned stages information;The system level information will be sent out described in including
All information sent;The part level information includes the partial information by all information to be sent;It is described to specify
Level information includes the appointed information of a certain bar by all information to be sent.
3. information protecting method as claimed in claim 2, it is characterised in that when it is described by all information to be sent to be
When level information, portion's rating information, also include before determining sensitive information from by all information to be sent, set and protect
Protect keyword;
Determine that sensitive information includes from by all information to be sent:From described by all information to be sent
The information with the protection keyword is allotted, will be matched using all information to be sent as sensitive information.
4. the information protecting method as described in claim any one of 1-3, it is characterised in that the limitation operation includes limitation and cut
Screen operation, limitation replicate any at least one operation in operation and limitation forwarding operation.
5. a kind of information protecting method, including:
Operation monitoring is carried out to the information received;
When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information operates for limitation
When, forbid the operation.
6. information protecting method as claimed in claim 5, it is characterised in that also include after the operation is forbidden:Judge
Whether the number that the operation is initiated for the sensitive information reaches preset times, if so, the sensitive information is destroyed, or
Person, send operation to the information transmitting terminal for sending the sensitive information and notify in violation of rules and regulations, pass through described information transmitting terminal remote control
Destroy the sensitive information.
A kind of 7. protection information dispensing device, it is characterised in that including:
Protection information selecting module:For determining sensitive information from by all information to be sent;
Limitation operation processing module:For setting corresponding limitation operation for the sensitive information;
Protection information sending module:Letter is sent to for operation will to be limited corresponding to the sensitive information and the sensitive information
Cease receiving terminal.
8. protection information dispensing device as claimed in claim 7, it is characterised in that also including grade classification module, for inciting somebody to action
It is described that all information to be sent are divided into system level information, portion's rating information and assigned stages information;It is described system-level
Information includes described by all information to be sent;The part level information includes described by all information to be sent
Partial information;The assigned stages information includes the appointed information of a certain bar by all information to be sent.
9. protection information dispensing device as claimed in claim 8, it is characterised in that also including keyword setup module, be used for
Determine to go back before sensitive information from by all information to be sent, protection keyword is set;
The protection information selecting module is used for, and is closed from described will be matched in all information to be sent with the protection
The information of keyword, it will match using all information to be sent as sensitive information.
A kind of 10. protection information reception device, it is characterised in that including:
Monitoring modular:For carrying out operation monitoring to the information received;
Processing module:For being sensitive information when the information for monitoring to receive, and for the behaviour of sensitive information initiation
When being operated as limitation, forbid the operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610658982.2A CN107733773A (en) | 2016-08-10 | 2016-08-10 | Information protecting method, protection information dispensing device and protection information reception device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610658982.2A CN107733773A (en) | 2016-08-10 | 2016-08-10 | Information protecting method, protection information dispensing device and protection information reception device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107733773A true CN107733773A (en) | 2018-02-23 |
Family
ID=61199711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610658982.2A Pending CN107733773A (en) | 2016-08-10 | 2016-08-10 | Information protecting method, protection information dispensing device and protection information reception device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107733773A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040419A (en) * | 2018-06-11 | 2018-12-18 | Oppo(重庆)智能科技有限公司 | Record screen method, apparatus, mobile terminal and storage medium |
CN109067557A (en) * | 2018-07-19 | 2018-12-21 | 北京达佳互联信息技术有限公司 | Monitoring method, device and the corresponding server and storage medium of communication group |
