CN107888573A - A kind of information security processing system and method - Google Patents
A kind of information security processing system and method Download PDFInfo
- Publication number
- CN107888573A CN107888573A CN201711027537.7A CN201711027537A CN107888573A CN 107888573 A CN107888573 A CN 107888573A CN 201711027537 A CN201711027537 A CN 201711027537A CN 107888573 A CN107888573 A CN 107888573A
- Authority
- CN
- China
- Prior art keywords
- information
- security mechanism
- pending
- user terminal
- keyword
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The present invention, which provides a kind of information security processing system and method, its method, to be included:Security mechanism is set, and the security mechanism includes keyword and message processing flow;Receive the pending information of the first user terminal transmission;From pending acquisition of information keyword, the keyword of pending information is matched with the keyword of mechanism configured information, judged whether to start security mechanism according to matching result, if the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, the execution data are sent into second user terminal, if matching is unsuccessful, do not start the security mechanism, the pending information is sent into second user terminal.The demand according to pending information of the present invention, it disclosure satisfy that security mechanism is opened under different scenes to be carried out information processing or be not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Description
Technical field
The invention mainly relates to field of information security technology, and in particular to a kind of information security processing system and method.
Background technology
Information security is link particularly important in enterprise's production, and reliable information processing of keeping the safety in production can reduce economy
Loss, but current information security processing or administrative skill be typically using a kind of mode to all pending information at
Reason, can not match different mode treatments so that information management form is relatively simple, in different feelings according to particular demands
Corresponding pattern can not be corresponded under scape and carries out information processing.
The content of the invention
The present invention provides a kind of information security processing system and method for above-mentioned technical problem.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of information security processing system, including:
Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;
Acquisition module, the pending information sent for receiving the first user terminal;
Matching module, for from pending acquisition of information keyword, the keyword of pending information and mechanism instruction to be believed
The keyword of breath is matched, and matching result is sent in processing module;
Processing module, for being judged whether to start security mechanism according to matching result, if the match is successful, described in startup
Security mechanism is treated processing information and handled, and obtains performing data, and the execution data are sent into second user terminal, if
Match unsuccessful, then do not start the security mechanism, the pending information is sent into second user terminal.
The beneficial effects of the invention are as follows:According to the demand of pending information, it disclosure satisfy that and safety is opened under different scenes
Mechanism carries out information processing or is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, described information handling process specifically includes:By log-on message in the pending information and prestore
Log-on message is matched,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
It is using the above-mentioned further beneficial effect of technical scheme:, can be according to default letter when starting security mechanism
Breath handling process is treated processing information and handled, good reliability.
Further, in addition to memory module, the memory module are used to preserve security mechanism and perform data message.
Another technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of information security processing method, including such as
Lower step;
Security mechanism is set, and the security mechanism includes keyword and message processing flow;
Receive the pending information of the first user terminal transmission;
From pending acquisition of information keyword, the keyword of pending information and the keyword of mechanism configured information are carried out
Matching, judged whether to start security mechanism according to matching result,
If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, by institute
State and perform data transmission second user terminal, if matching is unsuccessful, do not start the security mechanism, by the pending letter
Breath sends second user terminal.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, described information handling process specifically includes:By log-on message in the pending information and prestore
Log-on message is matched,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
Further, in addition to step:Preserve security mechanism and perform data message.
The beneficial effects of the invention are as follows:According to the demand of pending information, it disclosure satisfy that and safety is opened under different scenes
Mechanism carries out information processing or is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Brief description of the drawings
Fig. 1 is the module frame chart of information security processing system provided in an embodiment of the present invention;
The method flow diagram of Fig. 2 information security processing methods provided in an embodiment of the present invention.
Embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, the given examples are served only to explain the present invention, and
It is non-to be used to limit the scope of the present invention.
Fig. 1 is the module frame chart of information security processing system provided in an embodiment of the present invention;
As shown in figure 1, a kind of information security processing system, including:
Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;
Acquisition module, the pending information sent for receiving the first user terminal;
Matching module, for from pending acquisition of information keyword, the keyword of pending information and mechanism instruction to be believed
The keyword of breath is matched, and matching result is sent in processing module;
Processing module, for being judged whether to start security mechanism according to matching result, if the match is successful, described in startup
Security mechanism is treated processing information and handled, and obtains performing data, and the execution data are sent into second user terminal, if
Match unsuccessful, then do not start the security mechanism, the pending information is sent into second user terminal.
