CN107733773A - Information protecting method, protection information dispensing device and protection information reception device - Google Patents

Information protecting method, protection information dispensing device and protection information reception device Download PDF

Info

Publication number
CN107733773A
CN107733773A CN201610658982.2A CN201610658982A CN107733773A CN 107733773 A CN107733773 A CN 107733773A CN 201610658982 A CN201610658982 A CN 201610658982A CN 107733773 A CN107733773 A CN 107733773A
Authority
CN
China
Prior art keywords
information
sensitive
sent
protection
limitation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610658982.2A
Other languages
Chinese (zh)
Inventor
陈辉锋
郑明�
黄桂
胡静雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610658982.2A priority Critical patent/CN107733773A/en
Publication of CN107733773A publication Critical patent/CN107733773A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/23Reliability checks, e.g. acknowledgments or fault reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present invention provides a kind of information protecting method, protection information dispensing device and protection information reception device, and protection information dispensing device determines sensitive information from by all information to be sent;For these sensitive informations, corresponding limitation operation is set;Then sensitive information is sent to information receiving end, corresponding limit of the information receiving end sensitive information is informed about to operate, information receiving end is monitored to the information received, when the information for monitoring to receive is sensitive information, and it is when limiting operation to be directed to the operation that the sensitive information is initiated, and will forbid the operation to sensitive information initiation.On the one hand it can play a part of protecting the sensitive information, on the other hand, be readily applicable to various occasions.Solve directly to destroy protection information present in prior art, be not easy to the follow-up of user and check, it is impossible to while information is retained, limit the problem of user is directed to the operation of the information.

