CN107888573A - A kind of information security processing system and method - Google Patents

A kind of information security processing system and method Download PDF

Info

Publication number
CN107888573A
CN107888573A CN201711027537.7A CN201711027537A CN107888573A CN 107888573 A CN107888573 A CN 107888573A CN 201711027537 A CN201711027537 A CN 201711027537A CN 107888573 A CN107888573 A CN 107888573A
Authority
CN
China
Prior art keywords
information
security mechanism
pending
user terminal
keyword
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711027537.7A
Other languages
Chinese (zh)
Inventor
姜俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711027537.7A priority Critical patent/CN107888573A/en
Publication of CN107888573A publication Critical patent/CN107888573A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The present invention, which provides a kind of information security processing system and method, its method, to be included:Security mechanism is set, and the security mechanism includes keyword and message processing flow;Receive the pending information of the first user terminal transmission;From pending acquisition of information keyword, the keyword of pending information is matched with the keyword of mechanism configured information, judged whether to start security mechanism according to matching result, if the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, the execution data are sent into second user terminal, if matching is unsuccessful, do not start the security mechanism, the pending information is sent into second user terminal.The demand according to pending information of the present invention, it disclosure satisfy that security mechanism is opened under different scenes to be carried out information processing or be not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.

Description

A kind of information security processing system and method
Technical field
The invention mainly relates to field of information security technology, and in particular to a kind of information security processing system and method.
Background technology
Information security is link particularly important in enterprise's production, and reliable information processing of keeping the safety in production can reduce economy Loss, but current information security processing or administrative skill be typically using a kind of mode to all pending information at Reason, can not match different mode treatments so that information management form is relatively simple, in different feelings according to particular demands Corresponding pattern can not be corresponded under scape and carries out information processing.
The content of the invention
The present invention provides a kind of information security processing system and method for above-mentioned technical problem.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of information security processing system, including:
Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;
Acquisition module, the pending information sent for receiving the first user terminal;
Matching module, for from pending acquisition of information keyword, the keyword of pending information and mechanism instruction to be believed The keyword of breath is matched, and matching result is sent in processing module;
Processing module, for being judged whether to start security mechanism according to matching result, if the match is successful, described in startup Security mechanism is treated processing information and handled, and obtains performing data, and the execution data are sent into second user terminal, if Match unsuccessful, then do not start the security mechanism, the pending information is sent into second user terminal.
The beneficial effects of the invention are as follows:According to the demand of pending information, it disclosure satisfy that and safety is opened under different scenes Mechanism carries out information processing or is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, described information handling process specifically includes:By log-on message in the pending information and prestore Log-on message is matched,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
It is using the above-mentioned further beneficial effect of technical scheme:, can be according to default letter when starting security mechanism Breath handling process is treated processing information and handled, good reliability.
Further, in addition to memory module, the memory module are used to preserve security mechanism and perform data message.
Another technical scheme that the present invention solves above-mentioned technical problem is as follows:A kind of information security processing method, including such as Lower step;
Security mechanism is set, and the security mechanism includes keyword and message processing flow;
Receive the pending information of the first user terminal transmission;
From pending acquisition of information keyword, the keyword of pending information and the keyword of mechanism configured information are carried out Matching, judged whether to start security mechanism according to matching result,
If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, by institute State and perform data transmission second user terminal, if matching is unsuccessful, do not start the security mechanism, by the pending letter Breath sends second user terminal.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, described information handling process specifically includes:By log-on message in the pending information and prestore Log-on message is matched,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
Further, in addition to step:Preserve security mechanism and perform data message.
The beneficial effects of the invention are as follows:According to the demand of pending information, it disclosure satisfy that and safety is opened under different scenes Mechanism carries out information processing or is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Brief description of the drawings
Fig. 1 is the module frame chart of information security processing system provided in an embodiment of the present invention;
The method flow diagram of Fig. 2 information security processing methods provided in an embodiment of the present invention.
Embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the present invention.
Fig. 1 is the module frame chart of information security processing system provided in an embodiment of the present invention;
As shown in figure 1, a kind of information security processing system, including:
Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;
Acquisition module, the pending information sent for receiving the first user terminal;
Matching module, for from pending acquisition of information keyword, the keyword of pending information and mechanism instruction to be believed The keyword of breath is matched, and matching result is sent in processing module;
Processing module, for being judged whether to start security mechanism according to matching result, if the match is successful, described in startup Security mechanism is treated processing information and handled, and obtains performing data, and the execution data are sent into second user terminal, if Match unsuccessful, then do not start the security mechanism, the pending information is sent into second user terminal.
In above-described embodiment, according to the demand of pending information, it disclosure satisfy that security mechanism is opened under different scenes to be entered Row information processing is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Specifically, in above-described embodiment, the keyword of the security mechanism can be " QD ", that is, start, if pending letter The keyword carried in breath is " QD security mechanisms ", then judges the keyword of the security mechanism and carry in pending information Keywords matching success, then start security mechanism, if carrying " GB security mechanisms " in pending information, that is, closes, then judges The keyword of the security mechanism and the Keywords matching carried in pending information are unsuccessful, then do not start the safe machine System, or keyword is not carried in pending information, then also it is determined as the unsuccessful situation of Keywords matching.
Alternatively, specifically included as one embodiment of the present of invention, described information handling process:By the pending letter Log-on message in breath is matched with the log-on message to prestore,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
In above-described embodiment, when starting security mechanism, processing information can be treated according to default message processing flow Handled, good reliability.
Specifically, in above-described embodiment, when the pending information that the first user terminal is sent carries the situation of keyword, The pending information is that more special or more secret information is handled and protected, it is necessary to open security mechanism, will wait to locate After reason information is verified and encrypted, second user terminal is retransmited, second user terminal can be setting for consistency operation center It is standby.
Alternatively, as one embodiment of the present of invention, in addition to memory module, the memory module is used to preserve safety Mechanism and execution data message.
The method flow diagram of Fig. 2 information security processing methods provided in an embodiment of the present invention.
As shown in Fig. 2 a kind of information security processing method, comprises the following steps;
Security mechanism is set, and the security mechanism includes keyword and message processing flow;
Receive the pending information of the first user terminal transmission;
From pending acquisition of information keyword, the keyword of pending information and the keyword of mechanism configured information are carried out Matching, judged whether to start security mechanism according to matching result,
If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, by institute State and perform data transmission second user terminal, if matching is unsuccessful, do not start the security mechanism, by the pending letter Breath sends second user terminal.
Alternatively, specifically included as one embodiment of the present of invention, described information handling process:By the pending letter Log-on message in breath is matched with the log-on message to prestore,
If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
If be proved to be successful, pending information is encrypted, obtains performing data,
If authentication failed, to the first user terminal feedback validation code authentication failed information;
If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
Alternatively, as one embodiment of the present of invention, in addition to step:Preserve security mechanism and perform data message.
In above-described embodiment, according to the demand of pending information, it disclosure satisfy that security mechanism is opened under different scenes to be entered Row information processing is not turned on security mechanism, using flexible, information management diversification of forms, improves treatment effeciency.
Each functional unit in each embodiment of the present invention can be integrated in a processing unit or each Unit is individually physically present or two or more units are integrated in a unit.Above-mentioned integrated unit was both It can be realized, can also be realized in the form of SFU software functional unit in the form of hardware.
If integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can To be stored in a computer read/write memory medium.Based on such understanding, technical scheme substantially or Say that the part to be contributed to prior art, or all or part of the technical scheme can be embodied in the form of software product Out, the computer software product is stored in a storage medium, including some instructions are causing a computer equipment (can be personal computer, server, or network equipment etc.) performs all or part of each embodiment method of the present invention Step.And foregoing storage medium includes:It is USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random Access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Jie of store program codes Matter.
More than, it is only embodiment of the invention, but protection scope of the present invention is not limited thereto, and it is any to be familiar with Those skilled in the art the invention discloses technical scope in, various equivalent modifications or substitutions can be readily occurred in, These modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be wanted with right The protection domain asked is defined.