In above-described embodiment, according to the demand of pending information, it disclosure satisfy that security mechanism is opened under different scenes to be entered
Row information processing is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Specifically, in above-described embodiment, the keyword of the security mechanism can be " QD ", that is, start, if pending letter
The keyword carried in breath is " QD security mechanisms ", then judges the keyword of the security mechanism and carry in pending information
Keywords matching success, then start security mechanism, if carrying " GB security mechanisms " in pending information, that is, closes, then judges
The keyword of the security mechanism and the Keywords matching carried in pending information are unsuccessful, then do not start the safe machine
System, or keyword is not carried in pending information, then also it is determined as the unsuccessful situation of Keywords matching.
Alternatively, specifically included as one embodiment of the present of invention, described information handling process:By the pending letter
Log-on message in breath is matched with the log-on message to prestore,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
In above-described embodiment, when starting security mechanism, processing information can be treated according to default message processing flow
Handled, good reliability.
Specifically, in above-described embodiment, when the pending information that the first user terminal is sent carries the situation of keyword,
The pending information is that more special or more secret information is handled and protected, it is necessary to open security mechanism, will wait to locate
After reason information is verified and encrypted, second user terminal is retransmited, second user terminal can be setting for consistency operation center
It is standby.
Alternatively, as one embodiment of the present of invention, in addition to memory module, the memory module is used to preserve safety
Mechanism and execution data message.
The method flow diagram of Fig. 2 information security processing methods provided in an embodiment of the present invention.
As shown in Fig. 2 a kind of information security processing method, comprises the following steps;
Security mechanism is set, and the security mechanism includes keyword and message processing flow;
Receive the pending information of the first user terminal transmission;
From pending acquisition of information keyword, the keyword of pending information and the keyword of mechanism configured information are carried out
Matching, judged whether to start security mechanism according to matching result,
If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, by institute
State and perform data transmission second user terminal, if matching is unsuccessful, do not start the security mechanism, by the pending letter
Breath sends second user terminal.
Alternatively, specifically included as one embodiment of the present of invention, described information handling process:By the pending letter
Log-on message in breath is matched with the log-on message to prestore,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
Alternatively, as one embodiment of the present of invention, in addition to step:Preserve security mechanism and perform data message.
In above-described embodiment, according to the demand of pending information, it disclosure satisfy that security mechanism is opened under different scenes to be entered
Row information processing is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Each functional unit in each embodiment of the present invention can be integrated in a processing unit or each
Unit is individually physically present or two or more units are integrated in a unit.Above-mentioned integrated unit was both
It can be realized, can also be realized in the form of SFU software functional unit in the form of hardware.
If integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can
To be stored in a computer read/write memory medium.Based on such understanding, technical scheme substantially or
Say that the part to be contributed to prior art, or all or part of the technical scheme can be embodied in the form of software product
Out, the computer software product is stored in a storage medium, including some instructions are causing a computer equipment
(can be personal computer, server, or network equipment etc.) performs all or part of each embodiment method of the present invention
Step.And foregoing storage medium includes:It is USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random
Access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Jie of store program codes
Matter.
More than, it is only embodiment of the invention, but protection scope of the present invention is not limited thereto, and it is any to be familiar with
Those skilled in the art the invention discloses technical scope in, various equivalent modifications or substitutions can be readily occurred in,
These modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be wanted with right
The protection domain asked is defined.
Claims (6)
- A kind of 1. information security processing system, it is characterised in that including;Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;Acquisition module, the pending information sent for receiving the first user terminal;Matching module, for from pending acquisition of information keyword, by the keyword of pending information and the security mechanism Keyword matched, by matching result send processing module in;Processing module, for judging whether to start security mechanism according to matching result, if the match is successful, start the safety Mechanism, and processing information is treated according to described information handling process and handled, obtain performing data, by the execution data hair Second user terminal is sent, if matching is unsuccessful, does not start the security mechanism, the pending information is sent into second uses Family terminal.
- 2. information security processing system according to claim 1, it is characterised in that described information handling process is specifically wrapped Include:Log-on message in the pending information is matched with the log-on message to prestore,If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,If be proved to be successful, pending information is encrypted, obtains performing data,If authentication failed, to the first user terminal feedback validation code authentication failed information;If it fails to match, the incorrect information of log-on message is fed back to first user terminal.
- 3. information security processing system according to claim 1, it is characterised in that also including memory module, the storage Module is used to preserve security mechanism and performs data.