Description

Information protecting method, protection information dispensing device and protection information reception device
Technical field
The present invention relates to information security field, more particularly to information protecting method, protection information dispensing device and protection letter Cease reception device.
Background technology
With internet and mobile intelligent terminal explosive increase, all kinds of social networking applications are quickly grown, and what it is such as wechat class is When communication system, common people's popularization degree is very high, and the live and work exchange to masses brings great convenience, but simultaneously, because instant Information is easily stolen, some classified informations or the information that is not intended to be obtained by third party easily by random diffusion and propagation, Larger safety problem is brought to instant messages.
In order to solve the safety problem that instant messages are arbitrarily spread and propagated, solution party is it is also proposed in the prior art Formula is in the prior art, general by the way of being destroyed by fire after reading.The sender of information can be with configuration information when retaining Between so that auto-destruct information in the short period of recipient upon receiving this information.
Using mode of the prior art come carry out information protection can be so that information obtains preferably protecting safe coefficient Reliable, still, it is exactly that information can not preserve for a long time that it, which has the defects of larger, is generally required in people's daily life Some information are temporarily retained, to use in the near future.If using aforesaid way, will be brought not to the normal use of information Just, institute is in the above described manner, it is impossible to and it is real now for some privacy informations, while information is retained, user's pin can also be limited Operation to the information.
In summary, protection information is directly destroyed in the prior art, is not easy to the follow-up of user and checks, it is impossible to retaining While information, limitation user is directed to the operation of the information.
The content of the invention
Information protecting method and its device provided in an embodiment of the present invention, mainly solve in the prior art that protection information is straight Pin is ruined, and is not easy to the follow-up of user and is checked, the problem of not being suitable for the protection of instant messages.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of information protecting method, including:
Sensitive information is determined from by all information to be sent;
For the sensitive information, corresponding limitation operation is set;
Information receiving end is sent to by operation is limited corresponding to the sensitive information and the sensitive information.
The embodiment of the present invention also provides another information protecting method, including:
Operation monitoring is carried out to the information received;
When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information is grasped for limitation When making, forbid the operation.
The embodiment of the present invention provides a kind of information protection device, including:
Protection information selecting module:For determining sensitive information from by all information to be sent;
Setup module:For setting corresponding limitation operation for the sensitive information;
Protection information sending module:For limitation operation corresponding to the sensitive information and the sensitive information to be sent To information receiving end.
The embodiment of the present invention also provides another information protection device, including:
Monitoring modular:For carrying out operation monitoring to the information received;
Processing module:For being sensitive information when the information for monitoring to receive, and initiated for the sensitive information Operation for limitation operation when, forbid the operation.
The embodiment of the present invention also provides a kind of computer-readable storage medium, and computer is stored with the computer-readable storage medium Executable instruction, the computer executable instructions are used for the information protecting method for performing foregoing any one.
The beneficial effects of the invention are as follows:
Information protecting method, protection information dispensing device and the protection information provided according to embodiments of the present invention receives dress Put, protection information dispensing device determines sensitive information from by all information to be sent, and so-called sensitive information is namely Information to be protected;For these sensitive informations, corresponding limitation operation is set;Then sensitive information is sent to information receiving end, Inform about corresponding limit of the information receiving end sensitive information to operate, protection information reception device is as information receiving end, certainly Body is monitored to the information received, is sent out when the information for monitoring to receive is sensitive information, and for the sensitive information When the operation risen operates for limitation, the operation initiated the sensitive information will be forbidden, through the above way to the letter of transmission Breath makes a distinction, only to needing information to be protected to take corresponding safeguard measure, when for needing information to be protected to initiate operation, And the operation is when limiting operation, to forbid the operation.Compared with the mode of prior art, only forbid to the sensitive information Limitation operation, but other operation or can normally perform, on the one hand can play a part of protect the sensitive information, separately On the one hand, various occasions are readily applicable to.Solve directly to destroy protection information present in prior art, be not easy to user Follow-up check, it is impossible to while information is retained, limitation user for the information operation the problem of.
Brief description of the drawings
Fig. 1 is the flow chart of the information protecting method in the embodiment of the present invention one;
Fig. 2 is the structural representation of the protection information dispensing device in the embodiment of the present invention one;
Fig. 3 is the flow chart of the information protecting method in the embodiment of the present invention two;
Fig. 4 is the structural representation of the protection information reception device in the embodiment of the present invention two;
Fig. 5 is the flow of the information protecting method in the information transmitting terminal execution embodiment one in the embodiment of the present invention three Figure;
Fig. 6 is the flow of the information protecting method in the information receiving end execution embodiment two in the embodiment of the present invention three Figure;
Fig. 7 is protection information dispensing device and the execution of protection information reception device in inventive embodiments one and embodiment two The flow chart of information protecting method in embodiment three.
Embodiment
The embodiment of the present invention is described in further detail below by embodiment combination accompanying drawing.
Embodiment one:
In order to solve in the prior art directly to destroy protection information, caused the follow-up of user that be not easy to is checked, uncomfortable The problem of protection for instant messages, the present embodiment provide a kind of information protecting method, refer to Fig. 1, this method includes:
S101:Sensitive information is determined from by all information to be sent;
S102:For sensitive information, corresponding limitation operation is set;
S103:Information receiving end is sent to by operation is limited corresponding to sensitive information and the sensitive information.
In step S101, the information that be able to will be sent to user is classified, and is determined in the information to be sent from these Go out sensitive information, so-called sensitive information i.e. information to be protected, specifically determining the process of sensitive information can use down State mode.Protection keyword can be set in advance, and protection keyword can flexibly be set by user according to real needs.Here institute The protection keyword said is probably certain some specific keyword, for example, the wording such as " bank card ", all to carry " bank card " word The information of eye can be identified;It can also be a category information, but not be worth specifically, for example, " phone number ", institute Some phone numbers can be identified.Keyword mentioned here might not occur in the form of word, such as can also It is picture, voice messaging etc..Above-mentioned embodiment is any without being carried out to the present embodiment only as the explanation to the present embodiment Limit.
When user want send an information, this information be exactly by all information to be sent, will be to be sent All information in the information that includes matched with protection keyword, whether see will include this in all information to be sent A little protection keywords, are sensitive informations if comprising if, being considered as this by all information to be sent;If do not include Be not just, in this way when.It can set the grade of all information to be sent in advance, for example, can set and be Level information, portion's rating information and assigned stages information.Include all letters to be sent for system level information in system Breath;Part level information includes the partial information in all information that will be sent;Include being sent out for assigned stages information The appointed information of a certain bar in all information sent.So the setting of system level information is to the information system in whole system System comes into force, and the setting of portion's rating information may be to coming into force to some single chat or group chat information, and the setting of assigned stages information is only to certain Bar information comes into force.For example, user may think that a certain bar information is especially important, and special privacy, it is believed that it should be protected, Then this information is set as sensitive information, and this mode is exactly to set assigned stages information mode.
Screening for sensitive information in portion's rating information and system level information, it is crucial that above-mentioned setting protection can be combined The scheme of word carries out the screening of sensitive information.For example, user may think that the exchange of information with someone or some group compares It is important, set to all information of this people or this pocket transmission and be required for being protected, will be sent out in this mode All information sent just belong to portion's rating information.When user sends information, shielded group or individual is belonged to when monitoring The information of people, these information can just be matched these information with protection keyword using aforesaid way.User may Think to be required for being protected for all information sent, all information that can also be in setting system are required for being protected Shield, then all information sent in system are set to be required for being matched, to carry out the screening of sensitive information, that is to say, that User's each information to be sent, can all perform above-mentioned matching process, sensitive letter is matched from all information of transmission Cease, all information to be sent are just belonged into system level information in this mode.For assigned stages information, typically by user Specify, a certain bar information, naturally, the information inherently sensitive information.
After setting the screening rule of sensitive information, step S102 is performed, corresponding limitation behaviour is set for sensitive information Make.Limitation operates any one or more that can include in the operation of limitation screenshotss, limitation duplication operation, limitation forwarding operation. Such as set the limitation for system-level sensitive information to operate and operated for limitation screenshotss, if some system-level information is judged to It is set to sensitive information, the screenshotss authority of the sensitive information will be limited.Specifically, can be to the sensitivity of information not at the same level Information sets different limitation operations, and is directed to the limitation operation setting priority that different stage information needs to follow.For example, can With setting, the highest priority of limitation operating right corresponding to assigned stages information, next to that the sensitive information in portion's rating information, It is finally the sensitive information in system level information.For example, there is provided the limitation of the sensitive information in system level information operation to cut Screen operation, the limitation operation of limitation operation corresponding to assigned stages information replicate operation for the operation of limitation screenshotss and limitation.Use now Family will send an information, and it is sensitive information to specify it, and first, the information is the sensitive information belonged in system level information; Secondly, it is also to belong to assigned stages information, but due to assigned stages information, so its highest priority for enjoying, so this is quick The limitation operation for feeling information final choice should be just that the operation of limitation screenshotss and limitation replicate operation.
After above-mentioned steps are completed, it is possible to perform step S103, all information to be sent will be sent into information Receiving terminal, can also limitation behaviour corresponding to the notification receiving terminal sensitive information if the information sent is sensitive information Make.
The present embodiment also provides a kind of protection information dispensing device, refer to Fig. 2, and the protection information dispensing device includes protecting Information choice module 21 is protected, for determining sensitive information from by all information to be sent.
The information that protection information selecting module 21 be able to will be sent to user is classified, in the information to be sent from these Sensitive information is determined, following manner can be used by specifically determining the process of sensitive information.The protection information dispensing device is also Including keyword setup module 22, keyword setup module 22 can set protection keyword in advance, and protection keyword can be by User flexibly selects according to real needs.Protection keyword mentioned here is probably certain some specific keyword, can also It is a category information, but is not worth specifically.Keyword mentioned here might not occur in the form of word, for example, Can be picture, voice messaging etc..Above-mentioned embodiment is only as the explanation to the present embodiment, without being carried out to the present embodiment Any restriction.
Protection information dispensing device also includes grade classification module 23, and grade classification module 23 can be set in advance will be by The grade of all information sent, for example, system level information, portion's rating information and assigned stages information can be set.For being Level information is included all information to be sent in system;Part level information is included in all information that will be sent Partial information;Include the appointed information of a certain bar in all information that will be sent for assigned stages information.So it is The setting of level information comes into force to the information system in whole system, and the setting of portion's rating information may be to some single chat or group Merely information comes into force, and the setting of assigned stages information only comes into force to certain information.For example, user may think that a certain bar information is especially heavy Will, special privacy, it is believed that it should be protected, then set this information as sensitive information, this mode is exactly to set Assigned stages information mode.
Screening for sensitive information in portion's rating information and system level information, it is crucial that above-mentioned setting protection can be combined The scheme of word carries out the screening of sensitive information.For example, user may think that the exchange of information with someone or some group compares Important, protection information selecting module 21 sets to all information of this people or this pocket transmission and is required for being protected, Set to all information of this people or this pocket transmission and be required for being protected, by institute to be sent in this mode There is information just to belong to portion's rating information.When user sends information, the letter of shielded group or individual are belonged to when monitoring Breath, these information can just be matched these information with protection keyword using aforesaid way.User may think that pin All information of transmission are required for protecting, all information that protection information selecting module 21 can also be in setting system It is required for being protected, then sets all information sent in system to be required for being matched, to carry out the sieve of sensitive information Choosing, that is to say, that user's each information to be sent, above-mentioned matching process can be all performed, from all information of transmission Match sensitive information, all information to be sent are just belonged into system level information in this mode.For assigned stages information, Typically specified by user, a certain bar information, naturally, the information inherently sensitive information.
The protection information dispensing device also includes limitation operation processing module 24, corresponding to being set for sensitive information Limitation operation.When the mode of sensitive information during user is from portion's rating information and system level information, above-mentioned set can be combined The scheme for putting protection keyword carries out the screening of sensitive information.Limit screenshotss operation, limitation replicates operation, limitation forwarding operation In any one or more.
For example, limitation operation processing module 24 sets the limitation for system-level sensitive information to operate for limitation screenshotss behaviour Make, if some system-level information is judged as sensitive information, the screenshotss authority of the sensitive information will be limited.Tool Body, limitation operation processing module 24 can set different limitations to operate the sensitive information of information not at the same level, and for not Same level information needs the limitation operation setting priority followed.For example, it can set, limitation operation corresponding to assigned stages information The highest priority of authority, next to that the sensitive information in portion's rating information, is finally the sensitive information in system level information.
The protection information dispensing device also includes protection information sending module 25, for by by all information to be sent Information receiving end is sent to, can also the notification receiving terminal sensitive information pair if the information sent is sensitive information The limitation operation answered.Described information in the present embodiment, can include short message or various use application software are carried out Interactive information, for example, QQ, wechat, microblogging etc..
Protection information dispensing device in the present embodiment can be used for realizing the information protecting method in the present embodiment, this implementation All steps of information protecting method in example have corresponding module to complete in protection information dispensing device.The present embodiment In protection information dispensing device can be arranged in various terminals.Terminal can be come in a variety of manners in fact in the present embodiment Apply, for example, such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digitals can be included Assistant), PAD (tablet personal computer), PMP (portable media player), guider etc. mobile terminal and it is all in full The fixed terminal of word TV, desktop computer etc..These terminals all carry information sending module, can complete information transmission.This Each functional module of protection information dispensing device in embodiment, protection information selecting module 21, keyword setup module 22, Limitation operation processing module 23, the function of protection information sending module 24 can be realized by the processor of terminal.
, can be according to specific protection keyword using the information protecting method in the present embodiment and protection information dispensing device The difference of selection sets different sensitive informations, can also be that different sensitive informations set different limitation operations.Such one Come, be more convenient the protection for sensitive information, and different grades of protection, Consumer's Experience can be divided into according to different demands More preferably.
Embodiment two:
The present embodiment provides another information protecting method, refer to Fig. 3, the information protecting method includes:
S301:Operation monitoring is carried out to the information received;
S302:When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information is limited During system operation, forbid the operation.
Information protecting method in the present embodiment is relative with the information protecting method that embodiment is a kind of, a kind of side of embodiment Method is the step performed by sensitive information sender, and the information protecting method in the present embodiment is performed by sensitive information recipient The step of.
