CN105893870A - Information processing method and device - Google Patents
Information processing method and device Download PDFInfo
- Publication number
- CN105893870A CN105893870A CN201610187508.6A CN201610187508A CN105893870A CN 105893870 A CN105893870 A CN 105893870A CN 201610187508 A CN201610187508 A CN 201610187508A CN 105893870 A CN105893870 A CN 105893870A
- Authority
- CN
- China
- Prior art keywords
- information
- target information
- described target
- password
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an information processing method and device, and relates to the field of information security. The method includes the steps of receiving and displaying target information, judging whether the target information carries characteristic marks or not or judging whether the attribute of the target information is abnormal or not, and if yes, closing and deleting the target information after receiving an instruction for closing the target information. Thus, an information receiving side can check the information but not store or copy or forward the information, so the leakage of confidential information is avoided, and security of information communication is enhanced.
Description
Technical field
The present invention relates to information security field, be specifically related to a kind of information processing method and device.
Background technology
Popularizing of information communication mode, people exchange more and more by the way of sending information,
As sent note, multimedia message, wechat, QQ send text message, voice messaging etc..
People are by during communication for information at present, and the recipient of information gives tacit consent to the information that will receive
Preserve, in order to check at any time.
But, if A sends private information to B, it is intended merely to B and checks, it is undesirable that it preserved for day
After check, then acquiescence is protected the stored mode private information that often makes A be sent and is easily revealed,
Poor stability.
Summary of the invention
The technical problem to be solved in the present invention is the private information that in prior art, information addresser is sent out
Easily reveal.
To this end, the embodiment of the present invention provides a kind of information processing method, comprise the steps: to receive also
Show target information;Judge whether described target information carries signature or judge that described target is believed
The attribute of breath arranges the most abnormal;If described target information carries signature or described target information
Attribute exception is set, then after receiving the instruction closing described target information, close and delete institute
State target information.
Preferably, described signature includes preset characters string.
Preferably, after receiving the instruction closing described target information, and in described closedown and delete
Before described target information, also include: remind whether user preserves described target information.
Preferably, whether preserve described target information and described closedown described prompting user and delete institute
Stating between target information, also include: remind user to input password, described password is used for verifying preservation letter
The authority of breath;Judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is letter
The sender of breath and recipient make an appointment, if the password of user's input differs with described prescribed password
Cause, then close and delete described target information.
Preferably, after described closedown deleting described target information, also include: remind user to have
Information is the most deleted.
Correspondingly, the embodiment of the present invention additionally provides a kind of information processor, including: receive unit,
For receiving and showing target information;Judging unit, is used for judging whether described target information carries
Signature or whether judge that the attribute of described target information is arranged abnormal;Delete unit, in institute
State judging unit and judge that described target information carries signature or judges the attribute of described target information
When arranging abnormal, after receiving the instruction closing described target information, close and delete described target
Information.
Preferably, described signature includes preset characters string.
Preferably, described device also includes: the first reminding unit, for receiving the described mesh of closedown
After the instruction of mark information, before described target information is closed and deleted to described deletion unit, remind and use
Whether family preserves described target information.
Preferably, described device also includes: the second reminding unit, at described first reminding unit
Remind user whether to preserve described target information and close and delete described target information with described deletion unit
Between, remind user to input password, described password is used for verifying the stored authority of guarantor;Password confirming
Unit, for judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is letter
The sender of breath and recipient make an appointment, and are judging that the password that user inputs is predetermined close with described
When code is inconsistent, notify that described target information is closed and deleted to described deletion unit.
Preferably, described device also includes: the 3rd reminding unit, for closing at described deletion unit
And after deleting described target information, remind user to have information the most deleted.
Embodiment of the present invention technical scheme, has the advantage that
1, the information processing method that the embodiment of the present invention provides, receives and shows target information, it is judged that mesh
Whether mark information carries signature or judges that the attribute of target information arranges the most extremely, if so,
Then after receiving the instruction closing target information, close and delete target information so that information receives
Side is only capable of the information of checking, it is impossible to preserves and replicates forwarding information, it is therefore prevented that the leakage of private information, increases
Strong by the safety of communication for information.
2, the information processing method that the embodiment of the present invention provides, is receiving the instruction closing target information
Afterwards, and closing and before delete target information, reminding whether user preserves target information, give tool
The people having special access right provides information and preserves and replicate the approach forwarded so that different information receives
Side has different operating rights to target information, enhances the motility of the processing mode to information.
3, the information processing method that the embodiment of the present invention provides, is reminding whether user preserves target information
And close and between delete target information, remind user to input password and protect stored authority with checking,
Judge that the password that user inputs is the most consistent with prescribed password, if inconsistent, then close and delete target
Information, it is possible to prevent target information from arbitrarily being preserved and replicating forwarding, both ensure that there is different rights
Receiving party's motility to information processing manner, enhance again the safety of information in the case of this.
4, the information processing method that the embodiment of the present invention provides, after closedown delete target information,
Reminding user to have information the most deleted, to help user to confirm, actual truly having receives a private information;
And do not remind the information such as particular content and the information sender of user profile, it is ensured that Information Security.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, under
The accompanying drawing used required in detailed description of the invention or description of the prior art will be briefly described by face,
It should be evident that the accompanying drawing in describing below is some embodiments of the present invention, general for this area
From the point of view of logical technical staff, on the premise of not paying creative work, it is also possible to obtain according to these accompanying drawings
Obtain other accompanying drawing.
Figure 1A is the flow chart of information processing method in the embodiment of the present invention 1;
Figure 1B is the flow chart of a concrete example of information processing method in the embodiment of the present invention 1;
Fig. 2 A is the theory diagram of information processor in the embodiment of the present invention 2;
Fig. 2 B is the theory diagram of a concrete example of information processor in the embodiment of the present invention 2.
Detailed description of the invention
Below in conjunction with accompanying drawing, technical scheme is clearly and completely described, it is clear that
Described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on this
Embodiment in bright, those of ordinary skill in the art are obtained under not making creative work premise
Every other embodiment, broadly fall into the scope of protection of the invention.
In describing the invention, it should be noted that term " first ", " second ", " the 3rd "
It is only used for describing purpose, and it is not intended that indicate or hint relative importance.
As long as additionally, technical characteristic involved in invention described below difference embodiment that
The conflict of not constituting between this just can be combined with each other.
Embodiment 1
The present embodiment provides a kind of information processing method, is applied to receive the terminal of information, it is also possible to
It it is terminal.The information received can be the note/multimedia message information received by communication network,
Can also be the information received by application program, such as wechat information.As shown in Figure 1A, including such as
Lower step:
S10: receive and show target information.
Such as, when receiving private information, terminal preserves this information the most immediately, only prompts the user with
Receive an information, do not directly display information content, as " you have been received by a private information,
Please click on and check ".Only when user clicks on and opens this information, the particular content of information can be viewed,
Now terminal just can receive and show target information.
S20: judge target information whether carry signature or judge target information attribute arrange be
No exception.If the attribute that target information does not carries signature or target information arranges the most abnormal,
Then perform the step identical with currently existing scheme;If target information carries signature or target information
Attribute be provided with exception, then perform step S30.
Such as, if information originator sends a private information, then can be when sending this information, simultaneously
A signature is sent for this information.This feature labelling includes preset characters string, such as " %*%*%* ",
Or, the attribute of this information is set to exceptional value, as this information is dimensioned to infinity,
Or the combination that preset characters string is arranged with information attribute.
If target information carries signature, then prove what this information was sent by information sender
Private information, it is undesirable to compromised, needs this information deletion.
S30: after receiving the instruction closing target information, closes and delete target information.
Such as, after private information is checked, user clicks on button or the icon closing this information,
Then have sent an instruction closing this private information.Terminal, after receiving this instruction, is being closed
While this private information, this private information can be deleted simultaneously.
The information processing method that the embodiment of the present invention provides, receives and shows target information, it is judged that target
Whether information carries signature or judges that the attribute of target information arranges the most extremely, the most then
After receiving the instruction closing target information, close and delete target information so that receiving party
It is only capable of the information of checking, it is impossible to preserve and replicate forwarding information, it is therefore prevented that the leakage of private information, strengthens
By the safety of communication for information.
As a kind of preferred implementation of the present embodiment, as shown in Figure 1B, in above-mentioned steps S30,
After receiving the instruction closing target information, and closing and before delete target information, also wrapping
Include following steps:
S31: remind whether user preserves target information.
If information sender one private information of mass-sending, it is desirable to only groups of people can preserve this private information
For replicating, forwarding etc., then before deleting this private information, remind whether user preserves this secret letter
Breath.
S32: remind user to input password, password is used for verifying the stored authority of guarantor.
Receiving party is to preserve this private information, it is necessary to input password, if not having password, does not then have
There is the authority preserving this private information.
S33: judge that the password that user inputs is the most consistent with prescribed password, prescribed password is sending out of information
The side of sending makes an appointment with recipient.If the password of user's input is inconsistent with prescribed password, then perform
Step S34;If the password of user's input is consistent with prescribed password, then perform step S35.
S34: close and delete target information.
S35: close and preserve target information.
Such as, if information sender is A, it is " qazwsxedc " that its private information sent preserves password, B
All have received this private information that A sends with C, and only B has the preservation password of this private information, C
No.Although then B and C have received this private information, this information of checking can be clicked on, but C
Can not preserve and replicate, forward this information;B can preserve after have input correct preservation password should
Private information, such that it is able to replicate, forward this information.
Preferably, after target information is deleted, user is reminded to have information the most deleted, to help user
Confirm that actual truly having receives a private information;And do not remind particular content and the letter of user profile
The information such as breath sender, it is ensured that Information Security.
Embodiment 2
The present embodiment provides a kind of information processor, as shown in Figure 2 A, including receiving unit 10, sentencing
Disconnected unit 20 and deletion unit 30.
Receive unit 10, be used for receiving and showing target information.
Judging unit 20, is used for judging whether target information carries signature or judge target information
Attribute arrange whether abnormal.Signature includes preset characters string.
Delete unit 30, for judging that target information carries signature or judges mesh at judging unit
When the attribute of mark information arranges abnormal, after receiving the instruction closing target information, close and delete
Target information.
The information processor that the embodiment of the present invention provides, the target information received needs user to click on
Can check, if target information carries signature, then deleting after user closes target information should
Target information so that receiving party is only capable of the information of checking, it is impossible to preserve and replicate forwarding information, anti-
Stop the leakage of private information, enhance the safety by communication for information.
As a kind of preferred implementation of the present embodiment, this information processor also includes the first prompting
Unit the 31, second reminding unit 32 and password confirming unit 33.
First reminding unit 31, is used for reminding whether user preserves target information.
Second reminding unit 32, is used for reminding user to input password, and password is used for verifying that guarantor is stored
Authority.
Password confirming unit 33, for judging that the password that user inputs is the most consistent with prescribed password, in advance
Determine the sender that password is information to make an appointment with recipient, and judge password that user inputs with
When described prescribed password is inconsistent, notify that described target information is closed and deleted to described deletion unit.
Preferably, this information reminding device also includes the 3rd reminding unit, at described deletion unit
After closing and delete described target information, user is reminded to have information the most deleted.
Obviously, above-described embodiment is only for clearly demonstrating example, and not to embodiment party
The restriction of formula.For those of ordinary skill in the field, the most also may be used
To make other changes in different forms.Here without also all of embodiment being given
With exhaustive.And the obvious change thus extended out or variation are still in the guarantor of the invention
Protect among scope.
Claims (10)
1. an information processing method, it is characterised in that comprise the steps:
Receive and show target information;
Judge whether described target information carries signature or judge that the attribute of described target information sets
Put the most abnormal;
If the attribute that described target information carries signature or described target information arranges exception, then
After receiving the instruction closing described target information, close and delete described target information.
Information processing method the most according to claim 1, it is characterised in that described signature
Including preset characters string.
Information processing method the most according to claim 1, it is characterised in that receiving closedown
After the instruction of described target information, and before described closedown deleting described target information, also wrap
Include:
Remind whether user preserves described target information.
Information processing method the most according to claim 3, it is characterised in that use described prompting
Whether family preserves described target information and described closedown and deletes between described target information, also includes:
Reminding user to input password, described password is used for verifying the stored authority of guarantor;
Judging that the password that user inputs is the most consistent with prescribed password, described prescribed password is sending out of information
The side of sending makes an appointment with recipient, if the password of user's input is inconsistent with described prescribed password, then
Close and delete described target information.
5. according to the information processing method according to any one of claim 1-4, it is characterised in that
Described closedown after deleting described target information, also includes:
User is reminded to have information the most deleted.
6. an information processor, it is characterised in that including:
Receive unit, be used for receiving and showing target information;
Judging unit, is used for judging whether described target information carries signature or judge described mesh
The attribute of mark information arranges the most abnormal;
Delete unit, for described judging unit judge described target information carry signature or
Judge, when the attribute of described target information arranges abnormal, receiving the instruction closing described target information
After, close and delete described target information.
Information processor the most according to claim 6, it is characterised in that described signature
Including preset characters string.
Information processor the most according to claim 6, it is characterised in that also include:
First reminding unit, for after receiving the instruction closing described target information, deletes described
Before closing except unit and deleting described target information, remind whether user preserves described target information.
Information processor the most according to claim 8, it is characterised in that also include:
At described first reminding unit, second reminding unit, for reminding whether user preserves described target
Information and described deletion unit close and delete between described target information, remind user to input password,
Described password is used for verifying the stored authority of guarantor;
Password confirming unit, for judging that the password that user inputs is the most consistent with prescribed password, described
Prescribed password is that the sender of information makes an appointment with recipient, and at the password judging that user inputs
Time inconsistent with described prescribed password, notify that described target information is closed and deleted to described deletion unit.
10. according to the information processor according to any one of claim 6-9, it is characterised in that
Also include:
3rd reminding unit, is used for after described target information is closed and deleted to described deletion unit,
User is reminded to have information the most deleted.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610187508.6A CN105893870A (en) | 2016-03-29 | 2016-03-29 | Information processing method and device |
PCT/CN2016/096545 WO2017166616A1 (en) | 2016-03-29 | 2016-08-24 | Information processing method and apparatus, and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610187508.6A CN105893870A (en) | 2016-03-29 | 2016-03-29 | Information processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105893870A true CN105893870A (en) | 2016-08-24 |
Family
ID=57014590
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610187508.6A Pending CN105893870A (en) | 2016-03-29 | 2016-03-29 | Information processing method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105893870A (en) |
WO (1) | WO2017166616A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446717A (en) * | 2016-10-14 | 2017-02-22 | 深圳天珑无线科技有限公司 | Information processing method, device and terminal |