CN112861177A (en) * | 2021-02-05 | 2021-05-28 | 深圳市辰星瑞腾科技有限公司 | Computer defense system based on Internet of things |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101430752A (en) * | 2008-12-22 | 2009-05-13 | 哈尔滨工业大学 | Sensitive data switching control module and method for computer and movable memory device |
CN102611732A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework |
US20140066015A1 (en) * | 2012-08-28 | 2014-03-06 | Selim Aissi | Secure device service enrollment |
CN104615940A (en) * | 2014-10-27 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Sensitive information displaying method and device |
US20150163182A1 (en) * | 2013-12-06 | 2015-06-11 | Verizon Patent And Licensing Inc. | Confidential messages in a group chat |
CN105187211A (en) * | 2015-08-07 | 2015-12-23 | 北京思特奇信息技术股份有限公司 | Methods and devices for securely sending and receiving information |
CN105306443A (en) * | 2015-09-18 | 2016-02-03 | 四川效率源信息安全技术股份有限公司 | Burn-after-reading method based on complete offline |
CN105471956A (en) * | 2014-09-11 | 2016-04-06 | 中兴通讯股份有限公司 | User safety control method of social network, social application tool and terminal |
-
2016
- 2016-08-10 CN CN201610658982.2A patent/CN107733773A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101430752A (en) * | 2008-12-22 | 2009-05-13 | 哈尔滨工业大学 | Sensitive data switching control module and method for computer and movable memory device |
CN102611732A (en) * | 2011-11-25 | 2012-07-25 | 无锡华御信息技术有限公司 | Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework |
US20140066015A1 (en) * | 2012-08-28 | 2014-03-06 | Selim Aissi | Secure device service enrollment |
US20150163182A1 (en) * | 2013-12-06 | 2015-06-11 | Verizon Patent And Licensing Inc. | Confidential messages in a group chat |
CN105471956A (en) * | 2014-09-11 | 2016-04-06 | 中兴通讯股份有限公司 | User safety control method of social network, social application tool and terminal |
CN104615940A (en) * | 2014-10-27 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Sensitive information displaying method and device |
CN105187211A (en) * | 2015-08-07 | 2015-12-23 | 北京思特奇信息技术股份有限公司 | Methods and devices for securely sending and receiving information |
CN105306443A (en) * | 2015-09-18 | 2016-02-03 | 四川效率源信息安全技术股份有限公司 | Burn-after-reading method based on complete offline |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040419A (en) * | 2018-06-11 | 2018-12-18 | Oppo(重庆)智能科技有限公司 | Record screen method, apparatus, mobile terminal and storage medium |
CN109040419B (en) * | 2018-06-11 | 2021-01-12 | Oppo(重庆)智能科技有限公司 | Screen recording method and device, mobile terminal and storage medium |
CN109067557A (en) * | 2018-07-19 | 2018-12-21 | 北京达佳互联信息技术有限公司 | Monitoring method, device and the corresponding server and storage medium of communication group |
CN112861177A (en) * | 2021-02-05 | 2021-05-28 | 深圳市辰星瑞腾科技有限公司 | Computer defense system based on Internet of things |
CN112861177B (en) * | 2021-02-05 | 2021-11-19 | 深圳市辰星瑞腾科技有限公司 | Computer defense system based on Internet of things |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468611B (en) | The data safety processing method and device switched based on dual system | |
CN103457991B (en) | A kind of terminal safety protection method and system | |
KR102429416B1 (en) | Anti-Cyber Bulling System and Method | |
US8725824B2 (en) | Message processing in a messaging service client device | |
CN100536500C (en) | Transmission of personal data combined with private sign | |
CN104657643B (en) | Method for protecting privacy, wearable device and mobile terminal | |
CN102868812A (en) | Terminal and information-sending control method | |
CN105320880B (en) | The control method and device of terminal | |
CN104202734A (en) | Notification processing method, notification processing device and terminal | |
US11757805B2 (en) | Systems and methods for mediation using NLP and machine learning techniques | |
CN104184653B (en) | A kind of method and apparatus of message screening | |
CN107733773A (en) | Information protecting method, protection information dispensing device and protection information reception device | |
CN108846295A (en) | Sensitive information filter method, device, computer equipment and storage medium | |
CN105681564A (en) | Message reminding method and device | |
CN104598836A (en) | Method and device for managing communication content on mobile terminal as well as mobile terminal | |
CN108875069A (en) | A kind of marriage and making friend's matching process and device based on telecommunications big data | |
CN106506443A (en) | A kind of information inspection method and device | |
JP6691954B2 (en) | How to provide hidden message service in chat window | |
CN104679795A (en) | Scene mode switching method and device and mobile terminal | |
CN108718365A (en) | Message treatment method, device, terminal and storage medium | |
CN108600086B (en) | Information processing method, electronic device, and computer-readable storage medium | |
CN109039863A (en) | A kind of mail security detection method, device and storage medium based on self study | |
CN108989298A (en) | A kind of equipment safety monitoring method and device | |
CN108156330B (en) | Message management system and method based on mobile terminal | |
CN107222608B (en) | Contact person sharing method and user terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |