CN101071462A - System and method for indicating risk of information inputted by users - Google Patents

System and method for indicating risk of information inputted by users Download PDF

Info

Publication number
CN101071462A
CN101071462A CNA2007100739051A CN200710073905A CN101071462A CN 101071462 A CN101071462 A CN 101071462A CN A2007100739051 A CNA2007100739051 A CN A2007100739051A CN 200710073905 A CN200710073905 A CN 200710073905A CN 101071462 A CN101071462 A CN 101071462A
Authority
CN
China
Prior art keywords
character string
user
punctuate
privacy
indicating risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100739051A
Other languages
Chinese (zh)
Inventor
曾小俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CNA2007100739051A priority Critical patent/CN101071462A/en
Publication of CN101071462A publication Critical patent/CN101071462A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention applied to the field of information security provides a user-input information risk warning system and method. The system includes: information cache module for cache user input strings; punctuate processing module. The information referred to the cache module punctuate the strings; privacy rules database for preserving privacy rules; privacy rules than on modules for use, In accordance with privacy rules in the database punctuate the privacy rules to punctuate after treatment strings than the right, when there than the results punctuate a string of suspicious output control signals and risk warning modules for use in the receiving referred to the privacy rules than the control signal output modules, users risk tips. Implementation of this invention users through the process of real-time input string, when that input contains user privacy information, timely tips to the user, thus reducing the risk of user privacy leakage.

