CN107995198A - Information processing method, device, electronic equipment and storage medium - Google Patents
Information processing method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN107995198A CN107995198A CN201711266446.9A CN201711266446A CN107995198A CN 107995198 A CN107995198 A CN 107995198A CN 201711266446 A CN201711266446 A CN 201711266446A CN 107995198 A CN107995198 A CN 107995198A
- Authority
- CN
- China
- Prior art keywords
- identity information
- purpose terminal
- message data
- information
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Abstract
The present invention provides a kind of information processing method, device, electronic equipment and storage medium, it is related to field of computer technology.The information processing method includes:Obtain the message data for being used for being sent to purpose terminal outside;The identity information of the purpose terminal is obtained from the message data;Judge whether the identity information is default identity information;For it is no when, then the message data is replaced with into random string;The random string is sent to the purpose terminal.The information processing method, device, electronic equipment and storage medium can realize that the message data for being externally sent to the purpose terminal for not being default identity information replaces with random string, so that the data that the purpose terminal obtains are random string, the leakage of the data of electronic equipment is prevented.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of information processing method, device, electronic equipment
And storage medium.
Background technology
Usual terminal is the most weak link of information security, and the application software type of installation is numerous and jumbled, and Outside Access amount is larger.
Hacker can often set about from the webpage of terminal application software and internet, insert wooden horse in terminal and steal data, so as to lead
Cause the leakage of the data of terminal.
The content of the invention
In view of this, an embodiment of the present invention provides a kind of information processing method, device, electronic equipment and storage medium.
To achieve these goals, the technical solution adopted by the present invention is as follows:
In a first aspect, an embodiment of the present invention provides a kind of information processing method, the described method includes:Acquisition is used for outgoing
To the message data of purpose terminal;The identity information of the purpose terminal is obtained from the message data;Judge the identity
Whether information is default identity information;For it is no when, then the message data is replaced with into random string;By the random words
Symbol string is sent to the purpose terminal.
Second aspect, an embodiment of the present invention provides a kind of information processor, described device include message obtain module,
Information acquisition module, signal judgement module, replace execution module and the first sending module, wherein, the message obtains module
For obtaining the message data for being used for being sent to purpose terminal outside;Described information obtains module and is used to obtain from the message data
The identity information of the purpose terminal;Described information judgment module is used to judge whether the identity information is default identity letter
Breath;The replacement execution module is used to when the identity information is not to preset identity information, then replace the message data
For random string;First sending module is used to send the random string to the purpose terminal.
The third aspect, an embodiment of the present invention provides a kind of electronic equipment, the electronic equipment includes memory and processing
Device, the memory storage have computer instruction, when the computer instruction is read and performed by the processor, make described
Processor performs the information processing method that above-mentioned first aspect provides.
Fourth aspect, is stored with computer an embodiment of the present invention provides a kind of storage medium, in the storage medium and refers to
Order, wherein, the computer instruction performs the information processing method that above-mentioned first aspect provides when being read and running.
Information processing method, device, electronic equipment and storage medium provided in an embodiment of the present invention, by obtaining for outer
The message data of purpose terminal is sent to, the identity information of the purpose terminal is then obtained from the message data, then judges the body
Whether part information is default identity information, for it is no when, then the message data is replaced with by random words based on predetermined encryption algorithm
Symbol string, finally sends the random string to the purpose terminal.So as to which the information processing method, which can be realized, to be externally sent to not
It is that the flow of the purpose terminal of default identity information replaces with random string, so that the purpose for default identity information is whole
It is random string that end, which obtains data, prevents the leakage of the data of electronic equipment, and solution hacker can insert wooden horse in terminal and steal
Fetch evidence, the problem of causing the leakage of data of terminal.
To enable the above objects, features and advantages of the present invention to become apparent, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Brief description of the drawings
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without making creative work, belong to the scope of protection of the invention.
Fig. 1 shows the schematic diagram that electronic equipment provided in an embodiment of the present invention is interacted with purpose terminal;
Fig. 2 shows the block diagram of electronic equipment provided in an embodiment of the present invention;
Fig. 3 shows the flow chart of information processing provided in an embodiment of the present invention;
Fig. 4 shows the flow chart of step S130 in information processing method provided in an embodiment of the present invention;
Fig. 5 shows the module map of information processor provided in an embodiment of the present invention;
Fig. 6 shows the module map of signal judgement module in information processor provided in an embodiment of the present invention.
Embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and designed with a variety of configurations herein.Cause
This, the detailed description of the embodiment of the present invention to providing in the accompanying drawings is not intended to limit claimed invention below
Scope, but it is merely representative of the selected embodiment of the present invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Go out all other embodiments obtained on the premise of creative work, belong to the scope of protection of the invention.
It should be noted that:Similar label and letter represents similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.Meanwhile the present invention's
In description, term " first ", " second " etc. are only used for distinguishing description, and it is not intended that instruction or hint relative importance.
Fig. 1 shows the schematic diagram that electronic equipment provided in an embodiment of the present invention is interacted with purpose terminal.Electronics is set
Standby 100 are communicatively coupled by network and one or more purpose terminal 200, with into row data communication or interaction.It is described
Electronic equipment 100, purpose terminal 200 can be PC (personal computer, PC), certainly, the electronic equipment
100th, purpose terminal 200 also can also be server etc..
Fig. 2 shows a kind of structure diagram that can be applied to the electronic equipment in the embodiment of the present invention.It is as shown in Fig. 2, electric
Sub- equipment 100 includes memory 102, storage control 104, one or more (one is only shown in figure) processors 106, peripheral hardware
Interface 108, radio-frequency module 110, audio-frequency module 112, display unit 114 etc..These components by one or more communication bus/
Signal wire 116 mutually communicates.
Memory 102 can be used for storage software program and module, such as the information processing method in the embodiment of the present invention and
Corresponding programmed instruction/the module of device, processor 106 are stored in software program and module in memory 102 by operation,
So as to perform various functions application and data processing, such as information processing method provided in an embodiment of the present invention.
Memory 102 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.Processor 106 and other possible components are to storage
The access of device 102 can carry out under the control of storage control 104.
Various input/output devices are coupled to processor 106 and memory 102 by Peripheral Interface 108.In some implementations
In example, Peripheral Interface 108, processor 106 and storage control 104 can be realized in one single chip.In some other reality
In example, they can be realized by independent chip respectively.
Radio-frequency module 110 is used to receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, so that with
Communication network or other equipment are communicated.
Audio-frequency module 112 provides a user audio interface, it may include one or more microphones, one or more raises
Sound device and voicefrequency circuit.
Display unit 114 provides a display interface between electronic equipment 100 and user.Specifically, display unit 114
Video output is shown to user, and the content of these videos output may include word, figure, video and its any combination.
It is appreciated that structure shown in Fig. 2 is only to illustrate, electronic equipment 100 may also include it is more more than shown in Fig. 2 or
Less component, or there is the configuration different from shown in Fig. 2.Each component shown in Fig. 2 can use hardware, software or its
Combination is realized.
The existing detection for improper flow, such as fishing website, the security for generally using detection to link,
When link is judged as malicious link, forbid interacting with what this was linked.But can so miss and lose some malicious links,
This will cause damages user, such as the domain name that uses of backdoor programs is born no ill will content, and general testing mechanism is difficult hair
The problem of now such.
First embodiment
As Fig. 3 shows the flow chart of information processing method provided in an embodiment of the present invention.Fig. 3 is referred to, at the information
Reason method includes:
Step S110:Obtain the message data for being used for being sent to purpose terminal outside.
It is understood that electronic equipment when needing outgoing message data to other-end, obtains be used for outgoing first
To the message data of purpose terminal.
In embodiments of the present invention, electronic equipment can send message data after the request of response Mr. Yu's purpose terminal
Message data is sent to the purpose terminal or actively to certain purpose terminal.
Certainly, the condition for sending message data to other-end is not intended as limiting in embodiments of the present invention.
In addition, in embodiments of the present invention, it is necessary to which the message data for carrying out outgoing can be electronic equipment itself storage
Data.
In embodiments of the present invention, for be sent to outside the message data of purpose terminal can include body of data and should
The identity information of purpose terminal.Certainly, for be sent to outside purpose terminal message data particular content in the embodiment of the present invention
In be not intended as limiting.
