CN105893870A - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN105893870A
CN105893870A CN201610187508.6A CN201610187508A CN105893870A CN 105893870 A CN105893870 A CN 105893870A CN 201610187508 A CN201610187508 A CN 201610187508A CN 105893870 A CN105893870 A CN 105893870A
Authority
CN
China
Prior art keywords
information
target information
described target
password
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610187508.6A
Other languages
Chinese (zh)
Inventor
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610187508.6A priority Critical patent/CN105893870A/en
Priority to PCT/CN2016/096545 priority patent/WO2017166616A1/en
Publication of CN105893870A publication Critical patent/CN105893870A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information processing method and device, and relates to the field of information security. The method includes the steps of receiving and displaying target information, judging whether the target information carries characteristic marks or not or judging whether the attribute of the target information is abnormal or not, and if yes, closing and deleting the target information after receiving an instruction for closing the target information. Thus, an information receiving side can check the information but not store or copy or forward the information, so the leakage of confidential information is avoided, and security of information communication is enhanced.

Description

A kind of information processing method and device
Technical field
The present invention relates to information security field, be specifically related to a kind of information processing method and device.
Background technology
Popularizing of information communication mode, people exchange more and more by the way of sending information, As sent note, multimedia message, wechat, QQ send text message, voice messaging etc..
People are by during communication for information at present, and the recipient of information gives tacit consent to the information that will receive Preserve, in order to check at any time.
But, if A sends private information to B, it is intended merely to B and checks, it is undesirable that it preserved for day After check, then acquiescence is protected the stored mode private information that often makes A be sent and is easily revealed, Poor stability.
Summary of the invention
The technical problem to be solved in the present invention is the private information that in prior art, information addresser is sent out Easily reveal.
To this end, the embodiment of the present invention provides a kind of information processing method, comprise the steps: to receive also Show target information;Judge whether described target information carries signature or judge that described target is believed The attribute of breath arranges the most abnormal;If described target information carries signature or described target information Attribute exception is set, then after receiving the instruction closing described target information, close and delete institute State target information.
Preferably, described signature includes preset characters string.
Preferably, after receiving the instruction closing described target information, and in described closedown and delete Before described target information, also include: remind whether user preserves described target information.
Preferably, whether preserve described target information and described closedown described prompting user and delete institute Stating between target information, also include: remind user to input password, described password is used for verifying preservation letter The authority of breath;Judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is letter The sender of breath and recipient make an appointment, if the password of user's input differs with described prescribed password Cause, then close and delete described target information.
Preferably, after described closedown deleting described target information, also include: remind user to have Information is the most deleted.
Correspondingly, the embodiment of the present invention additionally provides a kind of information processor, including: receive unit, For receiving and showing target information;Judging unit, is used for judging whether described target information carries Signature or whether judge that the attribute of described target information is arranged abnormal;Delete unit, in institute State judging unit and judge that described target information carries signature or judges the attribute of described target information When arranging abnormal, after receiving the instruction closing described target information, close and delete described target Information.
Preferably, described signature includes preset characters string.
Preferably, described device also includes: the first reminding unit, for receiving the described mesh of closedown After the instruction of mark information, before described target information is closed and deleted to described deletion unit, remind and use Whether family preserves described target information.
Preferably, described device also includes: the second reminding unit, at described first reminding unit Remind user whether to preserve described target information and close and delete described target information with described deletion unit Between, remind user to input password, described password is used for verifying the stored authority of guarantor;Password confirming Unit, for judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is letter The sender of breath and recipient make an appointment, and are judging that the password that user inputs is predetermined close with described When code is inconsistent, notify that described target information is closed and deleted to described deletion unit.
Preferably, described device also includes: the 3rd reminding unit, for closing at described deletion unit And after deleting described target information, remind user to have information the most deleted.
Embodiment of the present invention technical scheme, has the advantage that
1, the information processing method that the embodiment of the present invention provides, receives and shows target information, it is judged that mesh Whether mark information carries signature or judges that the attribute of target information arranges the most extremely, if so, Then after receiving the instruction closing target information, close and delete target information so that information receives Side is only capable of the information of checking, it is impossible to preserves and replicates forwarding information, it is therefore prevented that the leakage of private information, increases Strong by the safety of communication for information.
2, the information processing method that the embodiment of the present invention provides, is receiving the instruction closing target information Afterwards, and closing and before delete target information, reminding whether user preserves target information, give tool The people having special access right provides information and preserves and replicate the approach forwarded so that different information receives Side has different operating rights to target information, enhances the motility of the processing mode to information.
3, the information processing method that the embodiment of the present invention provides, is reminding whether user preserves target information And close and between delete target information, remind user to input password and protect stored authority with checking, Judge that the password that user inputs is the most consistent with prescribed password, if inconsistent, then close and delete target Information, it is possible to prevent target information from arbitrarily being preserved and replicating forwarding, both ensure that there is different rights Receiving party's motility to information processing manner, enhance again the safety of information in the case of this.
4, the information processing method that the embodiment of the present invention provides, after closedown delete target information, Reminding user to have information the most deleted, to help user to confirm, actual truly having receives a private information; And do not remind the information such as particular content and the information sender of user profile, it is ensured that Information Security.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, under The accompanying drawing used required in detailed description of the invention or description of the prior art will be briefly described by face, It should be evident that the accompanying drawing in describing below is some embodiments of the present invention, general for this area From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings Obtain other accompanying drawing.
Figure 1A is the flow chart of information processing method in the embodiment of the present invention 1;
Figure 1B is the flow chart of a concrete example of information processing method in the embodiment of the present invention 1;
Fig. 2 A is the theory diagram of information processor in the embodiment of the present invention 2;
Fig. 2 B is the theory diagram of a concrete example of information processor in the embodiment of the present invention 2.
Detailed description of the invention
Below in conjunction with accompanying drawing, technical scheme is clearly and completely described, it is clear that Described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on this Embodiment in bright, those of ordinary skill in the art are obtained under not making creative work premise Every other embodiment, broadly fall into the scope of protection of the invention.
In describing the invention, it should be noted that term " first ", " second ", " the 3rd " It is only used for describing purpose, and it is not intended that indicate or hint relative importance.
As long as additionally, technical characteristic involved in invention described below difference embodiment that The conflict of not constituting between this just can be combined with each other.
Embodiment 1
The present embodiment provides a kind of information processing method, is applied to receive the terminal of information, it is also possible to It it is terminal.The information received can be the note/multimedia message information received by communication network, Can also be the information received by application program, such as wechat information.As shown in Figure 1A, including such as Lower step:
S10: receive and show target information.
Such as, when receiving private information, terminal preserves this information the most immediately, only prompts the user with Receive an information, do not directly display information content, as " you have been received by a private information, Please click on and check ".Only when user clicks on and opens this information, the particular content of information can be viewed, Now terminal just can receive and show target information.
S20: judge target information whether carry signature or judge target information attribute arrange be No exception.If the attribute that target information does not carries signature or target information arranges the most abnormal, Then perform the step identical with currently existing scheme;If target information carries signature or target information Attribute be provided with exception, then perform step S30.
Such as, if information originator sends a private information, then can be when sending this information, simultaneously A signature is sent for this information.This feature labelling includes preset characters string, such as " %*%*%* ", Or, the attribute of this information is set to exceptional value, as this information is dimensioned to infinity, Or the combination that preset characters string is arranged with information attribute.
If target information carries signature, then prove what this information was sent by information sender Private information, it is undesirable to compromised, needs this information deletion.
S30: after receiving the instruction closing target information, closes and delete target information.
Such as, after private information is checked, user clicks on button or the icon closing this information, Then have sent an instruction closing this private information.Terminal, after receiving this instruction, is being closed While this private information, this private information can be deleted simultaneously.
The information processing method that the embodiment of the present invention provides, receives and shows target information, it is judged that target Whether information carries signature or judges that the attribute of target information arranges the most extremely, the most then After receiving the instruction closing target information, close and delete target information so that receiving party It is only capable of the information of checking, it is impossible to preserve and replicate forwarding information, it is therefore prevented that the leakage of private information, strengthens By the safety of communication for information.
As a kind of preferred implementation of the present embodiment, as shown in Figure 1B, in above-mentioned steps S30, After receiving the instruction closing target information, and closing and before delete target information, also wrapping Include following steps:
S31: remind whether user preserves target information.
If information sender one private information of mass-sending, it is desirable to only groups of people can preserve this private information For replicating, forwarding etc., then before deleting this private information, remind whether user preserves this secret letter Breath.
S32: remind user to input password, password is used for verifying the stored authority of guarantor.
Receiving party is to preserve this private information, it is necessary to input password, if not having password, does not then have There is the authority preserving this private information.
S33: judge that the password that user inputs is the most consistent with prescribed password, prescribed password is sending out of information The side of sending makes an appointment with recipient.If the password of user's input is inconsistent with prescribed password, then perform Step S34;If the password of user's input is consistent with prescribed password, then perform step S35.
S34: close and delete target information.
S35: close and preserve target information.
Such as, if information sender is A, it is " qazwsxedc " that its private information sent preserves password, B All have received this private information that A sends with C, and only B has the preservation password of this private information, C No.Although then B and C have received this private information, this information of checking can be clicked on, but C Can not preserve and replicate, forward this information;B can preserve after have input correct preservation password should Private information, such that it is able to replicate, forward this information.
Preferably, after target information is deleted, user is reminded to have information the most deleted, to help user Confirm that actual truly having receives a private information;And do not remind particular content and the letter of user profile The information such as breath sender, it is ensured that Information Security.
Embodiment 2
The present embodiment provides a kind of information processor, as shown in Figure 2 A, including receiving unit 10, sentencing Disconnected unit 20 and deletion unit 30.
Receive unit 10, be used for receiving and showing target information.
Judging unit 20, is used for judging whether target information carries signature or judge target information Attribute arrange whether abnormal.Signature includes preset characters string.
Delete unit 30, for judging that target information carries signature or judges mesh at judging unit When the attribute of mark information arranges abnormal, after receiving the instruction closing target information, close and delete Target information.
The information processor that the embodiment of the present invention provides, the target information received needs user to click on Can check, if target information carries signature, then deleting after user closes target information should Target information so that receiving party is only capable of the information of checking, it is impossible to preserve and replicate forwarding information, anti- Stop the leakage of private information, enhance the safety by communication for information.
As a kind of preferred implementation of the present embodiment, this information processor also includes the first prompting Unit the 31, second reminding unit 32 and password confirming unit 33.
First reminding unit 31, is used for reminding whether user preserves target information.
Second reminding unit 32, is used for reminding user to input password, and password is used for verifying that guarantor is stored Authority.
Password confirming unit 33, for judging that the password that user inputs is the most consistent with prescribed password, in advance Determine the sender that password is information to make an appointment with recipient, and judge password that user inputs with When described prescribed password is inconsistent, notify that described target information is closed and deleted to described deletion unit.
Preferably, this information reminding device also includes the 3rd reminding unit, at described deletion unit After closing and delete described target information, user is reminded to have information the most deleted.
Obviously, above-described embodiment is only for clearly demonstrating example, and not to embodiment party The restriction of formula.For those of ordinary skill in the field, the most also may be used To make other changes in different forms.Here without also all of embodiment being given With exhaustive.And the obvious change thus extended out or variation are still in the guarantor of the invention Protect among scope.

Claims (10)

1. an information processing method, it is characterised in that comprise the steps:
Receive and show target information;
Judge whether described target information carries signature or judge that the attribute of described target information sets Put the most abnormal;
If the attribute that described target information carries signature or described target information arranges exception, then After receiving the instruction closing described target information, close and delete described target information.
Information processing method the most according to claim 1, it is characterised in that described signature Including preset characters string.
Information processing method the most according to claim 1, it is characterised in that receiving closedown After the instruction of described target information, and before described closedown deleting described target information, also wrap Include:
Remind whether user preserves described target information.
Information processing method the most according to claim 3, it is characterised in that use described prompting Whether family preserves described target information and described closedown and deletes between described target information, also includes:
Reminding user to input password, described password is used for verifying the stored authority of guarantor;
Judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is sending out of information The side of sending makes an appointment with recipient, if the password of user's input is inconsistent with described prescribed password, then Close and delete described target information.
5. according to the information processing method according to any one of claim 1-4, it is characterised in that Described closedown after deleting described target information, also includes:
User is reminded to have information the most deleted.
6. an information processor, it is characterised in that including:
Receive unit, be used for receiving and showing target information;
Judging unit, is used for judging whether described target information carries signature or judge described mesh The attribute of mark information arranges the most abnormal;
Delete unit, for described judging unit judge described target information carry signature or Judge, when the attribute of described target information arranges abnormal, receiving the instruction closing described target information After, close and delete described target information.
Information processor the most according to claim 6, it is characterised in that described signature Including preset characters string.
Information processor the most according to claim 6, it is characterised in that also include:
First reminding unit, for after receiving the instruction closing described target information, deletes described Before closing except unit and deleting described target information, remind whether user preserves described target information.
Information processor the most according to claim 8, it is characterised in that also include:
At described first reminding unit, second reminding unit, for reminding whether user preserves described target Information and described deletion unit close and delete between described target information, remind user to input password, Described password is used for verifying the stored authority of guarantor;
Password confirming unit, for judging that the password that user inputs is the most consistent with prescribed password, described Prescribed password is that the sender of information makes an appointment with recipient, and at the password judging that user inputs Time inconsistent with described prescribed password, notify that described target information is closed and deleted to described deletion unit.
10. according to the information processor according to any one of claim 6-9, it is characterised in that Also include:
3rd reminding unit, is used for after described target information is closed and deleted to described deletion unit, User is reminded to have information the most deleted.
CN201610187508.6A 2016-03-29 2016-03-29 Information processing method and device Pending CN105893870A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610187508.6A CN105893870A (en) 2016-03-29 2016-03-29 Information processing method and device
PCT/CN2016/096545 WO2017166616A1 (en) 2016-03-29 2016-08-24 Information processing method and apparatus, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610187508.6A CN105893870A (en) 2016-03-29 2016-03-29 Information processing method and device

Publications (1)

Publication Number Publication Date
CN105893870A true CN105893870A (en) 2016-08-24

Family

ID=57014590

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610187508.6A Pending CN105893870A (en) 2016-03-29 2016-03-29 Information processing method and device

Country Status (2)

Country Link
CN (1) CN105893870A (en)
WO (1) WO2017166616A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446717A (en) * 2016-10-14 2017-02-22 深圳天珑无线科技有限公司 Information processing method, device and terminal
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 Information presentation method and device based on instant messaging

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117468A (en) * 2018-08-01 2019-01-01 北京数字雷暴信息科技有限公司 A kind of data processing method and device
CN111191747B (en) * 2018-11-15 2023-09-01 西安中兴新软件有限责任公司 Information management method, processing method, device and storage medium
CN110945508A (en) * 2019-10-09 2020-03-31 中新智擎科技有限公司 Information confidentiality processing method and device, access control robot and access control system
CN111917592A (en) * 2020-08-12 2020-11-10 中国工商银行股份有限公司 Centralized operation method and device for heterogeneous brand network equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856919A (en) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 Information sending method and device as well as information receiving method and device
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication
WO2015143676A1 (en) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 Information transmitting method and device and information receiving method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105850163B (en) * 2014-03-27 2020-05-19 宇龙计算机通信科技(深圳)有限公司 Information sending method and device and information receiving method and device
CN105306443A (en) * 2015-09-18 2016-02-03 四川效率源信息安全技术股份有限公司 Burn-after-reading method based on complete offline

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856919A (en) * 2014-03-27 2014-06-11 宇龙计算机通信科技(深圳)有限公司 Information sending method and device as well as information receiving method and device
WO2015143676A1 (en) * 2014-03-27 2015-10-01 宇龙计算机通信科技(深圳)有限公司 Information transmitting method and device and information receiving method and device
CN104066060A (en) * 2014-06-26 2014-09-24 福州大学 Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106446717A (en) * 2016-10-14 2017-02-22 深圳天珑无线科技有限公司 Information processing method, device and terminal
CN107508799A (en) * 2017-07-31 2017-12-22 珠海格力电器股份有限公司 Information presentation method and device based on instant messaging
CN107508799B (en) * 2017-07-31 2018-12-04 珠海格力电器股份有限公司 Information presentation method and device based on instant messaging

Also Published As

Publication number Publication date
WO2017166616A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
CN105893870A (en) Information processing method and device
Lau et al. Mimesis Aegis: A Mimicry Privacy {Shield–A}{System’s} Approach to Data Privacy on Public Cloud
KR102104385B1 (en) Instant message transmitting and receiveing system, terminal device and controlling method thereof
CN107734176A (en) Loss guard method, terminal and the computer-readable recording medium of mobile terminal
US10911492B2 (en) System and method for securing documents prior to transmission
US9659189B2 (en) Systems and methods of safeguarding user information while interacting with online service providers
CN103856919B (en) Method for sending information and device and message receiving method and device
CN104050398B (en) Multifunctional encryption lock and operating method thereof
US9820119B2 (en) Method and systems for lockbox secured file transmission
CN104794405A (en) Method and system for achieving private storage of messages
CN106385506A (en) Information notification management method and device
CN103685266A (en) Method and device for protecting enterprise data
AU2015101772A4 (en) Reducing inadvertent data loss in email
CN106031202B (en) Method for sending information and device and message receiving method and device
US10241653B2 (en) Method for deleting messages and terminal
CN102271332B (en) End message time slot scrambling and device
EP3996328A1 (en) Blockchain-driven certification of iterative electronic communications
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN105827518A (en) Secure cross-domain mail transfer method, device and system
WO2015143682A1 (en) Information transmitting method and device and information receiving method and device
CN101951568A (en) Short message information interception processing method and device
US7529940B1 (en) Securing selected data within a message
CN106210233B (en) A kind of terminal called book management method and device
US10169547B2 (en) Secure computing system record transfer control
WO2017020598A1 (en) Contact information management method, apparatus and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160824

WD01 Invention patent application deemed withdrawn after publication