Description

A kind of information to user's input is carried out the system and method for indicating risk
Technical field
The invention belongs to the information security detection range, relate in particular to the system and method that a kind of information to user's input is carried out indicating risk.
Background technology
At present; the secret protection work of user in daily information is transmitted all is that the prompting in advance by static state realizes, for example basically; near the content input field, remind that the user " please protect the privacy of oneself, not reveal credit card number/ID (identity number) card No. " etc. with literal.
But the mode of in advance reminding of this static state is left in the basket easily, though the user noticed, also might in follow-up operating process, forget this prompting, and leakage of self privacy information inadvertently.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of information to user's input to carry out the system of indicating risk, is intended to solve in the prior art, because of carelessness, the problem that user's privacy may be leaked in the information of input.
Another purpose of the embodiment of the invention is to provide a kind of information to user's input to carry out the method for indicating risk.
The embodiment of the invention is achieved in that a kind of information to user input carries out the system of indicating risk, and described system comprises:
Information cache module is used for the character string that cache user is imported;
The punctuate processing module is used for the character string of described information cache module is made pauses in reading unpunctuated ancient writings;
Privacy rules database is used to preserve privacy rule;
The privacy rule comparing module, the punctuate character string after being used for according to the privacy rule of described privacy rules database punctuate being handled is compared, output control signal when there is suspicious punctuate character string in comparison result; And
The indicating risk module is used for after the control signal that receives described privacy rule comparing module output the user being carried out indicating risk.
Described privacy rule comparing module comprises:
Punctuate string length judging unit is used for the length of punctuate character string is judged, when the length of judging character string during greater than minimum value, it is submitted to the privacy rule comparing unit, and described minimum value is provided with according to the sensitivity of indicating risk;
The privacy rule comparing unit is used for according to the privacy rule of described privacy rules database the punctuate character string being compared, output control signal when there is suspicious punctuate character string in comparison result.
Described system also comprises:
The privacy rule administration module is used to accept increase, deletion or the retouching operation of user to privacy rules database.
Described privacy rule administration module is realized the operation of user to described privacy rules database by command line mode or graphic user interface.
Described indicating risk module is further used for giving the user with suspicious punctuate character string display.
Described system also comprises:
Suspicious character string locating module, be used for positioning in described information cache module according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is made up, and the character string display after will being made up by described indicating risk module is then given the user.
A kind of information to user's input is carried out the method for indicating risk, and described method comprises:
The character string of cache user input;
Character string to user's input is made pauses in reading unpunctuated ancient writings;
According to privacy rule the punctuate character string of making pauses in reading unpunctuated ancient writings after handling is compared;
When there is suspicious punctuate character string in comparison result, the user is carried out indicating risk.
Described step of the punctuate character string of making pauses in reading unpunctuated ancient writings after handling being compared according to privacy rule comprises:
Single punctuate character string or continuous punctuate character string are carried out the privacy rule comparison.
Before described step of the punctuate character string of making pauses in reading unpunctuated ancient writings after handling being compared according to privacy rule, described method further comprises:
Whether the length of judging the punctuate character string is greater than the step of minimum value, and described minimum value is provided with according to the sensitivity of indicating risk.
The described step that the user is carried out indicating risk further comprises:
Give the user with suspicious punctuate character string display.
The described step that the user is carried out indicating risk further comprises:
Position according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is made up, and the character string display after will making up is given the user.
The embodiment of the invention, is pointed out to the user when finding that the input content comprises user's privacy information timely by in the process of the real-time input of character string of user, thereby reduces the risk that the user is leaked privacy.
Description of drawings
Fig. 1 is indicating risk is carried out in realization that the embodiment of the invention provides to user's input information a system construction drawing;
Fig. 2 is the structural drawing of privacy rule comparing module 104 among Fig. 1;
Fig. 3 is indicating risk is carried out in realization that the embodiment of the invention provides to user's input information a method flow diagram.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
The embodiment of the invention, is pointed out to the user when finding that the input content comprises user's privacy information timely by in the process of the real-time input of character string of user, thereby reduces the risk that the user is leaked privacy.
Fig. 1 shows realization that the embodiment of the invention provides user's input information is carried out the structure of indicating risk system 100, comprises information cache module 101, punctuate processing module 102, privacy rules database 103, privacy rule comparing module 104 and indicating risk module 105.
Privacy rules database 103 is preserved all privacy rule for 104 retrievals of privacy rule comparing module.Information cache module 101 is used for the real-time input information of cache user, for punctuate processing module 102 processing of making pauses in reading unpunctuated ancient writings, punctuate character string (following a plurality of character strings that continuous character string is made pauses in reading unpunctuated ancient writings after handling all abbreviate the punctuate character string as) after privacy rule comparing module 104 is handled punctuate according to the privacy rule in the privacy rules database 103 is compared, when there is suspicious character string in comparison result, to risk reminding module 105 output control signals, indicating risk module 105 receives this control signal, and the possibility of leakage privacy is arranged to the information of the current input of user prompt.
As shown in Figure 2, in an embodiment of the present invention, privacy rule comparing module 104 further comprises a punctuate string length judging unit 1041, when the length of judging character string during greater than minimum value (this minimum value can be provided with according to the factors such as sensitivity of indicating risk), should the punctuate character string be submitted to privacy rule comparing unit 1042 and carry out the privacy rule comparison, when the length of judging character string is less than or equal to minimum value, with its data that are worth as no privacy, do not carry out the privacy rule comparison and handle, thus the operational efficiency of raising system.
In another embodiment of the present invention, indicating risk module 105 in the current input of user prompt, have leak privacy possible in, also give the user, more clear in order to the user is carried out, clear prompting with suspicious punctuate character string display.
In a preferred embodiment of the present invention, said system 100 also comprises a suspicious character string locating module 106, be used for positioning in information cache module 101 according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is made up, submit to indicating risk module 105 then and show and indicating risk, thereby make the user find the content that to reveal privacy faster in the input field according to more complete character string.
In another preferred embodiment of the present invention, said system 100 also comprise be used to accept the user to privacy rules database 103 increase, the privacy rule administration module 107 of operations such as deletion and modification.Disposable the importing in the privacy rules database 103 of rule file that privacy rule administration module 107 can edit the user by command line mode, (Graphical User Interface GUI) realizes the operations such as increase, deletion and modification of user to privacy rules database 103 also can to pass through graphic user interface.
Accordingly, the method realization flow that user's input information is carried out indicating risk that the embodiment of the invention provides as shown in Figure 3, details are as follows:
In step S301, the character string of cache user input;
In step S302, the character string of user's input is made pauses in reading unpunctuated ancient writings;