So the information protecting method in the present embodiment, can first receive the information that sensitive information sender sends, these Information may some belong to sensitive information, but it is also possible that some are not sensitive informations.Can be to the information that receives and right The operation of these information is monitored, and performs step S301.Generally, in monitoring process, the mistake judged may can be also accompanied by Journey, an information is received, it is sensitive information to judge the information, if sensitive information so limitation corresponding to it operates again What is.In embodiment one kind, when being described sensitive information sender transmission sensitive information, sensitive information can be also informed Corresponding limitation operation.When receiving an information, and receive limitation operation corresponding to the information, it is possible to know that the information is agreed Surely it is to belong to sensitive information, and has also known limitation operation corresponding to it.
When the information for monitoring to receive is sensitive information, and limitation operation corresponding to its is known, but also has monitored Certain operation will be carried out to the sensitive information to user, and this operation that will be carried out just is that the sensitive information is corresponding Limitation operation when, the execution of the operation can be forbidden.For example, when receiving a sensitive information, the sensitive information corresponds to Limitation operation be limitation screenshotss operation and limitation replicate operation.When attempting replicate operation to the sensitive information, can hinder The only duplication operation of user, and prompt user that the operation is invalid.
In a kind of embodiment, it can also choose whether to destroy for sensitive information according to real needs. It can set when user attempts to perform the limitation operation certain number of arrival, destroy the sensitive information.For example, showing in the preceding paragraph In example, after the user replicates failure for this sensitive information, repeat replication operates always, is limitation behaviour due to replicating operation Make, and be previously set, repeat if limitation operation reaches 10 times and just destroy corresponding sensitive information.Then, when this User's repeat replication operate 10 times when, the sensitive information can be destroyed.The process specifically destroyed can be completed by itself, Can when user being repeated into limitation operation to reach preset times, give the message informing to sensitive information sender, believed by sensitivity Breath sender carrys out the remote destroying sensitive information.Any mode is specifically selected, can be flexible according to real needs due to user Selection.
The present embodiment also provides a kind of protection information reception device, refer to Fig. 4, including sensitive information receiving module 41, For receive sensitive information sender transmission information, these information may some belong to sensitive information, but it is also possible that having A little is not sensitive information.
Protection information reception device, in addition to monitoring modular 42, can be to the information received and the behaviour to these information It is monitored.Generally, in monitoring process, possible monitoring modular 42 can also be accompanied by the process judged, receive an information, It is sensitive information to judge the information, if sensitive information is so corresponding to it, what limitation operation is again.When receiving one Bar information, and receive limitation operation corresponding to the information, it is possible to it is to belong to sensitive information certainly to know the information, and Limitation operation corresponding to it is known.
Protection information reception device also includes processing module 43, when the information that monitoring modular 42 monitors to receive is sensitivity Information, and known limitation operation corresponding to it, but also monitor that user will carry out certain operation to the sensitive information, And when this operation that will be carried out just is limitation operation corresponding to the sensitive information, processing module 43 can forbid this The execution of operation.For example, when receiving a sensitive information, limitation operation corresponding to the sensitive information be the operation of limitation screenshotss and Limitation replicates operation.When attempting replicate operation to the sensitive information, processing module 43 can prevent the duplication of user from operating, It can also prompt user's operation invalid.
Described information in the present embodiment, can include short message or various use application software interact Information, for example, QQ, wechat, microblogging etc..Limitation operation in the present embodiment can also include screenshotss operation, duplication operates, Forward any one or more in operation.
Protection information reception device in the present embodiment can be used for realizing the information protecting method in the present embodiment, this implementation All steps of information protecting method in example have corresponding module to complete in protection information dispensing device.The present embodiment In protection information reception device can be arranged in various terminals.Terminal can be come in a variety of manners in fact in the present embodiment Apply, for example, such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual digitals can be included Assistant), PAD (tablet personal computer), PMP (portable media player), guider etc. mobile terminal and it is all in full The fixed terminal of word TV, desktop computer etc..These terminals all carry information sending module, can complete information transmission.This Each functional module of protection information dispensing device in embodiment, sensitive information receiving module 41, monitoring modular 42, processing mould The function of block 43 can be realized by the processor of terminal.
Using the information protecting method in the present embodiment and protection information reception device, on the one hand can playing protection, this is quick Feel the effect of information, on the other hand, be readily applicable to various occasions.Solve present in prior art that protection information is direct Destroy, be not easy to the follow-up of user and check, the problem of not being suitable for the protection of instant messages.
Embodiment three:
The present embodiment provides the specific example using above-described embodiment one and the information protecting method in embodiment two.The party Method is performs in information transmitting terminal the step of, including:Setting up procedure and information transmission process, the process of being provided with refer to Fig. 5,
S501:The grade of security feature is set;System level information, portion's rating information and assigned stages letter can be included respectively Breath.
S502:The screening that sensitive information is carried out according to keyword match is set;Satisfactory information could be arranged to quick Feel information.
S503:The limitation for sensitive information is set to operate;Setting whether need restricted information recipient screenshotss, duplication, Forwarding, it is settable only to limit a certain item, can also limit simultaneously it is multinomial, it is also settable to monitor recipient and attempt to perform limitation operation Whether need to give afterwards prompt, whether chat message etc. is destroyed in auto-destruct chat message or remote control.
S504:Every setting in above-mentioned steps is preserved, and enters information transmission interface and enters row information transmission.
After above-mentioned S501-S504 setting up procedure has been performed, send into information, can be sent out when information is sent Send the limitation for the information to operate, but it is also possible to after above-mentioned S501-S504 setting is completed, configuration information is sent To information receiving end, information receiving end carries out corresponding operation limitation after information is received according to setting option.
Also include in the example of the present embodiment performed on information receiving end the step of, refer to Fig. 6, including:
S601:The information that receive information transmitting terminal is sent.The information that information transmitting terminal is sent, may be sensitive information, tool Body judge information whether be sensitive information process can be information transmitting terminal complete can also be completed in local terminal.
S602:The operation for sensitive information can be monitored in information receiving end.For example, there is provided the limit for sensitive information System operation operates for screenshotss, then monitors the screenshotss operation of local terminal.Can first monitor that information is sensitive information, then judge to operate Whether sensitive operation;When can also monitor the operation in terminal to limit operation, judge whether operation object is sensitive letter Breath.
S603:When judging performing limitation operation for sensitive information, the current operation of the user is limited.Example Such as, operate and forward and operate to replicate operation and screenshotss there is provided the operation of the limitation for privacy information, when detecting user For privacy information can all prevent the operation of user when any one above-mentioned operation.If be provided with transmitting terminal, When preventing user from operating, display reminding information, now, it can also be shown to the user and prevent reason etc. information.
Fig. 7 is to use the protection information dispensing device and protection information reception device in above-described embodiment one and embodiment two During using information protecting method in above-mentioned Fig. 5 and Fig. 6, the implementation procedure of each module.
S701:The information that recalls information editor module editor will send;Generally also wrapped on protection information dispensing device Information editing's module is included, information editing's module is used to edit the information that will be sent.
S702:Call grade classification module that each message level is set, can complete information editing's for information at different levels When directly specify the information to belong to system level information, portion's rating information and assigned stages information, without in advance set;When Can also configuration information grade be in advance so system level information, portion's rating information or assigned stages information.That is, it is not Information is sent every time to be required for performing S702-S705;It can be set when first using the information protecting method, follow-up S702-S705 is just performed when needing to change some characteristics during use again to carry out the more various characteristics set Change.
S703:Call keyword setup module that the limitation operation for system level information, portion's rating information is set.
S704:Protection information selecting module is called to filter out sensitive information, can for system level information, portion's rating information First to determine the grade residing for information, the sensitive word set for the grade is then obtained, filters out sensitive information.For specifying Level information, sensitive information are directly specified by user.
S705:Limitation operation processing module is called for limitation operation corresponding to the setting of various sensitive informations.It can also set Put monitor receiving party attempt to perform whether need to give after limitation operation prompting and whether auto-destruct chat message Or chat message etc. is destroyed in remote control.
S706:Recalls information sending module sends information to information receiving end.
S707:Protection information reception device is provided with information receiving end, calls sensitive information receiving module to receive letter Cease transmitting terminal send information, these information may some belong to sensitive information, but it is also possible that some are not sensitive informations. The screening of sensitive information can be completed in information transmitting terminal, can also be performed on information receiving end.
S708:Monitoring modular is called to be directed to the operation of sensitive information, in monitoring process, possible monitoring modular can also be adjoint There is the process of judgement, receive an information, it is sensitive information to judge the information, if sensitive information is so corresponding to it What limitation operation is again.
S709:When judging performing limitation operation for sensitive information, processing module is called to limit the user Current operation.
S710:Auto-destruct after recipient performs sensitive information limitation operation fixed number of times is provided with this example to be somebody's turn to do Sensitive information;So in this step, judge that recipient performs whether limitation operation reaches fixed number of times to sensitive information, if It is then to start auto-destruct module, the sensitive information is destroyed.
It can play a part of protecting the sensitive information to solve prior art using the information protecting method in the present embodiment Present in protection information is directly destroyed, be not easy to follow-up the problem of checking of user.
Obviously, those skilled in the art should be understood that each module of the embodiments of the present invention or each step can be used General computing device realizes that they can be concentrated on single computing device, or be distributed in multiple computing device institutes On the network of composition, alternatively, they can be realized with the program code that computing device can perform, it is thus possible to by they It is stored in computer-readable storage medium (ROM/RAM, magnetic disc, CD) and is performed by computing device, and in some cases, can With to perform shown or described step different from order herein, or they are fabricated to each integrated circuit die respectively Block, or the multiple modules or step in them are fabricated to single integrated circuit module to realize.So the present invention does not limit Combined in any specific hardware and software.
Above content is to combine the further description that specific embodiment is made to the embodiment of the present invention, it is impossible to is recognized The specific implementation of the fixed present invention is confined to these explanations.For general technical staff of the technical field of the invention, Without departing from the inventive concept of the premise, some simple deduction or replace can also be made, should all be considered as belonging to the present invention Protection domain.