Claims (6)

  1. A kind of 1. information security processing system, it is characterised in that including;
    Setup module, for setting security mechanism, the security mechanism includes keyword and message processing flow;
    Acquisition module, the pending information sent for receiving the first user terminal;
    Matching module, for from pending acquisition of information keyword, by the keyword of pending information and the security mechanism Keyword matched, by matching result send processing module in;
    Processing module, for judging whether to start security mechanism according to matching result, if the match is successful, start the safety Mechanism, and processing information is treated according to described information handling process and handled, obtain performing data, by the execution data hair Second user terminal is sent, if matching is unsuccessful, does not start the security mechanism, the pending information is sent into second uses Family terminal.
  2. 2. information security processing system according to claim 1, it is characterised in that described information handling process is specifically wrapped Include:Log-on message in the pending information is matched with the log-on message to prestore,
    If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
    If be proved to be successful, pending information is encrypted, obtains performing data,
    If authentication failed, to the first user terminal feedback validation code authentication failed information;
    If it fails to match, the incorrect information of log-on message is fed back to first user terminal.
  3. 3. information security processing system according to claim 1, it is characterised in that also including memory module, the storage Module is used to preserve security mechanism and performs data.
  4. A kind of 4. information security processing method, it is characterised in that including;
    Security mechanism is set, and the security mechanism includes keyword and message processing flow;
    Receive the pending information of the first user terminal transmission;
    From pending acquisition of information keyword, by the keyword of pending information and the progress of the keyword of mechanism configured information Match somebody with somebody, judged whether to start security mechanism according to matching result,
    If the match is successful, start the security mechanism and treat processing information and handled, obtain performing data, held described Row data send second user terminal, if matching is unsuccessful, do not start the security mechanism, and the pending information is sent out Send second user terminal.
  5. 5. information security processing method according to claim 4, it is characterised in that described information handling process is specifically wrapped Include:Log-on message in the pending information is matched with the log-on message to prestore,
    If the match is successful, the identifying code in the pending information is verified with the identifying code to prestore,
    If be proved to be successful, pending information is encrypted, obtains performing data,
    If authentication failed, to the first user terminal feedback validation code authentication failed information;
    If it fails to match, the incorrect information of log-on message will be fed back to first user terminal.
  6. 6. information security processing method according to claim 4, it is characterised in that also including step:Preserve security mechanism With execution data message.
CN201711027537.7A 2017-10-27 2017-10-27 A kind of information security processing system and method Pending CN107888573A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711027537.7A CN107888573A (en) 2017-10-27 2017-10-27 A kind of information security processing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711027537.7A CN107888573A (en) 2017-10-27 2017-10-27 A kind of information security processing system and method

Publications (1)

Publication Number Publication Date
CN107888573A true CN107888573A (en) 2018-04-06

Family

ID=61782669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711027537.7A Pending CN107888573A (en) 2017-10-27 2017-10-27 A kind of information security processing system and method

Country Status (1)

Country Link
CN (1) CN107888573A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252439A (en) * 2008-04-10 2008-08-27 北京飞天诚信科技有限公司 System and method for increasing information safety equipment security
US20140325670A1 (en) * 2013-04-25 2014-10-30 Rivendale Software Solution Private Limited System and method for providing risk score based on sensitive information inside user device
CN104954371A (en) * 2015-06-09 2015-09-30 小米科技有限责任公司 Equipment information display method and device
CN106372943A (en) * 2016-10-27 2017-02-01 北京小米移动软件有限公司 Message processing method and device
CN106454778A (en) * 2016-10-18 2017-02-22 惠州Tcl移动通信有限公司 Short message processing method, short message center and communication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252439A (en) * 2008-04-10 2008-08-27 北京飞天诚信科技有限公司 System and method for increasing information safety equipment security
US20140325670A1 (en) * 2013-04-25 2014-10-30 Rivendale Software Solution Private Limited System and method for providing risk score based on sensitive information inside user device
CN104954371A (en) * 2015-06-09 2015-09-30 小米科技有限责任公司 Equipment information display method and device
CN106454778A (en) * 2016-10-18 2017-02-22 惠州Tcl移动通信有限公司 Short message processing method, short message center and communication system
CN106372943A (en) * 2016-10-27 2017-02-01 北京小米移动软件有限公司 Message processing method and device

Similar Documents

Publication Publication Date Title
CN102479304B (en) Method, client and system for software access control
CN102378171B (en) Automatic authentication method and system thereof, Portal server, and RADIUS server
CN102542453B (en) Mobile payment identity verification method
JP5613596B2 (en) Authentication system, terminal device, authentication server, and program
CN101278299A (en) Computing system feature activation mechanism
CN107426235B (en) Authority authentication method, device and system based on equipment fingerprint
CN106790156A (en) A kind of smart machine binding method and device
US20150227733A1 (en) Automatic login system and automatic login method
CN109840435A (en) A kind of data guard method storing equipment
CN111222160B (en) Intelligent contract execution method and system
TW201810109A (en) Processing method for preventing copy attack, server and client
CN106790243B (en) A kind of password remapping method of safe U disc
CN106612178A (en) Method and device for protecting security of Android adb data transmission
CN104469736A (en) Data processing method, server and terminal
CN114297685A (en) Product key burning method, system, device, terminal equipment and storage medium
CN109214221A (en) A kind of identity card reader verification method, host computer and identity card reader
CN115952552B (en) Remote data destruction method, system and equipment
KR101676846B1 (en) Mutual verification system and method performing thereof
WO2015139950A1 (en) Automated and personalized protection system for mobile applications
EP2985712A1 (en) Application encryption processing method, apparatus, and terminal
CN110880965A (en) Outgoing electronic document encryption method, system, terminal and storage medium
CN107888573A (en) A kind of information security processing system and method
KR101221728B1 (en) The certification process server and the method for graphic OTP certification
CN114070548A (en) Software copyright encryption protection method based on soft dongle device
CN108256336B (en) Binding and identifying method for operating system and mainboard

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180406