Punctuate is exactly continuous character string is decomposed into the process of a plurality of character strings according to certain standard, more general punctuate standard be with punctuation mark as decomposition point, can certainly be with space, newline etc. as decomposition point.
In step S303, the punctuate character string after the punctuate processing is carried out the privacy rule comparison, when finding the suspicious character string of leaking privacy is arranged, execution in step S304;
Privacy rule is a kind of matched rule, be to use the expressed a kind of comparison rule of a character string that comprises and only comprise legal character and matched rule symbol, use this matched rule to compare to a punctuate character string, the requirement of matched rule if should the punctuate character string coincide, think that then this punctuate character string is suspicious character string, privacy rule can be formulated as required, and one of relevant privacy rule is exemplified below:
/ 13[0-9] d (8)/phone number rule;
/ ^0 d (16)/account No. rule;
/ 0 d (3)-d (5)/fixed telephone number rule;
/ tame .* location/home address rule
.* road ,/city/
......
At this moment, if the punctuate character string comprises " 13888888888 ", by with above-mentioned rule comparison, find that this punctuate character string and rule "/13[0-9] d (8)/" coincide, then should the punctuate character string be identified as suspicious character string; In like manner, if the punctuate character string comprises character and 16 bit digital with non-0 beginning, then can coincide, so should the punctuate character string be identified as suspicious character string with rule "/^0 d (16)/"; If the punctuate character string comprise " 0755-88888 " can with rule "/0 d (3)-d (5)/" coincide, so should the punctuate character string be identified as suspicious character string.(for example, ID (identity number) card No. rule etc.) comparison is identical with above-mentioned principle, repeats no more for more privacy rule.
In addition, except above-mentioned situation of carrying out the privacy rule comparison at single punctuate character string, can also be to carry out the privacy rule comparison at continuous punctuate character string series, for example when a punctuate character string comprises " home address " and privacy rule "/tame .* location/" coincide, do not think that it is suspicious character string, have only when back punctuate character string being adopted the privacy rule " .* road ,/city/" of address style compare also to coincide, think that just these two punctuate character strings are suspicious character string.
In an embodiment of the present invention, in order to raise the efficiency, before being carried out the privacy rule comparison, the punctuate character string after the punctuate processing also judges the length of this punctuate character string, just carry out the privacy rule comparison when having only length when this punctuate character string greater than minimum value, when the length of character string is not more than minimum value, it as the data that no privacy is worth, is not carried out the privacy rule comparison and handle.Minimum value can be provided with according to the factors such as sensitivity of indicating risk.
In step S304, the content of prompting user input may be leaked privacy.
In an embodiment of the present invention, when the content of prompting user input may be leaked privacy, also give the user, more clear in order to the user is carried out, clear prompting with suspicious punctuate character string display.
In one embodiment of the present invention, position in the character string of user's input of all buffer memorys according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is combined, be shown to the user, be convenient to work as user input content more for a long time, help the user to locate the Probability Area of privacy compromise fast, avoid the user in all input contents, to carry out craft and search.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1, a kind of information to user's input is carried out the system of indicating risk, it is characterized in that described system comprises:
Information cache module is used for the character string that cache user is imported;
The punctuate processing module is used for the character string of described information cache module is made pauses in reading unpunctuated ancient writings;
Privacy rules database is used to preserve privacy rule;
The privacy rule comparing module, the punctuate character string after being used for according to the privacy rule of described privacy rules database punctuate being handled is compared, output control signal when there is suspicious punctuate character string in comparison result; And
The indicating risk module is used for after the control signal that receives described privacy rule comparing module output the user being carried out indicating risk.
2, the information to user's input as claimed in claim 1 is carried out the system of indicating risk, it is characterized in that described privacy rule comparing module comprises:
Punctuate string length judging unit is used for the length of punctuate character string is judged, when the length of judging character string during greater than minimum value, it is submitted to the privacy rule comparing unit, and described minimum value is provided with according to the sensitivity of indicating risk;
The privacy rule comparing unit is used for according to the privacy rule of described privacy rules database the punctuate character string being compared, output control signal when there is suspicious punctuate character string in comparison result.
3, the information to user's input as claimed in claim 1 is carried out the system of indicating risk, it is characterized in that described system also comprises:
The privacy rule administration module is used to accept increase, deletion or the retouching operation of user to privacy rules database.
4, the information to user's input as claimed in claim 3 is carried out the system of indicating risk, it is characterized in that, described privacy rule administration module is realized the operation of user to described privacy rules database by command line mode or graphic user interface.
5, carry out the system of indicating risk as the described information of the arbitrary claim of claim 1 to 4, it is characterized in that described indicating risk module is further used for giving the user with suspicious punctuate character string display user's input.
6, carry out the system of indicating risk as the described information of the arbitrary claim of claim 1 to 4, it is characterized in that described system also comprises user's input:
Suspicious character string locating module, be used for positioning in described information cache module according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is made up, and the character string display after will being made up by described indicating risk module is then given the user.
7, a kind of information to user's input is carried out the method for indicating risk, it is characterized in that described method comprises:
The character string of cache user input;
Character string to user's input is made pauses in reading unpunctuated ancient writings;
According to privacy rule the punctuate character string of making pauses in reading unpunctuated ancient writings after handling is compared;
When there is suspicious punctuate character string in comparison result, the user is carried out indicating risk.
8, the information to user's input as claimed in claim 7 is carried out the method for indicating risk, it is characterized in that, described step of the punctuate character string of making pauses in reading unpunctuated ancient writings after handling being compared according to privacy rule comprises:
Single punctuate character string or continuous punctuate character string are carried out the privacy rule comparison.
9, the information to user's input as claimed in claim 7 is carried out the method for indicating risk, it is characterized in that, before described step of the punctuate character string of making pauses in reading unpunctuated ancient writings after handling being compared according to privacy rule, described method further comprises:
Whether the length of judging the punctuate character string is greater than the step of minimum value, and described minimum value is provided with according to the sensitivity of indicating risk.
10, carry out the method for indicating risk as the described information to user input of the arbitrary claim of claim 7 to 9, it is characterized in that, the described step that the user is carried out indicating risk further comprises:
Give the user with suspicious punctuate character string display.
11, carry out the method for indicating risk as the described information to user input of the arbitrary claim of claim 7 to 9, it is characterized in that, the described step that the user is carried out indicating risk further comprises:
Position according to suspicious punctuate character string, the punctuate character string of suspicious punctuate character string and front and back thereof is made up, and the character string display after will making up is given the user.
CNA2007100739051A 2007-03-30 2007-03-30 System and method for indicating risk of information inputted by users Pending CN101071462A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100739051A CN101071462A (en) 2007-03-30 2007-03-30 System and method for indicating risk of information inputted by users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100739051A CN101071462A (en) 2007-03-30 2007-03-30 System and method for indicating risk of information inputted by users