Claims (10)

1. a kind of information protecting method, including:
Sensitive information is determined from by all information to be sent;
For the sensitive information, corresponding limitation operation is set;
Information receiving end is sent to by operation is limited corresponding to the sensitive information and the sensitive information.
2. information protecting method as claimed in claim 1, it is characterised in that also include:To be sent is owned by described Information is divided into system level information, portion's rating information and assigned stages information;The system level information will be sent out described in including All information sent;The part level information includes the partial information by all information to be sent;It is described to specify Level information includes the appointed information of a certain bar by all information to be sent.
3. information protecting method as claimed in claim 2, it is characterised in that when it is described by all information to be sent to be When level information, portion's rating information, also include before determining sensitive information from by all information to be sent, set and protect Protect keyword;
Determine that sensitive information includes from by all information to be sent:From described by all information to be sent The information with the protection keyword is allotted, will be matched using all information to be sent as sensitive information.
4. the information protecting method as described in claim any one of 1-3, it is characterised in that the limitation operation includes limitation and cut Screen operation, limitation replicate any at least one operation in operation and limitation forwarding operation.
5. a kind of information protecting method, including:
Operation monitoring is carried out to the information received;
When the information for monitoring to receive is sensitive information, and the operation initiated for the sensitive information operates for limitation When, forbid the operation.
6. information protecting method as claimed in claim 5, it is characterised in that also include after the operation is forbidden:Judge Whether the number that the operation is initiated for the sensitive information reaches preset times, if so, the sensitive information is destroyed, or Person, send operation to the information transmitting terminal for sending the sensitive information and notify in violation of rules and regulations, pass through described information transmitting terminal remote control Destroy the sensitive information.
A kind of 7. protection information dispensing device, it is characterised in that including:
Protection information selecting module:For determining sensitive information from by all information to be sent;
Limitation operation processing module:For setting corresponding limitation operation for the sensitive information;
Protection information sending module:Letter is sent to for operation will to be limited corresponding to the sensitive information and the sensitive information Cease receiving terminal.
8. protection information dispensing device as claimed in claim 7, it is characterised in that also including grade classification module, for inciting somebody to action It is described that all information to be sent are divided into system level information, portion's rating information and assigned stages information;It is described system-level Information includes described by all information to be sent;The part level information includes described by all information to be sent Partial information;The assigned stages information includes the appointed information of a certain bar by all information to be sent.
9. protection information dispensing device as claimed in claim 8, it is characterised in that also including keyword setup module, be used for Determine to go back before sensitive information from by all information to be sent, protection keyword is set;
The protection information selecting module is used for, and is closed from described will be matched in all information to be sent with the protection The information of keyword, it will match using all information to be sent as sensitive information.
A kind of 10. protection information reception device, it is characterised in that including:
Monitoring modular:For carrying out operation monitoring to the information received;
Processing module:For being sensitive information when the information for monitoring to receive, and for the behaviour of sensitive information initiation When being operated as limitation, forbid the operation.
CN201610658982.2A 2016-08-10 2016-08-10 Information protecting method, protection information dispensing device and protection information reception device Pending CN107733773A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610658982.2A CN107733773A (en) 2016-08-10 2016-08-10 Information protecting method, protection information dispensing device and protection information reception device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610658982.2A CN107733773A (en) 2016-08-10 2016-08-10 Information protecting method, protection information dispensing device and protection information reception device