- A kind of 4. information security processing method, it is characterised in that including;Security mechanism is set, and the security mechanism includes keyword and message processing flow;Receive the pending information of the first user terminal transmission;From pending acquisition of information keyword, by the keyword of pending information and the progress of the keyword of mechanism configured information Match somebody with somebody, judged whether to start security mechanism according to matching result,If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, held described Row data send second user terminal, if matching is unsuccessful, do not start the security mechanism, and the pending information is sent out Send second user terminal.
- 5. information security processing method according to claim 4, it is characterised in that described information handling process is specifically wrapped Include:Log-on message in the pending information is matched with the log-on message to prestore,If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,If be proved to be successful, pending information is encrypted, obtains performing data,If authentication failed, to the first user terminal feedback validation code authentication failed information;If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
- 6. information security processing method according to claim 4, it is characterised in that also including step:Preserve security mechanism With execution data message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711027537.7A CN107888573A (en) | 2017-10-27 | 2017-10-27 | A kind of information security processing system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711027537.7A CN107888573A (en) | 2017-10-27 | 2017-10-27 | A kind of information security processing system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107888573A true CN107888573A (en) | 2018-04-06 |
Family
ID=61782669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711027537.7A Pending CN107888573A (en) | 2017-10-27 | 2017-10-27 | A kind of information security processing system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888573A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439A (en) * | 2008-04-10 | 2008-08-27 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
US20140325670A1 (en) * | 2013-04-25 | 2014-10-30 | Rivendale Software Solution Private Limited | System and method for providing risk score based on sensitive information inside user device |
CN104954371A (en) * | 2015-06-09 | 2015-09-30 | 小米科技有限责任公司 | Equipment information display method and device |
CN106372943A (en) * | 2016-10-27 | 2017-02-01 | 北京小米移动软件有限公司 | Message processing method and device |
CN106454778A (en) * | 2016-10-18 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Short message processing method, short message center and communication system |
-
2017
- 2017-10-27 CN CN201711027537.7A patent/CN107888573A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101252439A (en) * | 2008-04-10 | 2008-08-27 | 北京飞天诚信科技有限公司 | System and method for increasing information safety equipment security |
US20140325670A1 (en) * | 2013-04-25 | 2014-10-30 | Rivendale Software Solution Private Limited | System and method for providing risk score based on sensitive information inside user device |
CN104954371A (en) * | 2015-06-09 | 2015-09-30 | 小米科技有限责任公司 | Equipment information display method and device |
CN106454778A (en) * | 2016-10-18 | 2017-02-22 | 惠州Tcl移动通信有限公司 | Short message processing method, short message center and communication system |
CN106372943A (en) * | 2016-10-27 | 2017-02-01 | 北京小米移动软件有限公司 | Message processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102479304B (en) | Method, client and system for software access control | |
CN102378171B (en) | Automatic authentication method and system thereof, Portal server, and RADIUS server | |
CN102542453B (en) | Mobile payment identity verification method | |
JP5613596B2 (en) | Authentication system, terminal device, authentication server, and program | |
CN101278299A (en) | Computing system feature activation mechanism | |
CN107426235B (en) | Authority authentication method, device and system based on equipment fingerprint | |
CN106790156A (en) | A kind of smart machine binding method and device | |
US20150227733A1 (en) | Automatic login system and automatic login method | |
CN109840435A (en) | A kind of data guard method storing equipment | |
CN111222160B (en) | Intelligent contract execution method and system | |
TW201810109A (en) | Processing method for preventing copy attack, server and client | |
CN106790243B (en) | A kind of password remapping method of safe U disc | |
CN106612178A (en) | Method and device for protecting security of Android adb data transmission | |
CN104469736A (en) | Data processing method, server and terminal | |
CN114297685A (en) | Product key burning method, system, device, terminal equipment and storage medium | |
CN109214221A (en) | A kind of identity card reader verification method, host computer and identity card reader | |
CN115952552B (en) | Remote data destruction method, system and equipment | |
KR101676846B1 (en) | Mutual verification system and method performing thereof | |
WO2015139950A1 (en) | Automated and personalized protection system for mobile applications | |
EP2985712A1 (en) | Application encryption processing method, apparatus, and terminal | |
CN110880965A (en) | Outgoing electronic document encryption method, system, terminal and storage medium | |
CN107888573A (en) | A kind of information security processing system and method | |
KR101221728B1 (en) | The certification process server and the method for graphic OTP certification | |
CN114070548A (en) | Software copyright encryption protection method based on soft dongle device | |
CN108256336B (en) | Binding and identifying method for operating system and mainboard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180406 |