CN107508799A (en) * | 2017-07-31 | 2017-12-22 | 珠海格力电器股份有限公司 | Information presentation method and device based on instant messaging |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117468A (en) * | 2018-08-01 | 2019-01-01 | 北京数字雷暴信息科技有限公司 | A kind of data processing method and device |
CN111191747B (en) * | 2018-11-15 | 2023-09-01 | 西安中兴新软件有限责任公司 | Information management method, processing method, device and storage medium |
CN110945508A (en) * | 2019-10-09 | 2020-03-31 | 中新智擎科技有限公司 | Information confidentiality processing method and device, access control robot and access control system |
CN111917592A (en) * | 2020-08-12 | 2020-11-10 | 中国工商银行股份有限公司 | Centralized operation method and device for heterogeneous brand network equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103856919A (en) * | 2014-03-27 | 2014-06-11 | 宇龙计算机通信科技(深圳)有限公司 | Information sending method and device as well as information receiving method and device |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
WO2015143676A1 (en) * | 2014-03-27 | 2015-10-01 | 宇龙计算机通信科技(深圳)有限公司 | Information transmitting method and device and information receiving method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105850163B (en) * | 2014-03-27 | 2020-05-19 | 宇龙计算机通信科技(深圳)有限公司 | Information sending method and device and information receiving method and device |
CN105306443A (en) * | 2015-09-18 | 2016-02-03 | 四川效率源信息安全技术股份有限公司 | Burn-after-reading method based on complete offline |
-
2016
- 2016-03-29 CN CN201610187508.6A patent/CN105893870A/en active Pending
- 2016-08-24 WO PCT/CN2016/096545 patent/WO2017166616A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103856919A (en) * | 2014-03-27 | 2014-06-11 | 宇龙计算机通信科技(深圳)有限公司 | Information sending method and device as well as information receiving method and device |
WO2015143676A1 (en) * | 2014-03-27 | 2015-10-01 | 宇龙计算机通信科技(深圳)有限公司 | Information transmitting method and device and information receiving method and device |
CN104066060A (en) * | 2014-06-26 | 2014-09-24 | 福州大学 | Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446717A (en) * | 2016-10-14 | 2017-02-22 | 深圳天珑无线科技有限公司 | Information processing method, device and terminal |
CN107508799A (en) * | 2017-07-31 | 2017-12-22 | 珠海格力电器股份有限公司 | Information presentation method and device based on instant messaging |
CN107508799B (en) * | 2017-07-31 | 2018-12-04 | 珠海格力电器股份有限公司 | Information presentation method and device based on instant messaging |
Also Published As
Publication number | Publication date |
---|---|
WO2017166616A1 (en) | 2017-10-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105893870A (en) | Information processing method and device | |
Lau et al. | Mimesis Aegis: A Mimicry Privacy {Shield–A}{System’s} Approach to Data Privacy on Public Cloud | |
KR102104385B1 (en) | Instant message transmitting and receiveing system, terminal device and controlling method thereof | |
CN107734176A (en) | Loss guard method, terminal and the computer-readable recording medium of mobile terminal | |
US10911492B2 (en) | System and method for securing documents prior to transmission | |
US9659189B2 (en) | Systems and methods of safeguarding user information while interacting with online service providers | |
CN103856919B (en) | Method for sending information and device and message receiving method and device | |
CN104050398B (en) | Multifunctional encryption lock and operating method thereof | |
US9820119B2 (en) | Method and systems for lockbox secured file transmission | |
CN104794405A (en) | Method and system for achieving private storage of messages | |
CN106385506A (en) | Information notification management method and device | |
CN103685266A (en) | Method and device for protecting enterprise data | |
AU2015101772A4 (en) | Reducing inadvertent data loss in email | |
CN106031202B (en) | Method for sending information and device and message receiving method and device | |
US10241653B2 (en) | Method for deleting messages and terminal | |
CN102271332B (en) | End message time slot scrambling and device | |
EP3996328A1 (en) | Blockchain-driven certification of iterative electronic communications | |
CN107315934A (en) | Communication message processing method, mobile terminal and storage device | |
CN105827518A (en) | Secure cross-domain mail transfer method, device and system | |
WO2015143682A1 (en) | Information transmitting method and device and information receiving method and device | |
CN101951568A (en) | Short message information interception processing method and device | |
US7529940B1 (en) | Securing selected data within a message | |
CN106210233B (en) | A kind of terminal called book management method and device | |
US10169547B2 (en) | Secure computing system record transfer control | |
WO2017020598A1 (en) | Contact information management method, apparatus and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160824 |
|
WD01 | Invention patent application deemed withdrawn after publication |