Publications (1)

Publication Number Publication Date
CN107733773A true CN107733773A (en) 2018-02-23

Family

ID=61199711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610658982.2A Pending CN107733773A (en) 2016-08-10 2016-08-10 Information protecting method, protection information dispensing device and protection information reception device

Country Status (1)

Country Link
CN (1) CN107733773A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040419A (en) * 2018-06-11 2018-12-18 Oppo(重庆)智能科技有限公司 Record screen method, apparatus, mobile terminal and storage medium
CN109067557A (en) * 2018-07-19 2018-12-21 北京达佳互联信息技术有限公司 Monitoring method, device and the corresponding server and storage medium of communication group
CN112861177A (en) * 2021-02-05 2021-05-28 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101430752A (en) * 2008-12-22 2009-05-13 哈尔滨工业大学 Sensitive data switching control module and method for computer and movable memory device
CN102611732A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework
US20140066015A1 (en) * 2012-08-28 2014-03-06 Selim Aissi Secure device service enrollment
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
US20150163182A1 (en) * 2013-12-06 2015-06-11 Verizon Patent And Licensing Inc. Confidential messages in a group chat
CN105187211A (en) * 2015-08-07 2015-12-23 北京思特奇信息技术股份有限公司 Methods and devices for securely sending and receiving information
CN105306443A (en) * 2015-09-18 2016-02-03 四川效率源信息安全技术股份有限公司 Burn-after-reading method based on complete offline
CN105471956A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 User safety control method of social network, social application tool and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101430752A (en) * 2008-12-22 2009-05-13 哈尔滨工业大学 Sensitive data switching control module and method for computer and movable memory device
CN102611732A (en) * 2011-11-25 2012-07-25 无锡华御信息技术有限公司 Encryption document outgoing control system and method on basis of B/S (Browser/Server) framework
US20140066015A1 (en) * 2012-08-28 2014-03-06 Selim Aissi Secure device service enrollment
US20150163182A1 (en) * 2013-12-06 2015-06-11 Verizon Patent And Licensing Inc. Confidential messages in a group chat
CN105471956A (en) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 User safety control method of social network, social application tool and terminal
CN104615940A (en) * 2014-10-27 2015-05-13 腾讯科技(深圳)有限公司 Sensitive information displaying method and device
CN105187211A (en) * 2015-08-07 2015-12-23 北京思特奇信息技术股份有限公司 Methods and devices for securely sending and receiving information
CN105306443A (en) * 2015-09-18 2016-02-03 四川效率源信息安全技术股份有限公司 Burn-after-reading method based on complete offline

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109040419A (en) * 2018-06-11 2018-12-18 Oppo(重庆)智能科技有限公司 Record screen method, apparatus, mobile terminal and storage medium
CN109040419B (en) * 2018-06-11 2021-01-12 Oppo(重庆)智能科技有限公司 Screen recording method and device, mobile terminal and storage medium
CN109067557A (en) * 2018-07-19 2018-12-21 北京达佳互联信息技术有限公司 Monitoring method, device and the corresponding server and storage medium of communication group
CN112861177A (en) * 2021-02-05 2021-05-28 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things
CN112861177B (en) * 2021-02-05 2021-11-19 深圳市辰星瑞腾科技有限公司 Computer defense system based on Internet of things

Similar Documents

Publication Publication Date Title
CN104468611B (en) The data safety processing method and device switched based on dual system
CN103457991B (en) A kind of terminal safety protection method and system
KR102429416B1 (en) Anti-Cyber Bulling System and Method
US8725824B2 (en) Message processing in a messaging service client device
CN100536500C (en) Transmission of personal data combined with private sign
CN104657643B (en) Method for protecting privacy, wearable device and mobile terminal
CN102868812A (en) Terminal and information-sending control method
CN105320880B (en) The control method and device of terminal
CN104202734A (en) Notification processing method, notification processing device and terminal
US11757805B2 (en) Systems and methods for mediation using NLP and machine learning techniques
CN104184653B (en) A kind of method and apparatus of message screening
CN107733773A (en) Information protecting method, protection information dispensing device and protection information reception device
CN108846295A (en) Sensitive information filter method, device, computer equipment and storage medium
CN105681564A (en) Message reminding method and device
CN104598836A (en) Method and device for managing communication content on mobile terminal as well as mobile terminal
CN108875069A (en) A kind of marriage and making friend's matching process and device based on telecommunications big data
CN106506443A (en) A kind of information inspection method and device
JP6691954B2 (en) How to provide hidden message service in chat window
CN104679795A (en) Scene mode switching method and device and mobile terminal
CN108718365A (en) Message treatment method, device, terminal and storage medium
CN108600086B (en) Information processing method, electronic device, and computer-readable storage medium
CN109039863A (en) A kind of mail security detection method, device and storage medium based on self study
CN108989298A (en) A kind of equipment safety monitoring method and device
CN108156330B (en) Message management system and method based on mobile terminal
CN107222608B (en) Contact person sharing method and user terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180223