Step S120:The identity information of the purpose terminal is obtained from the message data.
It is understood that after acquisition is used to be sent to the message data of purpose terminal outside, to prevent electronic equipment
Leaking data, it is therefore desirable to judge the identity of purpose terminal, to ensure terminal of the outer purpose terminal being sent to as safety.
And the judgement for purpose terminal identity needs to obtain the identity information of purpose terminal, in addition, what is obtained is used to send to the mesh
The message data of terminal include the identity information of purposeful terminal, so obtaining the body of the purpose terminal from message data
Part information.
Step S130:Judge whether the identity information is default identity information.
After the identity information in obtaining message data, the security of the purpose terminal is judged further according to identity information.
In embodiments of the present invention, it can be previously stored with electronic equipment and have determined as the pre- of safe purpose terminal
If identity information, for judging to carry out the security of the purpose terminal of data interaction every time.
In embodiments of the present invention, default identity information can for the purpose of the corresponding URL information of terminal or purpose terminal-pair
The IP address answered, port etc..Certainly, the particular content for presetting identity information is not intended as limiting in embodiments of the present invention.
In embodiments of the present invention, all default identity informations for having determined as safe purpose terminal can be set
In a list, using this list as white list.White list, which can be understood as including, all has determined as safe purpose
The list of the default identity information of terminal.
Therefore, in embodiments of the present invention, Fig. 4 is referred to, judges whether the identity information is that default identity information can
With including:
Step S131:The white list prestored is obtained, the white list includes multiple default bodies of multiple purpose terminals
Part information.
It is understood that reading the white list prestored first, which includes the multiple of multiple purpose terminals
Default identity information, i.e., all default identity informations for having determined as safe purpose terminal, for the outer of acquisition
The default identity information for being sent to the corresponding purpose terminal of message data of purpose terminal is verified.
Step S132:Judge the identity information whether in the multiple default identity information.
It is understood that by white list in the identity information of the corresponding purpose terminal of above-mentioned message data and step S131
In multiple default identity informations matched, when there is any default identity information purpose terminal corresponding with the message data
Identity information matches, then can be determined that multiple default bodies of the identity information in white list of the corresponding purpose terminal of the message data
In part information;Conversely, it then can be determined that the identity information of the corresponding purpose terminal of the message data not in the multiple pre- of white list
If in identity information.
In embodiments of the present invention, when judging the identity information of the corresponding purpose terminal of the message data in white list
When in multiple default identity informations, then the identity information that can be determined that the corresponding purpose terminal of the message data is that default identity is believed
Breath;When judging the identity information of the corresponding purpose terminal of the message data not in multiple default identity informations of white list
When, then the identity information that can be determined that the corresponding purpose terminal of the message data is not default identity information.
It is thus possible to whether the identity information for obtaining the corresponding purpose terminal of the message data is sentencing for default identity information
Disconnected result.
Step S140:For it is no when, then the message data is replaced with into random string.
When step S130 judges the identity information of the corresponding purpose terminal of the message data not to preset identity information,
Then represent that the purpose terminal is, for example, the malicious act that the purpose terminal obtains data there are unsafe possibility.And the report
Literary data are then sent directly to the purpose terminal, may cause the leakage of data due to being original plaintext message data.Therefore
Need to handle original message data, so that the purpose terminal can not obtain the real information of original message data.
In embodiments of the present invention, above-mentioned message data can be replaced with random string, which can be with
For the data of plaintext.It is not original message data that it, which acts on the data for being to obtain the purpose terminal, i.e., can not obtain original
The real information of data, is played in the case where purpose terminal is not know to be safety, and the data of electronic equipment outgoing are carried out
Protection, prevents the leaking data of electronic equipment.
In embodiments of the present invention, step S130 judging result be the corresponding purpose terminal of the message data identity
Information is default identity information, then it is to have determined as safe purpose terminal that can determine the purpose terminal, therefore can be straight
Connect and send original message data to the purpose terminal.I.e. in embodiments of the present invention, the body is judged in step s 130
Whether part information is that the information processing method further includes after presetting identity information:When identity information is default identity information,
Message data in step S110 is sent to the purpose terminal.
It is thus possible to reduce the processing to sending the message data to the purpose terminal of the default identity information in white list
Flow, rather than the message data of all outgoings is all handled, improve the efficiency of data transfer.
Step S150:The random string is sent to the purpose terminal.
In embodiments of the present invention, after message data is replaced with random string, then the random string sent
To the corresponding purpose terminal of the message data.So that after the follow-up purpose terminal obtains random string, can not obtain original
The corresponding real information of message data, so as to be protected to the data of electronic equipment, which can not be obtained original
Message data.
In embodiments of the present invention, random string is being sent to the corresponding purpose terminal of above-mentioned message data,
The information processing method can also include:
The purpose terminal is associated with the action for replacing the message data, obtains correspondence;By described in
Correspondence is stored in the daily record of record replacement action.
It is understood that the action being replaced to message data and the correspondence of the purpose terminal can be stored
In the daily record of record replacement action, follow-up management person is set to know that the purpose terminal has the record for obtaining message data.
Additionally, there are real user to need from electronic equipment acquisition data, but the corresponding purpose terminal of the user
Identity information be not default identity information situation.
In the existing safe O&M for Intranet, mainly in Intranet application addition firewall policy, firewall policy
Access beyond white list will all be forbidden, and network administrator for addition white list when due to the application of user in do not have
Documentary, so the application approval of white list is very easy to malfunction, so as to cause the security of Intranet to reduce.
Therefore, purpose terminal, can in the corresponding customer requirement retrieval data of purpose terminal after random string is obtained
To propose to add the purpose terminal into the application of white list.So as to which in embodiments of the present invention, which can be with
Including:
The identity information addition request that the purpose terminal is sent is obtained, the identity information addition request includes the body
Part information and the random string;Obtain the addition determine instruction that user adds request input based on the identity;Response
The addition determine instruction, is stored the identity information as default identity information.
It is understood that the corresponding user of purpose terminal can be whole using the purpose by voucher of above-mentioned random string
End sends identity information addition request, and identity information addition request includes the identity information and random words of the purpose terminal
Symbol string.It is thus possible to obtain the identity information addition request of purpose terminal transmission, then audited by auditor
Afterwards, the addition determine instruction of auditor's input is obtained, then responds the addition determine instruction, identity information is stored in default body
In the corresponding list of white list of part information.
Mode of such a addition identity information in white list, it is default that white list addition can be made, which to add identity information,
Identity information, documentary may determine that whether random string and the character string sent before are consistent as support, auditor,
To determine whether to add, do not allow auditor error-prone.Also, what documentary can make identity information has been added with evidence,
Can be to avoid the phenomenon of maliciously addition identity information.
In embodiments of the present invention, each addition and addition request can be bound, and is recorded.Therefore, should
Information processing method can also include:
The identity information is added request to associate with the action of the response addition determine instruction, obtains first pair
It should be related to;First correspondence is stored in the daily record of the action of the default identity information of record addition.
It is understood that identity information addition request and the correspondence of the action of corresponding addition determine instruction are carried out
Record, can make identity information addition leave record, and the behavior of auditor's malice addition identity information data can occurring
Found during leakage.
In embodiments of the present invention, when repeatedly occurring in encrypted logs, same purpose terminal is corresponding to replace message data
Move when making, that is, represent that the purpose terminal repeatedly obtains the application that identity information is not all added after random string, should
Purpose terminal is probably then unsafe purpose terminal, such as the malicious peer of script is installed etc..Therefore, can forbid with being somebody's turn to do
The data interaction of purpose terminal, directly avoids the access of malice, improves the treatment effeciency of electronic equipment.
It is only right when the information processing method that first embodiment of the invention provides sends out message data to other purposes terminal outside
The message data of the outer corresponding purpose terminal of identity information being sent to outside white list is replaced as outgoing again after random string,
The message data for the corresponding purpose terminal of identity information being externally sent in white list directly carries out outer without replacing
Hair, while so as to improve data transmission efficiency, it is possible to achieve the protection for outgoing message data, prevents electronic equipment
Data leakage.Furthermore it is also possible to random string is used to add identity information in the white list for presetting identity information
Apply for voucher, do not allow addition of the auditor for white list error-prone, in addition also leave the relative recording of application voucher, just
In searching when something goes wrong problem owner.
Second embodiment
Second embodiment of the invention provides a kind of information processor 300, refers to Fig. 5, described information processing unit
300, which include message, obtains module 310, information acquisition module 320, signal judgement module 330, replaces execution module 340 and the
One sending module 350.Wherein, the message obtains module 310 and is used to obtain the message data for being used for being sent to purpose terminal outside;Institute
State the identity information that information acquisition module 320 is used to obtain the purpose terminal from the message data;Described information judges
Module 330 is used to judge whether the identity information is default identity information;The replacement execution module 340 is used in the body
When part information is to preset identity information, then the message data is replaced with into random string;First sending module 350
For sending the random string to the purpose terminal.
In embodiments of the present invention, Fig. 6 is referred to, described information judgment module 330 can include list acquiring unit 331
And judge execution unit 332.Wherein, the list acquiring unit 331 is used to obtain the white list prestored, the white name
Single multiple default identity informations for including multiple purpose terminals;The judgement execution unit 332 is used to judge the identity information
Whether in the multiple default identity information.
In embodiments of the present invention, described information processing unit 330 can also include the second sending module, second hair
Module is sent to be used to, when the identity information is default identity information, the message data is sent to the purpose terminal.
In embodiments of the present invention, described information processing unit 330 can also include acquisition request module, instruction obtains mould
Block and instruction respond module.Wherein, the acquisition request module adds for obtaining the identity information that the purpose terminal is sent
Add request, the identity information addition request includes the identity information and the random string;Described instruction obtains mould
Block is used to obtain the addition determine instruction that user adds request input based on the identity;Described instruction respond module is used to respond
The addition determine instruction, is stored the identity information as default identity information.
In embodiments of the present invention, described information processing unit 330 can also include the first relation and obtain module and the
One relationship storage module.Wherein, first relation obtains module and is used for identity information addition request and the response
The action association of the addition determine instruction, obtains the first correspondence;First relationship storage module is used for described the
One correspondence is stored in the daily record of the action of the default identity information of record addition.
In embodiments of the present invention, described information processing unit 300 can also include:Second relation obtains module and the
Two relationship storage modules, wherein, second relation obtain module be used for by the purpose terminal with it is described by the message number
Associated according to the action of replacement, obtain correspondence;Second relationship storage module is used to the correspondence being stored in note
In the daily record for recording replacement action.
3rd embodiment
Third embodiment of the invention provides a kind of electronic equipment 100, refers to Fig. 2, and the electronic equipment 100 includes depositing
Reservoir 102 and processor 106, the memory 102 are stored with computer instruction, when the computer instruction is by the processor
106 read and when performing, and the processor 106 is performed the information processing method that first embodiment of the invention provides.
Fourth embodiment
Fourth embodiment of the invention provides a kind of storage medium, and computer instruction is stored with the storage medium, its
In, the computer instruction performs the information processing method of first embodiment of the invention offer when being read and running.
In conclusion information processing method provided in an embodiment of the present invention, device, electronic equipment and storage medium, pass through
The message data for being used for being sent to purpose terminal outside is obtained, the identity information of the purpose terminal is then obtained from the message data,
Judge whether the identity information is default identity information again, for it is no when, then the message data is added based on predetermined encryption algorithm
It is close, encrypted message data is obtained, finally sends the encrypted message data to the purpose terminal.So as to the information processing
Method can realize that the flow for being externally sent to the purpose terminal for not being default identity information is encrypted, and prevent the number of electronic equipment
According to leakage.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight
Point explanation is all difference with other embodiment, between each embodiment identical similar part mutually referring to.
For device class embodiment, since it is substantially similar to embodiment of the method, so description is fairly simple, related part ginseng
See the part explanation of embodiment of the method.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, can also pass through it
Its mode is realized.Device embodiment described above is only schematical, for example, the flow chart and block diagram in attached drawing are shown
Device, architectural framework in the cards, the work(of method and computer program product of multiple embodiments according to the present invention are shown
Can and it operate.At this point, each square frame in flow chart or block diagram can represent one of a module, program segment or code
Point, a part for the module, program segment or code includes one or more and is used for realization the executable of defined logic function
Instruction.It should also be noted that at some as in the implementation replaced, the function of being marked in square frame can also be with different from attached
The order marked in figure occurs.For example, two continuous square frames can essentially perform substantially in parallel, they also may be used sometimes
To perform in the opposite order, this is depending on involved function.It is it is also noted that each in block diagram and/or flow chart
The combination of square frame and the square frame in block diagram and/or flow chart, function or the dedicated of action can be based on as defined in execution
The system of hardware is realized, or can be realized with the combination of specialized hardware and computer instruction.
In addition, each function module in each embodiment of the present invention can integrate to form an independent portion
Point or modules individualism, can also two or more modules be integrated to form an independent part.
If the function is realized in the form of software function module and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part to contribute to the prior art or the part of the technical solution can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment the method for the present invention.
And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.Need
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, without necessarily requiring or implying there are any this reality between these entities or operation
The relation or order on border.Moreover, term " comprising ", "comprising" or its any other variant are intended to the bag of nonexcludability
Contain, so that process, method, article or equipment including a series of elements not only include those key elements, but also including
Other elements that are not explicitly listed, or further include as elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including the key element
Process, method, also there are other identical element in article or equipment.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area
For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.It should be noted that:Similar label and letter exists
Similar terms is represented in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, is then not required in subsequent attached drawing
It is further defined and is explained.
The above description is merely a specific embodiment, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention answers the scope of the claims of being subject to.
Claims (10)
- A kind of 1. information processing method, it is characterised in that the described method includes:Obtain the message data for being used for being sent to purpose terminal outside;The identity information of the purpose terminal is obtained from the message data;Judge whether the identity information is default identity information;For it is no when, then the message data is replaced with into random string;The random string is sent to the purpose terminal.
- 2. according to the method described in claim 1, it is characterized in that, described judge whether the identity information is default identity letter Breath, including:The white list prestored is obtained, the white list includes multiple default identity informations of multiple purpose terminals;Judge the identity information whether in the multiple default identity information.
- 3. according to the method described in claim 1, it is characterized in that, judging whether the identity information is default identity information Afterwards, the method further includes:When to be, the message data is sent to the purpose terminal.
- 4. according to the method described in any claim in claim 1-3, it is characterised in that by the random string send to After the purpose terminal, the method further includes:The identity information addition request that the purpose terminal is sent is obtained, the identity information addition request includes the identity letter Breath and the random string;Obtain the addition determine instruction that user adds request input based on the identity;The addition determine instruction is responded, is stored the identity information as default identity information.
- 5. according to the method described in claim 4, it is characterized in that, described respond the addition determine instruction, by the purpose After the identity information of terminal is stored as default identity information, the method further includes:The identity information is added request to associate with the action of the response addition determine instruction, acquisition first, which corresponds to, closes System;First correspondence is stored in the daily record of the action of the default identity information of record addition.
- 6. according to the method described in any claim in claim 1-3, it is characterised in that by the random string send to After the purpose terminal, the method further includes:The purpose terminal is associated with the action for replacing the message data, obtains correspondence;The correspondence is stored in the daily record of record replacement action.
- 7. a kind of information processor, it is characterised in that described device includes message and obtains module, information acquisition module, information Judgment module, replace execution module and the first sending module, wherein,The message obtains module and is used to obtain the message data for being used for being sent to purpose terminal outside;Described information obtains the identity information that module is used to obtain the purpose terminal from the message data;Described information judgment module is used to judge whether the identity information is default identity information;The replacement execution module is used to when the identity information is not to preset identity information, then replace the message data For random string;First sending module is used to send the random string to the purpose terminal.
- 8. device according to claim 7, it is characterised in that described information judgment module include list acquiring unit with And judge execution unit, wherein,The list acquiring unit is used to obtain the white list prestored, and the white list includes the multiple of multiple purpose terminals Default identity information;It is described to judge that execution unit is used to judge the identity information whether in the multiple default identity information.
- 9. a kind of electronic equipment, it is characterised in that the electronic equipment includes memory and processor, and the memory storage has Computer instruction, when the computer instruction is read and performed by the processor, the processor is performed right such as will Seek the method described in any claim in 1-6.
- A kind of 10. storage medium, it is characterised in that computer instruction is stored with the storage medium, wherein, the computer Instruct the method performed when being read and running as described in any claim in claim 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711266446.9A CN107995198A (en) | 2017-12-05 | 2017-12-05 | Information processing method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711266446.9A CN107995198A (en) | 2017-12-05 | 2017-12-05 | Information processing method, device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107995198A true CN107995198A (en) | 2018-05-04 |
Family
ID=62035601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711266446.9A Pending CN107995198A (en) | 2017-12-05 | 2017-12-05 | Information processing method, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107995198A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659490A (en) * | 2019-09-20 | 2020-01-07 | 哈尔滨安天科技集团股份有限公司 | Malicious sample processing method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104796262A (en) * | 2015-04-27 | 2015-07-22 | 上海青橙实业有限公司 | Data encryption method and terminal system |
US20160021610A1 (en) * | 2014-07-17 | 2016-01-21 | Xiaomi Inc. | Network connection method and apparatus |
CN106789983A (en) * | 2016-12-08 | 2017-05-31 | 北京安普诺信息技术有限公司 | A kind of CC attack defense methods and its system of defense |
CN107295017A (en) * | 2017-08-10 | 2017-10-24 | 四川长虹电器股份有限公司 | CC means of defences based on user authentication |
-
2017
- 2017-12-05 CN CN201711266446.9A patent/CN107995198A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160021610A1 (en) * | 2014-07-17 | 2016-01-21 | Xiaomi Inc. | Network connection method and apparatus |
CN104796262A (en) * | 2015-04-27 | 2015-07-22 | 上海青橙实业有限公司 | Data encryption method and terminal system |
CN106789983A (en) * | 2016-12-08 | 2017-05-31 | 北京安普诺信息技术有限公司 | A kind of CC attack defense methods and its system of defense |
CN107295017A (en) * | 2017-08-10 | 2017-10-24 | 四川长虹电器股份有限公司 | CC means of defences based on user authentication |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659490A (en) * | 2019-09-20 | 2020-01-07 | 哈尔滨安天科技集团股份有限公司 | Malicious sample processing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607385B (en) | Method and apparatus for security detection based on browser | |
CN104426885B (en) | Abnormal account providing method and device | |
CN104348809B (en) | network security monitoring method and system | |
CN103891242B (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
CN107888671A (en) | A kind of information-pushing method and device | |
CN103368957B (en) | Method and system that web page access behavior is processed, client, server | |
CN104468592B (en) | Login method and login system | |
GB2507360A (en) | Threat detection through the accumulated detection of threat characteristics | |
CN107015996A (en) | A kind of resource access method, apparatus and system | |
CN104184705A (en) | Verification method, apparatus, server, user data center and system | |
CN109937564A (en) | The fraudulent account detected in distributed computing system uses | |
CN108259619A (en) | Network request means of defence and network communicating system | |
CN106993009A (en) | A kind of method and apparatus for loading webpage in a browser | |
CN107104924A (en) | The verification method and device of website backdoor file | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
Kaur et al. | Browser fingerprinting as user tracking technology | |
CN104216911A (en) | Browse tracking method and device | |
CN107733853A (en) | Page access method, apparatus, computer and medium | |
CN107332804A (en) | The detection method and device of webpage leak | |
Liccardi et al. | Improving mobile app selection through transparency and better permission analysis | |
Liccardi et al. | Improving user choice through better mobile apps transparency and permissions analysis | |
CN107896210A (en) | Safety protecting method, device, server and storage medium | |
CN106325993A (en) | Freezing method of application program and terminal | |
CN112528181B (en) | Two-dimensional code management method, device, computer equipment and readable storage medium | |
US10686834B1 (en) | Inert parameters for detection of malicious activity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing Applicant after: Beijing Zhichuangyu Information Technology Co., Ltd. Address before: Room 803, Jinwei Building, 55 Lanindichang South Road, Haidian District, Beijing Applicant before: Beijing Knows Chuangyu Information Technology Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180504 |
|
RJ01 | Rejection of invention patent application after publication |