Publications (1)

Publication Number Publication Date
CN101071462A true CN101071462A (en) 2007-11-14

Family

ID=38898682

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100739051A Pending CN101071462A (en) 2007-03-30 2007-03-30 System and method for indicating risk of information inputted by users

Country Status (1)

Country Link
CN (1) CN101071462A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009089706A1 (en) * 2007-12-19 2009-07-23 Tencent Technology (Shenzhen) Company Limited Method, device and computer terminal for preventing the sensitive information from leaking
CN101819611B (en) * 2009-02-26 2012-08-08 周宏建 Real-time comparison and defending method of input data and hardware thereof
WO2013044514A1 (en) * 2011-09-30 2013-04-04 宇龙计算机通信科技(深圳)有限公司 Media file processing method and mobile terminal
CN104751064A (en) * 2013-12-27 2015-07-01 珠海金山办公软件有限公司 Document encryption prompting method and document encryption prompting system
CN104993935A (en) * 2015-07-01 2015-10-21 北京奇虎科技有限公司 Method, equipment and system for prompting network threat
CN115622764A (en) * 2022-10-09 2023-01-17 深圳市君思科技有限公司 Method for discovering and classifying private data in web network flow
WO2023034415A1 (en) * 2021-08-31 2023-03-09 Google Llc Secret detection on computing platform

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009089706A1 (en) * 2007-12-19 2009-07-23 Tencent Technology (Shenzhen) Company Limited Method, device and computer terminal for preventing the sensitive information from leaking
CN101819611B (en) * 2009-02-26 2012-08-08 周宏建 Real-time comparison and defending method of input data and hardware thereof
WO2013044514A1 (en) * 2011-09-30 2013-04-04 宇龙计算机通信科技(深圳)有限公司 Media file processing method and mobile terminal
CN104751064A (en) * 2013-12-27 2015-07-01 珠海金山办公软件有限公司 Document encryption prompting method and document encryption prompting system
US10587417B2 (en) 2013-12-27 2020-03-10 Beijing Kingsoft Office Software, Inc. Document encryption prompt method and system
CN104993935A (en) * 2015-07-01 2015-10-21 北京奇虎科技有限公司 Method, equipment and system for prompting network threat
WO2023034415A1 (en) * 2021-08-31 2023-03-09 Google Llc Secret detection on computing platform
CN115622764A (en) * 2022-10-09 2023-01-17 深圳市君思科技有限公司 Method for discovering and classifying private data in web network flow

Similar Documents

Publication Publication Date Title
CN109582861B (en) Data privacy information detection system
KR101282705B1 (en) Apparatus and method for preventing disclosure of personal information contained in electronic document
CN108541310B9 (en) Method and device for displaying candidate words and graphical user interface
CN101071462A (en) System and method for indicating risk of information inputted by users
CN110659512B (en) Picture management method, device, terminal and storage medium
US10564846B2 (en) Supplementing a virtual input keyboard
CN105550298B (en) Keyword fuzzy matching method and device
CN104423623B (en) It is a kind of to select word treatment method and electronic equipment
CN101539822B (en) Method and system for identifying handwriting area of touch screen
US20150293975A1 (en) Method and device for searching for contact object, and storage medium
CN103037072A (en) Implementation method of extracting short message contents to apply to scene
CN107330306A (en) Text Watermarking is embedded in and extracting method, device, electronic equipment and storage medium
CN103200293A (en) Method of automatically combining tautonomy contacts in process of guiding contacts into contact list
CN107835316A (en) Method for displaying image and device, storage medium for mobile terminal
CN107992545A (en) A kind of searching method, device, terminal and readable storage medium storing program for executing
CN105678238A (en) Fingerprint authentication apparatus and method
WO2021227922A1 (en) Communication object adding method and apparatus, and electronic device
CN105320691A (en) Account information recognition method and device
CN114241501B (en) Image document processing method and device and electronic equipment
CN107451036A (en) Input reminding method, device and equipment
CN109871685B (en) RTF file analysis method and device
CN107203510A (en) character detecting method and device
CN102999639B (en) A kind of lookup method based on speech recognition character index and system
CN104750665A (en) Text message processing method and text message processing device
CN107229698A (en) A kind of method and device of information processing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication